<?xml version="1.0" encoding="UTF-8"?>
	<oval_definitions
		xsi:schemaLocation="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux linux-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#unix unix-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5 oval-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-common-5 oval-common-schema.xsd"
		xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5"
		xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
		xmlns:oval="http://oval.mitre.org/XMLSchema/oval-common-5"
		xmlns:oval-def="http://oval.mitre.org/XMLSchema/oval-definitions-5">
	  <generator>
	      <oval:product_name>Marcus Updateinfo to OVAL Converter</oval:product_name>
	      <oval:schema_version>5.5</oval:schema_version>
	      <oval:timestamp>2026-04-14T05:19:35</oval:timestamp>
	  </generator>
<definitions>
<definition id="oval:org.opensuse.security:def:200610002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-10002</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2006-10002" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-10002" source="CVE"/>
    <reference ref_id="SUSE CVE-2006-10002" ref_url="https://www.suse.com/security/cve/CVE-2006-10002" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:7681" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1152-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1153-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20993-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045338.html" source="SUSE-SU"/>
    <description>
    XML::Parser versions through 2.45 for Perl could overflow the pre-allocated buffer size cause a heap corruption (double free or corruption) and crashes.

A :utf8 PerlIO layer, parse_stream() in Expat.xs could overflow the XML input buffer because Perl's read() returns decoded characters while SvPV() gives back multi-byte UTF-8 bytes that can exceed the pre-allocated buffer size. This can cause heap corruption (double free or corruption) and crashes.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-05"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2006-10002/">CVE-2006-10002 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2006-10002">CVE-2006-10002 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259901">SUSE bug 1259901</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052811" comment="perl-XML-Parser-2.470.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010052337" comment="perl-XML-Parser is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:200610003" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2006-10003</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2006-10003" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-10003" source="CVE"/>
    <reference ref_id="SUSE CVE-2006-10003" ref_url="https://www.suse.com/security/cve/CVE-2006-10003" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:7681" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1152-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1153-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20993-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045338.html" source="SUSE-SU"/>
    <description>
    XML::Parser versions through 2.47 for Perl has an off-by-one heap buffer overflow in st_serial_stack.

In the case (stackptr == stacksize - 1), the stack will NOT be expanded. Then the new value will be written at location (++stackptr), which equals stacksize and therefore falls just outside the allocated buffer.

The bug can be observed when parsing an XML file with very deep element nesting
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-05"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2006-10003/">CVE-2006-10003 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2006-10003">CVE-2006-10003 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259902">SUSE bug 1259902</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052811" comment="perl-XML-Parser-2.470.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010052337" comment="perl-XML-Parser is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815853" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15853</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15853" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15853" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15853" ref_url="https://www.suse.com/security/cve/CVE-2018-15853" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3802-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QD7OXDVEE6GG73NXAXXSDS7BU4AU7ZPN/#QD7OXDVEE6GG73NXAXXSDS7BU4AU7ZPN" source="SUSE-SU"/>
    <description>
    Endless recursion exists in xkbcomp/expr.c in xkbcommon and libxkbcommon before 0.8.1, which could be used by local attackers to crash xkbcommon users by supplying a crafted keymap file that triggers boolean negation.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-02-04"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15853/">CVE-2018-15853 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15853">CVE-2018-15853 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1105832">SUSE bug 1105832</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041340" comment="xkbcomp-1.4.7-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010034109" comment="xkbcomp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041341" comment="xkbcomp-devel-1.4.7-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010034110" comment="xkbcomp-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815859" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15859</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15859" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15859" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15859" ref_url="https://www.suse.com/security/cve/CVE-2018-15859" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3802-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QD7OXDVEE6GG73NXAXXSDS7BU4AU7ZPN/#QD7OXDVEE6GG73NXAXXSDS7BU4AU7ZPN" source="SUSE-SU"/>
    <description>
    Unchecked NULL pointer usage when parsing invalid atoms in ExprResolveLhs in xkbcomp/expr.c in xkbcommon before 0.8.2 could be used by local attackers to crash (NULL pointer dereference) the xkbcommon parser by supplying a crafted keymap file, because lookup failures are mishandled.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-02-04"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15859/">CVE-2018-15859 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15859">CVE-2018-15859 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1105832">SUSE bug 1105832</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041340" comment="xkbcomp-1.4.7-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010034109" comment="xkbcomp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041341" comment="xkbcomp-devel-1.4.7-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010034110" comment="xkbcomp-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815861" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15861</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15861" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15861" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15861" ref_url="https://www.suse.com/security/cve/CVE-2018-15861" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3802-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QD7OXDVEE6GG73NXAXXSDS7BU4AU7ZPN/#QD7OXDVEE6GG73NXAXXSDS7BU4AU7ZPN" source="SUSE-SU"/>
    <description>
    Unchecked NULL pointer usage in ExprResolveLhs in xkbcomp/expr.c in xkbcommon before 0.8.2 could be used by local attackers to crash (NULL pointer dereference) the xkbcommon parser by supplying a crafted keymap file that triggers an xkb_intern_atom failure.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-02-04"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15861/">CVE-2018-15861 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15861">CVE-2018-15861 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1105832">SUSE bug 1105832</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041340" comment="xkbcomp-1.4.7-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010034109" comment="xkbcomp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041341" comment="xkbcomp-devel-1.4.7-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010034110" comment="xkbcomp-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:201815863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2018-15863</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2018-15863" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15863" source="CVE"/>
    <reference ref_id="SUSE CVE-2018-15863" ref_url="https://www.suse.com/security/cve/CVE-2018-15863" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2021:232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2021-June/008901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2018:3685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2018-November/004841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4407-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024030.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2018:3802-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QD7OXDVEE6GG73NXAXXSDS7BU4AU7ZPN/#QD7OXDVEE6GG73NXAXXSDS7BU4AU7ZPN" source="SUSE-SU"/>
    <description>
    Unchecked NULL pointer usage in ResolveStateAndPredicate in xkbcomp/compat.c in xkbcommon before 0.8.2 could be used by local attackers to crash (NULL pointer dereference) the xkbcommon parser by supplying a crafted keymap file with a no-op modmask expression.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-02-04"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2018-15863/">CVE-2018-15863 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2018-15863">CVE-2018-15863 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1105832">SUSE bug 1105832</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041340" comment="xkbcomp-1.4.7-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010034109" comment="xkbcomp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041341" comment="xkbcomp-devel-1.4.7-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010034110" comment="xkbcomp-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20211234" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-1234</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-1234" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-1234" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-1234" ref_url="https://www.suse.com/security/cve/CVE-2021-1234" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2025:15092-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DCN7O6E3P22YMNPL7E6QTRLJZEBZG3WZ/" source="SUSE-SU"/>
    <description>
    A vulnerability in the cluster management interface of Cisco&amp;nbsp;SD-WAN vManage Software could allow an unauthenticated, remote attacker to view sensitive information on an affected system. To be affected by this vulnerability, the vManage software must be in cluster mode.
This vulnerability is due to the absence of authentication for sensitive information in the cluster management interface. An attacker could exploit this vulnerability by sending a crafted request to the cluster management interface of an affected system. A successful exploit could allow the attacker to view sensitive information on the affected system.Cisco&amp;nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2025-12-19"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2021-1234/">CVE-2021-1234 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-1234">CVE-2021-1234 at NVD</cve>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032100" comment="pnpm-10.22.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032113" comment="pnpm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032101" comment="pnpm-bash-completion-10.22.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032114" comment="pnpm-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032102" comment="pnpm-fish-completion-10.22.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032115" comment="pnpm-fish-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032103" comment="pnpm-zsh-completion-10.22.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032116" comment="pnpm-zsh-completion is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202145261" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-45261</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-45261" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45261" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-45261" ref_url="https://www.suse.com/security/cve/CVE-2021-45261" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024342.html" source="SUSE-SU"/>
    <description>
    An Invalid Pointer vulnerability exists in GNU patch 2.7 via the another_hunk function, which causes a Denial of Service.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-16"/>
	<updated date="2026-03-04"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2021-45261/">CVE-2021-45261 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2021-45261">CVE-2021-45261 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1194037">SUSE bug 1194037</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044012" comment="patch-2.7.6-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151547" comment="patch is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20215678" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2021-5678</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2021-5678" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-5678" source="CVE"/>
    <reference ref_id="SUSE CVE-2021-5678" ref_url="https://www.suse.com/security/cve/CVE-2021-5678" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2025-11-29"/>
	<cve href="https://www.suse.com/security/cve/CVE-2021-5678/">CVE-2021-5678 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2021-5678">CVE-2021-5678 at NVD</cve>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032100" comment="pnpm-10.22.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032113" comment="pnpm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032101" comment="pnpm-bash-completion-10.22.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032114" comment="pnpm-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032102" comment="pnpm-fish-completion-10.22.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032115" comment="pnpm-fish-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032103" comment="pnpm-zsh-completion-10.22.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032116" comment="pnpm-zsh-completion is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202250253" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2022-50253</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2022-50253" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-50253" source="CVE"/>
    <reference ref_id="SUSE CVE-2022-50253" ref_url="https://www.suse.com/security/cve/CVE-2022-50253" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: make sure skb-&gt;len != 0 when redirecting to a tunneling device

syzkaller managed to trigger another case where skb-&gt;len == 0
when we enter __dev_queue_xmit:

WARNING: CPU: 0 PID: 2470 at include/linux/skbuff.h:2576 skb_assert_len include/linux/skbuff.h:2576 [inline]
WARNING: CPU: 0 PID: 2470 at include/linux/skbuff.h:2576 __dev_queue_xmit+0x2069/0x35e0 net/core/dev.c:4295

Call Trace:
 dev_queue_xmit+0x17/0x20 net/core/dev.c:4406
 __bpf_tx_skb net/core/filter.c:2115 [inline]
 __bpf_redirect_no_mac net/core/filter.c:2140 [inline]
 __bpf_redirect+0x5fb/0xda0 net/core/filter.c:2163
 ____bpf_clone_redirect net/core/filter.c:2447 [inline]
 bpf_clone_redirect+0x247/0x390 net/core/filter.c:2419
 bpf_prog_48159a89cb4a9a16+0x59/0x5e
 bpf_dispatcher_nop_func include/linux/bpf.h:897 [inline]
 __bpf_prog_run include/linux/filter.h:596 [inline]
 bpf_prog_run include/linux/filter.h:603 [inline]
 bpf_test_run+0x46c/0x890 net/bpf/test_run.c:402
 bpf_prog_test_run_skb+0xbdc/0x14c0 net/bpf/test_run.c:1170
 bpf_prog_test_run+0x345/0x3c0 kernel/bpf/syscall.c:3648
 __sys_bpf+0x43a/0x6c0 kernel/bpf/syscall.c:5005
 __do_sys_bpf kernel/bpf/syscall.c:5091 [inline]
 __se_sys_bpf kernel/bpf/syscall.c:5089 [inline]
 __x64_sys_bpf+0x7c/0x90 kernel/bpf/syscall.c:5089
 do_syscall_64+0x54/0x70 arch/x86/entry/common.c:48
 entry_SYSCALL_64_after_hwframe+0x61/0xc6

The reproducer doesn't really reproduce outside of syzkaller
environment, so I'm taking a guess here. It looks like we
do generate correct ETH_HLEN-sized packet, but we redirect
the packet to the tunneling device. Before we do so, we
__skb_pull l2 header and arrive again at skb-&gt;len == 0.
Doesn't seem like we can do anything better than having
an explicit check after __skb_pull?
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2022-50253/">CVE-2022-50253 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2022-50253">CVE-2022-50253 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249912">SUSE bug 1249912</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202326819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-26819</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-26819" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-26819" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-26819" ref_url="https://www.suse.com/security/cve/CVE-2023-26819" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03520-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042060.html" source="SUSE-SU"/>
    <description>
    cJSON 1.7.15 might allow a denial of service via a crafted JSON document such as {"a": true, "b": [ null,9999999999999999999999999999999999999999999999912345678901234567]}.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-13"/>
	<updated date="2026-03-13"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="2.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-26819/">CVE-2023-26819 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-26819">CVE-2023-26819 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1241502">SUSE bug 1241502</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048391" comment="cJSON-devel-1.7.19-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009862229" comment="cJSON-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048392" comment="libcjson1-1.7.19-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009862230" comment="libcjson1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202339327" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-39327</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-39327" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39327" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-39327" ref_url="https://www.suse.com/security/cve/CVE-2023-39327" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:3946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024348.html" source="SUSE-SU"/>
    <description>
    A flaw was found in OpenJPEG. Maliciously constructed pictures can cause the program to enter a large loop and continuously print warning messages on the terminal.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-15"/>
	<updated date="2026-02-19"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-39327/">CVE-2023-39327 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-39327">CVE-2023-39327 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227410">SUSE bug 1227410</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010043889" comment="libopenjp2-7-2.5.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153807" comment="libopenjp2-7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010043890" comment="libopenjp2-7-x86-64-v3-2.5.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010043905" comment="libopenjp2-7-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010043891" comment="openjpeg2-2.5.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153813" comment="openjpeg2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010043892" comment="openjpeg2-devel-2.5.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153814" comment="openjpeg2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010043893" comment="openjpeg2-devel-doc-2.5.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010043906" comment="openjpeg2-devel-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202340574" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-40574</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-40574" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40574" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-40574" ref_url="https://www.suse.com/security/cve/CVE-2023-40574" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017438.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions are subject to an Out-Of-Bounds Write in the `writePixelBGRX` function. This issue is likely down to incorrect calculations of the `nHeight` and `srcStep` variables. This issue has been addressed in version 3.0.0-beta3. Users are advised to upgrade. There are no known workarounds for this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-13"/>
	<updated date="2026-03-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2023-40574/">CVE-2023-40574 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40574">CVE-2023-40574 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214869">SUSE bug 1214869</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048376" comment="freerdp-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151908" comment="freerdp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048377" comment="freerdp-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151909" comment="freerdp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048378" comment="freerdp-proxy-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287971" comment="freerdp-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048379" comment="freerdp-proxy-plugins-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048429" comment="freerdp-proxy-plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048380" comment="freerdp-sdl-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048430" comment="freerdp-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048381" comment="freerdp-server-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245861" comment="freerdp-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048382" comment="freerdp-wayland-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245862" comment="freerdp-wayland is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048383" comment="libfreerdp-server-proxy3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048431" comment="libfreerdp-server-proxy3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048384" comment="libfreerdp3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048432" comment="libfreerdp3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048385" comment="librdtk0-0-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048433" comment="librdtk0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048386" comment="libuwac0-0-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245863" comment="libuwac0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048387" comment="libwinpr3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048434" comment="libwinpr3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048388" comment="rdtk0-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048435" comment="rdtk0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048389" comment="uwac0-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048436" comment="uwac0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048390" comment="winpr-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009877482" comment="winpr-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202340575" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-40575</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-40575" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40575" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-40575" ref_url="https://www.suse.com/security/cve/CVE-2023-40575" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017438.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions are subject to an Out-Of-Bounds Read in the `general_YUV444ToRGB_8u_P3AC4R_BGRX` function. This issue is likely down to insufficient data for the `pSrc` variable and results in crashes. This issue has been addressed in version 3.0.0-beta3. Users are advised to upgrade. There are no known workarounds for this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-13"/>
	<updated date="2026-03-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-40575/">CVE-2023-40575 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40575">CVE-2023-40575 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214870">SUSE bug 1214870</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048376" comment="freerdp-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151908" comment="freerdp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048377" comment="freerdp-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151909" comment="freerdp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048378" comment="freerdp-proxy-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287971" comment="freerdp-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048379" comment="freerdp-proxy-plugins-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048429" comment="freerdp-proxy-plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048380" comment="freerdp-sdl-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048430" comment="freerdp-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048381" comment="freerdp-server-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245861" comment="freerdp-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048382" comment="freerdp-wayland-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245862" comment="freerdp-wayland is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048383" comment="libfreerdp-server-proxy3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048431" comment="libfreerdp-server-proxy3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048384" comment="libfreerdp3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048432" comment="libfreerdp3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048385" comment="librdtk0-0-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048433" comment="librdtk0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048386" comment="libuwac0-0-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245863" comment="libuwac0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048387" comment="libwinpr3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048434" comment="libwinpr3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048388" comment="rdtk0-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048435" comment="rdtk0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048389" comment="uwac0-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048436" comment="uwac0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048390" comment="winpr-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009877482" comment="winpr-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202340576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-40576</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-40576" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40576" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-40576" ref_url="https://www.suse.com/security/cve/CVE-2023-40576" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2023:4611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-November/017261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4893-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017438.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol (RDP), released under the Apache license. Affected versions are subject to an Out-Of-Bounds Read in the `RleDecompress` function. This Out-Of-Bounds Read occurs because FreeRDP processes the `pbSrcBuffer` variable without checking if it contains data of sufficient length. Insufficient data in the `pbSrcBuffer` variable may cause errors or crashes. This issue has been addressed in version 3.0.0-beta3. Users are advised to upgrade. There are no known workarounds for this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-13"/>
	<updated date="2026-03-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2023-40576/">CVE-2023-40576 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-40576">CVE-2023-40576 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1214871">SUSE bug 1214871</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048376" comment="freerdp-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151908" comment="freerdp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048377" comment="freerdp-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151909" comment="freerdp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048378" comment="freerdp-proxy-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287971" comment="freerdp-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048379" comment="freerdp-proxy-plugins-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048429" comment="freerdp-proxy-plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048380" comment="freerdp-sdl-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048430" comment="freerdp-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048381" comment="freerdp-server-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245861" comment="freerdp-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048382" comment="freerdp-wayland-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245862" comment="freerdp-wayland is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048383" comment="libfreerdp-server-proxy3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048431" comment="libfreerdp-server-proxy3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048384" comment="libfreerdp3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048432" comment="libfreerdp3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048385" comment="librdtk0-0-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048433" comment="librdtk0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048386" comment="libuwac0-0-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245863" comment="libuwac0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048387" comment="libwinpr3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048434" comment="libwinpr3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048388" comment="rdtk0-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048435" comment="rdtk0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048389" comment="uwac0-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048436" comment="uwac0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048390" comment="winpr-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009877482" comment="winpr-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20234256" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-4256</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-4256" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-4256" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-4256" ref_url="https://www.suse.com/security/cve/CVE-2023-4256" source="SUSE CVE"/>
    <description>
    Within tcpreplay's tcprewrite, a double free vulnerability has been identified in the tcpedit_dlt_cleanup() function within plugins/dlt_plugins.c. This vulnerability can be exploited by supplying a specifically crafted file to the tcprewrite binary. This flaw enables a local attacker to initiate a Denial of Service (DoS) attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2025-11-29"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-4256/">CVE-2023-4256 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-4256">CVE-2023-4256 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1218249">SUSE bug 1218249</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032111" comment="tcpreplay-4.5.2-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154264" comment="tcpreplay is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202343000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-43000</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-43000" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43000" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-43000" ref_url="https://www.suse.com/security/cve/CVE-2023-43000" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:22789" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023882.html" source="SUSE-SU"/>
    <description>
    A use-after-free issue was addressed with improved memory management. This issue is fixed in macOS Ventura 13.5, iOS 16.6 and iPadOS 16.6, Safari 16.6, iOS 15.8.7 and iPadOS 15.8.7. Processing maliciously crafted web content may lead to memory corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-22"/>
	<updated date="2026-03-13"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2023-43000/">CVE-2023-43000 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2023-43000">CVE-2023-43000 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254164">SUSE bug 1254164</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038439" comment="WebKitGTK-4.0-lang-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779926" comment="WebKitGTK-4.0-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038440" comment="WebKitGTK-4.1-lang-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779927" comment="WebKitGTK-4.1-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038441" comment="WebKitGTK-6.0-lang-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779928" comment="WebKitGTK-6.0-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038442" comment="libjavascriptcoregtk-4_0-18-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038443" comment="libjavascriptcoregtk-4_1-0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698039" comment="libjavascriptcoregtk-4_1-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038444" comment="libjavascriptcoregtk-6_0-1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779930" comment="libjavascriptcoregtk-6_0-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038445" comment="libwebkit2gtk-4_0-37-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038446" comment="libwebkit2gtk-4_1-0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698041" comment="libwebkit2gtk-4_1-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038447" comment="libwebkitgtk-6_0-4-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779932" comment="libwebkitgtk-6_0-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038448" comment="typelib-1_0-JavaScriptCore-4_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038449" comment="typelib-1_0-JavaScriptCore-4_1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698148" comment="typelib-1_0-JavaScriptCore-4_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038450" comment="typelib-1_0-JavaScriptCore-6_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779933" comment="typelib-1_0-JavaScriptCore-6_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038451" comment="typelib-1_0-WebKit-6_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779934" comment="typelib-1_0-WebKit-6_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038452" comment="typelib-1_0-WebKit2-4_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038453" comment="typelib-1_0-WebKit2-4_1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698149" comment="typelib-1_0-WebKit2-4_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038454" comment="typelib-1_0-WebKit2WebExtension-4_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038455" comment="typelib-1_0-WebKit2WebExtension-4_1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698150" comment="typelib-1_0-WebKit2WebExtension-4_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038456" comment="typelib-1_0-WebKitWebProcessExtension-6_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779935" comment="typelib-1_0-WebKitWebProcessExtension-6_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038457" comment="webkit-jsc-4-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038458" comment="webkit-jsc-4.1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698152" comment="webkit-jsc-4.1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038459" comment="webkit-jsc-6.0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779936" comment="webkit-jsc-6.0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038460" comment="webkit2gtk-4_0-injected-bundles-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038461" comment="webkit2gtk-4_1-injected-bundles-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698045" comment="webkit2gtk-4_1-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038462" comment="webkit2gtk3-devel-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038463" comment="webkit2gtk3-minibrowser-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038464" comment="webkit2gtk3-soup2-devel-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698154" comment="webkit2gtk3-soup2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038465" comment="webkit2gtk3-soup2-minibrowser-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698155" comment="webkit2gtk3-soup2-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038466" comment="webkit2gtk4-devel-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698156" comment="webkit2gtk4-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038467" comment="webkit2gtk4-minibrowser-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698157" comment="webkit2gtk4-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038468" comment="webkitgtk-6_0-injected-bundles-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779937" comment="webkitgtk-6_0-injected-bundles is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202343279" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-43279</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-43279" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43279" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-43279" ref_url="https://www.suse.com/security/cve/CVE-2023-43279" source="SUSE CVE"/>
    <description>
    Null Pointer Dereference in mask_cidr6 component at cidr.c in Tcpreplay 4.4.4 allows attackers to crash the application via crafted tcprewrite command.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2025-11-29"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2023-43279/">CVE-2023-43279 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2023-43279">CVE-2023-43279 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1221324">SUSE bug 1221324</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032111" comment="tcpreplay-4.5.2-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154264" comment="tcpreplay is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202348795" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2023-48795</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2023-48795" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-48795" source="CVE"/>
    <reference ref_id="SUSE CVE-2023-48795" ref_url="https://www.suse.com/security/cve/CVE-2023-48795" source="SUSE CVE"/>
		<reference ref_id="SUSE-CU-2023:4230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:280-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:281-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017731.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:285-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017734.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-CU-2024:340-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2024:18-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2024:19-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-IU-2024:20-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2023:4946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2023-December/017514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-January/017759.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/017960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0974-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-March/018187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3656-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-October/037265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20009-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021369.html" source="SUSE-SU"/>
		<reference ref_id="TID000021295" ref_url="https://www.suse.com/support/kb/doc/?id=000021295" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2023:0411-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/S7UNBVBZXNPUVRYGXMQJVWO63X7TAJUV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2023:0421-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CNYVAEZZNHEKG5C7JHU5U3MPN73U4OKG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:0005-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BVOEVD2B4CFVDJEJANZW6QGRI6FTWFJ3/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:0008-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/L45IOOVVBSIBE7RRRVUWOWDGUABBZE4Q/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:0036-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UXSOYCFCX44QUQ434BAHHQRSSCB3KZG5/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:0135-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NJ4UKYMVT5L6QOJVM6JMV6AQINAVT4JW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0003-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PE3D4WEFUCELLDKJUEM2KLPFMME7KTAI/" source="SUSE-SU"/>
    <description>
    The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2025-12-24"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2023-48795/">CVE-2023-48795 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2023-48795">CVE-2023-48795 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1217950">SUSE bug 1217950</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1218708">SUSE bug 1218708</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035139" comment="cheat-4.4.2-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961128" comment="cheat is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20240406" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-0406</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-0406" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0406" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-0406" ref_url="https://www.suse.com/security/cve/CVE-2024-0406" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2025:14996-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WDWOGLHCP7BB4S74RDGLKFSALZGMVZWZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15004-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6KWGLCFENU7T4T4H7YR4P6HDEUWVL5XF/" source="SUSE-SU"/>
    <description>
    A flaw was discovered in the mholt/archiver package. This flaw allows an attacker to create a specially crafted tar file, which, when unpacked, may allow access to restricted files or directories. This issue can allow the creation or overwriting of files with the user's or application's privileges using the library.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-15"/>
	<updated date="2025-12-15"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-0406/">CVE-2024-0406 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-0406">CVE-2024-0406 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1241181">SUSE bug 1241181</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033446" comment="hauler-1.3.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033447" comment="hauler is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202410525" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-10525</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-10525" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-10525" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-10525" ref_url="https://www.suse.com/security/cve/CVE-2024-10525" source="SUSE CVE"/>
    <description>
    In Eclipse Mosquitto, from version 1.3.2 through 2.0.18, if a malicious broker sends a crafted SUBACK packet with no reason codes, a client using libmosquitto may make out of bounds memory access when acting in its on_subscribe callback. This affects the mosquitto_sub and mosquitto_rr clients.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-24"/>
	<updated date="2026-02-24"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-10525/">CVE-2024-10525 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-10525">CVE-2024-10525 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232636">SUSE bug 1232636</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044663" comment="libmosquitto1-2.0.23-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244945" comment="libmosquitto1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044664" comment="libmosquittopp1-2.0.23-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244946" comment="libmosquittopp1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044665" comment="mosquitto-2.0.23-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244947" comment="mosquitto is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044666" comment="mosquitto-clients-2.0.23-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244948" comment="mosquitto-clients is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044667" comment="mosquitto-devel-2.0.23-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244949" comment="mosquitto-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202411584" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-11584</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-11584" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11584" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-11584" ref_url="https://www.suse.com/security/cve/CVE-2024-11584" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2026:20174-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/043804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2026:20192-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/043824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20656-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20755-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041923.html" source="SUSE-SU"/>
    <description>
    cloud-init  through 25.1.2 includes the systemd socket unit  cloud-init-hotplugd.socket with default  SocketMode  that grants 0666 permissions, making it world-writable.  This is used for the "/run/cloud-init/hook-hotplug-cmd" FIFO. An unprivileged user could trigger  hotplug-hook commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-02-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="5.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-11584/">CVE-2024-11584 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-11584">CVE-2024-11584 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245403">SUSE bug 1245403</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041352" comment="cloud-init-25.1.3-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009273021" comment="cloud-init is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041353" comment="cloud-init-config-suse-25.1.3-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009273022" comment="cloud-init-config-suse is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041354" comment="cloud-init-doc-25.1.3-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009273023" comment="cloud-init-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202412224" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-12224</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-12224" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-12224" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-12224" ref_url="https://www.suse.com/security/cve/CVE-2024-12224" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2025:02203-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2025:02204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/040996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02587-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/040995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02768-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02810-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02811-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041228.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03298-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03306-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03307-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03445-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/041988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20491-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20716-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20783-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20858-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3783-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3784-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3785-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3786-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025105.html" source="SUSE-SU"/>
    <description>
    Improper Validation of Unsafe Equivalence in punycode by the idna crate from Servo rust-url allows an attacker to create a punycode hostname that one part of a system might treat as distinct while another part of that system would treat as equivalent to another hostname.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-22"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="2.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-12224/">CVE-2024-12224 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-12224">CVE-2024-12224 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243848">SUSE bug 1243848</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038432" comment="cargo-c-0.10.15-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009948421" comment="cargo-c is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050018" comment="gdk-pixbuf-loader-rsvg-2.60.2-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151634" comment="gdk-pixbuf-loader-rsvg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050019" comment="librsvg-2-2-2.60.2-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151635" comment="librsvg-2-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050702" comment="librsvg-devel-2.60.2-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151636" comment="librsvg-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050703" comment="rsvg-convert-2.60.2-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009353380" comment="rsvg-convert is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050704" comment="rsvg-thumbnailer-2.60.2-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161885" comment="rsvg-thumbnailer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050705" comment="typelib-1_0-Rsvg-2_0-2.60.2-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151637" comment="typelib-1_0-Rsvg-2_0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202413978" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-13978</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-13978" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-13978" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-13978" ref_url="https://www.suse.com/security/cve/CVE-2024-13978" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03348-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21009-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023396.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in LibTIFF up to 4.7.0. It has been declared as problematic. Affected by this vulnerability is the function t2p_read_tiff_init of the file tools/tiff2pdf.c of the component fax2ps. The manipulation leads to null pointer dereference. The attack needs to be approached locally. The complexity of an attack is rather high. The exploitation appears to be difficult. The patch is named 2ebfffb0e8836bfb1cd7d85c059cd285c59761a4. It is recommended to apply a patch to fix this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-22"/>
	<updated date="2025-12-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-13978/">CVE-2024-13978 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-13978">CVE-2024-13978 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247581">SUSE bug 1247581</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030533" comment="libtiff-devel-4.7.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151316" comment="libtiff-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030534" comment="libtiff-devel-docs-4.7.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010030587" comment="libtiff-devel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030535" comment="libtiff6-4.7.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009940809" comment="libtiff6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030536" comment="tiff-4.7.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151319" comment="tiff is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030537" comment="tiff-docs-4.7.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010030588" comment="tiff-docs is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202422038" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-22038</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-22038" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22038" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-22038" ref_url="https://www.suse.com/security/cve/CVE-2024-22038" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-December/019937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020511.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14543-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SSIRMKVEDVCU2OCQMQLG2IJZ4RGLG656/" source="SUSE-SU"/>
    <description>
    Various problems in obs-scm-bridge allows attackers that create specially crafted git repositories to leak information of cause denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-14"/>
	<updated date="2026-03-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-22038/">CVE-2024-22038 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-22038">CVE-2024-22038 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230469">SUSE bug 1230469</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048713" comment="obs-scm-bridge-0.7.4-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009956651" comment="obs-scm-bridge is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048714" comment="osc-1.24.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151686" comment="osc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202422211" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-22211</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-22211" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22211" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-22211" ref_url="https://www.suse.com/security/cve/CVE-2024-22211" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9092" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:0649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-February/018056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019043.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a set of free and open source remote desktop protocol library and clients. In affected versions an integer overflow in `freerdp_bitmap_planar_context_reset` leads to heap-buffer overflow. This affects FreeRDP based clients. FreeRDP based server implementations and proxy are not affected. A malicious server could prepare a `RDPGFX_RESET_GRAPHICS_PDU` to allocate too small buffers, possibly triggering later out of bound read/write. Data extraction over network is not possible, the buffers are used to display an image. This issue has been addressed in version 2.11.5 and 3.2.0. Users are advised to upgrade. there are no know workarounds for this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-13"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2024-22211/">CVE-2024-22211 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-22211">CVE-2024-22211 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219049">SUSE bug 1219049</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048376" comment="freerdp-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151908" comment="freerdp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048377" comment="freerdp-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151909" comment="freerdp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048378" comment="freerdp-proxy-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287971" comment="freerdp-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048379" comment="freerdp-proxy-plugins-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048429" comment="freerdp-proxy-plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048380" comment="freerdp-sdl-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048430" comment="freerdp-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048381" comment="freerdp-server-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245861" comment="freerdp-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048382" comment="freerdp-wayland-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245862" comment="freerdp-wayland is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047341" comment="freerdp2-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010047350" comment="freerdp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047342" comment="freerdp2-devel-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010047351" comment="freerdp2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047343" comment="freerdp2-proxy-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010047352" comment="freerdp2-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047344" comment="freerdp2-server-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010047353" comment="freerdp2-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048383" comment="libfreerdp-server-proxy3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048431" comment="libfreerdp-server-proxy3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047345" comment="libfreerdp2-2-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009877480" comment="libfreerdp2-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048384" comment="libfreerdp3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048432" comment="libfreerdp3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048385" comment="librdtk0-0-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048433" comment="librdtk0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048386" comment="libuwac0-0-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245863" comment="libuwac0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047346" comment="libwinpr2-2-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009877481" comment="libwinpr2-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048387" comment="libwinpr3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048434" comment="libwinpr3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048388" comment="rdtk0-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048435" comment="rdtk0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048389" comment="uwac0-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048436" comment="uwac0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048390" comment="winpr-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009877482" comment="winpr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047347" comment="winpr2-devel-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245865" comment="winpr2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202422373" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-22373</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-22373" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22373" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-22373" ref_url="https://www.suse.com/security/cve/CVE-2024-22373" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:0167-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OVC3YQG7DFW4JG5KA2OTCA2FXYQHJQXJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:0168-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VPMULE4ATWMCC5FCR25GEIHTPR3ZUZ76/" source="SUSE-SU"/>
    <description>
    An out-of-bounds write vulnerability exists in the JPEG2000Codec::DecodeByStreamsCommon functionality of Mathieu Malaterre Grassroot DICOM 3.0.23. A specially crafted DICOM file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-11"/>
	<updated date="2026-02-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-22373/">CVE-2024-22373 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-22373">CVE-2024-22373 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223398">SUSE bug 1223398</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042602" comment="gdcm-3.0.24-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009717493" comment="gdcm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042603" comment="gdcm-applications-3.0.24-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009717494" comment="gdcm-applications is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042604" comment="gdcm-devel-3.0.24-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009717495" comment="gdcm-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042605" comment="gdcm-examples-3.0.24-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009717496" comment="gdcm-examples is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042606" comment="libgdcm3_0-3.0.24-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009717497" comment="libgdcm3_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042607" comment="libsocketxx1_2-3.0.24-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009717498" comment="libsocketxx1_2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042608" comment="orthanc-1.12.10-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009717499" comment="orthanc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042609" comment="orthanc-authorization-0.10.3-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010042625" comment="orthanc-authorization is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042610" comment="orthanc-devel-1.12.10-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009717500" comment="orthanc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042611" comment="orthanc-dicomweb-1.22-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010042626" comment="orthanc-dicomweb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042612" comment="orthanc-doc-1.12.10-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009717501" comment="orthanc-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042613" comment="orthanc-gdcm-1.8-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009717502" comment="orthanc-gdcm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042614" comment="orthanc-indexer-1.0-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010042627" comment="orthanc-indexer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042615" comment="orthanc-mysql-5.2-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010042628" comment="orthanc-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042616" comment="orthanc-neuro-1.1-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010042629" comment="orthanc-neuro is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042617" comment="orthanc-postgresql-10.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010042630" comment="orthanc-postgresql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042618" comment="orthanc-python-7.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010042631" comment="orthanc-python is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042619" comment="orthanc-source-1.12.10-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009717503" comment="orthanc-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042620" comment="orthanc-stl-1.2-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010042632" comment="orthanc-stl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042621" comment="orthanc-tcia-1.3-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010042633" comment="orthanc-tcia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042622" comment="orthanc-wsi-3.3-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010042634" comment="orthanc-wsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042623" comment="python3-gdcm-3.0.24-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009717505" comment="python3-gdcm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042624" comment="python313-pyorthanc-1.22.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010042635" comment="python313-pyorthanc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202422391" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-22391</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-22391" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22391" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-22391" ref_url="https://www.suse.com/security/cve/CVE-2024-22391" source="SUSE CVE"/>
    <description>
    A heap-based buffer overflow vulnerability exists in the LookupTable::SetLUT functionality of Mathieu Malaterre Grassroot DICOM 3.0.23. A specially crafted malformed file can lead to memory corruption. An attacker can provide a malicious file to trigger this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-11"/>
	<updated date="2026-02-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-22391/">CVE-2024-22391 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-22391">CVE-2024-22391 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223400">SUSE bug 1223400</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042602" comment="gdcm-3.0.24-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009717493" comment="gdcm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042603" comment="gdcm-applications-3.0.24-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009717494" comment="gdcm-applications is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042604" comment="gdcm-devel-3.0.24-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009717495" comment="gdcm-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042605" comment="gdcm-examples-3.0.24-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009717496" comment="gdcm-examples is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042606" comment="libgdcm3_0-3.0.24-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009717497" comment="libgdcm3_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042607" comment="libsocketxx1_2-3.0.24-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009717498" comment="libsocketxx1_2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042608" comment="orthanc-1.12.10-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009717499" comment="orthanc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042609" comment="orthanc-authorization-0.10.3-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010042625" comment="orthanc-authorization is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042610" comment="orthanc-devel-1.12.10-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009717500" comment="orthanc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042611" comment="orthanc-dicomweb-1.22-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010042626" comment="orthanc-dicomweb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042612" comment="orthanc-doc-1.12.10-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009717501" comment="orthanc-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042613" comment="orthanc-gdcm-1.8-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009717502" comment="orthanc-gdcm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042614" comment="orthanc-indexer-1.0-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010042627" comment="orthanc-indexer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042615" comment="orthanc-mysql-5.2-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010042628" comment="orthanc-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042616" comment="orthanc-neuro-1.1-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010042629" comment="orthanc-neuro is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042617" comment="orthanc-postgresql-10.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010042630" comment="orthanc-postgresql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042618" comment="orthanc-python-7.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010042631" comment="orthanc-python is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042619" comment="orthanc-source-1.12.10-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009717503" comment="orthanc-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042620" comment="orthanc-stl-1.2-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010042632" comment="orthanc-stl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042621" comment="orthanc-tcia-1.3-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010042633" comment="orthanc-tcia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042622" comment="orthanc-wsi-3.3-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010042634" comment="orthanc-wsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042623" comment="python3-gdcm-3.0.24-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009717505" comment="python3-gdcm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042624" comment="python313-pyorthanc-1.22.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010042635" comment="python313-pyorthanc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202422654" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-22654</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-22654" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22654" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-22654" ref_url="https://www.suse.com/security/cve/CVE-2024-22654" source="SUSE CVE"/>
    <description>
    tcpreplay v4.4.4 was discovered to contain an infinite loop via the tcprewrite function at get.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2025-11-29"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-22654/">CVE-2024-22654 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-22654">CVE-2024-22654 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243845">SUSE bug 1243845</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032111" comment="tcpreplay-4.5.2-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154264" comment="tcpreplay is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20242312" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-2312</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-2312" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2312" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-2312" ref_url="https://www.suse.com/security/cve/CVE-2024-2312" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024522.html" source="SUSE-SU"/>
    <description>
    GRUB2 does not call the module fini functions on exit, leading to Debian/Ubuntu's peimage GRUB2 module leaving UEFI system table hooks after exit. This lead to a use-after-free condition, and could possibly lead to secure boot bypass.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-08"/>
	<updated date="2026-03-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-2312/">CVE-2024-2312 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-2312">CVE-2024-2312 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222868">SUSE bug 1222868</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047568" comment="shim-16.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152144" comment="shim is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202424826" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-24826</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-24826" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24826" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-24826" ref_url="https://www.suse.com/security/cve/CVE-2024-24826" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045229.html" source="SUSE-SU"/>
    <description>
    Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An out-of-bounds read was found in Exiv2 version v0.28.1. The vulnerable function, `QuickTimeVideo::NikonTagsDecoder`, was new in v0.28.0, so Exiv2 versions before v0.28 are _not_ affected. The out-of-bounds read is triggered when Exiv2 is used to read the metadata of a crafted video file. In most cases this out of bounds read will result in a crash. This bug is fixed in version v0.28.2. Users are advised to upgrade. There are no known workarounds for this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-24826/">CVE-2024-24826 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-24826">CVE-2024-24826 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219870">SUSE bug 1219870</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051765" comment="exiv2-0.28.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154125" comment="exiv2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051766" comment="exiv2-lang-0.28.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154126" comment="exiv2-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050764" comment="libexiv2-28-0.28.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010051915" comment="libexiv2-28 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050765" comment="libexiv2-28-x86-64-v3-0.28.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010051916" comment="libexiv2-28-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051767" comment="libexiv2-devel-0.28.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152552" comment="libexiv2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202424853" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-24853</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-24853" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24853" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-24853" ref_url="https://www.suse.com/security/cve/CVE-2024-24853" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:2941-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3095-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0668-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0670-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20758-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20941-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045211.html" source="SUSE-SU"/>
    <description>
    Incorrect behavior order in transition between executive monitor and SMI transfer monitor (STM) in some Intel(R) Processor may allow a privileged user to potentially enable escalation of privilege via local access.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2024-24853/">CVE-2024-24853 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-24853">CVE-2024-24853 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229129">SUSE bug 1229129</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050021" comment="ucode-intel-20260210-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009169251" comment="ucode-intel is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202425112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-25112</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-25112" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25112" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-25112" ref_url="https://www.suse.com/security/cve/CVE-2024-25112" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045229.html" source="SUSE-SU"/>
    <description>
    Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. A denial-of-service was found in Exiv2 version v0.28.1: an unbounded recursion can cause Exiv2 to crash by exhausting the stack. The vulnerable function, `QuickTimeVideo::multipleEntriesDecoder`, was new in v0.28.0, so Exiv2 versions before v0.28 are _not_ affected. The denial-of-service is triggered when Exiv2 is used to read the metadata of a crafted video file. This bug is fixed in version v0.28.2. Users are advised to upgrade. There are no known workarounds for this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-25112/">CVE-2024-25112 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-25112">CVE-2024-25112 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1219871">SUSE bug 1219871</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051765" comment="exiv2-0.28.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154125" comment="exiv2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051766" comment="exiv2-lang-0.28.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154126" comment="exiv2-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050764" comment="libexiv2-28-0.28.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010051915" comment="libexiv2-28 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050765" comment="libexiv2-28-x86-64-v3-0.28.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010051916" comment="libexiv2-28-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051767" comment="libexiv2-devel-0.28.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152552" comment="libexiv2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202425569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-25569</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-25569" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25569" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-25569" ref_url="https://www.suse.com/security/cve/CVE-2024-25569" source="SUSE CVE"/>
    <description>
    An out-of-bounds read vulnerability exists in the RAWCodec::DecodeBytes functionality of Mathieu Malaterre Grassroot DICOM 3.0.23. A specially crafted DICOM file can lead to an out-of-bounds read. An attacker can provide a malicious file to trigger this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-11"/>
	<updated date="2026-02-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-25569/">CVE-2024-25569 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-25569">CVE-2024-25569 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223401">SUSE bug 1223401</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042602" comment="gdcm-3.0.24-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009717493" comment="gdcm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042603" comment="gdcm-applications-3.0.24-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009717494" comment="gdcm-applications is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042604" comment="gdcm-devel-3.0.24-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009717495" comment="gdcm-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042605" comment="gdcm-examples-3.0.24-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009717496" comment="gdcm-examples is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042606" comment="libgdcm3_0-3.0.24-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009717497" comment="libgdcm3_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042607" comment="libsocketxx1_2-3.0.24-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009717498" comment="libsocketxx1_2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042608" comment="orthanc-1.12.10-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009717499" comment="orthanc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042609" comment="orthanc-authorization-0.10.3-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010042625" comment="orthanc-authorization is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042610" comment="orthanc-devel-1.12.10-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009717500" comment="orthanc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042611" comment="orthanc-dicomweb-1.22-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010042626" comment="orthanc-dicomweb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042612" comment="orthanc-doc-1.12.10-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009717501" comment="orthanc-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042613" comment="orthanc-gdcm-1.8-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009717502" comment="orthanc-gdcm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042614" comment="orthanc-indexer-1.0-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010042627" comment="orthanc-indexer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042615" comment="orthanc-mysql-5.2-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010042628" comment="orthanc-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042616" comment="orthanc-neuro-1.1-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010042629" comment="orthanc-neuro is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042617" comment="orthanc-postgresql-10.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010042630" comment="orthanc-postgresql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042618" comment="orthanc-python-7.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010042631" comment="orthanc-python is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042619" comment="orthanc-source-1.12.10-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009717503" comment="orthanc-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042620" comment="orthanc-stl-1.2-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010042632" comment="orthanc-stl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042621" comment="orthanc-tcia-1.3-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010042633" comment="orthanc-tcia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042622" comment="orthanc-wsi-3.3-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010042634" comment="orthanc-wsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042623" comment="python3-gdcm-3.0.24-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009717505" comment="python3-gdcm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042624" comment="python313-pyorthanc-1.22.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010042635" comment="python313-pyorthanc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202426134" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-26134</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-26134" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-26134" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-26134" ref_url="https://www.suse.com/security/cve/CVE-2024-26134" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023501.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14733-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3J6INDULK4UFE4EESVOPROBMFBKXOAXS/" source="SUSE-SU"/>
    <description>
    cbor2 provides encoding and decoding for the Concise Binary Object Representation (CBOR) (RFC 8949) serialization format. Starting in version 5.5.1 and prior to version 5.6.2, an attacker can crash a service using cbor2 to parse a CBOR binary by sending a long enough object. Version 5.6.2 contains a patch for this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-03"/>
	<updated date="2025-12-11"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-26134/">CVE-2024-26134 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-26134">CVE-2024-26134 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1220096">SUSE bug 1220096</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032408" comment="python313-cbor2-5.6.5-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032409" comment="python313-cbor2 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202428180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-28180</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-28180" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-28180" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-28180" ref_url="https://www.suse.com/security/cve/CVE-2024-28180" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:1987-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-June/035548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1987-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-July/035958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2754-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-August/036292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3120-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3151-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021351.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20550-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044567.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14618-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/O3WPJO3GKMRSPM2EPUNFU5AXM6YFRQAN/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14663-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IL7QOYRPFRGRS6UKU6ZYHI76FWFFUJNK/" source="SUSE-SU"/>
    <description>
    Package jose aims to provide an implementation of the Javascript Object Signing and Encryption set of standards. An attacker could send a JWE containing compressed data that used large amounts of memory and CPU when decompressed by Decrypt or DecryptMulti. Those functions now return an error if the decompressed data would exceed 250kB or 10x the compressed size (whichever is larger). This vulnerability has been patched in versions 4.0.1, 3.0.3 and 2.6.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-28180/">CVE-2024-28180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-28180">CVE-2024-28180 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234984">SUSE bug 1234984</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045691" comment="containerized-data-importer-api-1.64.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624359" comment="containerized-data-importer-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045692" comment="containerized-data-importer-cloner-1.64.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624360" comment="containerized-data-importer-cloner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045693" comment="containerized-data-importer-controller-1.64.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624361" comment="containerized-data-importer-controller is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045694" comment="containerized-data-importer-importer-1.64.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624362" comment="containerized-data-importer-importer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045695" comment="containerized-data-importer-manifests-1.64.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624363" comment="containerized-data-importer-manifests is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045696" comment="containerized-data-importer-operator-1.64.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624364" comment="containerized-data-importer-operator is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045697" comment="containerized-data-importer-uploadproxy-1.64.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624365" comment="containerized-data-importer-uploadproxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045698" comment="containerized-data-importer-uploadserver-1.64.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624366" comment="containerized-data-importer-uploadserver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045699" comment="obs-service-cdi_containers_meta-1.64.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009714767" comment="obs-service-cdi_containers_meta is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20243024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-3024</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-3024" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3024" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-3024" ref_url="https://www.suse.com/security/cve/CVE-2024-3024" source="SUSE CVE"/>
    <description>
    A vulnerability was found in appneta tcpreplay up to 4.4.4. It has been classified as problematic. This affects the function get_layer4_v6 of the file /tcpreplay/src/common/get.c. The manipulation leads to heap-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The identifier VDB-258333 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2025-12-19"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-3024/">CVE-2024-3024 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3024">CVE-2024-3024 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1222131">SUSE bug 1222131</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032111" comment="tcpreplay-4.5.2-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154264" comment="tcpreplay is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202432039" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-32039</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-32039" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32039" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-32039" ref_url="https://www.suse.com/security/cve/CVE-2024-32039" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9092" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1609-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1610-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035234.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients using a version of FreeRDP prior to 3.5.0 or 2.11.6 are vulnerable to integer overflow and out-of-bounds write. Versions 3.5.0 and 2.11.6 patch the issue. As a workaround, do not use `/gfx` options (e.g. deactivate with `/bpp:32` or `/rfx` as it is on by default).
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-13"/>
	<updated date="2026-03-13"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-32039/">CVE-2024-32039 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32039">CVE-2024-32039 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223293">SUSE bug 1223293</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048376" comment="freerdp-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151908" comment="freerdp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048377" comment="freerdp-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151909" comment="freerdp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048378" comment="freerdp-proxy-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287971" comment="freerdp-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048379" comment="freerdp-proxy-plugins-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048429" comment="freerdp-proxy-plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048380" comment="freerdp-sdl-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048430" comment="freerdp-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048381" comment="freerdp-server-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245861" comment="freerdp-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048382" comment="freerdp-wayland-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245862" comment="freerdp-wayland is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048383" comment="libfreerdp-server-proxy3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048431" comment="libfreerdp-server-proxy3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048384" comment="libfreerdp3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048432" comment="libfreerdp3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048385" comment="librdtk0-0-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048433" comment="librdtk0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048386" comment="libuwac0-0-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245863" comment="libuwac0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048387" comment="libwinpr3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048434" comment="libwinpr3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048388" comment="rdtk0-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048435" comment="rdtk0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048389" comment="uwac0-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048436" comment="uwac0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048390" comment="winpr-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009877482" comment="winpr-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202432040" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-32040</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-32040" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32040" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-32040" ref_url="https://www.suse.com/security/cve/CVE-2024-32040" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9092" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1609-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1610-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035234.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients that use a version of FreeRDP prior to 3.5.0 or 2.11.6 and have connections to servers using the `NSC` codec are vulnerable to integer underflow. Versions 3.5.0 and 2.11.6 patch the issue. As a workaround, do not use the NSC codec (e.g. use `-nsc`).
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-13"/>
	<updated date="2026-03-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-32040/">CVE-2024-32040 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32040">CVE-2024-32040 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223294">SUSE bug 1223294</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048376" comment="freerdp-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151908" comment="freerdp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048377" comment="freerdp-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151909" comment="freerdp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048378" comment="freerdp-proxy-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287971" comment="freerdp-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048379" comment="freerdp-proxy-plugins-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048429" comment="freerdp-proxy-plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048380" comment="freerdp-sdl-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048430" comment="freerdp-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048381" comment="freerdp-server-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245861" comment="freerdp-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048382" comment="freerdp-wayland-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245862" comment="freerdp-wayland is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048383" comment="libfreerdp-server-proxy3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048431" comment="libfreerdp-server-proxy3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048384" comment="libfreerdp3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048432" comment="libfreerdp3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048385" comment="librdtk0-0-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048433" comment="librdtk0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048386" comment="libuwac0-0-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245863" comment="libuwac0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048387" comment="libwinpr3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048434" comment="libwinpr3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048388" comment="rdtk0-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048435" comment="rdtk0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048389" comment="uwac0-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048436" comment="uwac0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048390" comment="winpr-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009877482" comment="winpr-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202432041" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-32041</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-32041" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32041" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-32041" ref_url="https://www.suse.com/security/cve/CVE-2024-32041" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9092" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1609-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1610-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035234.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients that use a version of FreeRDP prior to 3.5.0 or 2.11.6 are vulnerable to out-of-bounds read. Versions 3.5.0 and 2.11.6 patch the issue. As a workaround, deactivate `/gfx` (on by default, set `/bpp` or `/rfx` options instead.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-13"/>
	<updated date="2026-03-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-32041/">CVE-2024-32041 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32041">CVE-2024-32041 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223295">SUSE bug 1223295</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048376" comment="freerdp-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151908" comment="freerdp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048377" comment="freerdp-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151909" comment="freerdp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048378" comment="freerdp-proxy-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287971" comment="freerdp-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048379" comment="freerdp-proxy-plugins-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048429" comment="freerdp-proxy-plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048380" comment="freerdp-sdl-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048430" comment="freerdp-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048381" comment="freerdp-server-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245861" comment="freerdp-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048382" comment="freerdp-wayland-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245862" comment="freerdp-wayland is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048383" comment="libfreerdp-server-proxy3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048431" comment="libfreerdp-server-proxy3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048384" comment="libfreerdp3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048432" comment="libfreerdp3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048385" comment="librdtk0-0-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048433" comment="librdtk0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048386" comment="libuwac0-0-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245863" comment="libuwac0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048387" comment="libwinpr3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048434" comment="libwinpr3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048388" comment="rdtk0-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048435" comment="rdtk0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048389" comment="uwac0-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048436" comment="uwac0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048390" comment="winpr-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009877482" comment="winpr-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202432458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-32458</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-32458" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32458" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-32458" ref_url="https://www.suse.com/security/cve/CVE-2024-32458" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9092" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1609-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1610-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035234.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients that use a version of FreeRDP prior to 3.5.0 or 2.11.6 are vulnerable to out-of-bounds read. Versions 3.5.0 and 2.11.6 patch the issue. As a workaround, use `/gfx` or `/rfx` modes (on by default, require server side support).
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-13"/>
	<updated date="2026-03-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-32458/">CVE-2024-32458 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32458">CVE-2024-32458 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223296">SUSE bug 1223296</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048376" comment="freerdp-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151908" comment="freerdp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048377" comment="freerdp-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151909" comment="freerdp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048378" comment="freerdp-proxy-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287971" comment="freerdp-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048379" comment="freerdp-proxy-plugins-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048429" comment="freerdp-proxy-plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048380" comment="freerdp-sdl-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048430" comment="freerdp-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048381" comment="freerdp-server-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245861" comment="freerdp-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048382" comment="freerdp-wayland-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245862" comment="freerdp-wayland is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048383" comment="libfreerdp-server-proxy3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048431" comment="libfreerdp-server-proxy3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048384" comment="libfreerdp3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048432" comment="libfreerdp3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048385" comment="librdtk0-0-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048433" comment="librdtk0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048386" comment="libuwac0-0-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245863" comment="libuwac0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048387" comment="libwinpr3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048434" comment="libwinpr3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048388" comment="rdtk0-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048435" comment="rdtk0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048389" comment="uwac0-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048436" comment="uwac0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048390" comment="winpr-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009877482" comment="winpr-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202432459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-32459</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-32459" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32459" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-32459" ref_url="https://www.suse.com/security/cve/CVE-2024-32459" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9092" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1609-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1610-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035234.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients and servers that use a version of FreeRDP prior to 3.5.0 or 2.11.6 are vulnerable to out-of-bounds read. Versions 3.5.0 and 2.11.6 patch the issue. No known workarounds are available.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-13"/>
	<updated date="2026-03-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2024-32459/">CVE-2024-32459 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32459">CVE-2024-32459 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223297">SUSE bug 1223297</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048376" comment="freerdp-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151908" comment="freerdp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048377" comment="freerdp-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151909" comment="freerdp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048378" comment="freerdp-proxy-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287971" comment="freerdp-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048379" comment="freerdp-proxy-plugins-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048429" comment="freerdp-proxy-plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048380" comment="freerdp-sdl-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048430" comment="freerdp-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048381" comment="freerdp-server-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245861" comment="freerdp-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048382" comment="freerdp-wayland-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245862" comment="freerdp-wayland is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048383" comment="libfreerdp-server-proxy3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048431" comment="libfreerdp-server-proxy3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048384" comment="libfreerdp3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048432" comment="libfreerdp3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048385" comment="librdtk0-0-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048433" comment="librdtk0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048386" comment="libuwac0-0-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245863" comment="libuwac0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048387" comment="libwinpr3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048434" comment="libwinpr3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048388" comment="rdtk0-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048435" comment="rdtk0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048389" comment="uwac0-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048436" comment="uwac0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048390" comment="winpr-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009877482" comment="winpr-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202432460" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-32460</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-32460" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32460" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-32460" ref_url="https://www.suse.com/security/cve/CVE-2024-32460" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9092" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1609-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1610-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-May/035234.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based based clients using `/bpp:32` legacy `GDI` drawing path with a version of FreeRDP prior to 3.5.0 or 2.11.6 are vulnerable to out-of-bounds read. Versions 3.5.0 and 2.11.6 patch the issue. As a workaround, use modern drawing paths (e.g. `/rfx` or `/gfx` options). The workaround requires server side support.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-13"/>
	<updated date="2026-03-13"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-32460/">CVE-2024-32460 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32460">CVE-2024-32460 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223298">SUSE bug 1223298</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048376" comment="freerdp-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151908" comment="freerdp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048377" comment="freerdp-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151909" comment="freerdp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048378" comment="freerdp-proxy-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287971" comment="freerdp-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048379" comment="freerdp-proxy-plugins-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048429" comment="freerdp-proxy-plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048380" comment="freerdp-sdl-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048430" comment="freerdp-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048381" comment="freerdp-server-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245861" comment="freerdp-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048382" comment="freerdp-wayland-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245862" comment="freerdp-wayland is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048383" comment="libfreerdp-server-proxy3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048431" comment="libfreerdp-server-proxy3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048384" comment="libfreerdp3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048432" comment="libfreerdp3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048385" comment="librdtk0-0-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048433" comment="librdtk0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048386" comment="libuwac0-0-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245863" comment="libuwac0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048387" comment="libwinpr3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048434" comment="libwinpr3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048388" comment="rdtk0-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048435" comment="rdtk0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048389" comment="uwac0-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048436" comment="uwac0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048390" comment="winpr-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009877482" comment="winpr-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202432658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-32658</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-32658" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32658" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-32658" ref_url="https://www.suse.com/security/cve/CVE-2024-32658" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9092" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019043.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients prior to version 3.5.1 are vulnerable to out-of-bounds read. Version 3.5.1 contains a patch for the issue. No known workarounds are available.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-13"/>
	<updated date="2026-03-13"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-32658/">CVE-2024-32658 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32658">CVE-2024-32658 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223353">SUSE bug 1223353</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048376" comment="freerdp-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151908" comment="freerdp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048377" comment="freerdp-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151909" comment="freerdp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048378" comment="freerdp-proxy-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287971" comment="freerdp-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048379" comment="freerdp-proxy-plugins-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048429" comment="freerdp-proxy-plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048380" comment="freerdp-sdl-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048430" comment="freerdp-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048381" comment="freerdp-server-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245861" comment="freerdp-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048382" comment="freerdp-wayland-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245862" comment="freerdp-wayland is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048383" comment="libfreerdp-server-proxy3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048431" comment="libfreerdp-server-proxy3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048384" comment="libfreerdp3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048432" comment="libfreerdp3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048385" comment="librdtk0-0-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048433" comment="librdtk0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048386" comment="libuwac0-0-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245863" comment="libuwac0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048387" comment="libwinpr3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048434" comment="libwinpr3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048388" comment="rdtk0-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048435" comment="rdtk0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048389" comment="uwac0-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048436" comment="uwac0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048390" comment="winpr-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009877482" comment="winpr-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202432659" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-32659</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-32659" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32659" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-32659" ref_url="https://www.suse.com/security/cve/CVE-2024-32659" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9092" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019043.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients prior to version 3.5.1 are vulnerable to out-of-bounds read if `((nWidth == 0) and (nHeight == 0))`. Version 3.5.1 contains a patch for the issue. No known workarounds are available.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-13"/>
	<updated date="2026-03-13"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-32659/">CVE-2024-32659 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32659">CVE-2024-32659 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223346">SUSE bug 1223346</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048376" comment="freerdp-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151908" comment="freerdp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048377" comment="freerdp-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151909" comment="freerdp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048378" comment="freerdp-proxy-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287971" comment="freerdp-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048379" comment="freerdp-proxy-plugins-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048429" comment="freerdp-proxy-plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048380" comment="freerdp-sdl-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048430" comment="freerdp-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048381" comment="freerdp-server-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245861" comment="freerdp-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048382" comment="freerdp-wayland-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245862" comment="freerdp-wayland is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048383" comment="libfreerdp-server-proxy3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048431" comment="libfreerdp-server-proxy3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048384" comment="libfreerdp3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048432" comment="libfreerdp3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048385" comment="librdtk0-0-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048433" comment="librdtk0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048386" comment="libuwac0-0-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245863" comment="libuwac0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048387" comment="libwinpr3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048434" comment="libwinpr3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048388" comment="rdtk0-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048435" comment="rdtk0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048389" comment="uwac0-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048436" comment="uwac0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048390" comment="winpr-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009877482" comment="winpr-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202432660" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-32660</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-32660" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32660" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-32660" ref_url="https://www.suse.com/security/cve/CVE-2024-32660" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9092" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019043.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.5.1, a malicious server can crash the FreeRDP client by sending invalid huge allocation size. Version 3.5.1 contains a patch for the issue. No known workarounds are available.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-13"/>
	<updated date="2026-03-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-32660/">CVE-2024-32660 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32660">CVE-2024-32660 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223347">SUSE bug 1223347</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048376" comment="freerdp-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151908" comment="freerdp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048377" comment="freerdp-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151909" comment="freerdp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048378" comment="freerdp-proxy-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287971" comment="freerdp-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048379" comment="freerdp-proxy-plugins-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048429" comment="freerdp-proxy-plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048380" comment="freerdp-sdl-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048430" comment="freerdp-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048381" comment="freerdp-server-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245861" comment="freerdp-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048382" comment="freerdp-wayland-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245862" comment="freerdp-wayland is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048383" comment="libfreerdp-server-proxy3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048431" comment="libfreerdp-server-proxy3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048384" comment="libfreerdp3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048432" comment="libfreerdp3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048385" comment="librdtk0-0-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048433" comment="librdtk0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048386" comment="libuwac0-0-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245863" comment="libuwac0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048387" comment="libwinpr3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048434" comment="libwinpr3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048388" comment="rdtk0-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048435" comment="rdtk0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048389" comment="uwac0-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048436" comment="uwac0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048390" comment="winpr-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009877482" comment="winpr-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202432661" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-32661</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-32661" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-32661" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-32661" ref_url="https://www.suse.com/security/cve/CVE-2024-32661" source="SUSE CVE"/>
		<reference ref_id="RHSA-2024:9092" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2024-November/000530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-May/018621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:1856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-August/019266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:2631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-July/019043.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol. FreeRDP based clients prior to version 3.5.1 are vulnerable to a possible `NULL` access and crash. Version 3.5.1 contains a patch for the issue. No known workarounds are available.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-13"/>
	<updated date="2026-03-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-32661/">CVE-2024-32661 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-32661">CVE-2024-32661 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1223348">SUSE bug 1223348</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048376" comment="freerdp-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151908" comment="freerdp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048377" comment="freerdp-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151909" comment="freerdp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048378" comment="freerdp-proxy-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287971" comment="freerdp-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048379" comment="freerdp-proxy-plugins-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048429" comment="freerdp-proxy-plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048380" comment="freerdp-sdl-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048430" comment="freerdp-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048381" comment="freerdp-server-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245861" comment="freerdp-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048382" comment="freerdp-wayland-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245862" comment="freerdp-wayland is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048383" comment="libfreerdp-server-proxy3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048431" comment="libfreerdp-server-proxy3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048384" comment="libfreerdp3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048432" comment="libfreerdp3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048385" comment="librdtk0-0-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048433" comment="librdtk0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048386" comment="libuwac0-0-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245863" comment="libuwac0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048387" comment="libwinpr3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048434" comment="libwinpr3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048388" comment="rdtk0-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048435" comment="rdtk0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048389" comment="uwac0-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048436" comment="uwac0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048390" comment="winpr-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009877482" comment="winpr-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20243817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-3817</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-3817" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3817" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-3817" ref_url="https://www.suse.com/security/cve/CVE-2024-3817" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2025:0056-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DUNHR7ATZWEF5LQKUNEXKL22CUQAND3A/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14713-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JZAWXH6WKGE2WACLTZWYMHTDCJMU3X6R/" source="SUSE-SU"/>
    <description>
    HashiCorp's go-getter library is vulnerable to argument injection when executing Git to discover remote branches. 

This vulnerability does not affect the go-getter/v2 branch and package.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2025-12-19"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-3817/">CVE-2024-3817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-3817">CVE-2024-3817 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1226999">SUSE bug 1226999</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032107" comment="trivy-0.66.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698141" comment="trivy is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20243935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-3935</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-3935" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3935" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-3935" ref_url="https://www.suse.com/security/cve/CVE-2024-3935" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2025:15074-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZVFEGLDJBY7EABGWWD3F2MDZ223VAMQ6/" source="SUSE-SU"/>
    <description>
    In Eclipse Mosquito, versions from 2.0.0 through 2.0.18, if a Mosquitto broker is configured to create an outgoing bridge connection, and that bridge connection has an incoming topic configured that makes use of topic remapping, then if the remote connection sends a crafted PUBLISH packet to the broker a double free will occur with a subsequent crash of the broker.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-24"/>
	<updated date="2026-02-24"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-3935/">CVE-2024-3935 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-3935">CVE-2024-3935 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232635">SUSE bug 1232635</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044663" comment="libmosquitto1-2.0.23-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244945" comment="libmosquitto1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044664" comment="libmosquittopp1-2.0.23-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244946" comment="libmosquittopp1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044665" comment="mosquitto-2.0.23-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244947" comment="mosquitto is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044666" comment="mosquitto-clients-2.0.23-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244948" comment="mosquitto-clients is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044667" comment="mosquitto-devel-2.0.23-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009244949" comment="mosquitto-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202439695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-39695</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-39695" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-39695" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-39695" ref_url="https://www.suse.com/security/cve/CVE-2024-39695" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045229.html" source="SUSE-SU"/>
    <description>
    Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An out-of-bounds read was found in Exiv2 version v0.28.2. The vulnerability is in the parser for the ASF video format, which was a new feature in v0.28.0. The out-of-bounds read is triggered when Exiv2 is used to read the metadata of a crafted video file. The bug is fixed in version v0.28.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2024-39695/">CVE-2024-39695 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2024-39695">CVE-2024-39695 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1227528">SUSE bug 1227528</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051765" comment="exiv2-0.28.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154125" comment="exiv2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051766" comment="exiv2-lang-0.28.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154126" comment="exiv2-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050764" comment="libexiv2-28-0.28.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010051915" comment="libexiv2-28 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050765" comment="libexiv2-28-x86-64-v3-0.28.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010051916" comment="libexiv2-28-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051767" comment="libexiv2-devel-0.28.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152552" comment="libexiv2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202443806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-43806</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-43806" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43806" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-43806" ref_url="https://www.suse.com/security/cve/CVE-2024-43806" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3404-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02810-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02811-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041228.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20858-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20755-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025105.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14354-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TXPZZSAXTA6CTQAGWASRTKWJQ3DFB7GG/" source="SUSE-SU"/>
    <description>
    Rustix is a set of safe Rust bindings to POSIX-ish APIs. When using `rustix::fs::Dir` using the `linux_raw` backend, it's possible for the iterator to "get stuck" when an IO error is encountered. Combined with a memory over-allocation issue in `rustix::fs::Dir::read_more`, this can cause quick and unbounded memory explosion (gigabytes in a few seconds if used on a hot path) and eventually lead to an OOM crash of the application. The symptoms were initially discovered in https://github.com/imsnif/bandwhich/issues/284. That post has lots of details of our investigation. Full details can be read on the GHSA-c827-hfw6-qwvm repo advisory. If a program tries to access a directory with its file descriptor after the file has been unlinked (or any other action that leaves the `Dir` iterator in the stuck state), and the implementation does not break after seeing an error, it can cause a memory explosion. As an example, Linux's various virtual file systems (e.g. `/proc`, `/sys`) can contain directories that spontaneously pop in and out of existence. Attempting to iterate over them using `rustix::fs::Dir` directly or indirectly (e.g. with the `procfs` crate) can trigger this fault condition if the implementation decides to continue on errors. An attacker knowledgeable about the implementation details of a vulnerable target can therefore try to trigger this fault condition via any one or a combination of several available APIs. If successful, the application host will quickly run out of memory, after which the application will likely be terminated by an OOM killer, leading to denial of service. This issue has been addressed in release versions 0.35.15, 0.36.16, 0.37.25, and 0.38.19. Users are advised to upgrade. There are no known workarounds for this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-43806/">CVE-2024-43806 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-43806">CVE-2024-43806 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1229376">SUSE bug 1229376</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050018" comment="gdk-pixbuf-loader-rsvg-2.60.2-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151634" comment="gdk-pixbuf-loader-rsvg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050019" comment="librsvg-2-2-2.60.2-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151635" comment="librsvg-2-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050702" comment="librsvg-devel-2.60.2-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151636" comment="librsvg-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050703" comment="rsvg-convert-2.60.2-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009353380" comment="rsvg-convert is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050704" comment="rsvg-thumbnailer-2.60.2-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161885" comment="rsvg-thumbnailer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050705" comment="typelib-1_0-Rsvg-2_0-2.60.2-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151637" comment="typelib-1_0-Rsvg-2_0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445310" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45310</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45310" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45310" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45310" ref_url="https://www.suse.com/security/cve/CVE-2024-45310" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:3222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-September/019419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2024:3324-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2024-September/036969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02198-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02198-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1374-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20335-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20353-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024607.html" source="SUSE-SU"/>
    <description>
    runc is a CLI tool for spawning and running containers according to the OCI specification. runc 1.1.13 and earlier, as well as 1.2.0-rc2 and earlier, can be tricked into creating empty files or directories in arbitrary locations in the host filesystem by sharing a volume between two containers and exploiting a race with `os.MkdirAll`. While this could be used to create empty files, existing files would not be truncated. An attacker must have the ability to start containers using some kind of custom volume configuration. Containers using user namespaces are still affected, but the scope of places an attacker can create inodes can be significantly reduced. Sufficiently strict LSM policies (SELinux/Apparmor) can also in principle block this attack -- we suspect the industry standard SELinux policy may restrict this attack's scope but the exact scope of protection hasn't been analysed. This is exploitable using runc directly as well as through Docker and Kubernetes. The issue is fixed in runc v1.1.14 and v1.2.0-rc3.

Some workarounds are available. Using user namespaces restricts this attack fairly significantly such that the attacker can only create inodes in directories that the remapped root user/group has write access to. Unless the root user is remapped to an actual
user on the host (such as with rootless containers that don't use `/etc/sub[ug]id`), this in practice means that an attacker would only be able to create inodes in world-writable directories. A strict enough SELinux or AppArmor policy could in principle also restrict the scope if a specific label is applied to the runc runtime, though neither the extent to which the standard existing policies block this attack nor what exact policies are needed to sufficiently restrict this attack have been thoroughly tested.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-06"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2024-45310/">CVE-2024-45310 at SUSE</cve>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45310">CVE-2024-45310 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230092">SUSE bug 1230092</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257413">SUSE bug 1257413</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045700" comment="kubevirt-container-disk-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624367" comment="kubevirt-container-disk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045701" comment="kubevirt-manifests-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624368" comment="kubevirt-manifests is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045702" comment="kubevirt-pr-helper-conf-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009871691" comment="kubevirt-pr-helper-conf is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045703" comment="kubevirt-sidecar-shim-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010045808" comment="kubevirt-sidecar-shim is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045704" comment="kubevirt-tests-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624369" comment="kubevirt-tests is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045705" comment="kubevirt-virt-api-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624370" comment="kubevirt-virt-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045706" comment="kubevirt-virt-controller-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624371" comment="kubevirt-virt-controller is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045707" comment="kubevirt-virt-exportproxy-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009814386" comment="kubevirt-virt-exportproxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045708" comment="kubevirt-virt-exportserver-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009814387" comment="kubevirt-virt-exportserver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045709" comment="kubevirt-virt-handler-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624372" comment="kubevirt-virt-handler is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045710" comment="kubevirt-virt-launcher-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624373" comment="kubevirt-virt-launcher is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045711" comment="kubevirt-virt-operator-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624374" comment="kubevirt-virt-operator is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045712" comment="kubevirt-virt-synchronization-controller-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010045809" comment="kubevirt-virt-synchronization-controller is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045713" comment="kubevirt-virtctl-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624375" comment="kubevirt-virtctl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045714" comment="obs-service-kubevirt_containers_meta-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009662899" comment="obs-service-kubevirt_containers_meta is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445337" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45337</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45337" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45337" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45337" ref_url="https://www.suse.com/security/cve/CVE-2024-45337" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01985-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02581-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03278-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020348.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020347.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1142-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1143-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024365.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14585-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3VJBDKTY25NRJXFRK6QZSRH6ZRBUV2UT/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14590-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RFAKX3BHM5IEGVFZW5ORK472VJQ7GAKL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14592-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XRFL3E5J4TDRJ22WLK6BNXDRPBVNWDKW/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14593-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AAHWJCS7IRD2RDUFE5DZXZ6M6SOGWYEK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14595-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RQIXFLKNJXAP2G3IJXYD2WY62FHMR5IX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14599-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QTUY324RV3FFZBHVIWDHRCIOPJHIJIN4/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14602-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KJENUST4DVKPMGTJHYGQFE57E55AQQDC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0025-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/V7MPKXR7TT2G72ERR2OMAC2SJ3BTV5F6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0056-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DUNHR7ATZWEF5LQKUNEXKL22CUQAND3A/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0094-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LKOLRH73CIQLMQ327IYGUHNSFKCU5MPI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14613-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/72PNSQCBBGVVNI7VQE3WSCUAIHCZLRVQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14633-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VJK5RQOOJ3Q26ODJIGOXXYOYQDDEQ3UX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14641-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MCLAZVPDAT5UFMI67YRTRQBKGNJYHBIS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14660-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LW4KB34TW645AUU7ROKPDCHUTXLGZZBG/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14713-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JZAWXH6WKGE2WACLTZWYMHTDCJMU3X6R/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14909-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BIPGSRATX6BG2ZXWE7566EGQCKXLC4RV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14920-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/OAFVZYRPJ63SNIOTJJCDPNRWHGLE355Q/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14969-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HSLGKMFCTSANXEKOHC36CPS5WHI66Y6L/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15013-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HL46ARER7ICEJBIK62L5XG52R6FHUFHU/" source="SUSE-SU"/>
    <description>
    Applications and libraries which misuse connection.serverAuthenticate (via callback field ServerConfig.PublicKeyCallback) may be susceptible to an authorization bypass. The documentation for ServerConfig.PublicKeyCallback says that "A call to this function does not guarantee that the key offered is in fact used to authenticate." Specifically, the SSH protocol allows clients to inquire about whether a public key is acceptable before proving control of the corresponding private key. PublicKeyCallback may be called with multiple keys, and the order in which the keys were provided cannot be used to infer which key the client successfully authenticated with, if any. Some applications, which store the key(s) passed to PublicKeyCallback (or derived information) and make security relevant determinations based on it once the connection is established, may make incorrect assumptions. For example, an attacker may send public keys A and B, and then authenticate with A. PublicKeyCallback would be called only twice, first with A and then with B. A vulnerable application may then make authorization decisions based on key B for which the attacker does not actually control the private key. Since this API is widely misused, as a partial mitigation golang.org/x/cry...@v0.31.0 enforces the property that, when successfully authenticating via public key, the last key passed to ServerConfig.PublicKeyCallback will be the key used to authenticate the connection. PublicKeyCallback will now be called multiple times with the same key, if necessary. Note that the client may still not control the last key passed to PublicKeyCallback if the connection is then authenticated with a different method, such as PasswordCallback, KeyboardInteractiveCallback, or NoClientAuth. Users should be using the Extensions field of the Permissions return value from the various authentication callbacks to record data associated with the authentication attempt instead of referencing external state. Once the connection is established the state corresponding to the successful authentication attempt can be retrieved via the ServerConn.Permissions field. Note that some third-party libraries misuse the Permissions type by sharing it across authentication attempts; users of third-party libraries should refer to the relevant projects for guidance.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-02-21"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2024-45337/">CVE-2024-45337 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45337">CVE-2024-45337 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234482">SUSE bug 1234482</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032565" comment="git-bug-0.10.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009969399" comment="git-bug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032566" comment="git-bug-bash-completion-0.10.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009969400" comment="git-bug-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032567" comment="git-bug-fish-completion-0.10.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009969401" comment="git-bug-fish-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032568" comment="git-bug-zsh-completion-0.10.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009969402" comment="git-bug-zsh-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032107" comment="trivy-0.66.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698141" comment="trivy is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445338" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45338</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45338" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45338" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45338" ref_url="https://www.suse.com/security/cve/CVE-2024-45338" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02581-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03278-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20550-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044567.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14603-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GN5BTYONDVDULOG3YURKUJNL2YZ2LDHU/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0056-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DUNHR7ATZWEF5LQKUNEXKL22CUQAND3A/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0094-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LKOLRH73CIQLMQ327IYGUHNSFKCU5MPI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14613-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/72PNSQCBBGVVNI7VQE3WSCUAIHCZLRVQ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14634-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VCY3UOSZNLMH6IOLEYWFNO3UOF3DLF3P/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14639-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UHS4NHWGXZ2TKRE7FZUZI5JIQDOZ4E4E/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14641-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MCLAZVPDAT5UFMI67YRTRQBKGNJYHBIS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14663-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IL7QOYRPFRGRS6UKU6ZYHI76FWFFUJNK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14666-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VI6PLACYTL73MKICQUXPS2F2JPQOB565/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14711-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VWAYQNBT67LBJHAMRBSUFHHLUR5XBJHE/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14713-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JZAWXH6WKGE2WACLTZWYMHTDCJMU3X6R/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14721-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/5YFLTCQGRUOCTVDQZEWUHS7QKU3FNK4S/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14725-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TQKDFR4QSFMEP533OXGQTCJ6QXWSSDKD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14907-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CZP3P5NBSLZINLGQH7DRQMDTIOVW4D3C/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14909-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BIPGSRATX6BG2ZXWE7566EGQCKXLC4RV/" source="SUSE-SU"/>
    <description>
    An attacker can craft an input to the Parse functions that would be processed non-linearly with respect to its length, resulting in extremely slow parsing. This could cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-45338/">CVE-2024-45338 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-45338">CVE-2024-45338 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234794">SUSE bug 1234794</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045691" comment="containerized-data-importer-api-1.64.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624359" comment="containerized-data-importer-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045692" comment="containerized-data-importer-cloner-1.64.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624360" comment="containerized-data-importer-cloner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045693" comment="containerized-data-importer-controller-1.64.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624361" comment="containerized-data-importer-controller is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045694" comment="containerized-data-importer-importer-1.64.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624362" comment="containerized-data-importer-importer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045695" comment="containerized-data-importer-manifests-1.64.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624363" comment="containerized-data-importer-manifests is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045696" comment="containerized-data-importer-operator-1.64.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624364" comment="containerized-data-importer-operator is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045697" comment="containerized-data-importer-uploadproxy-1.64.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624365" comment="containerized-data-importer-uploadproxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045698" comment="containerized-data-importer-uploadserver-1.64.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624366" comment="containerized-data-importer-uploadserver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033446" comment="hauler-1.3.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033447" comment="hauler is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035658" comment="helmfile-1.1.9-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010031777" comment="helmfile is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035659" comment="helmfile-bash-completion-1.1.9-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010031778" comment="helmfile-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035660" comment="helmfile-fish-completion-1.1.9-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010031779" comment="helmfile-fish-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035661" comment="helmfile-zsh-completion-1.1.9-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010031780" comment="helmfile-zsh-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045699" comment="obs-service-cdi_containers_meta-1.64.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009714767" comment="obs-service-cdi_containers_meta is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032107" comment="trivy-0.66.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698141" comment="trivy is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202445508" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-45508</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-45508" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-45508" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-45508" ref_url="https://www.suse.com/security/cve/CVE-2024-45508" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:0303-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZGODTNNF6WAHIUNECA2R4KRIX7DLALG7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:0304-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PS3VK5JTDY5FTLYYYSQWM5OBYO27JOKV/" source="SUSE-SU"/>
    <description>
    HTMLDOC before 1.9.19 has an out-of-bounds write in parse_paragraph in ps-pdf.cxx because of an attempt to strip leading whitespace from a whitespace-only node.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-15"/>
	<updated date="2026-02-15"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-45508/">CVE-2024-45508 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-45508">CVE-2024-45508 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1230022">SUSE bug 1230022</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010043904" comment="htmldoc-1.9.23-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151341" comment="htmldoc is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202446478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-46478</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-46478" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-46478" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-46478" ref_url="https://www.suse.com/security/cve/CVE-2024-46478" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2024:0349-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/66EAKHFU5UCLXGZTCGHTRYJAVMYI7VOL/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14460-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RNU4P4P7ZCF5TYOAPMGGBX2KSE6IHZFT/" source="SUSE-SU"/>
    <description>
    HTMLDOC v1.9.18 contains a buffer overflow in parse_pre function,ps-pdf.cxx:5681.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-15"/>
	<updated date="2026-02-15"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2024-46478/">CVE-2024-46478 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-46478">CVE-2024-46478 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232380">SUSE bug 1232380</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010043904" comment="htmldoc-1.9.23-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151341" comment="htmldoc is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202451744" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-51744</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-51744" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-51744" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-51744" ref_url="https://www.suse.com/security/cve/CVE-2024-51744" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2024:4042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2024-November/019840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01985-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020348.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020347.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1333-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039052.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14481-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FRQMZTGDFOBRPKL5LYFU2R55SK6DBIPC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14495-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/Z2Z4KRNR3L2CXM6VPBBBFXIJ2NM4JPWE/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14517-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K5YH6ZA2JQ3Z35FVNJRKHS4UMH5RMAUJ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2024:14522-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2VWEFHGRWATJW5MOESA3XEER2UJZLJOD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0131-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EUVFYQAJREBRWHGVJH4PINWMTHG2NH7G/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14663-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IL7QOYRPFRGRS6UKU6ZYHI76FWFFUJNK/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14768-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6G3C2BVUXSTIXS4W727LQ5WT3V2NAP27/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14988-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IQWUH5CIGBJCVZRE6D76AYCLT3MS47XX/" source="SUSE-SU"/>
    <description>
    golang-jwt is a Go implementation of JSON Web Tokens. Unclear documentation of the error behavior in `ParseWithClaims` can lead to situation where users are potentially not checking errors in the way they should be. Especially, if a token is both expired and invalid, the errors returned by `ParseWithClaims` return both error codes. If users only check for the `jwt.ErrTokenExpired ` using `error.Is`, they will ignore the embedded `jwt.ErrTokenSignatureInvalid` and thus potentially accept invalid tokens. A fix has been back-ported with the error handling logic from the `v5` branch to the `v4` branch. In this logic, the `ParseWithClaims` function will immediately return in "dangerous" situations (e.g., an invalid signature), limiting the combined errors only to situations where the signature is valid, but further validation failed (e.g., if the signature is valid, but is expired AND has the wrong audience). This fix is part of the 4.5.1 release. We are aware that this changes the behaviour of an established function and is not 100 % backwards compatible, so updating to 4.5.1 might break your code. In case you cannot update to 4.5.0, please make sure that you are properly checking for all errors ("dangerous" ones first), so that you are not running in the case detailed above.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-01-25"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" cvss4="2.1/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-51744/">CVE-2024-51744 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-51744">CVE-2024-51744 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1232936">SUSE bug 1232936</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039725" comment="coredns-1.14.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009945102" comment="coredns is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039726" comment="coredns-extras-1.14.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009945103" comment="coredns-extras is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032107" comment="trivy-0.66.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698141" comment="trivy is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202452615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-52615</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-52615" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-52615" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-52615" ref_url="https://www.suse.com/security/cve/CVE-2024-52615" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:11402" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03266-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03331-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03333-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20070-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024497.html" source="SUSE-SU"/>
    <description>
    A flaw was found in Avahi-daemon, which relies on fixed source ports for wide-area DNS queries. This issue simplifies attacks where malicious DNS responses are injected.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-13"/>
	<updated date="2026-03-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-52615/">CVE-2024-52615 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-52615">CVE-2024-52615 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1233421">SUSE bug 1233421</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037153" comment="avahi-0.8-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151208" comment="avahi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037154" comment="avahi-autoipd-0.8-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151209" comment="avahi-autoipd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037155" comment="avahi-compat-howl-devel-0.8-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243729" comment="avahi-compat-howl-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037156" comment="avahi-compat-mDNSResponder-devel-0.8-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151210" comment="avahi-compat-mDNSResponder-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037157" comment="avahi-lang-0.8-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151211" comment="avahi-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037158" comment="avahi-utils-0.8-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243733" comment="avahi-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037159" comment="avahi-utils-gtk-0.8-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243734" comment="avahi-utils-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037160" comment="libavahi-client3-0.8-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151212" comment="libavahi-client3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037161" comment="libavahi-common3-0.8-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151214" comment="libavahi-common3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037162" comment="libavahi-core7-0.8-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151216" comment="libavahi-core7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037163" comment="libavahi-devel-0.8-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151217" comment="libavahi-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037164" comment="libavahi-glib-devel-0.8-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243735" comment="libavahi-glib-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037165" comment="libavahi-glib1-0.8-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243736" comment="libavahi-glib1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037166" comment="libavahi-gobject-devel-0.8-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243738" comment="libavahi-gobject-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037167" comment="libavahi-gobject0-0.8-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243739" comment="libavahi-gobject0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037168" comment="libavahi-libevent1-0.8-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009755253" comment="libavahi-libevent1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037169" comment="libavahi-qt6-1-0.8-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037217" comment="libavahi-qt6-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037170" comment="libavahi-qt6-devel-0.8-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037218" comment="libavahi-qt6-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037171" comment="libavahi-ui-gtk3-0-0.8-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243742" comment="libavahi-ui-gtk3-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037172" comment="libdns_sd-0.8-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151218" comment="libdns_sd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037173" comment="libhowl0-0.8-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243745" comment="libhowl0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037174" comment="python3-avahi-gtk-0.8-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009346637" comment="python3-avahi-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037175" comment="python313-avahi-0.8-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037219" comment="python313-avahi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037176" comment="typelib-1_0-Avahi-0_6-0.8-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243748" comment="typelib-1_0-Avahi-0_6 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202453164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-53164</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-53164" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-53164" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-53164" ref_url="https://www.suse.com/security/cve/CVE-2024-53164" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:6966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02588-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02844-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02844-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02848-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02849-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02850-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02851-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02852-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20165-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20959-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20977-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20982-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4050-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20292-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: sched: fix ordering of qlen adjustment

Changes to sch-&gt;q.qlen around qdisc_tree_reduce_backlog() need to happen
_before_ a call to said function because otherwise it may fail to notify
parent qdiscs when the child is about to become empty.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-53164/">CVE-2024-53164 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-53164">CVE-2024-53164 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234863">SUSE bug 1234863</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246019">SUSE bug 1246019</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202454031" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-54031</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-54031" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54031" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-54031" ref_url="https://www.suse.com/security/cve/CVE-2024-54031" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1131-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nft_set_hash: unaligned atomic read on struct nft_set_ext

Access to genmask field in struct nft_set_ext results in unaligned
atomic read:

[   72.130109] Unable to handle kernel paging request at virtual address ffff0000c2bb708c
[   72.131036] Mem abort info:
[   72.131213]   ESR = 0x0000000096000021
[   72.131446]   EC = 0x25: DABT (current EL), IL = 32 bits
[   72.132209]   SET = 0, FnV = 0
[   72.133216]   EA = 0, S1PTW = 0
[   72.134080]   FSC = 0x21: alignment fault
[   72.135593] Data abort info:
[   72.137194]   ISV = 0, ISS = 0x00000021, ISS2 = 0x00000000
[   72.142351]   CM = 0, WnR = 0, TnD = 0, TagAccess = 0
[   72.145989]   GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0
[   72.150115] swapper pgtable: 4k pages, 48-bit VAs, pgdp=0000000237d27000
[   72.154893] [ffff0000c2bb708c] pgd=0000000000000000, p4d=180000023ffff403, pud=180000023f84b403, pmd=180000023f835403,
+pte=0068000102bb7707
[   72.163021] Internal error: Oops: 0000000096000021 [#1] SMP
[...]
[   72.170041] CPU: 7 UID: 0 PID: 54 Comm: kworker/7:0 Tainted: G            E      6.13.0-rc3+ #2
[   72.170509] Tainted: [E]=UNSIGNED_MODULE
[   72.170720] Hardware name: QEMU QEMU Virtual Machine, BIOS edk2-stable202302-for-qemu 03/01/2023
[   72.171192] Workqueue: events_power_efficient nft_rhash_gc [nf_tables]
[   72.171552] pstate: 21400005 (nzCv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--)
[   72.171915] pc : nft_rhash_gc+0x200/0x2d8 [nf_tables]
[   72.172166] lr : nft_rhash_gc+0x128/0x2d8 [nf_tables]
[   72.172546] sp : ffff800081f2bce0
[   72.172724] x29: ffff800081f2bd40 x28: ffff0000c2bb708c x27: 0000000000000038
[   72.173078] x26: ffff0000c6780ef0 x25: ffff0000c643df00 x24: ffff0000c6778f78
[   72.173431] x23: 000000000000001a x22: ffff0000c4b1f000 x21: ffff0000c6780f78
[   72.173782] x20: ffff0000c2bb70dc x19: ffff0000c2bb7080 x18: 0000000000000000
[   72.174135] x17: ffff0000c0a4e1c0 x16: 0000000000003000 x15: 0000ac26d173b978
[   72.174485] x14: ffffffffffffffff x13: 0000000000000030 x12: ffff0000c6780ef0
[   72.174841] x11: 0000000000000000 x10: ffff800081f2bcf8 x9 : ffff0000c3000000
[   72.175193] x8 : 00000000000004be x7 : 0000000000000000 x6 : 0000000000000000
[   72.175544] x5 : 0000000000000040 x4 : ffff0000c3000010 x3 : 0000000000000000
[   72.175871] x2 : 0000000000003a98 x1 : ffff0000c2bb708c x0 : 0000000000000004
[   72.176207] Call trace:
[   72.176316]  nft_rhash_gc+0x200/0x2d8 [nf_tables] (P)
[   72.176653]  process_one_work+0x178/0x3d0
[   72.176831]  worker_thread+0x200/0x3f0
[   72.176995]  kthread+0xe8/0xf8
[   72.177130]  ret_from_fork+0x10/0x20
[   72.177289] Code: 54fff984 d503201f d2800080 91003261 (f820303f)
[   72.177557] ---[ end trace 0000000000000000 ]---

Align struct nft_set_ext to word size to address this and
documentation it.

pahole reports that this increases the size of elements for rhash and
pipapo in 8 bytes on x86_64.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-54031/">CVE-2024-54031 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-54031">CVE-2024-54031 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235905">SUSE bug 1235905</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202456738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-56738</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-56738" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-56738" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-56738" ref_url="https://www.suse.com/security/cve/CVE-2024-56738" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02705-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02706-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02724-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02727-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02772-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02813-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20654-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041569.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20863-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023588.html" source="SUSE-SU"/>
    <description>
    GNU GRUB (aka GRUB2) through 2.12 does not use a constant-time algorithm for grub_crypto_memcmp and thus allows side-channel attacks.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-18"/>
	<updated date="2025-12-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-56738/">CVE-2024-56738 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-56738">CVE-2024-56738 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1234959">SUSE bug 1234959</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034125" comment="grub2-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153175" comment="grub2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034126" comment="grub2-arm64-efi-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623763" comment="grub2-arm64-efi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034127" comment="grub2-arm64-efi-bls-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010034157" comment="grub2-arm64-efi-bls is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034128" comment="grub2-arm64-efi-debug-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623764" comment="grub2-arm64-efi-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034129" comment="grub2-arm64-efi-extras-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009802512" comment="grub2-arm64-efi-extras is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034130" comment="grub2-branding-upstream-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153176" comment="grub2-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034131" comment="grub2-common-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010034158" comment="grub2-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034132" comment="grub2-i386-pc-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153178" comment="grub2-i386-pc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034133" comment="grub2-i386-pc-debug-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291438" comment="grub2-i386-pc-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034134" comment="grub2-i386-pc-extras-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009802514" comment="grub2-i386-pc-extras is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034135" comment="grub2-powerpc-ieee1275-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623765" comment="grub2-powerpc-ieee1275 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034136" comment="grub2-powerpc-ieee1275-debug-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623766" comment="grub2-powerpc-ieee1275-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034137" comment="grub2-powerpc-ieee1275-extras-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009802516" comment="grub2-powerpc-ieee1275-extras is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034138" comment="grub2-s390x-emu-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623767" comment="grub2-s390x-emu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034139" comment="grub2-s390x-emu-debug-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623768" comment="grub2-s390x-emu-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034140" comment="grub2-s390x-emu-extras-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009802517" comment="grub2-s390x-emu-extras is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034141" comment="grub2-snapper-plugin-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153179" comment="grub2-snapper-plugin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034142" comment="grub2-systemd-sleep-plugin-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154139" comment="grub2-systemd-sleep-plugin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034143" comment="grub2-x86_64-efi-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153180" comment="grub2-x86_64-efi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034144" comment="grub2-x86_64-efi-bls-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010034159" comment="grub2-x86_64-efi-bls is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034145" comment="grub2-x86_64-efi-debug-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291439" comment="grub2-x86_64-efi-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034146" comment="grub2-x86_64-efi-extras-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009802518" comment="grub2-x86_64-efi-extras is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034147" comment="grub2-x86_64-xen-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153181" comment="grub2-x86_64-xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034148" comment="grub2-x86_64-xen-debug-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009964903" comment="grub2-x86_64-xen-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034149" comment="grub2-x86_64-xen-extras-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009802519" comment="grub2-x86_64-xen-extras is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457891" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57891</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57891" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57891" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57891" ref_url="https://www.suse.com/security/cve/CVE-2024-57891" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sched_ext: Fix invalid irq restore in scx_ops_bypass()

While adding outer irqsave/restore locking, 0e7ffff1b811 ("scx: Fix raciness
in scx_ops_bypass()") forgot to convert an inner rq_unlock_irqrestore() to
rq_unlock() which could re-enable IRQ prematurely leading to the following
warning:

  raw_local_irq_restore() called with IRQs enabled
  WARNING: CPU: 1 PID: 96 at kernel/locking/irqflag-debug.c:10 warn_bogus_irq_restore+0x30/0x40
  ...
  Sched_ext: create_dsq (enabling)
  pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
  pc : warn_bogus_irq_restore+0x30/0x40
  lr : warn_bogus_irq_restore+0x30/0x40
  ...
  Call trace:
   warn_bogus_irq_restore+0x30/0x40 (P)
   warn_bogus_irq_restore+0x30/0x40 (L)
   scx_ops_bypass+0x224/0x3b8
   scx_ops_enable.isra.0+0x2c8/0xaa8
   bpf_scx_reg+0x18/0x30
  ...
  irq event stamp: 33739
  hardirqs last  enabled at (33739): [&lt;ffff8000800b699c&gt;] scx_ops_bypass+0x174/0x3b8
  hardirqs last disabled at (33738): [&lt;ffff800080d48ad4&gt;] _raw_spin_lock_irqsave+0xb4/0xd8

Drop the stray _irqrestore().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57891/">CVE-2024-57891 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57891">CVE-2024-57891 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235953">SUSE bug 1235953</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457951" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57951</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57951" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57951" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57951" ref_url="https://www.suse.com/security/cve/CVE-2024-57951" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hrtimers: Handle CPU state correctly on hotplug

Consider a scenario where a CPU transitions from CPUHP_ONLINE to halfway
through a CPU hotunplug down to CPUHP_HRTIMERS_PREPARE, and then back to
CPUHP_ONLINE:

Since hrtimers_prepare_cpu() does not run, cpu_base.hres_active remains set
to 1 throughout. However, during a CPU unplug operation, the tick and the
clockevents are shut down at CPUHP_AP_TICK_DYING. On return to the online
state, for instance CFS incorrectly assumes that the hrtick is already
active, and the chance of the clockevent device to transition to oneshot
mode is also lost forever for the CPU, unless it goes back to a lower state
than CPUHP_HRTIMERS_PREPARE once.

This round-trip reveals another issue; cpu_base.online is not set to 1
after the transition, which appears as a WARN_ON_ONCE in enqueue_hrtimer().

Aside of that, the bulk of the per CPU state is not reset either, which
means there are dangling pointers in the worst case.

Address this by adding a corresponding startup() callback, which resets the
stale per CPU state and sets the online flag.

[ tglx: Make the new callback unconditionally available, remove the online
  	modification in the prepare() callback and clear the remaining
  	state in the starting callback instead of the prepare callback ]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2024-57951/">CVE-2024-57951 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57951">CVE-2024-57951 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237108">SUSE bug 1237108</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202457952" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-57952</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-57952" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-57952" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-57952" ref_url="https://www.suse.com/security/cve/CVE-2024-57952" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Revert "libfs: fix infinite directory reads for offset dir"

The current directory offset allocator (based on mtree_alloc_cyclic)
stores the next offset value to return in octx-&gt;next_offset. This
mechanism typically returns values that increase monotonically over
time. Eventually, though, the newly allocated offset value wraps
back to a low number (say, 2) which is smaller than other already-
allocated offset values.

Yu Kuai &lt;yukuai3@huawei.com&gt; reports that, after commit 64a7ce76fb90
("libfs: fix infinite directory reads for offset dir"), if a
directory's offset allocator wraps, existing entries are no longer
visible via readdir/getdents because offset_readdir() stops listing
entries once an entry's offset is larger than octx-&gt;next_offset.
These entries vanish persistently -- they can be looked up, but will
never again appear in readdir(3) output.

The reason for this is that the commit treats directory offsets as
monotonically increasing integer values rather than opaque cookies,
and introduces this comparison:

	if (dentry2offset(dentry) &gt;= last_index) {

On 64-bit platforms, the directory offset value upper bound is
2^63 - 1. Directory offsets will monotonically increase for millions
of years without wrapping.

On 32-bit platforms, however, LONG_MAX is 2^31 - 1. The allocator
can wrap after only a few weeks (at worst).

Revert commit 64a7ce76fb90 ("libfs: fix infinite directory reads for
offset dir") to prepare for a fix that can work properly on 32-bit
systems and might apply to recent LTS kernels where shmem employs
the simple_offset mechanism.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-57952/">CVE-2024-57952 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-57952">CVE-2024-57952 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237131">SUSE bug 1237131</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202458090" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-58090</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-58090" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-58090" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-58090" ref_url="https://www.suse.com/security/cve/CVE-2024-58090" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sched/core: Prevent rescheduling when interrupts are disabled

David reported a warning observed while loop testing kexec jump:

  Interrupts enabled after irqrouter_resume+0x0/0x50
  WARNING: CPU: 0 PID: 560 at drivers/base/syscore.c:103 syscore_resume+0x18a/0x220
   kernel_kexec+0xf6/0x180
   __do_sys_reboot+0x206/0x250
   do_syscall_64+0x95/0x180

The corresponding interrupt flag trace:

  hardirqs last  enabled at (15573): [&lt;ffffffffa8281b8e&gt;] __up_console_sem+0x7e/0x90
  hardirqs last disabled at (15580): [&lt;ffffffffa8281b73&gt;] __up_console_sem+0x63/0x90

That means __up_console_sem() was invoked with interrupts enabled. Further
instrumentation revealed that in the interrupt disabled section of kexec
jump one of the syscore_suspend() callbacks woke up a task, which set the
NEED_RESCHED flag. A later callback in the resume path invoked
cond_resched() which in turn led to the invocation of the scheduler:

  __cond_resched+0x21/0x60
  down_timeout+0x18/0x60
  acpi_os_wait_semaphore+0x4c/0x80
  acpi_ut_acquire_mutex+0x3d/0x100
  acpi_ns_get_node+0x27/0x60
  acpi_ns_evaluate+0x1cb/0x2d0
  acpi_rs_set_srs_method_data+0x156/0x190
  acpi_pci_link_set+0x11c/0x290
  irqrouter_resume+0x54/0x60
  syscore_resume+0x6a/0x200
  kernel_kexec+0x145/0x1c0
  __do_sys_reboot+0xeb/0x240
  do_syscall_64+0x95/0x180

This is a long standing problem, which probably got more visible with
the recent printk changes. Something does a task wakeup and the
scheduler sets the NEED_RESCHED flag. cond_resched() sees it set and
invokes schedule() from a completely bogus context. The scheduler
enables interrupts after context switching, which causes the above
warning at the end.

Quite some of the code paths in syscore_suspend()/resume() can result in
triggering a wakeup with the exactly same consequences. They might not
have done so yet, but as they share a lot of code with normal operations
it's just a question of time.

The problem only affects the PREEMPT_NONE and PREEMPT_VOLUNTARY scheduling
models. Full preemption is not affected as cond_resched() is disabled and
the preemption check preemptible() takes the interrupt disabled flag into
account.

Cure the problem by adding a corresponding check into cond_resched().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-58090/">CVE-2024-58090 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2024-58090">CVE-2024-58090 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240324">SUSE bug 1240324</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20246174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2024-6174</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2024-6174" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-6174" source="CVE"/>
    <reference ref_id="SUSE CVE-2024-6174" ref_url="https://www.suse.com/security/cve/CVE-2024-6174" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:10848" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001788.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:11324" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2026:20174-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/043804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2026:20192-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/043824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20656-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20755-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041923.html" source="SUSE-SU"/>
    <description>
    When a non-x86 platform is detected, cloud-init grants root access to a hardcoded url with a local IP address. To prevent this,  cloud-init default configurations disable platform enumeration.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-02-04"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2024-6174/">CVE-2024-6174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2024-6174">CVE-2024-6174 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245401">SUSE bug 1245401</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041352" comment="cloud-init-25.1.3-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009273021" comment="cloud-init is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041353" comment="cloud-init-config-suse-25.1.3-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009273022" comment="cloud-init-config-suse is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041354" comment="cloud-init-doc-25.1.3-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009273023" comment="cloud-init-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20250377" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-0377</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-0377" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0377" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-0377" ref_url="https://www.suse.com/security/cve/CVE-2025-0377" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:0297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020248.html" source="SUSE-SU"/>
    <description>
    HashiCorp's go-slug library is vulnerable to a zip-slip style attack when a non-existing user-provided path is extracted from the tar entry.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-01-03"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-0377/">CVE-2025-0377 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-0377">CVE-2025-0377 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236209">SUSE bug 1236209</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035658" comment="helmfile-1.1.9-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010031777" comment="helmfile is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035659" comment="helmfile-bash-completion-1.1.9-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010031778" comment="helmfile-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035660" comment="helmfile-fish-completion-1.1.9-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010031779" comment="helmfile-fish-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035661" comment="helmfile-zsh-completion-1.1.9-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010031780" comment="helmfile-zsh-completion is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20250395" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-0395</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-0395" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0395" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-0395" ref_url="https://www.suse.com/security/cve/CVE-2025-0395" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:3828" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001036.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:4244" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0510-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024576.html" source="SUSE-SU"/>
    <description>
    When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-06"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-0395/">CVE-2025-0395 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-0395">CVE-2025-0395 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236282">SUSE bug 1236282</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041421" comment="cross-aarch64-glibc-devel-2.40-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041605" comment="cross-aarch64-glibc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041422" comment="cross-ppc64le-glibc-devel-2.40-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041606" comment="cross-ppc64le-glibc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041423" comment="cross-riscv64-glibc-devel-2.40-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041607" comment="cross-riscv64-glibc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041424" comment="cross-s390x-glibc-devel-2.40-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041608" comment="cross-s390x-glibc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041425" comment="glibc-2.40-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151368" comment="glibc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041426" comment="glibc-devel-2.40-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151370" comment="glibc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041427" comment="glibc-devel-static-2.40-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152567" comment="glibc-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041428" comment="glibc-extra-2.40-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151371" comment="glibc-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041429" comment="glibc-gconv-modules-extra-2.40-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041609" comment="glibc-gconv-modules-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041430" comment="glibc-html-2.40-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152569" comment="glibc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041431" comment="glibc-i18ndata-2.40-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152570" comment="glibc-i18ndata is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041432" comment="glibc-info-2.40-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151372" comment="glibc-info is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041433" comment="glibc-lang-2.40-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009651309" comment="glibc-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041434" comment="glibc-locale-2.40-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151373" comment="glibc-locale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041435" comment="glibc-locale-base-2.40-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251612" comment="glibc-locale-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041436" comment="glibc-profile-2.40-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152572" comment="glibc-profile is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041437" comment="glibc-utils-2.40-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152575" comment="glibc-utils is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20250840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-0840</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-0840" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-0840" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-0840" ref_url="https://www.suse.com/security/cve/CVE-2025-0840" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023286.html" source="SUSE-SU"/>
    <description>
    A vulnerability, which was classified as problematic, was found in GNU Binutils up to 2.43. This affects the function disassemble_bytes of the file binutils/objdump.c. The manipulation of the argument buf leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 2.44 is able to address this issue. The identifier of the patch is baac6c221e9d69335bf41366a1c7d87d8ab2f893. It is recommended to upgrade the affected component.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-13"/>
	<updated date="2025-12-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="2.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-0840/">CVE-2025-0840 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-0840">CVE-2025-0840 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236632">SUSE bug 1236632</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033339" comment="binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033340" comment="binutils-devel-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033444" comment="bpftool-7.5.0-160000.2.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009955992" comment="bpftool is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033445" comment="bpftool-bash-completion-7.5.0-160000.2.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033375" comment="bpftool-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033343" comment="cross-aarch64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167594" comment="cross-aarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033344" comment="cross-arm-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167596" comment="cross-arm-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033345" comment="cross-avr-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167598" comment="cross-avr-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033346" comment="cross-bpf-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010029579" comment="cross-bpf-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033347" comment="cross-epiphany-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238034" comment="cross-epiphany-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033348" comment="cross-hppa-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167600" comment="cross-hppa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033349" comment="cross-hppa64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167602" comment="cross-hppa64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033350" comment="cross-i386-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167604" comment="cross-i386-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033351" comment="cross-ia64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167606" comment="cross-ia64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033352" comment="cross-loongarch64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033376" comment="cross-loongarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033353" comment="cross-m68k-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167608" comment="cross-m68k-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033354" comment="cross-mips-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167610" comment="cross-mips-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033355" comment="cross-ppc-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167612" comment="cross-ppc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033356" comment="cross-ppc64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167614" comment="cross-ppc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033357" comment="cross-ppc64le-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167616" comment="cross-ppc64le-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033358" comment="cross-pru-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010029580" comment="cross-pru-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033359" comment="cross-riscv64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238035" comment="cross-riscv64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033360" comment="cross-rx-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238036" comment="cross-rx-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033361" comment="cross-s390-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167618" comment="cross-s390-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033362" comment="cross-s390x-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167620" comment="cross-s390x-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033363" comment="cross-sparc-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167622" comment="cross-sparc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033364" comment="cross-sparc64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167624" comment="cross-sparc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033365" comment="cross-spu-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167626" comment="cross-spu-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033366" comment="cross-x86_64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167628" comment="cross-x86_64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033367" comment="cross-xtensa-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297932" comment="cross-xtensa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033368" comment="gprofng-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033377" comment="gprofng is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033369" comment="libctf-nobfd0-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297779" comment="libctf-nobfd0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033370" comment="libctf0-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297780" comment="libctf0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202510148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-10148</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-10148" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10148" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-10148" ref_url="https://www.suse.com/security/cve/CVE-2025-10148" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03173-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03198-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03267-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03268-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20802-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20824-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023512.html" source="SUSE-SU"/>
    <description>
    curl's websocket code did not update the 32 bit mask pattern for each new
 outgoing frame as the specification says. Instead it used a fixed mask that
persisted and was used throughout the entire connection.

A predictable mask pattern allows for a malicious server to induce traffic
between the two communicating parties that could be interpreted by an involved
proxy (configured or transparent) as genuine, real, HTTP traffic with content
and thereby poison its cache. That cached poisoned content could then be
served to all users of that proxy.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2025-12-11"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10148/">CVE-2025-10148 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10148">CVE-2025-10148 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249348">SUSE bug 1249348</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031702" comment="curl-8.14.1-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031703" comment="curl-fish-completion-8.14.1-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010031781" comment="curl-fish-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031704" comment="curl-zsh-completion-8.14.1-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010031782" comment="curl-zsh-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031705" comment="libcurl-devel-8.14.1-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151178" comment="libcurl-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031706" comment="libcurl-devel-doc-8.14.1-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010031783" comment="libcurl-devel-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031707" comment="libcurl4-8.14.1-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202510230" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-10230</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-10230" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10230" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-10230" ref_url="https://www.suse.com/security/cve/CVE-2025-10230" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03603-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03604-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03618-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21005-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3676-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3677-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042218.html" source="SUSE-SU"/>
    <description>
    A flaw was found in Samba, in the front-end WINS hook handling: NetBIOS names from registration packets are passed to a shell without proper validation or escaping. Unsanitized NetBIOS name data from WINS registration packets are inserted into a shell command and executed by the Samba Active Directory Domain Controller's wins hook, allowing an unauthenticated network attacker to achieve remote command execution as the Samba process.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-22"/>
	<updated date="2025-12-19"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-10230/">CVE-2025-10230 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10230">CVE-2025-10230 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251280">SUSE bug 1251280</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030508" comment="ctdb-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152996" comment="ctdb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030509" comment="ctdb-pcp-pmda-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233089" comment="ctdb-pcp-pmda is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030510" comment="ldb-tools-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152723" comment="ldb-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030511" comment="libldb-devel-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152732" comment="libldb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030512" comment="libldb2-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291435" comment="libldb2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030513" comment="python3-ldb-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009247520" comment="python3-ldb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030514" comment="samba-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030515" comment="samba-ad-dc-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266821" comment="samba-ad-dc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030516" comment="samba-ad-dc-libs-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009666845" comment="samba-ad-dc-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030517" comment="samba-ceph-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162650" comment="samba-ceph is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030518" comment="samba-client-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030519" comment="samba-client-libs-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009666847" comment="samba-client-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030520" comment="samba-dcerpc-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010021989" comment="samba-dcerpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030521" comment="samba-devel-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009666849" comment="samba-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030522" comment="samba-doc-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030523" comment="samba-dsdb-modules-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177163" comment="samba-dsdb-modules is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030524" comment="samba-gpupdate-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009655385" comment="samba-gpupdate is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030525" comment="samba-ldb-ldap-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009655386" comment="samba-ldb-ldap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030526" comment="samba-libs-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030527" comment="samba-libs-python3-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266825" comment="samba-libs-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030528" comment="samba-python3-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266827" comment="samba-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030529" comment="samba-test-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152778" comment="samba-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030530" comment="samba-tool-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009666851" comment="samba-tool is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030531" comment="samba-winbind-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030532" comment="samba-winbind-libs-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009666852" comment="samba-winbind-libs is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202510527" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-10527</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-10527" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10527" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-10527" ref_url="https://www.suse.com/security/cve/CVE-2025-10527" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16108" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002030.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16156" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002033.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16260" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002035.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16589" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03291-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03309-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041811.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023380.html" source="SUSE-SU"/>
    <description>
    Sandbox escape due to use-after-free in the Graphics: Canvas2D component. This vulnerability was fixed in Firefox 143, Firefox ESR 140.3, Thunderbird 143, and Thunderbird 140.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10527/">CVE-2025-10527 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10527">CVE-2025-10527 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249391">SUSE bug 1249391</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030561" comment="MozillaFirefox-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030562" comment="MozillaFirefox-branding-upstream-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030563" comment="MozillaFirefox-devel-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030564" comment="MozillaFirefox-translations-common-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030565" comment="MozillaFirefox-translations-other-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025469" comment="MozillaThunderbird-140.3.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025470" comment="MozillaThunderbird-openpgp-librnp-140.3.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025480" comment="MozillaThunderbird-openpgp-librnp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025471" comment="MozillaThunderbird-translations-common-140.3.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025472" comment="MozillaThunderbird-translations-other-140.3.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202510528" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-10528</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-10528" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10528" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-10528" ref_url="https://www.suse.com/security/cve/CVE-2025-10528" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16108" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002030.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16156" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002033.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16260" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002035.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16589" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03291-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03309-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041811.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023380.html" source="SUSE-SU"/>
    <description>
    Sandbox escape due to undefined behavior, invalid pointer in the Graphics: Canvas2D component. This vulnerability was fixed in Firefox 143, Firefox ESR 140.3, Thunderbird 143, and Thunderbird 140.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10528/">CVE-2025-10528 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10528">CVE-2025-10528 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249391">SUSE bug 1249391</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030561" comment="MozillaFirefox-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030562" comment="MozillaFirefox-branding-upstream-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030563" comment="MozillaFirefox-devel-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030564" comment="MozillaFirefox-translations-common-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030565" comment="MozillaFirefox-translations-other-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025469" comment="MozillaThunderbird-140.3.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025470" comment="MozillaThunderbird-openpgp-librnp-140.3.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025480" comment="MozillaThunderbird-openpgp-librnp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025471" comment="MozillaThunderbird-translations-common-140.3.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025472" comment="MozillaThunderbird-translations-other-140.3.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202510529" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-10529</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-10529" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10529" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-10529" ref_url="https://www.suse.com/security/cve/CVE-2025-10529" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16108" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002030.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16156" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002033.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16260" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002035.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16589" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03291-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03309-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041811.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023380.html" source="SUSE-SU"/>
    <description>
    Same-origin policy bypass in the Layout component. This vulnerability was fixed in Firefox 143, Firefox ESR 140.3, Thunderbird 143, and Thunderbird 140.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10529/">CVE-2025-10529 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10529">CVE-2025-10529 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249391">SUSE bug 1249391</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030561" comment="MozillaFirefox-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030562" comment="MozillaFirefox-branding-upstream-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030563" comment="MozillaFirefox-devel-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030564" comment="MozillaFirefox-translations-common-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030565" comment="MozillaFirefox-translations-other-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025469" comment="MozillaThunderbird-140.3.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025470" comment="MozillaThunderbird-openpgp-librnp-140.3.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025480" comment="MozillaThunderbird-openpgp-librnp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025471" comment="MozillaThunderbird-translations-common-140.3.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025472" comment="MozillaThunderbird-translations-other-140.3.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202510532" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-10532</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-10532" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10532" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-10532" ref_url="https://www.suse.com/security/cve/CVE-2025-10532" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16108" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002030.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16156" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002033.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16260" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002035.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16589" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03291-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03309-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041811.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023380.html" source="SUSE-SU"/>
    <description>
    Incorrect boundary conditions in the JavaScript: GC component. This vulnerability was fixed in Firefox 143, Firefox ESR 140.3, Thunderbird 143, and Thunderbird 140.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10532/">CVE-2025-10532 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10532">CVE-2025-10532 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249391">SUSE bug 1249391</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030561" comment="MozillaFirefox-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030562" comment="MozillaFirefox-branding-upstream-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030563" comment="MozillaFirefox-devel-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030564" comment="MozillaFirefox-translations-common-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030565" comment="MozillaFirefox-translations-other-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025469" comment="MozillaThunderbird-140.3.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025470" comment="MozillaThunderbird-openpgp-librnp-140.3.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025480" comment="MozillaThunderbird-openpgp-librnp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025471" comment="MozillaThunderbird-translations-common-140.3.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025472" comment="MozillaThunderbird-translations-other-140.3.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202510533" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-10533</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-10533" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10533" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-10533" ref_url="https://www.suse.com/security/cve/CVE-2025-10533" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16108" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002030.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16156" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002033.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16260" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002035.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16589" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03291-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03309-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041811.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023380.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the SVG component. This vulnerability was fixed in Firefox 143, Firefox ESR 115.28, Firefox ESR 140.3, Thunderbird 143, and Thunderbird 140.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10533/">CVE-2025-10533 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10533">CVE-2025-10533 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249391">SUSE bug 1249391</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030561" comment="MozillaFirefox-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030562" comment="MozillaFirefox-branding-upstream-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030563" comment="MozillaFirefox-devel-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030564" comment="MozillaFirefox-translations-common-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030565" comment="MozillaFirefox-translations-other-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025469" comment="MozillaThunderbird-140.3.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025470" comment="MozillaThunderbird-openpgp-librnp-140.3.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025480" comment="MozillaThunderbird-openpgp-librnp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025471" comment="MozillaThunderbird-translations-common-140.3.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025472" comment="MozillaThunderbird-translations-other-140.3.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202510536" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-10536</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-10536" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10536" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-10536" ref_url="https://www.suse.com/security/cve/CVE-2025-10536" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16108" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002030.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16156" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002033.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16260" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002035.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16589" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03291-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03309-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041811.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023380.html" source="SUSE-SU"/>
    <description>
    Information disclosure in the Networking: Cache component. This vulnerability was fixed in Firefox 143, Firefox ESR 140.3, Thunderbird 143, and Thunderbird 140.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10536/">CVE-2025-10536 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10536">CVE-2025-10536 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249391">SUSE bug 1249391</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030561" comment="MozillaFirefox-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030562" comment="MozillaFirefox-branding-upstream-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030563" comment="MozillaFirefox-devel-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030564" comment="MozillaFirefox-translations-common-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030565" comment="MozillaFirefox-translations-other-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025469" comment="MozillaThunderbird-140.3.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025470" comment="MozillaThunderbird-openpgp-librnp-140.3.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025480" comment="MozillaThunderbird-openpgp-librnp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025471" comment="MozillaThunderbird-translations-common-140.3.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025472" comment="MozillaThunderbird-translations-other-140.3.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202510537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-10537</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-10537" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10537" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-10537" ref_url="https://www.suse.com/security/cve/CVE-2025-10537" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16108" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002030.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16156" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002033.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16260" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002035.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16589" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03291-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03309-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041811.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023380.html" source="SUSE-SU"/>
    <description>
    Memory safety bugs present in Firefox ESR 140.2, Thunderbird ESR 140.2, Firefox 142 and Thunderbird 142. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability was fixed in Firefox 143, Firefox ESR 140.3, Thunderbird 143, and Thunderbird 140.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10537/">CVE-2025-10537 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10537">CVE-2025-10537 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249391">SUSE bug 1249391</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030561" comment="MozillaFirefox-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030562" comment="MozillaFirefox-branding-upstream-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030563" comment="MozillaFirefox-devel-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030564" comment="MozillaFirefox-translations-common-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030565" comment="MozillaFirefox-translations-other-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025469" comment="MozillaThunderbird-140.3.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025470" comment="MozillaThunderbird-openpgp-librnp-140.3.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025480" comment="MozillaThunderbird-openpgp-librnp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025471" comment="MozillaThunderbird-translations-common-140.3.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025472" comment="MozillaThunderbird-translations-other-140.3.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20251057" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-1057</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-1057" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1057" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-1057" ref_url="https://www.suse.com/security/cve/CVE-2025-1057" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023547.html" source="SUSE-SU"/>
    <description>
    A flaw was found in Keylime, a remote attestation solution, where strict type checking introduced in version 7.12.0 prevents the registrar from reading database entries created by previous versions, for example, 7.11.0. Specifically, older versions store agent registration data as bytes, whereas the updated registrar expects str. This issue leads to an exception when processing agent registration requests, causing the agent to fail.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-15"/>
	<updated date="2025-12-16"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-1057/">CVE-2025-1057 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1057">CVE-2025-1057 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237153">SUSE bug 1237153</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033436" comment="keylime-config-7.13.0+40-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009704319" comment="keylime-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033437" comment="keylime-firewalld-7.13.0+40-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009704320" comment="keylime-firewalld is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033438" comment="keylime-logrotate-7.13.0+40-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009777628" comment="keylime-logrotate is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033439" comment="keylime-registrar-7.13.0+40-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009704321" comment="keylime-registrar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033440" comment="keylime-tenant-7.13.0+40-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033448" comment="keylime-tenant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033441" comment="keylime-tpm_cert_store-7.13.0+40-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009704322" comment="keylime-tpm_cert_store is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033442" comment="keylime-verifier-7.13.0+40-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009704323" comment="keylime-verifier is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033443" comment="python313-keylime-7.13.0+40-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033449" comment="python313-keylime is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202510890" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-10890</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-10890" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10890" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-10890" ref_url="https://www.suse.com/security/cve/CVE-2025-10890" source="SUSE CVE"/>
    <description>
    Side-channel information leakage in V8 in Google Chrome prior to 140.0.7339.207 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-10-31"/>
	<updated date="2025-10-31"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10890/">CVE-2025-10890 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10890">CVE-2025-10890 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250472">SUSE bug 1250472</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010024375" comment="chromedriver-141.0.7390.76-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010024376" comment="chromium-141.0.7390.76-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202510891" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-10891</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-10891" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10891" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-10891" ref_url="https://www.suse.com/security/cve/CVE-2025-10891" source="SUSE CVE"/>
    <description>
    Integer overflow in V8 in Google Chrome prior to 140.0.7339.207 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-10-31"/>
	<updated date="2025-10-31"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10891/">CVE-2025-10891 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10891">CVE-2025-10891 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250472">SUSE bug 1250472</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010024375" comment="chromedriver-141.0.7390.76-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010024376" comment="chromium-141.0.7390.76-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202510892" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-10892</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-10892" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10892" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-10892" ref_url="https://www.suse.com/security/cve/CVE-2025-10892" source="SUSE CVE"/>
    <description>
    Integer overflow in V8 in Google Chrome prior to 140.0.7339.207 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-10-31"/>
	<updated date="2025-10-31"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-10892/">CVE-2025-10892 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-10892">CVE-2025-10892 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250472">SUSE bug 1250472</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010024375" comment="chromedriver-141.0.7390.76-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010024376" comment="chromium-141.0.7390.76-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202510911" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-10911</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-10911" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10911" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-10911" ref_url="https://www.suse.com/security/cve/CVE-2025-10911" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03491-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042030.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03595-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0568-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024731.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability was found in libxslt while parsing xsl nodes that may lead to the dereference of expired pointers and application crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-22"/>
	<updated date="2026-03-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-10911/">CVE-2025-10911 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10911">CVE-2025-10911 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250553">SUSE bug 1250553</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047326" comment="libexslt0-1.1.43-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010030589" comment="libexslt0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047327" comment="libxml2-2-2.13.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151137" comment="libxml2-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047328" comment="libxml2-devel-2.13.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151139" comment="libxml2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047329" comment="libxml2-doc-2.13.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152664" comment="libxml2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047330" comment="libxml2-tools-2.13.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151140" comment="libxml2-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047331" comment="libxslt-devel-1.1.43-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009155744" comment="libxslt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047332" comment="libxslt-tools-1.1.43-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009155747" comment="libxslt-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047333" comment="libxslt1-1.1.43-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009155748" comment="libxslt1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047334" comment="python313-libxml2-2.13.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010042235" comment="python313-libxml2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202510920" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-10920</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-10920" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10920" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-10920" ref_url="https://www.suse.com/security/cve/CVE-2025-10920" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:21968" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003117.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22417" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002271.html" source="SUSE-SU"/>
    <description>
    GIMP ICNS File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within the parsing of ICNS files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-27684.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-18"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-10920/">CVE-2025-10920 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10920">CVE-2025-10920 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250495">SUSE bug 1250495</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037896" comment="gimp-3.0.6-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151540" comment="gimp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037897" comment="gimp-devel-3.0.6-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153688" comment="gimp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037898" comment="gimp-extension-goat-excercises-3.0.6-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037906" comment="gimp-extension-goat-excercises is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037899" comment="gimp-lang-3.0.6-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151542" comment="gimp-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037900" comment="gimp-plugin-aa-3.0.6-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151543" comment="gimp-plugin-aa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037901" comment="gimp-plugin-python3-3.0.6-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037907" comment="gimp-plugin-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037902" comment="gimp-vala-3.0.6-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037908" comment="gimp-vala is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037903" comment="libgimp-3_0-0-3.0.6-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037909" comment="libgimp-3_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037904" comment="libgimpui-3_0-0-3.0.6-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037910" comment="libgimpui-3_0-0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202510922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-10922</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-10922" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10922" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-10922" ref_url="https://www.suse.com/security/cve/CVE-2025-10922" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:21968" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003117.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22417" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002271.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22445" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023447.html" source="SUSE-SU"/>
    <description>
    GIMP DCM File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within the parsing of DCM files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-27863.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-18"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-10922/">CVE-2025-10922 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10922">CVE-2025-10922 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250497">SUSE bug 1250497</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037896" comment="gimp-3.0.6-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151540" comment="gimp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037897" comment="gimp-devel-3.0.6-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153688" comment="gimp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037898" comment="gimp-extension-goat-excercises-3.0.6-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037906" comment="gimp-extension-goat-excercises is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037899" comment="gimp-lang-3.0.6-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151542" comment="gimp-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037900" comment="gimp-plugin-aa-3.0.6-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151543" comment="gimp-plugin-aa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037901" comment="gimp-plugin-python3-3.0.6-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037907" comment="gimp-plugin-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037902" comment="gimp-vala-3.0.6-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037908" comment="gimp-vala is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037903" comment="libgimp-3_0-0-3.0.6-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037909" comment="libgimp-3_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037904" comment="libgimpui-3_0-0-3.0.6-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037910" comment="libgimpui-3_0-0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202510924" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-10924</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-10924" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10924" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-10924" ref_url="https://www.suse.com/security/cve/CVE-2025-10924" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:21968" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003117.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22417" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002271.html" source="SUSE-SU"/>
    <description>
    GIMP FF File Parsing Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within the parsing of FF files. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-27836.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-18"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-10924/">CVE-2025-10924 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10924">CVE-2025-10924 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250499">SUSE bug 1250499</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037896" comment="gimp-3.0.6-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151540" comment="gimp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037897" comment="gimp-devel-3.0.6-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153688" comment="gimp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037898" comment="gimp-extension-goat-excercises-3.0.6-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037906" comment="gimp-extension-goat-excercises is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037899" comment="gimp-lang-3.0.6-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151542" comment="gimp-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037900" comment="gimp-plugin-aa-3.0.6-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151543" comment="gimp-plugin-aa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037901" comment="gimp-plugin-python3-3.0.6-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037907" comment="gimp-plugin-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037902" comment="gimp-vala-3.0.6-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037908" comment="gimp-vala is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037903" comment="libgimp-3_0-0-3.0.6-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037909" comment="libgimp-3_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037904" comment="libgimpui-3_0-0-3.0.6-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037910" comment="libgimpui-3_0-0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202510925" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-10925</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-10925" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-10925" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-10925" ref_url="https://www.suse.com/security/cve/CVE-2025-10925" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:21968" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003117.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22417" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002271.html" source="SUSE-SU"/>
    <description>
    GIMP ILBM File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within the parsing of ILBM files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-27793.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-18"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-10925/">CVE-2025-10925 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-10925">CVE-2025-10925 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250501">SUSE bug 1250501</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037896" comment="gimp-3.0.6-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151540" comment="gimp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037897" comment="gimp-devel-3.0.6-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153688" comment="gimp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037898" comment="gimp-extension-goat-excercises-3.0.6-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037906" comment="gimp-extension-goat-excercises is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037899" comment="gimp-lang-3.0.6-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151542" comment="gimp-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037900" comment="gimp-plugin-aa-3.0.6-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151543" comment="gimp-plugin-aa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037901" comment="gimp-plugin-python3-3.0.6-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037907" comment="gimp-plugin-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037902" comment="gimp-vala-3.0.6-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037908" comment="gimp-vala is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037903" comment="libgimp-3_0-0-3.0.6-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037909" comment="libgimp-3_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037904" comment="libgimpui-3_0-0-3.0.6-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037910" comment="libgimpui-3_0-0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202511021" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-11021</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-11021" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11021" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-11021" ref_url="https://www.suse.com/security/cve/CVE-2025-11021" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:19713" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002191.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19714" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002204.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20959" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20937-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20965-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024074.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the cookie date handling logic of the libsoup HTTP library, widely used by GNOME and other applications for web communication. When processing cookies with specially crafted expiration dates, the library may perform an out-of-bounds memory read. This flaw could result in unintended disclosure of memory contents, potentially exposing sensitive information from the process using libsoup.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11021/">CVE-2025-11021 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11021">CVE-2025-11021 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250562">SUSE bug 1250562</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041474" comment="libsoup-3_0-0-3.6.5-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698059" comment="libsoup-3_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041475" comment="libsoup-devel-3.6.5-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151597" comment="libsoup-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041476" comment="libsoup-lang-3.6.5-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151598" comment="libsoup-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041477" comment="typelib-1_0-Soup-3_0-3.6.5-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698061" comment="typelib-1_0-Soup-3_0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202511065" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-11065</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-11065" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11065" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-11065" ref_url="https://www.suse.com/security/cve/CVE-2025-11065" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4446-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023607.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025109.html" source="SUSE-SU"/>
    <description>
    A flaw was found in github.com/go-viper/mapstructure/v2, in the field processing component using mapstructure.WeakDecode. This vulnerability allows information disclosure through detailed error messages that may leak sensitive input values via malformed user-supplied data processed in security-critical contexts.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-22"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11065/">CVE-2025-11065 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11065">CVE-2025-11065 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250608">SUSE bug 1250608</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030578" comment="alloy-1.11.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010030590" comment="alloy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050183" comment="cosign-3.0.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009707674" comment="cosign is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050184" comment="cosign-bash-completion-3.0.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010050218" comment="cosign-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050185" comment="cosign-fish-completion-3.0.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010050219" comment="cosign-fish-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050186" comment="cosign-zsh-completion-3.0.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010050220" comment="cosign-zsh-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032107" comment="trivy-0.66.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698141" comment="trivy is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202511083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-11083</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-11083" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11083" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-11083" ref_url="https://www.suse.com/security/cve/CVE-2025-11083" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23336" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003145.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23343" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003144.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23382" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002321.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23400" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002336.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0052" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003180.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0341" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002412.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0342" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002417.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1359" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003197.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2627" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023286.html" source="SUSE-SU"/>
    <description>
    A vulnerability has been found in GNU Binutils 2.45. The affected element is the function elf_swap_shdr in the library bfd/elfcode.h of the component Linker. The manipulation leads to heap-based buffer overflow. The attack must be carried out locally. The exploit has been disclosed to the public and may be used. The identifier of the patch is 9ca499644a21ceb3f946d1c179c38a83be084490. To fix this issue, it is recommended to deploy a patch. The code maintainer replied with "[f]ixed for 2.46".
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-13"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="1.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-11083/">CVE-2025-11083 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-11083">CVE-2025-11083 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250632">SUSE bug 1250632</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033339" comment="binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033340" comment="binutils-devel-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033444" comment="bpftool-7.5.0-160000.2.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009955992" comment="bpftool is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033445" comment="bpftool-bash-completion-7.5.0-160000.2.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033375" comment="bpftool-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033343" comment="cross-aarch64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167594" comment="cross-aarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033344" comment="cross-arm-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167596" comment="cross-arm-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033345" comment="cross-avr-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167598" comment="cross-avr-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033346" comment="cross-bpf-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010029579" comment="cross-bpf-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033347" comment="cross-epiphany-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238034" comment="cross-epiphany-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033348" comment="cross-hppa-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167600" comment="cross-hppa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033349" comment="cross-hppa64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167602" comment="cross-hppa64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033350" comment="cross-i386-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167604" comment="cross-i386-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033351" comment="cross-ia64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167606" comment="cross-ia64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033352" comment="cross-loongarch64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033376" comment="cross-loongarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033353" comment="cross-m68k-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167608" comment="cross-m68k-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033354" comment="cross-mips-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167610" comment="cross-mips-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033355" comment="cross-ppc-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167612" comment="cross-ppc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033356" comment="cross-ppc64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167614" comment="cross-ppc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033357" comment="cross-ppc64le-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167616" comment="cross-ppc64le-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033358" comment="cross-pru-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010029580" comment="cross-pru-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033359" comment="cross-riscv64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238035" comment="cross-riscv64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033360" comment="cross-rx-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238036" comment="cross-rx-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033361" comment="cross-s390-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167618" comment="cross-s390-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033362" comment="cross-s390x-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167620" comment="cross-s390x-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033363" comment="cross-sparc-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167622" comment="cross-sparc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033364" comment="cross-sparc64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167624" comment="cross-sparc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033365" comment="cross-spu-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167626" comment="cross-spu-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033366" comment="cross-x86_64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167628" comment="cross-x86_64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033367" comment="cross-xtensa-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297932" comment="cross-xtensa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033368" comment="gprofng-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033377" comment="gprofng is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033369" comment="libctf-nobfd0-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297779" comment="libctf-nobfd0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033370" comment="libctf0-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297780" comment="libctf0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202511187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-11187</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-11187" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11187" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-11187" ref_url="https://www.suse.com/security/cve/CVE-2025-11187" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1473" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024609.html" source="SUSE-SU"/>
    <description>
    Issue summary: PBMAC1 parameters in PKCS#12 files are missing validation
which can trigger a stack-based buffer overflow, invalid pointer or NULL
pointer dereference during MAC verification.

Impact summary: The stack buffer overflow or NULL pointer dereference may
cause a crash leading to Denial of Service for an application that parses
untrusted PKCS#12 files. The buffer overflow may also potentially enable
code execution depending on platform mitigations.

When verifying a PKCS#12 file that uses PBMAC1 for the MAC, the PBKDF2
salt and keylength parameters from the file are used without validation.
If the value of keylength exceeds the size of the fixed stack buffer used
for the derived key (64 bytes), the key derivation will overflow the buffer.
The overflow length is attacker-controlled. Also, if the salt parameter is
not an OCTET STRING type this can lead to invalid or NULL pointer
dereference.

Exploiting this issue requires a user or application to process
a maliciously crafted PKCS#12 file. It is uncommon to accept untrusted
PKCS#12 files in applications as they are usually used to store private
keys which are trusted by definition. For this reason the issue was assessed
as Moderate severity.

The FIPS modules in 3.6, 3.5 and 3.4 are not affected by this issue, as
PKCS#12 processing is outside the OpenSSL FIPS module boundary.

OpenSSL 3.6, 3.5 and 3.4 are vulnerable to this issue.

OpenSSL 3.3, 3.0, 1.1.1 and 1.0.2 are not affected by this issue as they do
not support PBMAC1 in PKCS#12.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11187/">CVE-2025-11187 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11187">CVE-2025-11187 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256829">SUSE bug 1256829</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256878">SUSE bug 1256878</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041595" comment="libopenssl-3-devel-3.5.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700693" comment="libopenssl-3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041596" comment="libopenssl-3-fips-provider-3.5.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009868077" comment="libopenssl-3-fips-provider is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041597" comment="libopenssl-3-fips-provider-x86-64-v3-3.5.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010034160" comment="libopenssl-3-fips-provider-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041598" comment="libopenssl3-3.5.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700695" comment="libopenssl3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041599" comment="libopenssl3-x86-64-v3-3.5.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010034161" comment="libopenssl3-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041600" comment="openssl-3-3.5.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700697" comment="openssl-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041601" comment="openssl-3-doc-3.5.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700698" comment="openssl-3-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202511205" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-11205</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-11205" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11205" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-11205" ref_url="https://www.suse.com/security/cve/CVE-2025-11205" source="SUSE CVE"/>
    <description>
    Heap buffer overflow in WebGPU in Google Chrome prior to 141.0.7390.54 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-10-31"/>
	<updated date="2025-11-09"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11205/">CVE-2025-11205 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11205">CVE-2025-11205 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250780">SUSE bug 1250780</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010024375" comment="chromedriver-141.0.7390.76-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010024376" comment="chromium-141.0.7390.76-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202511206" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-11206</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-11206" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11206" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-11206" ref_url="https://www.suse.com/security/cve/CVE-2025-11206" source="SUSE CVE"/>
    <description>
    Heap buffer overflow in Video in Google Chrome prior to 141.0.7390.54 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-10-31"/>
	<updated date="2025-11-09"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11206/">CVE-2025-11206 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11206">CVE-2025-11206 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250780">SUSE bug 1250780</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010024375" comment="chromedriver-141.0.7390.76-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010024376" comment="chromium-141.0.7390.76-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202511207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-11207</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-11207" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11207" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-11207" ref_url="https://www.suse.com/security/cve/CVE-2025-11207" source="SUSE CVE"/>
    <description>
    Side-channel information leakage in Storage in Google Chrome prior to 141.0.7390.54 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: Medium)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-10-31"/>
	<updated date="2025-11-09"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11207/">CVE-2025-11207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11207">CVE-2025-11207 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250780">SUSE bug 1250780</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010024375" comment="chromedriver-141.0.7390.76-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010024376" comment="chromium-141.0.7390.76-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202511208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-11208</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-11208" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11208" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-11208" ref_url="https://www.suse.com/security/cve/CVE-2025-11208" source="SUSE CVE"/>
    <description>
    Inappropriate implementation in Media in Google Chrome prior to 141.0.7390.54 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-10-31"/>
	<updated date="2025-11-09"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11208/">CVE-2025-11208 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11208">CVE-2025-11208 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250780">SUSE bug 1250780</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010024375" comment="chromedriver-141.0.7390.76-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010024376" comment="chromium-141.0.7390.76-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202511209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-11209</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-11209" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11209" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-11209" ref_url="https://www.suse.com/security/cve/CVE-2025-11209" source="SUSE CVE"/>
    <description>
    Inappropriate implementation in Omnibox in Google Chrome on Android prior to 141.0.7390.54 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Medium)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-10-31"/>
	<updated date="2025-11-09"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11209/">CVE-2025-11209 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11209">CVE-2025-11209 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250780">SUSE bug 1250780</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010024375" comment="chromedriver-141.0.7390.76-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010024376" comment="chromium-141.0.7390.76-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202511210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-11210</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-11210" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11210" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-11210" ref_url="https://www.suse.com/security/cve/CVE-2025-11210" source="SUSE CVE"/>
    <description>
    Side-channel information leakage in Tab in Google Chrome prior to 141.0.7390.54 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-10-31"/>
	<updated date="2025-11-09"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11210/">CVE-2025-11210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11210">CVE-2025-11210 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250780">SUSE bug 1250780</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010024375" comment="chromedriver-141.0.7390.76-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010024376" comment="chromium-141.0.7390.76-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202511211" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-11211</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-11211" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11211" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-11211" ref_url="https://www.suse.com/security/cve/CVE-2025-11211" source="SUSE CVE"/>
    <description>
    Out of bounds read in Media in Google Chrome prior to 141.0.7390.54 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page. (Chromium security severity: Medium)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-10-31"/>
	<updated date="2025-11-09"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11211/">CVE-2025-11211 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11211">CVE-2025-11211 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250780">SUSE bug 1250780</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010024375" comment="chromedriver-141.0.7390.76-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010024376" comment="chromium-141.0.7390.76-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202511212" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-11212</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-11212" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11212" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-11212" ref_url="https://www.suse.com/security/cve/CVE-2025-11212" source="SUSE CVE"/>
    <description>
    Inappropriate implementation in Media in Google Chrome on Windows prior to 141.0.7390.54 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform domain spoofing via a crafted HTML page. (Chromium security severity: Medium)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-10-31"/>
	<updated date="2025-11-11"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11212/">CVE-2025-11212 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11212">CVE-2025-11212 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250780">SUSE bug 1250780</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010024375" comment="chromedriver-141.0.7390.76-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010024376" comment="chromium-141.0.7390.76-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202511213" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-11213</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-11213" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11213" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-11213" ref_url="https://www.suse.com/security/cve/CVE-2025-11213" source="SUSE CVE"/>
    <description>
    Inappropriate implementation in Omnibox in Google Chrome on Android prior to 141.0.7390.54 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform domain spoofing via a crafted HTML page. (Chromium security severity: Medium)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-10-31"/>
	<updated date="2025-11-09"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11213/">CVE-2025-11213 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11213">CVE-2025-11213 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250780">SUSE bug 1250780</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010024375" comment="chromedriver-141.0.7390.76-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010024376" comment="chromium-141.0.7390.76-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202511215" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-11215</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-11215" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11215" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-11215" ref_url="https://www.suse.com/security/cve/CVE-2025-11215" source="SUSE CVE"/>
    <description>
    Off by one error in V8 in Google Chrome prior to 141.0.7390.54 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: Medium)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-10-31"/>
	<updated date="2025-11-09"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11215/">CVE-2025-11215 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11215">CVE-2025-11215 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250780">SUSE bug 1250780</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010024375" comment="chromedriver-141.0.7390.76-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010024376" comment="chromium-141.0.7390.76-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202511216" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-11216</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-11216" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11216" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-11216" ref_url="https://www.suse.com/security/cve/CVE-2025-11216" source="SUSE CVE"/>
    <description>
    Inappropriate implementation in Storage in Google Chrome on Mac prior to 141.0.7390.54 allowed a remote attacker to perform domain spoofing via a crafted video file. (Chromium security severity: Low)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-10-31"/>
	<updated date="2025-11-09"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11216/">CVE-2025-11216 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11216">CVE-2025-11216 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250780">SUSE bug 1250780</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010024375" comment="chromedriver-141.0.7390.76-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010024376" comment="chromium-141.0.7390.76-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202511219" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-11219</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-11219" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11219" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-11219" ref_url="https://www.suse.com/security/cve/CVE-2025-11219" source="SUSE CVE"/>
    <description>
    Use after free in V8 in Google Chrome prior to 141.0.7390.54 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page. (Chromium security severity: Low)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-10-31"/>
	<updated date="2025-11-09"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11219/">CVE-2025-11219 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11219">CVE-2025-11219 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250780">SUSE bug 1250780</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010024375" comment="chromedriver-141.0.7390.76-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010024376" comment="chromium-141.0.7390.76-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202511230" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-11230</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-11230" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11230" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-11230" ref_url="https://www.suse.com/security/cve/CVE-2025-11230" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:21693" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003126.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21694" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03587-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03589-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023879.html" source="SUSE-SU"/>
    <description>
    Inefficient algorithm complexity in mjson in HAProxy allows remote attackers to cause a denial of service via specially crafted JSON requests.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-16"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11230/">CVE-2025-11230 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11230">CVE-2025-11230 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250983">SUSE bug 1250983</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037726" comment="haproxy-3.2.0+git0.e134140d2-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238038" comment="haproxy is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202511232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-11232</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-11232" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11232" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-11232" ref_url="https://www.suse.com/security/cve/CVE-2025-11232" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20989-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045342.html" source="SUSE-SU"/>
    <description>
    To trigger the issue, three configuration parameters must have specific settings: "hostname-char-set" must be left at the default setting, which is "[^A-Za-z0-9.-]"; "hostname-char-replacement" must be empty (the default); and "ddns-qualifying-suffix" must *NOT* be empty (the default is empty). DDNS updates do not need to be enabled for this issue to manifest. A client that sends certain option content would then cause kea-dhcp4 to exit unexpectedly.
This issue affects Kea versions 3.0.1 through 3.0.1 and 3.1.1 through 3.1.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-03"/>
	<updated date="2026-04-10"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11232/">CVE-2025-11232 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11232">CVE-2025-11232 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252863">SUSE bug 1252863</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052662" comment="kea-3.0.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048437" comment="kea is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052663" comment="kea-devel-3.0.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048438" comment="kea-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052664" comment="kea-doc-3.0.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048439" comment="kea-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052665" comment="kea-hooks-3.0.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048440" comment="kea-hooks is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052666" comment="libkea-asiodns62-3.0.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048441" comment="libkea-asiodns62 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052667" comment="libkea-asiolink88-3.0.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048442" comment="libkea-asiolink88 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052668" comment="libkea-cc83-3.0.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010052699" comment="libkea-cc83 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052669" comment="libkea-cfgrpt3-3.0.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048444" comment="libkea-cfgrpt3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052670" comment="libkea-config84-3.0.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010052700" comment="libkea-config84 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052671" comment="libkea-cryptolink64-3.0.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048446" comment="libkea-cryptolink64 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052672" comment="libkea-d2srv63-3.0.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048447" comment="libkea-d2srv63 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052673" comment="libkea-database76-3.0.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048448" comment="libkea-database76 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052674" comment="libkea-dhcp109-3.0.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048449" comment="libkea-dhcp109 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052675" comment="libkea-dhcp_ddns68-3.0.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048450" comment="libkea-dhcp_ddns68 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052676" comment="libkea-dhcpsrv131-3.0.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010052701" comment="libkea-dhcpsrv131 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052677" comment="libkea-dns71-3.0.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048452" comment="libkea-dns71 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052678" comment="libkea-eval84-3.0.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048453" comment="libkea-eval84 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052679" comment="libkea-exceptions45-3.0.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048454" comment="libkea-exceptions45 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052680" comment="libkea-hooks121-3.0.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010052702" comment="libkea-hooks121 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052681" comment="libkea-http87-3.0.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048456" comment="libkea-http87 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052682" comment="libkea-log-interprocess3-3.0.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048457" comment="libkea-log-interprocess3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052683" comment="libkea-log75-3.0.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048458" comment="libkea-log75 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052684" comment="libkea-mysql88-3.0.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048459" comment="libkea-mysql88 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052685" comment="libkea-pgsql88-3.0.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048460" comment="libkea-pgsql88 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052686" comment="libkea-process91-3.0.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010052703" comment="libkea-process91 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052687" comment="libkea-stats53-3.0.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048462" comment="libkea-stats53 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052688" comment="libkea-tcp33-3.0.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048463" comment="libkea-tcp33 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052689" comment="libkea-util-io12-3.0.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048464" comment="libkea-util-io12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052690" comment="libkea-util102-3.0.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010052704" comment="libkea-util102 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052691" comment="python3-kea-3.0.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048466" comment="python3-kea is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202511234" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-11234</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-11234" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11234" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-11234" ref_url="https://www.suse.com/security/cve/CVE-2025-11234" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023642.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0022-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024003.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023769.html" source="SUSE-SU"/>
    <description>
    A flaw was found in QEMU. If the QIOChannelWebsock object is freed while it is waiting to complete a handshake, a GSource is leaked. This can lead to the callback firing later on and triggering a use-after-free in the use of the channel. This can be abused by a malicious client with network access to the VNC WebSocket port to cause a denial of service during the WebSocket handshake prior to the VNC client authentication.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-02-12"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11234/">CVE-2025-11234 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11234">CVE-2025-11234 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250984">SUSE bug 1250984</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034877" comment="qemu-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034878" comment="qemu-SLOF-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009676699" comment="qemu-SLOF is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035029" comment="qemu-accel-qtest-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700691" comment="qemu-accel-qtest is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035030" comment="qemu-arm-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035031" comment="qemu-audio-alsa-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266837" comment="qemu-audio-alsa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035032" comment="qemu-audio-dbus-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009775936" comment="qemu-audio-dbus is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035033" comment="qemu-audio-jack-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700692" comment="qemu-audio-jack is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035034" comment="qemu-audio-oss-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266838" comment="qemu-audio-oss is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035035" comment="qemu-audio-pa-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266839" comment="qemu-audio-pa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035036" comment="qemu-audio-pipewire-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009881182" comment="qemu-audio-pipewire is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034880" comment="qemu-audio-spice-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623393" comment="qemu-audio-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035037" comment="qemu-block-curl-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035038" comment="qemu-block-dmg-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154081" comment="qemu-block-dmg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034881" comment="qemu-block-iscsi-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154082" comment="qemu-block-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035039" comment="qemu-block-nfs-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266841" comment="qemu-block-nfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035040" comment="qemu-block-rbd-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034882" comment="qemu-block-ssh-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154083" comment="qemu-block-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035041" comment="qemu-chardev-baum-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623394" comment="qemu-chardev-baum is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034883" comment="qemu-chardev-spice-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623395" comment="qemu-chardev-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035042" comment="qemu-doc-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009881183" comment="qemu-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035043" comment="qemu-extra-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034884" comment="qemu-guest-agent-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035044" comment="qemu-headless-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009881184" comment="qemu-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034885" comment="qemu-hw-display-qxl-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623396" comment="qemu-hw-display-qxl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034886" comment="qemu-hw-display-virtio-gpu-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623397" comment="qemu-hw-display-virtio-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034887" comment="qemu-hw-display-virtio-gpu-pci-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623398" comment="qemu-hw-display-virtio-gpu-pci is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034888" comment="qemu-hw-display-virtio-vga-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623399" comment="qemu-hw-display-virtio-vga is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035045" comment="qemu-hw-s390x-virtio-gpu-ccw-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623400" comment="qemu-hw-s390x-virtio-gpu-ccw is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034890" comment="qemu-hw-usb-host-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698021" comment="qemu-hw-usb-host is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034891" comment="qemu-hw-usb-redirect-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623401" comment="qemu-hw-usb-redirect is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035046" comment="qemu-hw-usb-smartcard-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623402" comment="qemu-hw-usb-smartcard is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034892" comment="qemu-img-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009881185" comment="qemu-img is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034893" comment="qemu-ipxe-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035047" comment="qemu-ivshmem-tools-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623403" comment="qemu-ivshmem-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034894" comment="qemu-ksm-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161270" comment="qemu-ksm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034895" comment="qemu-lang-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035048" comment="qemu-linux-user-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035049" comment="qemu-microvm-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291440" comment="qemu-microvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035050" comment="qemu-ppc-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034897" comment="qemu-pr-helper-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009881186" comment="qemu-pr-helper is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035051" comment="qemu-s390x-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623404" comment="qemu-s390x is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034899" comment="qemu-seabios-10.0.71.16.3_3_g3d33c746-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035052" comment="qemu-skiboot-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623405" comment="qemu-skiboot is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035053" comment="qemu-spice-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009881187" comment="qemu-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034900" comment="qemu-tools-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035054" comment="qemu-ui-curses-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266842" comment="qemu-ui-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035055" comment="qemu-ui-dbus-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009775937" comment="qemu-ui-dbus is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035056" comment="qemu-ui-gtk-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266843" comment="qemu-ui-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034901" comment="qemu-ui-opengl-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623406" comment="qemu-ui-opengl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035057" comment="qemu-ui-spice-app-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291441" comment="qemu-ui-spice-app is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034902" comment="qemu-ui-spice-core-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623407" comment="qemu-ui-spice-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034903" comment="qemu-vgabios-10.0.71.16.3_3_g3d33c746-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035058" comment="qemu-vhost-user-gpu-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291442" comment="qemu-vhost-user-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034904" comment="qemu-vmsr-helper-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010035142" comment="qemu-vmsr-helper is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035059" comment="qemu-x86-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202511411" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-11411</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-11411" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11411" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-11411" ref_url="https://www.suse.com/security/cve/CVE-2025-11411" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21050-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21065-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4134-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024018.html" source="SUSE-SU"/>
    <description>
    NLnet Labs Unbound up to and including version 1.24.1 is vulnerable to possible domain hijack attacks. Promiscuous NS RRSets that complement positive DNS replies in the authority section can be used to trick resolvers to update their delegation information for the zone. Usually these RRSets are used to update the resolver's knowledge of the zone's name servers. A malicious actor can exploit the possible poisonous effect by injecting NS RRSets (and possibly their respective address records) in a reply. This could be done for example by trying to spoof a packet or fragmentation attacks. Unbound would then proceed to update the NS RRSet data it already has since the new data has enough trust for it, i.e., in-zone data for the delegation point. Unbound 1.24.1 includes a fix that scrubs unsolicited NS RRSets (and their respective address records) from replies mitigating the possible poison effect. Unbound 1.24.2 includes an additional fix that scrubs unsolicited NS RRSets (and their respective address records) from YXDOMAIN and non-referral nodata replies, further mitigating the possible poison effect.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-02-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.9/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:L" cvss4="7.1/CVSS:4.0/AV:A/AC:H/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:H/SA:L" href="https://www.suse.com/security/cve/CVE-2025-11411/">CVE-2025-11411 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11411">CVE-2025-11411 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252525">SUSE bug 1252525</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041456" comment="libunbound8-1.24.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009864081" comment="libunbound8 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041457" comment="python3-unbound-1.24.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041610" comment="python3-unbound is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041458" comment="unbound-1.24.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286673" comment="unbound is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041459" comment="unbound-anchor-1.24.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177205" comment="unbound-anchor is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041460" comment="unbound-devel-1.24.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286674" comment="unbound-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041461" comment="unbound-munin-1.24.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009286675" comment="unbound-munin is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202511412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-11412</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-11412" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11412" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-11412" ref_url="https://www.suse.com/security/cve/CVE-2025-11412" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023286.html" source="SUSE-SU"/>
    <description>
    A vulnerability has been found in GNU Binutils 2.45. This impacts the function bfd_elf_gc_record_vtentry of the file bfd/elflink.c of the component Linker. The manipulation leads to out-of-bounds read. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The identifier of the patch is 047435dd988a3975d40c6626a8f739a0b2e154bc. To fix this issue, it is recommended to deploy a patch.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-13"/>
	<updated date="2025-12-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11412/">CVE-2025-11412 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-11412">CVE-2025-11412 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251275">SUSE bug 1251275</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033339" comment="binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033340" comment="binutils-devel-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033444" comment="bpftool-7.5.0-160000.2.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009955992" comment="bpftool is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033445" comment="bpftool-bash-completion-7.5.0-160000.2.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033375" comment="bpftool-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033343" comment="cross-aarch64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167594" comment="cross-aarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033344" comment="cross-arm-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167596" comment="cross-arm-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033345" comment="cross-avr-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167598" comment="cross-avr-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033346" comment="cross-bpf-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010029579" comment="cross-bpf-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033347" comment="cross-epiphany-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238034" comment="cross-epiphany-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033348" comment="cross-hppa-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167600" comment="cross-hppa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033349" comment="cross-hppa64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167602" comment="cross-hppa64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033350" comment="cross-i386-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167604" comment="cross-i386-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033351" comment="cross-ia64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167606" comment="cross-ia64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033352" comment="cross-loongarch64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033376" comment="cross-loongarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033353" comment="cross-m68k-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167608" comment="cross-m68k-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033354" comment="cross-mips-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167610" comment="cross-mips-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033355" comment="cross-ppc-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167612" comment="cross-ppc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033356" comment="cross-ppc64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167614" comment="cross-ppc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033357" comment="cross-ppc64le-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167616" comment="cross-ppc64le-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033358" comment="cross-pru-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010029580" comment="cross-pru-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033359" comment="cross-riscv64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238035" comment="cross-riscv64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033360" comment="cross-rx-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238036" comment="cross-rx-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033361" comment="cross-s390-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167618" comment="cross-s390-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033362" comment="cross-s390x-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167620" comment="cross-s390x-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033363" comment="cross-sparc-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167622" comment="cross-sparc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033364" comment="cross-sparc64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167624" comment="cross-sparc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033365" comment="cross-spu-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167626" comment="cross-spu-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033366" comment="cross-x86_64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167628" comment="cross-x86_64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033367" comment="cross-xtensa-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297932" comment="cross-xtensa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033368" comment="gprofng-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033377" comment="gprofng is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033369" comment="libctf-nobfd0-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297779" comment="libctf-nobfd0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033370" comment="libctf0-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297780" comment="libctf0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202511413" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-11413</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-11413" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11413" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-11413" ref_url="https://www.suse.com/security/cve/CVE-2025-11413" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023286.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in GNU Binutils 2.45. Affected is the function elf_link_add_object_symbols of the file bfd/elflink.c of the component Linker. The manipulation results in out-of-bounds read. The attack needs to be approached locally. The exploit has been made public and could be used. Upgrading to version 2.46 is able to address this issue. The patch is identified as 72efdf166aa0ed72ecc69fc2349af6591a7a19c0. Upgrading the affected component is advised.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-13"/>
	<updated date="2025-12-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11413/">CVE-2025-11413 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-11413">CVE-2025-11413 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251276">SUSE bug 1251276</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033339" comment="binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033340" comment="binutils-devel-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033444" comment="bpftool-7.5.0-160000.2.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009955992" comment="bpftool is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033445" comment="bpftool-bash-completion-7.5.0-160000.2.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033375" comment="bpftool-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033343" comment="cross-aarch64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167594" comment="cross-aarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033344" comment="cross-arm-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167596" comment="cross-arm-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033345" comment="cross-avr-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167598" comment="cross-avr-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033346" comment="cross-bpf-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010029579" comment="cross-bpf-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033347" comment="cross-epiphany-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238034" comment="cross-epiphany-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033348" comment="cross-hppa-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167600" comment="cross-hppa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033349" comment="cross-hppa64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167602" comment="cross-hppa64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033350" comment="cross-i386-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167604" comment="cross-i386-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033351" comment="cross-ia64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167606" comment="cross-ia64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033352" comment="cross-loongarch64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033376" comment="cross-loongarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033353" comment="cross-m68k-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167608" comment="cross-m68k-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033354" comment="cross-mips-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167610" comment="cross-mips-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033355" comment="cross-ppc-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167612" comment="cross-ppc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033356" comment="cross-ppc64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167614" comment="cross-ppc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033357" comment="cross-ppc64le-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167616" comment="cross-ppc64le-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033358" comment="cross-pru-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010029580" comment="cross-pru-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033359" comment="cross-riscv64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238035" comment="cross-riscv64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033360" comment="cross-rx-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238036" comment="cross-rx-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033361" comment="cross-s390-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167618" comment="cross-s390-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033362" comment="cross-s390x-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167620" comment="cross-s390x-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033363" comment="cross-sparc-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167622" comment="cross-sparc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033364" comment="cross-sparc64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167624" comment="cross-sparc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033365" comment="cross-spu-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167626" comment="cross-spu-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033366" comment="cross-x86_64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167628" comment="cross-x86_64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033367" comment="cross-xtensa-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297932" comment="cross-xtensa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033368" comment="gprofng-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033377" comment="gprofng is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033369" comment="libctf-nobfd0-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297779" comment="libctf-nobfd0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033370" comment="libctf0-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297780" comment="libctf0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202511414" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-11414</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-11414" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11414" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-11414" ref_url="https://www.suse.com/security/cve/CVE-2025-11414" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023286.html" source="SUSE-SU"/>
    <description>
    A vulnerability was determined in GNU Binutils 2.45. Affected by this vulnerability is the function get_link_hash_entry of the file bfd/elflink.c of the component Linker. This manipulation causes out-of-bounds read. The attack can only be executed locally. The exploit has been publicly disclosed and may be utilized. Upgrading to version 2.46 addresses this issue. Patch name: aeaaa9af6359c8e394ce9cf24911fec4f4d23703. It is advisable to upgrade the affected component.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-13"/>
	<updated date="2025-12-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11414/">CVE-2025-11414 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-11414">CVE-2025-11414 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251277">SUSE bug 1251277</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033339" comment="binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033340" comment="binutils-devel-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033444" comment="bpftool-7.5.0-160000.2.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009955992" comment="bpftool is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033445" comment="bpftool-bash-completion-7.5.0-160000.2.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033375" comment="bpftool-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033343" comment="cross-aarch64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167594" comment="cross-aarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033344" comment="cross-arm-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167596" comment="cross-arm-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033345" comment="cross-avr-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167598" comment="cross-avr-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033346" comment="cross-bpf-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010029579" comment="cross-bpf-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033347" comment="cross-epiphany-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238034" comment="cross-epiphany-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033348" comment="cross-hppa-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167600" comment="cross-hppa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033349" comment="cross-hppa64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167602" comment="cross-hppa64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033350" comment="cross-i386-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167604" comment="cross-i386-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033351" comment="cross-ia64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167606" comment="cross-ia64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033352" comment="cross-loongarch64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033376" comment="cross-loongarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033353" comment="cross-m68k-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167608" comment="cross-m68k-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033354" comment="cross-mips-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167610" comment="cross-mips-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033355" comment="cross-ppc-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167612" comment="cross-ppc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033356" comment="cross-ppc64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167614" comment="cross-ppc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033357" comment="cross-ppc64le-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167616" comment="cross-ppc64le-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033358" comment="cross-pru-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010029580" comment="cross-pru-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033359" comment="cross-riscv64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238035" comment="cross-riscv64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033360" comment="cross-rx-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238036" comment="cross-rx-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033361" comment="cross-s390-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167618" comment="cross-s390-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033362" comment="cross-s390x-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167620" comment="cross-s390x-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033363" comment="cross-sparc-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167622" comment="cross-sparc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033364" comment="cross-sparc64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167624" comment="cross-sparc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033365" comment="cross-spu-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167626" comment="cross-spu-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033366" comment="cross-x86_64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167628" comment="cross-x86_64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033367" comment="cross-xtensa-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297932" comment="cross-xtensa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033368" comment="gprofng-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033377" comment="gprofng is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033369" comment="libctf-nobfd0-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297779" comment="libctf-nobfd0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033370" comment="libctf0-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297780" comment="libctf0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202511458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-11458</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-11458" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11458" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-11458" ref_url="https://www.suse.com/security/cve/CVE-2025-11458" source="SUSE CVE"/>
    <description>
    Heap buffer overflow in Sync in Google Chrome prior to 141.0.7390.65 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-10-31"/>
	<updated date="2025-11-09"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11458/">CVE-2025-11458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11458">CVE-2025-11458 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251334">SUSE bug 1251334</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010024375" comment="chromedriver-141.0.7390.76-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010024376" comment="chromium-141.0.7390.76-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202511460" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-11460</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-11460" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11460" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-11460" ref_url="https://www.suse.com/security/cve/CVE-2025-11460" source="SUSE CVE"/>
    <description>
    Use after free in Storage in Google Chrome prior to 141.0.7390.65 allowed a remote attacker to execute arbitrary code via a crafted video file. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-10-31"/>
	<updated date="2025-11-09"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11460/">CVE-2025-11460 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11460">CVE-2025-11460 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251334">SUSE bug 1251334</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010024375" comment="chromedriver-141.0.7390.76-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010024376" comment="chromium-141.0.7390.76-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202511468" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-11468</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-11468" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11468" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-11468" ref_url="https://www.suse.com/security/cve/CVE-2025-11468" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024893.html" source="SUSE-SU"/>
    <description>
    When folding a long comment in an email header containing exclusively unfoldable characters, the parenthesis would not be preserved. This could be used for injecting headers into email messages where addresses are user-controlled and not sanitized.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-22"/>
	<updated date="2026-03-28"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11468/">CVE-2025-11468 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11468">CVE-2025-11468 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257029">SUSE bug 1257029</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044584" comment="libpython3_13-1_0-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039739" comment="libpython3_13-1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044585" comment="libpython3_13-1_0-x86-64-v3-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039740" comment="libpython3_13-1_0-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044586" comment="libpython3_13t1_0-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039741" comment="libpython3_13t1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044587" comment="python313-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039742" comment="python313 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044588" comment="python313-base-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039743" comment="python313-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044589" comment="python313-base-x86-64-v3-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039744" comment="python313-base-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044590" comment="python313-curses-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039745" comment="python313-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044591" comment="python313-dbm-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039746" comment="python313-dbm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044592" comment="python313-devel-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039747" comment="python313-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044593" comment="python313-doc-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039748" comment="python313-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044594" comment="python313-doc-devhelp-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039749" comment="python313-doc-devhelp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044595" comment="python313-idle-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039750" comment="python313-idle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044596" comment="python313-nogil-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039751" comment="python313-nogil is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044597" comment="python313-nogil-base-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039752" comment="python313-nogil-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044598" comment="python313-nogil-curses-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039753" comment="python313-nogil-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044599" comment="python313-nogil-dbm-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039754" comment="python313-nogil-dbm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044600" comment="python313-nogil-devel-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039755" comment="python313-nogil-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044601" comment="python313-nogil-idle-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039756" comment="python313-nogil-idle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044602" comment="python313-nogil-testsuite-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039757" comment="python313-nogil-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044603" comment="python313-nogil-tk-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039758" comment="python313-nogil-tk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044604" comment="python313-nogil-tools-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039759" comment="python313-nogil-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044605" comment="python313-testsuite-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039760" comment="python313-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044606" comment="python313-tk-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039761" comment="python313-tk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044607" comment="python313-tools-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039762" comment="python313-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044608" comment="python313-x86-64-v3-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039763" comment="python313-x86-64-v3 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20251147" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-1147</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-1147" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1147" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-1147" ref_url="https://www.suse.com/security/cve/CVE-2025-1147" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023286.html" source="SUSE-SU"/>
    <description>
    A vulnerability has been found in GNU Binutils 2.43 and classified as problematic. Affected by this vulnerability is the function __sanitizer::internal_strlen of the file binutils/nm.c of the component nm. The manipulation of the argument const leads to buffer overflow. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-13"/>
	<updated date="2025-12-19"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L" cvss4="1.8/CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1147/">CVE-2025-1147 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1147">CVE-2025-1147 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236976">SUSE bug 1236976</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033339" comment="binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033340" comment="binutils-devel-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033444" comment="bpftool-7.5.0-160000.2.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009955992" comment="bpftool is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033445" comment="bpftool-bash-completion-7.5.0-160000.2.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033375" comment="bpftool-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033343" comment="cross-aarch64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167594" comment="cross-aarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033344" comment="cross-arm-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167596" comment="cross-arm-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033345" comment="cross-avr-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167598" comment="cross-avr-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033346" comment="cross-bpf-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010029579" comment="cross-bpf-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033347" comment="cross-epiphany-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238034" comment="cross-epiphany-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033348" comment="cross-hppa-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167600" comment="cross-hppa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033349" comment="cross-hppa64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167602" comment="cross-hppa64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033350" comment="cross-i386-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167604" comment="cross-i386-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033351" comment="cross-ia64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167606" comment="cross-ia64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033352" comment="cross-loongarch64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033376" comment="cross-loongarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033353" comment="cross-m68k-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167608" comment="cross-m68k-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033354" comment="cross-mips-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167610" comment="cross-mips-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033355" comment="cross-ppc-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167612" comment="cross-ppc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033356" comment="cross-ppc64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167614" comment="cross-ppc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033357" comment="cross-ppc64le-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167616" comment="cross-ppc64le-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033358" comment="cross-pru-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010029580" comment="cross-pru-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033359" comment="cross-riscv64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238035" comment="cross-riscv64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033360" comment="cross-rx-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238036" comment="cross-rx-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033361" comment="cross-s390-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167618" comment="cross-s390-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033362" comment="cross-s390x-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167620" comment="cross-s390x-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033363" comment="cross-sparc-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167622" comment="cross-sparc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033364" comment="cross-sparc64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167624" comment="cross-sparc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033365" comment="cross-spu-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167626" comment="cross-spu-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033366" comment="cross-x86_64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167628" comment="cross-x86_64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033367" comment="cross-xtensa-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297932" comment="cross-xtensa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033368" comment="gprofng-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033377" comment="gprofng is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033369" comment="libctf-nobfd0-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297779" comment="libctf-nobfd0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033370" comment="libctf0-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297780" comment="libctf0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20251148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-1148</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-1148" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1148" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-1148" ref_url="https://www.suse.com/security/cve/CVE-2025-1148" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023286.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in GNU Binutils 2.43 and classified as problematic. Affected by this issue is the function link_order_scan of the file ld/ldelfgen.c of the component ld. The manipulation leads to memory leak. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The code maintainer explains: "I'm not going to commit some of the leak fixes I've been working on to the 2.44 branch due to concern that would destabilise ld. All of the reported leaks in this bugzilla have been fixed on binutils master."
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-13"/>
	<updated date="2025-12-19"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1148/">CVE-2025-1148 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1148">CVE-2025-1148 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236978">SUSE bug 1236978</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033339" comment="binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033340" comment="binutils-devel-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033444" comment="bpftool-7.5.0-160000.2.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009955992" comment="bpftool is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033445" comment="bpftool-bash-completion-7.5.0-160000.2.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033375" comment="bpftool-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033343" comment="cross-aarch64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167594" comment="cross-aarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033344" comment="cross-arm-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167596" comment="cross-arm-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033345" comment="cross-avr-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167598" comment="cross-avr-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033346" comment="cross-bpf-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010029579" comment="cross-bpf-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033347" comment="cross-epiphany-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238034" comment="cross-epiphany-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033348" comment="cross-hppa-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167600" comment="cross-hppa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033349" comment="cross-hppa64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167602" comment="cross-hppa64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033350" comment="cross-i386-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167604" comment="cross-i386-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033351" comment="cross-ia64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167606" comment="cross-ia64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033352" comment="cross-loongarch64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033376" comment="cross-loongarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033353" comment="cross-m68k-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167608" comment="cross-m68k-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033354" comment="cross-mips-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167610" comment="cross-mips-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033355" comment="cross-ppc-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167612" comment="cross-ppc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033356" comment="cross-ppc64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167614" comment="cross-ppc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033357" comment="cross-ppc64le-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167616" comment="cross-ppc64le-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033358" comment="cross-pru-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010029580" comment="cross-pru-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033359" comment="cross-riscv64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238035" comment="cross-riscv64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033360" comment="cross-rx-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238036" comment="cross-rx-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033361" comment="cross-s390-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167618" comment="cross-s390-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033362" comment="cross-s390x-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167620" comment="cross-s390x-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033363" comment="cross-sparc-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167622" comment="cross-sparc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033364" comment="cross-sparc64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167624" comment="cross-sparc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033365" comment="cross-spu-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167626" comment="cross-spu-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033366" comment="cross-x86_64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167628" comment="cross-x86_64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033367" comment="cross-xtensa-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297932" comment="cross-xtensa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033368" comment="gprofng-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033377" comment="gprofng is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033369" comment="libctf-nobfd0-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297779" comment="libctf-nobfd0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033370" comment="libctf0-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297780" comment="libctf0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20251149" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-1149</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-1149" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1149" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-1149" ref_url="https://www.suse.com/security/cve/CVE-2025-1149" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023286.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in GNU Binutils 2.43. It has been classified as problematic. This affects the function xstrdup of the file libiberty/xmalloc.c of the component ld. The manipulation leads to memory leak. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The code maintainer explains: "I'm not going to commit some of the leak fixes I've been working on to the 2.44 branch due to concern that would destabilise ld. All of the reported leaks in this bugzilla have been fixed on binutils master."
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-13"/>
	<updated date="2025-12-19"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1149/">CVE-2025-1149 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1149">CVE-2025-1149 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236977">SUSE bug 1236977</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033339" comment="binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033340" comment="binutils-devel-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033444" comment="bpftool-7.5.0-160000.2.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009955992" comment="bpftool is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033445" comment="bpftool-bash-completion-7.5.0-160000.2.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033375" comment="bpftool-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033343" comment="cross-aarch64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167594" comment="cross-aarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033344" comment="cross-arm-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167596" comment="cross-arm-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033345" comment="cross-avr-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167598" comment="cross-avr-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033346" comment="cross-bpf-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010029579" comment="cross-bpf-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033347" comment="cross-epiphany-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238034" comment="cross-epiphany-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033348" comment="cross-hppa-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167600" comment="cross-hppa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033349" comment="cross-hppa64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167602" comment="cross-hppa64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033350" comment="cross-i386-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167604" comment="cross-i386-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033351" comment="cross-ia64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167606" comment="cross-ia64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033352" comment="cross-loongarch64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033376" comment="cross-loongarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033353" comment="cross-m68k-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167608" comment="cross-m68k-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033354" comment="cross-mips-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167610" comment="cross-mips-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033355" comment="cross-ppc-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167612" comment="cross-ppc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033356" comment="cross-ppc64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167614" comment="cross-ppc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033357" comment="cross-ppc64le-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167616" comment="cross-ppc64le-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033358" comment="cross-pru-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010029580" comment="cross-pru-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033359" comment="cross-riscv64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238035" comment="cross-riscv64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033360" comment="cross-rx-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238036" comment="cross-rx-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033361" comment="cross-s390-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167618" comment="cross-s390-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033362" comment="cross-s390x-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167620" comment="cross-s390x-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033363" comment="cross-sparc-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167622" comment="cross-sparc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033364" comment="cross-sparc64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167624" comment="cross-sparc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033365" comment="cross-spu-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167626" comment="cross-spu-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033366" comment="cross-x86_64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167628" comment="cross-x86_64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033367" comment="cross-xtensa-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297932" comment="cross-xtensa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033368" comment="gprofng-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033377" comment="gprofng is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033369" comment="libctf-nobfd0-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297779" comment="libctf-nobfd0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033370" comment="libctf0-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297780" comment="libctf0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202511494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-11494</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-11494" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11494" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-11494" ref_url="https://www.suse.com/security/cve/CVE-2025-11494" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023286.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in GNU Binutils 2.45. Impacted is the function _bfd_x86_elf_late_size_sections of the file bfd/elfxx-x86.c of the component Linker. The manipulation results in out-of-bounds read. The attack needs to be approached locally. The exploit has been made public and could be used. The patch is identified as b6ac5a8a5b82f0ae6a4642c8d7149b325f4cc60a. A patch should be applied to remediate this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-13"/>
	<updated date="2025-12-19"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="1.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-11494/">CVE-2025-11494 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-11494">CVE-2025-11494 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251794">SUSE bug 1251794</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033339" comment="binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033340" comment="binutils-devel-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033444" comment="bpftool-7.5.0-160000.2.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009955992" comment="bpftool is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033445" comment="bpftool-bash-completion-7.5.0-160000.2.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033375" comment="bpftool-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033343" comment="cross-aarch64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167594" comment="cross-aarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033344" comment="cross-arm-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167596" comment="cross-arm-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033345" comment="cross-avr-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167598" comment="cross-avr-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033346" comment="cross-bpf-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010029579" comment="cross-bpf-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033347" comment="cross-epiphany-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238034" comment="cross-epiphany-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033348" comment="cross-hppa-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167600" comment="cross-hppa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033349" comment="cross-hppa64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167602" comment="cross-hppa64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033350" comment="cross-i386-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167604" comment="cross-i386-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033351" comment="cross-ia64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167606" comment="cross-ia64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033352" comment="cross-loongarch64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033376" comment="cross-loongarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033353" comment="cross-m68k-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167608" comment="cross-m68k-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033354" comment="cross-mips-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167610" comment="cross-mips-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033355" comment="cross-ppc-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167612" comment="cross-ppc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033356" comment="cross-ppc64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167614" comment="cross-ppc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033357" comment="cross-ppc64le-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167616" comment="cross-ppc64le-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033358" comment="cross-pru-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010029580" comment="cross-pru-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033359" comment="cross-riscv64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238035" comment="cross-riscv64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033360" comment="cross-rx-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238036" comment="cross-rx-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033361" comment="cross-s390-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167618" comment="cross-s390-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033362" comment="cross-s390x-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167620" comment="cross-s390x-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033363" comment="cross-sparc-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167622" comment="cross-sparc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033364" comment="cross-sparc64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167624" comment="cross-sparc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033365" comment="cross-spu-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167626" comment="cross-spu-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033366" comment="cross-x86_64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167628" comment="cross-x86_64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033367" comment="cross-xtensa-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297932" comment="cross-xtensa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033368" comment="gprofng-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033377" comment="gprofng is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033369" comment="libctf-nobfd0-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297779" comment="libctf-nobfd0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033370" comment="libctf0-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297780" comment="libctf0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202511495" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-11495</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-11495" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11495" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-11495" ref_url="https://www.suse.com/security/cve/CVE-2025-11495" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023286.html" source="SUSE-SU"/>
    <description>
    A vulnerability was determined in GNU Binutils 2.45. The affected element is the function elf_x86_64_relocate_section of the file elf64-x86-64.c of the component Linker. This manipulation causes heap-based buffer overflow. The attack can only be executed locally. The exploit has been publicly disclosed and may be utilized. Patch name: 6b21c8b2ecfef5c95142cbc2c32f185cb1c26ab0. To fix this issue, it is recommended to deploy a patch.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-13"/>
	<updated date="2025-12-19"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="1.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-11495/">CVE-2025-11495 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-11495">CVE-2025-11495 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251795">SUSE bug 1251795</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033339" comment="binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033340" comment="binutils-devel-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033444" comment="bpftool-7.5.0-160000.2.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009955992" comment="bpftool is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033445" comment="bpftool-bash-completion-7.5.0-160000.2.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033375" comment="bpftool-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033343" comment="cross-aarch64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167594" comment="cross-aarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033344" comment="cross-arm-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167596" comment="cross-arm-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033345" comment="cross-avr-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167598" comment="cross-avr-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033346" comment="cross-bpf-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010029579" comment="cross-bpf-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033347" comment="cross-epiphany-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238034" comment="cross-epiphany-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033348" comment="cross-hppa-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167600" comment="cross-hppa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033349" comment="cross-hppa64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167602" comment="cross-hppa64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033350" comment="cross-i386-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167604" comment="cross-i386-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033351" comment="cross-ia64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167606" comment="cross-ia64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033352" comment="cross-loongarch64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033376" comment="cross-loongarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033353" comment="cross-m68k-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167608" comment="cross-m68k-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033354" comment="cross-mips-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167610" comment="cross-mips-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033355" comment="cross-ppc-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167612" comment="cross-ppc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033356" comment="cross-ppc64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167614" comment="cross-ppc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033357" comment="cross-ppc64le-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167616" comment="cross-ppc64le-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033358" comment="cross-pru-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010029580" comment="cross-pru-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033359" comment="cross-riscv64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238035" comment="cross-riscv64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033360" comment="cross-rx-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238036" comment="cross-rx-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033361" comment="cross-s390-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167618" comment="cross-s390-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033362" comment="cross-s390x-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167620" comment="cross-s390x-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033363" comment="cross-sparc-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167622" comment="cross-sparc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033364" comment="cross-sparc64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167624" comment="cross-sparc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033365" comment="cross-spu-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167626" comment="cross-spu-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033366" comment="cross-x86_64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167628" comment="cross-x86_64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033367" comment="cross-xtensa-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297932" comment="cross-xtensa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033368" comment="gprofng-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033377" comment="gprofng is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033369" comment="libctf-nobfd0-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297779" comment="libctf-nobfd0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033370" comment="libctf0-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297780" comment="libctf0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20251150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-1150</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-1150" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1150" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-1150" ref_url="https://www.suse.com/security/cve/CVE-2025-1150" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023286.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in GNU Binutils 2.43. It has been declared as problematic. This vulnerability affects the function bfd_malloc of the file libbfd.c of the component ld. The manipulation leads to memory leak. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The code maintainer explains: "I'm not going to commit some of the leak fixes I've been working on to the 2.44 branch due to concern that would destabilise ld. All of the reported leaks in this bugzilla have been fixed on binutils master."
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-13"/>
	<updated date="2025-12-19"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="1.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1150/">CVE-2025-1150 at SUSE</cve>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1150">CVE-2025-1150 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237005">SUSE bug 1237005</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033339" comment="binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033340" comment="binutils-devel-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033444" comment="bpftool-7.5.0-160000.2.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009955992" comment="bpftool is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033445" comment="bpftool-bash-completion-7.5.0-160000.2.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033375" comment="bpftool-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033343" comment="cross-aarch64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167594" comment="cross-aarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033344" comment="cross-arm-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167596" comment="cross-arm-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033345" comment="cross-avr-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167598" comment="cross-avr-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033346" comment="cross-bpf-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010029579" comment="cross-bpf-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033347" comment="cross-epiphany-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238034" comment="cross-epiphany-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033348" comment="cross-hppa-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167600" comment="cross-hppa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033349" comment="cross-hppa64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167602" comment="cross-hppa64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033350" comment="cross-i386-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167604" comment="cross-i386-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033351" comment="cross-ia64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167606" comment="cross-ia64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033352" comment="cross-loongarch64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033376" comment="cross-loongarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033353" comment="cross-m68k-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167608" comment="cross-m68k-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033354" comment="cross-mips-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167610" comment="cross-mips-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033355" comment="cross-ppc-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167612" comment="cross-ppc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033356" comment="cross-ppc64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167614" comment="cross-ppc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033357" comment="cross-ppc64le-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167616" comment="cross-ppc64le-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033358" comment="cross-pru-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010029580" comment="cross-pru-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033359" comment="cross-riscv64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238035" comment="cross-riscv64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033360" comment="cross-rx-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238036" comment="cross-rx-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033361" comment="cross-s390-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167618" comment="cross-s390-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033362" comment="cross-s390x-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167620" comment="cross-s390x-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033363" comment="cross-sparc-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167622" comment="cross-sparc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033364" comment="cross-sparc64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167624" comment="cross-sparc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033365" comment="cross-spu-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167626" comment="cross-spu-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033366" comment="cross-x86_64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167628" comment="cross-x86_64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033367" comment="cross-xtensa-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297932" comment="cross-xtensa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033368" comment="gprofng-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033377" comment="gprofng is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033369" comment="libctf-nobfd0-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297779" comment="libctf-nobfd0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033370" comment="libctf0-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297780" comment="libctf0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20251151" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-1151</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-1151" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1151" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-1151" ref_url="https://www.suse.com/security/cve/CVE-2025-1151" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023286.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in GNU Binutils 2.43. It has been rated as problematic. This issue affects the function xmemdup of the file xmemdup.c of the component ld. The manipulation leads to memory leak. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The code maintainer explains: "I'm not going to commit some of the leak fixes I've been working on to the 2.44 branch due to concern that would destabilise ld. All of the reported leaks in this bugzilla have been fixed on binutils master."
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-13"/>
	<updated date="2025-12-19"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1151/">CVE-2025-1151 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1151">CVE-2025-1151 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237003">SUSE bug 1237003</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033339" comment="binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033340" comment="binutils-devel-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033444" comment="bpftool-7.5.0-160000.2.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009955992" comment="bpftool is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033445" comment="bpftool-bash-completion-7.5.0-160000.2.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033375" comment="bpftool-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033343" comment="cross-aarch64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167594" comment="cross-aarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033344" comment="cross-arm-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167596" comment="cross-arm-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033345" comment="cross-avr-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167598" comment="cross-avr-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033346" comment="cross-bpf-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010029579" comment="cross-bpf-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033347" comment="cross-epiphany-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238034" comment="cross-epiphany-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033348" comment="cross-hppa-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167600" comment="cross-hppa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033349" comment="cross-hppa64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167602" comment="cross-hppa64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033350" comment="cross-i386-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167604" comment="cross-i386-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033351" comment="cross-ia64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167606" comment="cross-ia64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033352" comment="cross-loongarch64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033376" comment="cross-loongarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033353" comment="cross-m68k-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167608" comment="cross-m68k-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033354" comment="cross-mips-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167610" comment="cross-mips-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033355" comment="cross-ppc-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167612" comment="cross-ppc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033356" comment="cross-ppc64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167614" comment="cross-ppc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033357" comment="cross-ppc64le-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167616" comment="cross-ppc64le-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033358" comment="cross-pru-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010029580" comment="cross-pru-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033359" comment="cross-riscv64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238035" comment="cross-riscv64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033360" comment="cross-rx-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238036" comment="cross-rx-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033361" comment="cross-s390-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167618" comment="cross-s390-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033362" comment="cross-s390x-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167620" comment="cross-s390x-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033363" comment="cross-sparc-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167622" comment="cross-sparc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033364" comment="cross-sparc64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167624" comment="cross-sparc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033365" comment="cross-spu-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167626" comment="cross-spu-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033366" comment="cross-x86_64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167628" comment="cross-x86_64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033367" comment="cross-xtensa-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297932" comment="cross-xtensa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033368" comment="gprofng-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033377" comment="gprofng is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033369" comment="libctf-nobfd0-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297779" comment="libctf-nobfd0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033370" comment="libctf0-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297780" comment="libctf0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20251152" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-1152</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-1152" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1152" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-1152" ref_url="https://www.suse.com/security/cve/CVE-2025-1152" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023286.html" source="SUSE-SU"/>
    <description>
    A vulnerability classified as problematic has been found in GNU Binutils 2.43. Affected is the function xstrdup of the file xstrdup.c of the component ld. The manipulation leads to memory leak. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The code maintainer explains: "I'm not going to commit some of the leak fixes I've been working on to the 2.44 branch due to concern that would destabilise ld. All of the reported leaks in this bugzilla have been fixed on binutils master."
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-13"/>
	<updated date="2025-12-19"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1152/">CVE-2025-1152 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1152">CVE-2025-1152 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237001">SUSE bug 1237001</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033339" comment="binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033340" comment="binutils-devel-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033444" comment="bpftool-7.5.0-160000.2.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009955992" comment="bpftool is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033445" comment="bpftool-bash-completion-7.5.0-160000.2.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033375" comment="bpftool-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033343" comment="cross-aarch64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167594" comment="cross-aarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033344" comment="cross-arm-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167596" comment="cross-arm-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033345" comment="cross-avr-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167598" comment="cross-avr-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033346" comment="cross-bpf-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010029579" comment="cross-bpf-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033347" comment="cross-epiphany-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238034" comment="cross-epiphany-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033348" comment="cross-hppa-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167600" comment="cross-hppa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033349" comment="cross-hppa64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167602" comment="cross-hppa64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033350" comment="cross-i386-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167604" comment="cross-i386-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033351" comment="cross-ia64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167606" comment="cross-ia64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033352" comment="cross-loongarch64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033376" comment="cross-loongarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033353" comment="cross-m68k-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167608" comment="cross-m68k-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033354" comment="cross-mips-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167610" comment="cross-mips-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033355" comment="cross-ppc-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167612" comment="cross-ppc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033356" comment="cross-ppc64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167614" comment="cross-ppc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033357" comment="cross-ppc64le-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167616" comment="cross-ppc64le-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033358" comment="cross-pru-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010029580" comment="cross-pru-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033359" comment="cross-riscv64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238035" comment="cross-riscv64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033360" comment="cross-rx-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238036" comment="cross-rx-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033361" comment="cross-s390-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167618" comment="cross-s390-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033362" comment="cross-s390x-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167620" comment="cross-s390x-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033363" comment="cross-sparc-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167622" comment="cross-sparc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033364" comment="cross-sparc64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167624" comment="cross-sparc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033365" comment="cross-spu-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167626" comment="cross-spu-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033366" comment="cross-x86_64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167628" comment="cross-x86_64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033367" comment="cross-xtensa-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297932" comment="cross-xtensa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033368" comment="gprofng-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033377" comment="gprofng is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033369" comment="libctf-nobfd0-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297779" comment="libctf-nobfd0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033370" comment="libctf0-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297780" comment="libctf0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20251153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-1153</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-1153" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1153" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-1153" ref_url="https://www.suse.com/security/cve/CVE-2025-1153" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023286.html" source="SUSE-SU"/>
    <description>
    A vulnerability classified as problematic was found in GNU Binutils 2.43/2.44. Affected by this vulnerability is the function bfd_set_format of the file format.c. The manipulation leads to memory corruption. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. Upgrading to version 2.45 is able to address this issue. The identifier of the patch is 8d97c1a53f3dc9fd8e1ccdb039b8a33d50133150. It is recommended to upgrade the affected component.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-13"/>
	<updated date="2025-12-19"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1153/">CVE-2025-1153 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1153">CVE-2025-1153 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237000">SUSE bug 1237000</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033339" comment="binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033340" comment="binutils-devel-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033444" comment="bpftool-7.5.0-160000.2.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009955992" comment="bpftool is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033445" comment="bpftool-bash-completion-7.5.0-160000.2.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033375" comment="bpftool-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033343" comment="cross-aarch64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167594" comment="cross-aarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033344" comment="cross-arm-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167596" comment="cross-arm-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033345" comment="cross-avr-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167598" comment="cross-avr-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033346" comment="cross-bpf-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010029579" comment="cross-bpf-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033347" comment="cross-epiphany-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238034" comment="cross-epiphany-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033348" comment="cross-hppa-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167600" comment="cross-hppa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033349" comment="cross-hppa64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167602" comment="cross-hppa64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033350" comment="cross-i386-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167604" comment="cross-i386-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033351" comment="cross-ia64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167606" comment="cross-ia64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033352" comment="cross-loongarch64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033376" comment="cross-loongarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033353" comment="cross-m68k-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167608" comment="cross-m68k-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033354" comment="cross-mips-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167610" comment="cross-mips-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033355" comment="cross-ppc-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167612" comment="cross-ppc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033356" comment="cross-ppc64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167614" comment="cross-ppc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033357" comment="cross-ppc64le-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167616" comment="cross-ppc64le-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033358" comment="cross-pru-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010029580" comment="cross-pru-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033359" comment="cross-riscv64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238035" comment="cross-riscv64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033360" comment="cross-rx-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238036" comment="cross-rx-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033361" comment="cross-s390-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167618" comment="cross-s390-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033362" comment="cross-s390x-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167620" comment="cross-s390x-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033363" comment="cross-sparc-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167622" comment="cross-sparc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033364" comment="cross-sparc64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167624" comment="cross-sparc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033365" comment="cross-spu-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167626" comment="cross-spu-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033366" comment="cross-x86_64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167628" comment="cross-x86_64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033367" comment="cross-xtensa-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297932" comment="cross-xtensa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033368" comment="gprofng-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033377" comment="gprofng is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033369" comment="libctf-nobfd0-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297779" comment="libctf-nobfd0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033370" comment="libctf0-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297780" comment="libctf0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202511561" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-11561</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-11561" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11561" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-11561" ref_url="https://www.suse.com/security/cve/CVE-2025-11561" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:19610" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002175.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19847" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002540.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20954" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003082.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21067" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4181-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023358.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023724.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the integration of Active Directory and the System Security Services Daemon (SSSD) on Linux systems. In default configurations, the Kerberos local authentication plugin (sssd_krb5_localauth_plugin) is enabled, but a fallback to the an2ln plugin is possible. This fallback allows an attacker with permission to modify certain AD attributes (such as userPrincipalName or samAccountName) to impersonate privileged users, potentially resulting in unauthorized access or privilege escalation on domain-joined Linux hosts.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-03"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11561/">CVE-2025-11561 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11561">CVE-2025-11561 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251827">SUSE bug 1251827</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035629" comment="libipa_hbac-devel-2.9.5-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152068" comment="libipa_hbac-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035630" comment="libipa_hbac0-2.9.5-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152069" comment="libipa_hbac0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035631" comment="libnfsidmap-sss-2.9.5-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231788" comment="libnfsidmap-sss is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035632" comment="libsss_certmap-devel-2.9.5-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231789" comment="libsss_certmap-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035633" comment="libsss_certmap0-2.9.5-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231790" comment="libsss_certmap0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035634" comment="libsss_idmap-devel-2.9.5-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152070" comment="libsss_idmap-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035635" comment="libsss_idmap0-2.9.5-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151530" comment="libsss_idmap0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035636" comment="libsss_nss_idmap-devel-2.9.5-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152071" comment="libsss_nss_idmap-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035637" comment="libsss_nss_idmap0-2.9.5-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152072" comment="libsss_nss_idmap0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035638" comment="python3-ipa_hbac-2.9.5-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231793" comment="python3-ipa_hbac is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035639" comment="python3-sss-murmur-2.9.5-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231794" comment="python3-sss-murmur is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035640" comment="python3-sss_nss_idmap-2.9.5-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231795" comment="python3-sss_nss_idmap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035641" comment="python3-sssd-config-2.9.5-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231796" comment="python3-sssd-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035642" comment="sssd-2.9.5-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151531" comment="sssd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035643" comment="sssd-ad-2.9.5-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152077" comment="sssd-ad is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035644" comment="sssd-cifs-idmap-plugin-2.9.5-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010035673" comment="sssd-cifs-idmap-plugin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035645" comment="sssd-dbus-2.9.5-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231797" comment="sssd-dbus is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035646" comment="sssd-ipa-2.9.5-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152078" comment="sssd-ipa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035647" comment="sssd-kcm-2.9.5-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009706576" comment="sssd-kcm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035648" comment="sssd-krb5-2.9.5-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152079" comment="sssd-krb5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035649" comment="sssd-krb5-common-2.9.5-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151533" comment="sssd-krb5-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035650" comment="sssd-ldap-2.9.5-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151534" comment="sssd-ldap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035651" comment="sssd-proxy-2.9.5-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152080" comment="sssd-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035652" comment="sssd-tools-2.9.5-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152081" comment="sssd-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035653" comment="sssd-winbind-idmap-2.9.5-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009231800" comment="sssd-winbind-idmap is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202511563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-11563</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-11563" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11563" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-11563" ref_url="https://www.suse.com/security/cve/CVE-2025-11563" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023437.html" source="SUSE-SU"/>
    <description>
    URLs containing percent-encoded slashes (`/` or `\`) can trick wcurl into
saving the output file outside of the current directory without the user
explicitly asking for it.

This flaw only affects the wcurl command line tool.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-02-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11563/">CVE-2025-11563 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11563">CVE-2025-11563 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253757">SUSE bug 1253757</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031702" comment="curl-8.14.1-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031703" comment="curl-fish-completion-8.14.1-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010031781" comment="curl-fish-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031704" comment="curl-zsh-completion-8.14.1-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010031782" comment="curl-zsh-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031705" comment="libcurl-devel-8.14.1-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151178" comment="libcurl-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031706" comment="libcurl-devel-doc-8.14.1-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010031783" comment="libcurl-devel-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031707" comment="libcurl4-8.14.1-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202511579" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-11579</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-11579" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11579" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-11579" ref_url="https://www.suse.com/security/cve/CVE-2025-11579" source="SUSE CVE"/>
    <description>
    github.com/nwaples/rardecode versions &lt;=2.1.1 fail to restrict the dictionary size when reading  large RAR  dictionary sizes, which allows an attacker to provide a specially crafted RAR file and cause Denial of Service via an Out Of Memory Crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-15"/>
	<updated date="2026-01-18"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11579/">CVE-2025-11579 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-11579">CVE-2025-11579 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251871">SUSE bug 1251871</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033446" comment="hauler-1.3.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033447" comment="hauler is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202511626" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-11626</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-11626" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11626" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-11626" ref_url="https://www.suse.com/security/cve/CVE-2025-11626" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:3777-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024065.html" source="SUSE-SU"/>
    <description>
    MONGO dissector infinite loop in Wireshark 4.4.0 to 4.4.9 and 4.2.0 to 4.2.13 allows denial of service
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-02-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11626/">CVE-2025-11626 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11626">CVE-2025-11626 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251933">SUSE bug 1251933</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041589" comment="libwireshark18-4.4.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041611" comment="libwireshark18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041590" comment="libwiretap15-4.4.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041612" comment="libwiretap15 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041591" comment="libwsutil16-4.4.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041613" comment="libwsutil16 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041592" comment="wireshark-4.4.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041593" comment="wireshark-devel-4.4.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041594" comment="wireshark-ui-qt-4.4.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202511708" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-11708</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-11708" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11708" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-11708" ref_url="https://www.suse.com/security/cve/CVE-2025-11708" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:18155" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002111.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18285" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002116.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18321" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002117.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18983" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023323.html" source="SUSE-SU"/>
    <description>
    Use-after-free in MediaTrackGraphImpl::GetInstance(). This vulnerability was fixed in Firefox 144, Firefox ESR 140.4, Thunderbird 144, and Thunderbird 140.4.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-04-14"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11708/">CVE-2025-11708 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11708">CVE-2025-11708 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251263">SUSE bug 1251263</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030561" comment="MozillaFirefox-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030562" comment="MozillaFirefox-branding-upstream-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030563" comment="MozillaFirefox-devel-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030564" comment="MozillaFirefox-translations-common-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030565" comment="MozillaFirefox-translations-other-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025476" comment="MozillaThunderbird-140.4.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025477" comment="MozillaThunderbird-openpgp-librnp-140.4.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025480" comment="MozillaThunderbird-openpgp-librnp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025478" comment="MozillaThunderbird-translations-common-140.4.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025479" comment="MozillaThunderbird-translations-other-140.4.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202511709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-11709</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-11709" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11709" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-11709" ref_url="https://www.suse.com/security/cve/CVE-2025-11709" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:18155" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002111.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18285" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002116.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18321" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002117.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18983" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023323.html" source="SUSE-SU"/>
    <description>
    A compromised web process was able to trigger out of bounds reads and writes in a more privileged process using manipulated WebGL textures. This vulnerability was fixed in Firefox 144, Firefox ESR 115.29, Firefox ESR 140.4, Thunderbird 144, and Thunderbird 140.4.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-04-14"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11709/">CVE-2025-11709 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11709">CVE-2025-11709 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251263">SUSE bug 1251263</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030561" comment="MozillaFirefox-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030562" comment="MozillaFirefox-branding-upstream-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030563" comment="MozillaFirefox-devel-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030564" comment="MozillaFirefox-translations-common-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030565" comment="MozillaFirefox-translations-other-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025476" comment="MozillaThunderbird-140.4.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025477" comment="MozillaThunderbird-openpgp-librnp-140.4.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025480" comment="MozillaThunderbird-openpgp-librnp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025478" comment="MozillaThunderbird-translations-common-140.4.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025479" comment="MozillaThunderbird-translations-other-140.4.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202511710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-11710</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-11710" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11710" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-11710" ref_url="https://www.suse.com/security/cve/CVE-2025-11710" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:18155" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002111.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18285" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002116.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18321" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002117.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18983" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023323.html" source="SUSE-SU"/>
    <description>
    A compromised web process using malicious IPC messages could have caused the privileged browser process to reveal blocks of its memory to the compromised process. This vulnerability was fixed in Firefox 144, Firefox ESR 115.29, Firefox ESR 140.4, Thunderbird 144, and Thunderbird 140.4.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-04-14"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11710/">CVE-2025-11710 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11710">CVE-2025-11710 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251263">SUSE bug 1251263</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030561" comment="MozillaFirefox-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030562" comment="MozillaFirefox-branding-upstream-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030563" comment="MozillaFirefox-devel-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030564" comment="MozillaFirefox-translations-common-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030565" comment="MozillaFirefox-translations-other-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025476" comment="MozillaThunderbird-140.4.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025477" comment="MozillaThunderbird-openpgp-librnp-140.4.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025480" comment="MozillaThunderbird-openpgp-librnp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025478" comment="MozillaThunderbird-translations-common-140.4.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025479" comment="MozillaThunderbird-translations-other-140.4.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202511711" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-11711</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-11711" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11711" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-11711" ref_url="https://www.suse.com/security/cve/CVE-2025-11711" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:18155" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002111.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18285" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002116.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18321" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002117.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18983" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023323.html" source="SUSE-SU"/>
    <description>
    There was a way to change the value of JavaScript Object properties that were supposed to be non-writeable. This vulnerability was fixed in Firefox 144, Firefox ESR 115.29, Firefox ESR 140.4, Thunderbird 144, and Thunderbird 140.4.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-04-14"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11711/">CVE-2025-11711 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11711">CVE-2025-11711 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251263">SUSE bug 1251263</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030561" comment="MozillaFirefox-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030562" comment="MozillaFirefox-branding-upstream-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030563" comment="MozillaFirefox-devel-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030564" comment="MozillaFirefox-translations-common-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030565" comment="MozillaFirefox-translations-other-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025476" comment="MozillaThunderbird-140.4.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025477" comment="MozillaThunderbird-openpgp-librnp-140.4.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025480" comment="MozillaThunderbird-openpgp-librnp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025478" comment="MozillaThunderbird-translations-common-140.4.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025479" comment="MozillaThunderbird-translations-other-140.4.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202511712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-11712</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-11712" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11712" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-11712" ref_url="https://www.suse.com/security/cve/CVE-2025-11712" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:18155" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002111.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18285" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002116.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18321" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002117.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18983" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023323.html" source="SUSE-SU"/>
    <description>
    A malicious page could have used the type attribute of an OBJECT tag to override the default browser behavior when encountering a web resource served without a content-type. This could have contributed to an XSS on a site that unsafely serves files without a content-type header. This vulnerability was fixed in Firefox 144, Firefox ESR 140.4, Thunderbird 144, and Thunderbird 140.4.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-04-14"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11712/">CVE-2025-11712 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11712">CVE-2025-11712 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251263">SUSE bug 1251263</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030561" comment="MozillaFirefox-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030562" comment="MozillaFirefox-branding-upstream-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030563" comment="MozillaFirefox-devel-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030564" comment="MozillaFirefox-translations-common-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030565" comment="MozillaFirefox-translations-other-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025476" comment="MozillaThunderbird-140.4.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025477" comment="MozillaThunderbird-openpgp-librnp-140.4.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025480" comment="MozillaThunderbird-openpgp-librnp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025478" comment="MozillaThunderbird-translations-common-140.4.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025479" comment="MozillaThunderbird-translations-other-140.4.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202511713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-11713</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-11713" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11713" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-11713" ref_url="https://www.suse.com/security/cve/CVE-2025-11713" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023323.html" source="SUSE-SU"/>
    <description>
    Insufficient escaping in the “Copy as cURL” feature could have been used to trick a user into executing unexpected code on Windows. This did not affect the application when running on other operating systems. This vulnerability was fixed in Firefox 144, Firefox ESR 140.4, Thunderbird 144, and Thunderbird 140.4.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-04-14"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11713/">CVE-2025-11713 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11713">CVE-2025-11713 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251263">SUSE bug 1251263</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030561" comment="MozillaFirefox-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030562" comment="MozillaFirefox-branding-upstream-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030563" comment="MozillaFirefox-devel-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030564" comment="MozillaFirefox-translations-common-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030565" comment="MozillaFirefox-translations-other-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025476" comment="MozillaThunderbird-140.4.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025477" comment="MozillaThunderbird-openpgp-librnp-140.4.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025480" comment="MozillaThunderbird-openpgp-librnp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025478" comment="MozillaThunderbird-translations-common-140.4.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025479" comment="MozillaThunderbird-translations-other-140.4.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202511714" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-11714</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-11714" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11714" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-11714" ref_url="https://www.suse.com/security/cve/CVE-2025-11714" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:18155" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002111.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18285" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002116.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18321" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002117.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18983" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023323.html" source="SUSE-SU"/>
    <description>
    Memory safety bugs present in Firefox ESR 115.28, Firefox ESR 140.3, Thunderbird ESR 140.3, Firefox 143 and Thunderbird 143. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability was fixed in Firefox 144, Firefox ESR 115.29, Firefox ESR 140.4, Thunderbird 144, and Thunderbird 140.4.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-04-14"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11714/">CVE-2025-11714 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11714">CVE-2025-11714 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251263">SUSE bug 1251263</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030561" comment="MozillaFirefox-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030562" comment="MozillaFirefox-branding-upstream-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030563" comment="MozillaFirefox-devel-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030564" comment="MozillaFirefox-translations-common-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030565" comment="MozillaFirefox-translations-other-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025476" comment="MozillaThunderbird-140.4.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025477" comment="MozillaThunderbird-openpgp-librnp-140.4.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025480" comment="MozillaThunderbird-openpgp-librnp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025478" comment="MozillaThunderbird-translations-common-140.4.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025479" comment="MozillaThunderbird-translations-other-140.4.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202511715" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-11715</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-11715" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11715" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-11715" ref_url="https://www.suse.com/security/cve/CVE-2025-11715" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:18155" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002111.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18285" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002116.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18321" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002117.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18983" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023323.html" source="SUSE-SU"/>
    <description>
    Memory safety bugs present in Firefox ESR 140.3, Thunderbird ESR 140.3, Firefox 143 and Thunderbird 143. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability was fixed in Firefox 144, Firefox ESR 140.4, Thunderbird 144, and Thunderbird 140.4.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-04-14"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11715/">CVE-2025-11715 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11715">CVE-2025-11715 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251263">SUSE bug 1251263</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030561" comment="MozillaFirefox-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030562" comment="MozillaFirefox-branding-upstream-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030563" comment="MozillaFirefox-devel-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030564" comment="MozillaFirefox-translations-common-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030565" comment="MozillaFirefox-translations-other-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025476" comment="MozillaThunderbird-140.4.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025477" comment="MozillaThunderbird-openpgp-librnp-140.4.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025480" comment="MozillaThunderbird-openpgp-librnp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025478" comment="MozillaThunderbird-translations-common-140.4.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025479" comment="MozillaThunderbird-translations-other-140.4.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202511731" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-11731</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-11731" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11731" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-11731" ref_url="https://www.suse.com/security/cve/CVE-2025-11731" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3743-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3778-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024373.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the exsltFuncResultComp() function of libxslt, which handles EXSLT &lt;func:result&gt; elements during stylesheet parsing. Due to improper type handling, the function may treat an XML document node as a regular XML element node, resulting in a type confusion. This can cause unexpected memory reads and potential crashes. While difficult to exploit, the flaw could lead to application instability or denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-22"/>
	<updated date="2026-02-25"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11731/">CVE-2025-11731 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11731">CVE-2025-11731 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251979">SUSE bug 1251979</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030538" comment="libexslt0-1.1.43-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010030589" comment="libexslt0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030539" comment="libxslt-devel-1.1.43-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009155744" comment="libxslt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030540" comment="libxslt-tools-1.1.43-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009155747" comment="libxslt-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030541" comment="libxslt1-1.1.43-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009155748" comment="libxslt1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202511756" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-11756</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-11756" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11756" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-11756" ref_url="https://www.suse.com/security/cve/CVE-2025-11756" source="SUSE CVE"/>
    <description>
    Use after free in Safe Browsing in Google Chrome prior to 141.0.7390.107 allowed a remote attacker who had compromised the renderer process to potentially perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-10-31"/>
	<updated date="2025-11-09"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-11756/">CVE-2025-11756 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11756">CVE-2025-11756 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252013">SUSE bug 1252013</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010024377" comment="chromedriver-141.0.7390.107-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010024378" comment="chromium-141.0.7390.107-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20251176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-1176</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-1176" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1176" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-1176" ref_url="https://www.suse.com/security/cve/CVE-2025-1176" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023286.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in GNU Binutils 2.43 and classified as critical. This issue affects the function _bfd_elf_gc_mark_rsec of the file elflink.c of the component ld. The manipulation leads to heap-based buffer overflow. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The patch is named f9978defb6fab0bd8583942d97c112b0932ac814. It is recommended to apply a patch to fix this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-13"/>
	<updated date="2025-12-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="1.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1176/">CVE-2025-1176 at SUSE</cve>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1176">CVE-2025-1176 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1236999">SUSE bug 1236999</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033339" comment="binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033340" comment="binutils-devel-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033444" comment="bpftool-7.5.0-160000.2.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009955992" comment="bpftool is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033445" comment="bpftool-bash-completion-7.5.0-160000.2.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033375" comment="bpftool-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033343" comment="cross-aarch64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167594" comment="cross-aarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033344" comment="cross-arm-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167596" comment="cross-arm-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033345" comment="cross-avr-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167598" comment="cross-avr-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033346" comment="cross-bpf-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010029579" comment="cross-bpf-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033347" comment="cross-epiphany-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238034" comment="cross-epiphany-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033348" comment="cross-hppa-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167600" comment="cross-hppa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033349" comment="cross-hppa64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167602" comment="cross-hppa64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033350" comment="cross-i386-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167604" comment="cross-i386-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033351" comment="cross-ia64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167606" comment="cross-ia64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033352" comment="cross-loongarch64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033376" comment="cross-loongarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033353" comment="cross-m68k-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167608" comment="cross-m68k-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033354" comment="cross-mips-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167610" comment="cross-mips-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033355" comment="cross-ppc-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167612" comment="cross-ppc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033356" comment="cross-ppc64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167614" comment="cross-ppc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033357" comment="cross-ppc64le-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167616" comment="cross-ppc64le-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033358" comment="cross-pru-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010029580" comment="cross-pru-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033359" comment="cross-riscv64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238035" comment="cross-riscv64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033360" comment="cross-rx-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238036" comment="cross-rx-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033361" comment="cross-s390-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167618" comment="cross-s390-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033362" comment="cross-s390x-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167620" comment="cross-s390x-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033363" comment="cross-sparc-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167622" comment="cross-sparc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033364" comment="cross-sparc64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167624" comment="cross-sparc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033365" comment="cross-spu-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167626" comment="cross-spu-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033366" comment="cross-x86_64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167628" comment="cross-x86_64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033367" comment="cross-xtensa-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297932" comment="cross-xtensa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033368" comment="gprofng-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033377" comment="gprofng is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033369" comment="libctf-nobfd0-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297779" comment="libctf-nobfd0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033370" comment="libctf0-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297780" comment="libctf0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20251178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-1178</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-1178" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1178" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-1178" ref_url="https://www.suse.com/security/cve/CVE-2025-1178" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023286.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in GNU Binutils 2.43. It has been declared as problematic. Affected by this vulnerability is the function bfd_putl64 of the file libbfd.c of the component ld. The manipulation leads to memory corruption. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The identifier of the patch is 75086e9de1707281172cc77f178e7949a4414ed0. It is recommended to apply a patch to fix this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-13"/>
	<updated date="2025-12-19"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1178/">CVE-2025-1178 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1178">CVE-2025-1178 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237018">SUSE bug 1237018</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033339" comment="binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033340" comment="binutils-devel-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033444" comment="bpftool-7.5.0-160000.2.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009955992" comment="bpftool is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033445" comment="bpftool-bash-completion-7.5.0-160000.2.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033375" comment="bpftool-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033343" comment="cross-aarch64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167594" comment="cross-aarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033344" comment="cross-arm-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167596" comment="cross-arm-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033345" comment="cross-avr-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167598" comment="cross-avr-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033346" comment="cross-bpf-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010029579" comment="cross-bpf-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033347" comment="cross-epiphany-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238034" comment="cross-epiphany-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033348" comment="cross-hppa-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167600" comment="cross-hppa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033349" comment="cross-hppa64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167602" comment="cross-hppa64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033350" comment="cross-i386-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167604" comment="cross-i386-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033351" comment="cross-ia64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167606" comment="cross-ia64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033352" comment="cross-loongarch64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033376" comment="cross-loongarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033353" comment="cross-m68k-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167608" comment="cross-m68k-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033354" comment="cross-mips-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167610" comment="cross-mips-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033355" comment="cross-ppc-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167612" comment="cross-ppc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033356" comment="cross-ppc64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167614" comment="cross-ppc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033357" comment="cross-ppc64le-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167616" comment="cross-ppc64le-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033358" comment="cross-pru-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010029580" comment="cross-pru-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033359" comment="cross-riscv64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238035" comment="cross-riscv64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033360" comment="cross-rx-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238036" comment="cross-rx-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033361" comment="cross-s390-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167618" comment="cross-s390-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033362" comment="cross-s390x-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167620" comment="cross-s390x-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033363" comment="cross-sparc-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167622" comment="cross-sparc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033364" comment="cross-sparc64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167624" comment="cross-sparc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033365" comment="cross-spu-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167626" comment="cross-spu-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033366" comment="cross-x86_64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167628" comment="cross-x86_64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033367" comment="cross-xtensa-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297932" comment="cross-xtensa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033368" comment="gprofng-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033377" comment="gprofng is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033369" comment="libctf-nobfd0-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297779" comment="libctf-nobfd0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033370" comment="libctf0-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297780" comment="libctf0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20251179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-1179</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-1179" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1179" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-1179" ref_url="https://www.suse.com/security/cve/CVE-2025-1179" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023286.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in GNU Binutils 2.43. It has been rated as critical. Affected by this issue is the function bfd_putl64 of the file bfd/libbfd.c of the component ld. The manipulation leads to memory corruption. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 2.44 is able to address this issue. It is recommended to upgrade the affected component. The code maintainer explains, that "[t]his bug has been fixed at some point between the 2.43 and 2.44 releases".
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-13"/>
	<updated date="2025-12-19"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1179/">CVE-2025-1179 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-1179">CVE-2025-1179 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237021">SUSE bug 1237021</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033339" comment="binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033340" comment="binutils-devel-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033444" comment="bpftool-7.5.0-160000.2.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009955992" comment="bpftool is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033445" comment="bpftool-bash-completion-7.5.0-160000.2.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033375" comment="bpftool-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033343" comment="cross-aarch64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167594" comment="cross-aarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033344" comment="cross-arm-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167596" comment="cross-arm-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033345" comment="cross-avr-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167598" comment="cross-avr-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033346" comment="cross-bpf-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010029579" comment="cross-bpf-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033347" comment="cross-epiphany-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238034" comment="cross-epiphany-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033348" comment="cross-hppa-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167600" comment="cross-hppa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033349" comment="cross-hppa64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167602" comment="cross-hppa64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033350" comment="cross-i386-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167604" comment="cross-i386-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033351" comment="cross-ia64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167606" comment="cross-ia64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033352" comment="cross-loongarch64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033376" comment="cross-loongarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033353" comment="cross-m68k-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167608" comment="cross-m68k-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033354" comment="cross-mips-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167610" comment="cross-mips-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033355" comment="cross-ppc-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167612" comment="cross-ppc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033356" comment="cross-ppc64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167614" comment="cross-ppc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033357" comment="cross-ppc64le-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167616" comment="cross-ppc64le-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033358" comment="cross-pru-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010029580" comment="cross-pru-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033359" comment="cross-riscv64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238035" comment="cross-riscv64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033360" comment="cross-rx-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238036" comment="cross-rx-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033361" comment="cross-s390-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167618" comment="cross-s390-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033362" comment="cross-s390x-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167620" comment="cross-s390x-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033363" comment="cross-sparc-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167622" comment="cross-sparc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033364" comment="cross-sparc64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167624" comment="cross-sparc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033365" comment="cross-spu-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167626" comment="cross-spu-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033366" comment="cross-x86_64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167628" comment="cross-x86_64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033367" comment="cross-xtensa-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297932" comment="cross-xtensa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033368" comment="gprofng-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033377" comment="gprofng is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033369" comment="libctf-nobfd0-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297779" comment="libctf-nobfd0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033370" comment="libctf0-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297780" comment="libctf0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20251180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-1180</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-1180" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1180" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-1180" ref_url="https://www.suse.com/security/cve/CVE-2025-1180" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023286.html" source="SUSE-SU"/>
    <description>
    A vulnerability classified as problematic has been found in GNU Binutils 2.43. This affects the function _bfd_elf_write_section_eh_frame of the file bfd/elf-eh-frame.c of the component ld. The manipulation leads to memory corruption. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-13"/>
	<updated date="2025-12-19"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1180/">CVE-2025-1180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1180">CVE-2025-1180 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237020">SUSE bug 1237020</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033339" comment="binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033340" comment="binutils-devel-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033444" comment="bpftool-7.5.0-160000.2.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009955992" comment="bpftool is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033445" comment="bpftool-bash-completion-7.5.0-160000.2.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033375" comment="bpftool-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033343" comment="cross-aarch64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167594" comment="cross-aarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033344" comment="cross-arm-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167596" comment="cross-arm-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033345" comment="cross-avr-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167598" comment="cross-avr-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033346" comment="cross-bpf-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010029579" comment="cross-bpf-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033347" comment="cross-epiphany-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238034" comment="cross-epiphany-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033348" comment="cross-hppa-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167600" comment="cross-hppa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033349" comment="cross-hppa64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167602" comment="cross-hppa64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033350" comment="cross-i386-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167604" comment="cross-i386-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033351" comment="cross-ia64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167606" comment="cross-ia64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033352" comment="cross-loongarch64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033376" comment="cross-loongarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033353" comment="cross-m68k-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167608" comment="cross-m68k-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033354" comment="cross-mips-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167610" comment="cross-mips-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033355" comment="cross-ppc-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167612" comment="cross-ppc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033356" comment="cross-ppc64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167614" comment="cross-ppc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033357" comment="cross-ppc64le-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167616" comment="cross-ppc64le-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033358" comment="cross-pru-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010029580" comment="cross-pru-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033359" comment="cross-riscv64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238035" comment="cross-riscv64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033360" comment="cross-rx-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238036" comment="cross-rx-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033361" comment="cross-s390-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167618" comment="cross-s390-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033362" comment="cross-s390x-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167620" comment="cross-s390x-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033363" comment="cross-sparc-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167622" comment="cross-sparc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033364" comment="cross-sparc64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167624" comment="cross-sparc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033365" comment="cross-spu-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167626" comment="cross-spu-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033366" comment="cross-x86_64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167628" comment="cross-x86_64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033367" comment="cross-xtensa-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297932" comment="cross-xtensa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033368" comment="gprofng-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033377" comment="gprofng is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033369" comment="libctf-nobfd0-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297779" comment="libctf-nobfd0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033370" comment="libctf0-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297780" comment="libctf0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20251181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-1181</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-1181" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1181" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-1181" ref_url="https://www.suse.com/security/cve/CVE-2025-1181" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023286.html" source="SUSE-SU"/>
    <description>
    A vulnerability classified as critical was found in GNU Binutils 2.43. This vulnerability affects the function _bfd_elf_gc_mark_rsec of the file bfd/elflink.c of the component ld. The manipulation leads to memory corruption. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The name of the patch is 931494c9a89558acb36a03a340c01726545eef24. It is recommended to apply a patch to fix this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-13"/>
	<updated date="2025-12-19"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1181/">CVE-2025-1181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1181">CVE-2025-1181 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237019">SUSE bug 1237019</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033339" comment="binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033340" comment="binutils-devel-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033444" comment="bpftool-7.5.0-160000.2.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009955992" comment="bpftool is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033445" comment="bpftool-bash-completion-7.5.0-160000.2.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033375" comment="bpftool-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033343" comment="cross-aarch64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167594" comment="cross-aarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033344" comment="cross-arm-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167596" comment="cross-arm-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033345" comment="cross-avr-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167598" comment="cross-avr-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033346" comment="cross-bpf-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010029579" comment="cross-bpf-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033347" comment="cross-epiphany-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238034" comment="cross-epiphany-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033348" comment="cross-hppa-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167600" comment="cross-hppa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033349" comment="cross-hppa64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167602" comment="cross-hppa64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033350" comment="cross-i386-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167604" comment="cross-i386-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033351" comment="cross-ia64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167606" comment="cross-ia64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033352" comment="cross-loongarch64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033376" comment="cross-loongarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033353" comment="cross-m68k-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167608" comment="cross-m68k-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033354" comment="cross-mips-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167610" comment="cross-mips-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033355" comment="cross-ppc-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167612" comment="cross-ppc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033356" comment="cross-ppc64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167614" comment="cross-ppc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033357" comment="cross-ppc64le-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167616" comment="cross-ppc64le-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033358" comment="cross-pru-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010029580" comment="cross-pru-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033359" comment="cross-riscv64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238035" comment="cross-riscv64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033360" comment="cross-rx-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238036" comment="cross-rx-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033361" comment="cross-s390-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167618" comment="cross-s390-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033362" comment="cross-s390x-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167620" comment="cross-s390x-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033363" comment="cross-sparc-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167622" comment="cross-sparc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033364" comment="cross-sparc64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167624" comment="cross-sparc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033365" comment="cross-spu-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167626" comment="cross-spu-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033366" comment="cross-x86_64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167628" comment="cross-x86_64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033367" comment="cross-xtensa-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297932" comment="cross-xtensa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033368" comment="gprofng-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033377" comment="gprofng is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033369" comment="libctf-nobfd0-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297779" comment="libctf-nobfd0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033370" comment="libctf0-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297780" comment="libctf0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20251182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-1182</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-1182" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1182" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-1182" ref_url="https://www.suse.com/security/cve/CVE-2025-1182" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023286.html" source="SUSE-SU"/>
    <description>
    A vulnerability, which was classified as critical, was found in GNU Binutils 2.43. Affected is the function bfd_elf_reloc_symbol_deleted_p of the file bfd/elflink.c of the component ld. The manipulation leads to memory corruption. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The patch is identified as b425859021d17adf62f06fb904797cf8642986ad. It is recommended to apply a patch to fix this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-13"/>
	<updated date="2025-12-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-1182/">CVE-2025-1182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-1182">CVE-2025-1182 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237042">SUSE bug 1237042</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033339" comment="binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033340" comment="binutils-devel-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033444" comment="bpftool-7.5.0-160000.2.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009955992" comment="bpftool is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033445" comment="bpftool-bash-completion-7.5.0-160000.2.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033375" comment="bpftool-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033343" comment="cross-aarch64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167594" comment="cross-aarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033344" comment="cross-arm-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167596" comment="cross-arm-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033345" comment="cross-avr-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167598" comment="cross-avr-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033346" comment="cross-bpf-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010029579" comment="cross-bpf-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033347" comment="cross-epiphany-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238034" comment="cross-epiphany-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033348" comment="cross-hppa-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167600" comment="cross-hppa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033349" comment="cross-hppa64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167602" comment="cross-hppa64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033350" comment="cross-i386-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167604" comment="cross-i386-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033351" comment="cross-ia64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167606" comment="cross-ia64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033352" comment="cross-loongarch64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033376" comment="cross-loongarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033353" comment="cross-m68k-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167608" comment="cross-m68k-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033354" comment="cross-mips-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167610" comment="cross-mips-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033355" comment="cross-ppc-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167612" comment="cross-ppc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033356" comment="cross-ppc64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167614" comment="cross-ppc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033357" comment="cross-ppc64le-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167616" comment="cross-ppc64le-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033358" comment="cross-pru-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010029580" comment="cross-pru-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033359" comment="cross-riscv64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238035" comment="cross-riscv64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033360" comment="cross-rx-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238036" comment="cross-rx-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033361" comment="cross-s390-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167618" comment="cross-s390-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033362" comment="cross-s390x-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167620" comment="cross-s390x-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033363" comment="cross-sparc-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167622" comment="cross-sparc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033364" comment="cross-sparc64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167624" comment="cross-sparc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033365" comment="cross-spu-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167626" comment="cross-spu-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033366" comment="cross-x86_64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167628" comment="cross-x86_64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033367" comment="cross-xtensa-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297932" comment="cross-xtensa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033368" comment="gprofng-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033377" comment="gprofng is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033369" comment="libctf-nobfd0-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297779" comment="libctf-nobfd0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033370" comment="libctf0-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297780" comment="libctf0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202511896" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-11896</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-11896" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11896" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-11896" ref_url="https://www.suse.com/security/cve/CVE-2025-11896" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4412-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023561.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023720.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025104.html" source="SUSE-SU"/>
    <description>
    In Xpdf 4.05 (and earlier), a PDF object loop in a CMap, via the "UseCMap" entry, leads to infinite recursion and a stack overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11896/">CVE-2025-11896 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11896">CVE-2025-11896 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252337">SUSE bug 1252337</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050706" comment="libpoppler-cpp2-25.04.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010030591" comment="libpoppler-cpp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050707" comment="libpoppler-devel-25.04.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151223" comment="libpoppler-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051757" comment="libpoppler-glib-devel-25.04.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153236" comment="libpoppler-glib-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050708" comment="libpoppler-glib8-25.04.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151224" comment="libpoppler-glib8 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051758" comment="libpoppler-qt5-1-25.04.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153238" comment="libpoppler-qt5-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051759" comment="libpoppler-qt5-devel-25.04.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153239" comment="libpoppler-qt5-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050709" comment="libpoppler-qt6-3-25.04.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009742105" comment="libpoppler-qt6-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050710" comment="libpoppler-qt6-devel-25.04.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009742106" comment="libpoppler-qt6-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050711" comment="libpoppler148-25.04.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010030592" comment="libpoppler148 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050712" comment="poppler-tools-25.04.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151227" comment="poppler-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050713" comment="typelib-1_0-Poppler-0_18-25.04.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153243" comment="typelib-1_0-Poppler-0_18 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202511961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-11961</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-11961" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-11961" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-11961" ref_url="https://www.suse.com/security/cve/CVE-2025-11961" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20120-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023949.html" source="SUSE-SU"/>
    <description>
    pcap_ether_aton() is an auxiliary function in libpcap, it takes a string argument and returns a fixed-size allocated buffer.  The string argument must be a well-formed MAC-48 address in one of the supported formats, but this requirement has been poorly documented.  If an application calls the function with an argument that deviates from the expected format, the function can read data beyond the end of the provided string and write data beyond the end of the allocated buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-25"/>
	<updated date="2026-02-19"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-11961/">CVE-2025-11961 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-11961">CVE-2025-11961 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255765">SUSE bug 1255765</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039638" comment="libpcap-devel-1.10.5-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009155206" comment="libpcap-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039639" comment="libpcap-devel-static-1.10.5-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009155210" comment="libpcap-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039640" comment="libpcap1-1.10.5-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009155212" comment="libpcap1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202512036" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-12036</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-12036" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12036" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-12036" ref_url="https://www.suse.com/security/cve/CVE-2025-12036" source="SUSE CVE"/>
    <description>
    Out of bounds memory access in V8 in Google Chrome prior to 141.0.7390.122 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-10-31"/>
	<updated date="2025-11-09"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-12036/">CVE-2025-12036 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12036">CVE-2025-12036 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252402">SUSE bug 1252402</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010024386" comment="chromedriver-141.0.7390.122-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010024387" comment="chromium-141.0.7390.122-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202512084" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-12084</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-12084" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12084" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-12084" ref_url="https://www.suse.com/security/cve/CVE-2025-12084" source="SUSE CVE"/>
		<reference ref_id="ESSA-2026:0022" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002438.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0123" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002346.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1374" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002442.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1408" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003158.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1410" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003202.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1478" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003215.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1583" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002451.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1631" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002456.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2275" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002482.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2713" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20125-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024893.html" source="SUSE-SU"/>
    <description>
    When building nested elements using xml.dom.minidom methods such as appendChild() that have a dependency on _clear_id_cache() the algorithm is quadratic. Availability can be impacted when building excessively nested documents.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-25"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-12084/">CVE-2025-12084 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-12084">CVE-2025-12084 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254997">SUSE bug 1254997</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039656" comment="libpython3_13-1_0-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039739" comment="libpython3_13-1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039657" comment="libpython3_13-1_0-x86-64-v3-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039740" comment="libpython3_13-1_0-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039658" comment="libpython3_13t1_0-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039741" comment="libpython3_13t1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039659" comment="python313-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039742" comment="python313 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039660" comment="python313-base-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039743" comment="python313-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039661" comment="python313-base-x86-64-v3-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039744" comment="python313-base-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039662" comment="python313-curses-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039745" comment="python313-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039663" comment="python313-dbm-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039746" comment="python313-dbm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039664" comment="python313-devel-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039747" comment="python313-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039665" comment="python313-doc-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039748" comment="python313-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039666" comment="python313-doc-devhelp-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039749" comment="python313-doc-devhelp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039667" comment="python313-idle-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039750" comment="python313-idle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039668" comment="python313-nogil-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039751" comment="python313-nogil is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039669" comment="python313-nogil-base-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039752" comment="python313-nogil-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039670" comment="python313-nogil-curses-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039753" comment="python313-nogil-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039671" comment="python313-nogil-dbm-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039754" comment="python313-nogil-dbm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039672" comment="python313-nogil-devel-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039755" comment="python313-nogil-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039673" comment="python313-nogil-idle-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039756" comment="python313-nogil-idle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039674" comment="python313-nogil-testsuite-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039757" comment="python313-nogil-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039675" comment="python313-nogil-tk-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039758" comment="python313-nogil-tk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039676" comment="python313-nogil-tools-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039759" comment="python313-nogil-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039677" comment="python313-testsuite-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039760" comment="python313-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039678" comment="python313-tk-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039761" comment="python313-tk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039679" comment="python313-tools-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039762" comment="python313-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039680" comment="python313-x86-64-v3-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039763" comment="python313-x86-64-v3 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202512105" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-12105</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-12105" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12105" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-12105" ref_url="https://www.suse.com/security/cve/CVE-2025-12105" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0017-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025111.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the asynchronous message queue handling of the libsoup library, widely used by GNOME and WebKit-based applications to manage HTTP/2 communications. When network operations are aborted at specific timing intervals, an internal message queue item may be freed twice due to missing state synchronization. This leads to a use-after-free memory access, potentially crashing the affected application. Attackers could exploit this behavior remotely by triggering specific HTTP/2 read and cancel sequences, resulting in a denial-of-service condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-25"/>
	<updated date="2026-04-02"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-12105/">CVE-2025-12105 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12105">CVE-2025-12105 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252555">SUSE bug 1252555</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050015" comment="libsoup-3_0-0-3.6.6-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698059" comment="libsoup-3_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050176" comment="libsoup-devel-3.6.6-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151597" comment="libsoup-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050177" comment="libsoup-lang-3.6.6-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151598" comment="libsoup-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050178" comment="typelib-1_0-Soup-3_0-3.6.6-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698061" comment="typelib-1_0-Soup-3_0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202512464" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-12464</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-12464" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12464" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-12464" ref_url="https://www.suse.com/security/cve/CVE-2025-12464" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21230-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023642.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0022-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0288-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023919.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023769.html" source="SUSE-SU"/>
    <description>
    A stack-based buffer overflow was found in the QEMU e1000 network device. The code for padding short frames was dropped from individual network devices and moved to the net core code. The issue stems from the device's receive code still being able to process a short frame in loopback mode. This could lead to a buffer overrun in the e1000_receive_iov() function via the loopback code path. A malicious guest user could use this vulnerability to crash the QEMU process on the host, resulting in a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-01-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-12464/">CVE-2025-12464 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12464">CVE-2025-12464 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253002">SUSE bug 1253002</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034877" comment="qemu-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034878" comment="qemu-SLOF-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009676699" comment="qemu-SLOF is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035029" comment="qemu-accel-qtest-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700691" comment="qemu-accel-qtest is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035030" comment="qemu-arm-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035031" comment="qemu-audio-alsa-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266837" comment="qemu-audio-alsa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035032" comment="qemu-audio-dbus-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009775936" comment="qemu-audio-dbus is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035033" comment="qemu-audio-jack-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700692" comment="qemu-audio-jack is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035034" comment="qemu-audio-oss-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266838" comment="qemu-audio-oss is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035035" comment="qemu-audio-pa-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266839" comment="qemu-audio-pa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035036" comment="qemu-audio-pipewire-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009881182" comment="qemu-audio-pipewire is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034880" comment="qemu-audio-spice-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623393" comment="qemu-audio-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035037" comment="qemu-block-curl-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035038" comment="qemu-block-dmg-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154081" comment="qemu-block-dmg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034881" comment="qemu-block-iscsi-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154082" comment="qemu-block-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035039" comment="qemu-block-nfs-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266841" comment="qemu-block-nfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035040" comment="qemu-block-rbd-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034882" comment="qemu-block-ssh-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154083" comment="qemu-block-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035041" comment="qemu-chardev-baum-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623394" comment="qemu-chardev-baum is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034883" comment="qemu-chardev-spice-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623395" comment="qemu-chardev-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035042" comment="qemu-doc-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009881183" comment="qemu-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035043" comment="qemu-extra-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034884" comment="qemu-guest-agent-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035044" comment="qemu-headless-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009881184" comment="qemu-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034885" comment="qemu-hw-display-qxl-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623396" comment="qemu-hw-display-qxl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034886" comment="qemu-hw-display-virtio-gpu-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623397" comment="qemu-hw-display-virtio-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034887" comment="qemu-hw-display-virtio-gpu-pci-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623398" comment="qemu-hw-display-virtio-gpu-pci is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034888" comment="qemu-hw-display-virtio-vga-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623399" comment="qemu-hw-display-virtio-vga is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035045" comment="qemu-hw-s390x-virtio-gpu-ccw-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623400" comment="qemu-hw-s390x-virtio-gpu-ccw is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034890" comment="qemu-hw-usb-host-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698021" comment="qemu-hw-usb-host is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034891" comment="qemu-hw-usb-redirect-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623401" comment="qemu-hw-usb-redirect is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035046" comment="qemu-hw-usb-smartcard-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623402" comment="qemu-hw-usb-smartcard is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034892" comment="qemu-img-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009881185" comment="qemu-img is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034893" comment="qemu-ipxe-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035047" comment="qemu-ivshmem-tools-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623403" comment="qemu-ivshmem-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034894" comment="qemu-ksm-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161270" comment="qemu-ksm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034895" comment="qemu-lang-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035048" comment="qemu-linux-user-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035049" comment="qemu-microvm-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291440" comment="qemu-microvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035050" comment="qemu-ppc-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034897" comment="qemu-pr-helper-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009881186" comment="qemu-pr-helper is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035051" comment="qemu-s390x-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623404" comment="qemu-s390x is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034899" comment="qemu-seabios-10.0.71.16.3_3_g3d33c746-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035052" comment="qemu-skiboot-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623405" comment="qemu-skiboot is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035053" comment="qemu-spice-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009881187" comment="qemu-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034900" comment="qemu-tools-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035054" comment="qemu-ui-curses-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266842" comment="qemu-ui-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035055" comment="qemu-ui-dbus-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009775937" comment="qemu-ui-dbus is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035056" comment="qemu-ui-gtk-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266843" comment="qemu-ui-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034901" comment="qemu-ui-opengl-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623406" comment="qemu-ui-opengl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035057" comment="qemu-ui-spice-app-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291441" comment="qemu-ui-spice-app is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034902" comment="qemu-ui-spice-core-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623407" comment="qemu-ui-spice-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034903" comment="qemu-vgabios-10.0.71.16.3_3_g3d33c746-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035058" comment="qemu-vhost-user-gpu-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291442" comment="qemu-vhost-user-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034904" comment="qemu-vmsr-helper-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010035142" comment="qemu-vmsr-helper is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035059" comment="qemu-x86-10.0.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202512474" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-12474</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-12474" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12474" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-12474" ref_url="https://www.suse.com/security/cve/CVE-2025-12474" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025110.html" source="SUSE-SU"/>
    <description>
    A specially-crafted file can cause libjxl's decoder to read pixel data from uninitialized (but allocated) memory.

This can be done by causing the decoder to reference an outside-image-bound area in a subsequent patches. An incorrect optimization causes the decoder to omit populating those areas.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-25"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-12474/">CVE-2025-12474 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12474">CVE-2025-12474 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258090">SUSE bug 1258090</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050179" comment="libjxl-devel-0.11.2-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771646" comment="libjxl-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050180" comment="libjxl-tools-0.11.2-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771647" comment="libjxl-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050181" comment="libjxl0_11-0.11.2-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010050221" comment="libjxl0_11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050182" comment="libjxl0_11-x86-64-v3-0.11.2-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010050222" comment="libjxl0_11-x86-64-v3 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202512495" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-12495</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-12495" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12495" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-12495" ref_url="https://www.suse.com/security/cve/CVE-2025-12495" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023550.html" source="SUSE-SU"/>
    <description>
    Academy Software Foundation OpenEXR EXR File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Academy Software Foundation OpenEXR. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within the parsing of EXR files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-27946.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-13"/>
	<updated date="2025-12-24"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-12495/">CVE-2025-12495 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12495">CVE-2025-12495 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253714">SUSE bug 1253714</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033326" comment="libIex-3_2-31-3.2.2-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010030593" comment="libIex-3_2-31 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033327" comment="libIex-3_2-31-x86-64-v3-3.2.2-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010030594" comment="libIex-3_2-31-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033328" comment="libIlmThread-3_2-31-3.2.2-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010030595" comment="libIlmThread-3_2-31 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033329" comment="libIlmThread-3_2-31-x86-64-v3-3.2.2-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010030596" comment="libIlmThread-3_2-31-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033330" comment="libOpenEXR-3_2-31-3.2.2-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010030597" comment="libOpenEXR-3_2-31 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033331" comment="libOpenEXR-3_2-31-x86-64-v3-3.2.2-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010030598" comment="libOpenEXR-3_2-31-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033332" comment="libOpenEXRCore-3_2-31-3.2.2-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010030599" comment="libOpenEXRCore-3_2-31 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033333" comment="libOpenEXRCore-3_2-31-x86-64-v3-3.2.2-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010030600" comment="libOpenEXRCore-3_2-31-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033334" comment="libOpenEXRUtil-3_2-31-3.2.2-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010030601" comment="libOpenEXRUtil-3_2-31 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033335" comment="libOpenEXRUtil-3_2-31-x86-64-v3-3.2.2-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010030602" comment="libOpenEXRUtil-3_2-31-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033336" comment="openexr-3.2.2-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172752" comment="openexr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033337" comment="openexr-devel-3.2.2-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151255" comment="openexr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033338" comment="openexr-doc-3.2.2-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172753" comment="openexr-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202512725" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-12725</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-12725" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12725" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-12725" ref_url="https://www.suse.com/security/cve/CVE-2025-12725" source="SUSE CVE"/>
    <description>
    Out of bounds read in WebGPU in Google Chrome on Android prior to 142.0.7444.137 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-13"/>
	<updated date="2025-11-13"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-12725/">CVE-2025-12725 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12725">CVE-2025-12725 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253089">SUSE bug 1253089</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025474" comment="chromedriver-142.0.7444.59-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025475" comment="chromium-142.0.7444.59-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202512726" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-12726</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-12726" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12726" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-12726" ref_url="https://www.suse.com/security/cve/CVE-2025-12726" source="SUSE CVE"/>
    <description>
    Inappropriate implementation in Views in Google Chrome on Windows prior to 142.0.7444.137 allowed a remote attacker who had compromised the renderer process to perform privilege escalation via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-13"/>
	<updated date="2025-11-13"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-12726/">CVE-2025-12726 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12726">CVE-2025-12726 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253089">SUSE bug 1253089</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025474" comment="chromedriver-142.0.7444.59-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025475" comment="chromium-142.0.7444.59-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202512727" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-12727</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-12727" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12727" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-12727" ref_url="https://www.suse.com/security/cve/CVE-2025-12727" source="SUSE CVE"/>
    <description>
    Inappropriate implementation in V8 in Google Chrome prior to 142.0.7444.137 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-13"/>
	<updated date="2025-11-13"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-12727/">CVE-2025-12727 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12727">CVE-2025-12727 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253089">SUSE bug 1253089</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025474" comment="chromedriver-142.0.7444.59-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025475" comment="chromium-142.0.7444.59-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202512728" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-12728</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-12728" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12728" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-12728" ref_url="https://www.suse.com/security/cve/CVE-2025-12728" source="SUSE CVE"/>
    <description>
    Inappropriate implementation in Omnibox in Google Chrome on Android prior to 142.0.7444.137 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-13"/>
	<updated date="2025-11-13"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-12728/">CVE-2025-12728 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12728">CVE-2025-12728 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253089">SUSE bug 1253089</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025474" comment="chromedriver-142.0.7444.59-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025475" comment="chromium-142.0.7444.59-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202512729" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-12729</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-12729" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12729" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-12729" ref_url="https://www.suse.com/security/cve/CVE-2025-12729" source="SUSE CVE"/>
    <description>
    Inappropriate implementation in Omnibox in Google Chrome on Android prior to 142.0.7444.137 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-13"/>
	<updated date="2025-11-13"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-12729/">CVE-2025-12729 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12729">CVE-2025-12729 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253089">SUSE bug 1253089</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025474" comment="chromedriver-142.0.7444.59-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025475" comment="chromium-142.0.7444.59-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202512748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-12748</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-12748" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12748" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-12748" ref_url="https://www.suse.com/security/cve/CVE-2025-12748" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023509.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023758.html" source="SUSE-SU"/>
    <description>
    A flaw was discovered in libvirt in the XML file processing. More specifically, the parsing of user provided XML files was performed before the ACL checks. A malicious user with limited permissions could exploit this flaw by submitting a specially crafted XML file, causing libvirt to allocate too much memory on the host. The excessive memory consumption could lead to a libvirt process crash on the host, resulting in a denial-of-service condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-02-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-12748/">CVE-2025-12748 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12748">CVE-2025-12748 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253277">SUSE bug 1253277</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032043" comment="libvirt-11.4.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151423" comment="libvirt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032044" comment="libvirt-client-11.4.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151424" comment="libvirt-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032045" comment="libvirt-client-qemu-11.4.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769741" comment="libvirt-client-qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032046" comment="libvirt-daemon-11.4.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151425" comment="libvirt-daemon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032047" comment="libvirt-daemon-common-11.4.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009865252" comment="libvirt-daemon-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032048" comment="libvirt-daemon-config-network-11.4.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151426" comment="libvirt-daemon-config-network is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032049" comment="libvirt-daemon-config-nwfilter-11.4.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151427" comment="libvirt-daemon-config-nwfilter is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032050" comment="libvirt-daemon-driver-network-11.4.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151431" comment="libvirt-daemon-driver-network is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032051" comment="libvirt-daemon-driver-nodedev-11.4.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151432" comment="libvirt-daemon-driver-nodedev is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032052" comment="libvirt-daemon-driver-nwfilter-11.4.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151433" comment="libvirt-daemon-driver-nwfilter is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032053" comment="libvirt-daemon-driver-qemu-11.4.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151434" comment="libvirt-daemon-driver-qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032054" comment="libvirt-daemon-driver-secret-11.4.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151435" comment="libvirt-daemon-driver-secret is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032055" comment="libvirt-daemon-driver-storage-11.4.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151436" comment="libvirt-daemon-driver-storage is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032056" comment="libvirt-daemon-driver-storage-core-11.4.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161274" comment="libvirt-daemon-driver-storage-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032057" comment="libvirt-daemon-driver-storage-disk-11.4.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161275" comment="libvirt-daemon-driver-storage-disk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032058" comment="libvirt-daemon-driver-storage-iscsi-11.4.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161276" comment="libvirt-daemon-driver-storage-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032059" comment="libvirt-daemon-driver-storage-iscsi-direct-11.4.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009631621" comment="libvirt-daemon-driver-storage-iscsi-direct is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032060" comment="libvirt-daemon-driver-storage-logical-11.4.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161277" comment="libvirt-daemon-driver-storage-logical is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032061" comment="libvirt-daemon-driver-storage-mpath-11.4.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161278" comment="libvirt-daemon-driver-storage-mpath is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032062" comment="libvirt-daemon-driver-storage-scsi-11.4.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161280" comment="libvirt-daemon-driver-storage-scsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032063" comment="libvirt-daemon-hooks-11.4.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170836" comment="libvirt-daemon-hooks is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032064" comment="libvirt-daemon-lock-11.4.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009865253" comment="libvirt-daemon-lock is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032065" comment="libvirt-daemon-log-11.4.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009865254" comment="libvirt-daemon-log is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032066" comment="libvirt-daemon-plugin-lockd-11.4.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009865255" comment="libvirt-daemon-plugin-lockd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032067" comment="libvirt-daemon-proxy-11.4.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009865257" comment="libvirt-daemon-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032068" comment="libvirt-daemon-qemu-11.4.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151440" comment="libvirt-daemon-qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032069" comment="libvirt-devel-11.4.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152991" comment="libvirt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032070" comment="libvirt-doc-11.4.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152993" comment="libvirt-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032071" comment="libvirt-libs-11.4.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161281" comment="libvirt-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032072" comment="libvirt-nss-11.4.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166269" comment="libvirt-nss is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032073" comment="libvirt-ssh-proxy-11.4.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032117" comment="libvirt-ssh-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032074" comment="wireshark-plugin-libvirt-11.4.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223340" comment="wireshark-plugin-libvirt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202512816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-12816</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-12816" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12816" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-12816" ref_url="https://www.suse.com/security/cve/CVE-2025-12816" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024095.html" source="SUSE-SU"/>
    <description>
    An interpretation-conflict (CWE-436) vulnerability in node-forge versions 1.3.1 and earlier enables unauthenticated attackers to craft ASN.1 structures to desynchronize schema validations, yielding a semantic divergence that may bypass downstream cryptographic verifications and security decisions.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-06"/>
	<updated date="2026-03-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-12816/">CVE-2025-12816 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12816">CVE-2025-12816 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255584">SUSE bug 1255584</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042229" comment="golang-github-prometheus-prometheus-3.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630838" comment="golang-github-prometheus-prometheus is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202512817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-12817</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-12817" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12817" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-12817" ref_url="https://www.suse.com/security/cve/CVE-2025-12817" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23023" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002334.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0268" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002425.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0269" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002375.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0491" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003183.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0492" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003166.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0493" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003169.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0519" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002376.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0523" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002379.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0524" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20986-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045345.html" source="SUSE-SU"/>
    <description>
    Missing authorization in PostgreSQL CREATE STATISTICS command allows a table owner to achieve denial of service against other CREATE STATISTICS users by creating in any schema.  A later CREATE STATISTICS for the same name, from a user having the CREATE privilege, would then fail.  Versions before PostgreSQL 18.1, 17.7, 16.11, 15.15, 14.20, and 13.23 are affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-12817/">CVE-2025-12817 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12817">CVE-2025-12817 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253332">SUSE bug 1253332</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050151" comment="libecpg6-18.1-160000.1.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151069" comment="libecpg6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050152" comment="libpq5-18.1-160000.1.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151071" comment="libpq5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041369" comment="postgresql-18-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177236" comment="postgresql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041370" comment="postgresql-contrib-18-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289717" comment="postgresql-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041371" comment="postgresql-devel-18-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289718" comment="postgresql-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041372" comment="postgresql-docs-18-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289719" comment="postgresql-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041373" comment="postgresql-llvmjit-18-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289720" comment="postgresql-llvmjit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041374" comment="postgresql-llvmjit-devel-18-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009811565" comment="postgresql-llvmjit-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041375" comment="postgresql-plperl-18-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289721" comment="postgresql-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041376" comment="postgresql-plpython-18-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289722" comment="postgresql-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041377" comment="postgresql-pltcl-18-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289723" comment="postgresql-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041378" comment="postgresql-server-18-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177237" comment="postgresql-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041379" comment="postgresql-server-devel-18-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289724" comment="postgresql-server-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041380" comment="postgresql-test-18-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289725" comment="postgresql-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052636" comment="postgresql13-13.23-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623868" comment="postgresql13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052637" comment="postgresql13-contrib-13.23-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623869" comment="postgresql13-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052638" comment="postgresql13-devel-13.23-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623870" comment="postgresql13-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052639" comment="postgresql13-docs-13.23-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623872" comment="postgresql13-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052640" comment="postgresql13-llvmjit-13.23-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624044" comment="postgresql13-llvmjit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052641" comment="postgresql13-llvmjit-devel-13.23-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698137" comment="postgresql13-llvmjit-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041381" comment="postgresql13-pgaudit-1.5.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041614" comment="postgresql13-pgaudit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041382" comment="postgresql13-pgvector-0.8.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041615" comment="postgresql13-pgvector is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052642" comment="postgresql13-plperl-13.23-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623873" comment="postgresql13-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052643" comment="postgresql13-plpython-13.23-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623874" comment="postgresql13-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052644" comment="postgresql13-pltcl-13.23-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623875" comment="postgresql13-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052645" comment="postgresql13-server-13.23-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623876" comment="postgresql13-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052646" comment="postgresql13-server-devel-13.23-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623877" comment="postgresql13-server-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052647" comment="postgresql13-test-13.23-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623878" comment="postgresql13-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045662" comment="postgresql14-14.21-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009657383" comment="postgresql14 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045663" comment="postgresql14-contrib-14.21-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009657384" comment="postgresql14-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045664" comment="postgresql14-devel-14.21-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009657385" comment="postgresql14-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045665" comment="postgresql14-docs-14.21-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009657387" comment="postgresql14-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045666" comment="postgresql14-llvmjit-14.21-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009657388" comment="postgresql14-llvmjit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045667" comment="postgresql14-llvmjit-devel-14.21-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698138" comment="postgresql14-llvmjit-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041383" comment="postgresql14-pgaudit-1.6.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041616" comment="postgresql14-pgaudit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041384" comment="postgresql14-pgvector-0.8.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041617" comment="postgresql14-pgvector is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045668" comment="postgresql14-plperl-14.21-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009657389" comment="postgresql14-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045669" comment="postgresql14-plpython-14.21-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009657390" comment="postgresql14-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045670" comment="postgresql14-pltcl-14.21-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009657391" comment="postgresql14-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045671" comment="postgresql14-server-14.21-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009657392" comment="postgresql14-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045672" comment="postgresql14-server-devel-14.21-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009657393" comment="postgresql14-server-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045673" comment="postgresql14-test-14.21-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009657394" comment="postgresql14-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045674" comment="postgresql15-15.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009742699" comment="postgresql15 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045675" comment="postgresql15-contrib-15.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009742700" comment="postgresql15-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045676" comment="postgresql15-devel-15.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009742701" comment="postgresql15-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045677" comment="postgresql15-docs-15.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009742702" comment="postgresql15-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045678" comment="postgresql15-llvmjit-15.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009742703" comment="postgresql15-llvmjit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045679" comment="postgresql15-llvmjit-devel-15.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009742704" comment="postgresql15-llvmjit-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041385" comment="postgresql15-pgaudit-1.7.1-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041618" comment="postgresql15-pgaudit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041386" comment="postgresql15-pgvector-0.8.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041619" comment="postgresql15-pgvector is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045680" comment="postgresql15-plperl-15.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009742705" comment="postgresql15-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045681" comment="postgresql15-plpython-15.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009742706" comment="postgresql15-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045682" comment="postgresql15-pltcl-15.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009742707" comment="postgresql15-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045683" comment="postgresql15-server-15.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009742708" comment="postgresql15-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045684" comment="postgresql15-server-devel-15.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009742709" comment="postgresql15-server-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045685" comment="postgresql15-test-15.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009742710" comment="postgresql15-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041355" comment="postgresql16-16.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009811566" comment="postgresql16 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041356" comment="postgresql16-contrib-16.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009811567" comment="postgresql16-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041357" comment="postgresql16-devel-16.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009811568" comment="postgresql16-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041358" comment="postgresql16-docs-16.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009811570" comment="postgresql16-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041359" comment="postgresql16-llvmjit-16.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009811571" comment="postgresql16-llvmjit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041360" comment="postgresql16-llvmjit-devel-16.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009811572" comment="postgresql16-llvmjit-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041387" comment="postgresql16-pgaudit-16.1-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041620" comment="postgresql16-pgaudit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041388" comment="postgresql16-pgvector-0.8.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041621" comment="postgresql16-pgvector is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041361" comment="postgresql16-plperl-16.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009811573" comment="postgresql16-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041362" comment="postgresql16-plpython-16.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009811574" comment="postgresql16-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041363" comment="postgresql16-pltcl-16.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009811575" comment="postgresql16-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041364" comment="postgresql16-server-16.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009811576" comment="postgresql16-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041365" comment="postgresql16-server-devel-16.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009811577" comment="postgresql16-server-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041366" comment="postgresql16-test-16.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009811578" comment="postgresql16-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041389" comment="postgresql17-17.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009954906" comment="postgresql17 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041390" comment="postgresql17-contrib-17.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009954907" comment="postgresql17-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041391" comment="postgresql17-devel-17.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009954908" comment="postgresql17-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041392" comment="postgresql17-docs-17.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009954909" comment="postgresql17-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041393" comment="postgresql17-llvmjit-17.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009954910" comment="postgresql17-llvmjit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041394" comment="postgresql17-llvmjit-devel-17.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009954911" comment="postgresql17-llvmjit-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041395" comment="postgresql17-pgaudit-17.1-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041622" comment="postgresql17-pgaudit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041396" comment="postgresql17-pgvector-0.8.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041623" comment="postgresql17-pgvector is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041397" comment="postgresql17-plperl-17.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009954912" comment="postgresql17-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041398" comment="postgresql17-plpython-17.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009954913" comment="postgresql17-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041399" comment="postgresql17-pltcl-17.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009954914" comment="postgresql17-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041400" comment="postgresql17-server-17.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009954915" comment="postgresql17-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041401" comment="postgresql17-server-devel-17.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009954916" comment="postgresql17-server-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041402" comment="postgresql17-test-17.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009954917" comment="postgresql17-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050153" comment="postgresql18-18.1-160000.1.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033162" comment="postgresql18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050154" comment="postgresql18-contrib-18.1-160000.1.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033163" comment="postgresql18-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050155" comment="postgresql18-devel-18.1-160000.1.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033164" comment="postgresql18-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041406" comment="postgresql18-devel-mini-18.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041624" comment="postgresql18-devel-mini is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050156" comment="postgresql18-docs-18.1-160000.1.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033165" comment="postgresql18-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050157" comment="postgresql18-llvmjit-18.1-160000.1.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033166" comment="postgresql18-llvmjit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050158" comment="postgresql18-llvmjit-devel-18.1-160000.1.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033167" comment="postgresql18-llvmjit-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041410" comment="postgresql18-pgaudit-18.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041625" comment="postgresql18-pgaudit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041411" comment="postgresql18-pgvector-0.8.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041626" comment="postgresql18-pgvector is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050159" comment="postgresql18-plperl-18.1-160000.1.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033168" comment="postgresql18-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050160" comment="postgresql18-plpython-18.1-160000.1.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033169" comment="postgresql18-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050161" comment="postgresql18-pltcl-18.1-160000.1.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033170" comment="postgresql18-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050162" comment="postgresql18-server-18.1-160000.1.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033171" comment="postgresql18-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050163" comment="postgresql18-server-devel-18.1-160000.1.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033172" comment="postgresql18-server-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050164" comment="postgresql18-test-18.1-160000.1.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033173" comment="postgresql18-test is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202512818" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-12818</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-12818" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12818" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-12818" ref_url="https://www.suse.com/security/cve/CVE-2025-12818" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23023" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002334.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0268" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002425.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0269" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002375.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0458" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003173.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0491" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003183.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0492" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003166.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0493" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003169.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0519" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002376.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0523" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002379.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0524" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002382.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0695" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002381.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0745" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4325-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4406-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023551.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4486-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20986-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045345.html" source="SUSE-SU"/>
    <description>
    Integer wraparound in multiple PostgreSQL libpq client library functions allows an application input provider or network peer to cause libpq to undersize an allocation and write out-of-bounds by hundreds of megabytes.  This results in a segmentation fault for the application using libpq.  Versions before PostgreSQL 18.1, 17.7, 16.11, 15.15, 14.20, and 13.23 are affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-12818/">CVE-2025-12818 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12818">CVE-2025-12818 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253333">SUSE bug 1253333</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050151" comment="libecpg6-18.1-160000.1.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151069" comment="libecpg6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050152" comment="libpq5-18.1-160000.1.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151071" comment="libpq5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041369" comment="postgresql-18-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177236" comment="postgresql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041370" comment="postgresql-contrib-18-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289717" comment="postgresql-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041371" comment="postgresql-devel-18-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289718" comment="postgresql-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041372" comment="postgresql-docs-18-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289719" comment="postgresql-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041373" comment="postgresql-llvmjit-18-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289720" comment="postgresql-llvmjit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041374" comment="postgresql-llvmjit-devel-18-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009811565" comment="postgresql-llvmjit-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041375" comment="postgresql-plperl-18-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289721" comment="postgresql-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041376" comment="postgresql-plpython-18-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289722" comment="postgresql-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041377" comment="postgresql-pltcl-18-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289723" comment="postgresql-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041378" comment="postgresql-server-18-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177237" comment="postgresql-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041379" comment="postgresql-server-devel-18-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289724" comment="postgresql-server-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041380" comment="postgresql-test-18-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009289725" comment="postgresql-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052636" comment="postgresql13-13.23-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623868" comment="postgresql13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052637" comment="postgresql13-contrib-13.23-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623869" comment="postgresql13-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052638" comment="postgresql13-devel-13.23-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623870" comment="postgresql13-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052639" comment="postgresql13-docs-13.23-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623872" comment="postgresql13-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052640" comment="postgresql13-llvmjit-13.23-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624044" comment="postgresql13-llvmjit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052641" comment="postgresql13-llvmjit-devel-13.23-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698137" comment="postgresql13-llvmjit-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041381" comment="postgresql13-pgaudit-1.5.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041614" comment="postgresql13-pgaudit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041382" comment="postgresql13-pgvector-0.8.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041615" comment="postgresql13-pgvector is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052642" comment="postgresql13-plperl-13.23-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623873" comment="postgresql13-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052643" comment="postgresql13-plpython-13.23-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623874" comment="postgresql13-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052644" comment="postgresql13-pltcl-13.23-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623875" comment="postgresql13-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052645" comment="postgresql13-server-13.23-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623876" comment="postgresql13-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052646" comment="postgresql13-server-devel-13.23-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623877" comment="postgresql13-server-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052647" comment="postgresql13-test-13.23-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623878" comment="postgresql13-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045662" comment="postgresql14-14.21-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009657383" comment="postgresql14 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045663" comment="postgresql14-contrib-14.21-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009657384" comment="postgresql14-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045664" comment="postgresql14-devel-14.21-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009657385" comment="postgresql14-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045665" comment="postgresql14-docs-14.21-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009657387" comment="postgresql14-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045666" comment="postgresql14-llvmjit-14.21-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009657388" comment="postgresql14-llvmjit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045667" comment="postgresql14-llvmjit-devel-14.21-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698138" comment="postgresql14-llvmjit-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041383" comment="postgresql14-pgaudit-1.6.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041616" comment="postgresql14-pgaudit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041384" comment="postgresql14-pgvector-0.8.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041617" comment="postgresql14-pgvector is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045668" comment="postgresql14-plperl-14.21-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009657389" comment="postgresql14-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045669" comment="postgresql14-plpython-14.21-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009657390" comment="postgresql14-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045670" comment="postgresql14-pltcl-14.21-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009657391" comment="postgresql14-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045671" comment="postgresql14-server-14.21-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009657392" comment="postgresql14-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045672" comment="postgresql14-server-devel-14.21-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009657393" comment="postgresql14-server-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045673" comment="postgresql14-test-14.21-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009657394" comment="postgresql14-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045674" comment="postgresql15-15.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009742699" comment="postgresql15 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045675" comment="postgresql15-contrib-15.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009742700" comment="postgresql15-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045676" comment="postgresql15-devel-15.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009742701" comment="postgresql15-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045677" comment="postgresql15-docs-15.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009742702" comment="postgresql15-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045678" comment="postgresql15-llvmjit-15.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009742703" comment="postgresql15-llvmjit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045679" comment="postgresql15-llvmjit-devel-15.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009742704" comment="postgresql15-llvmjit-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041385" comment="postgresql15-pgaudit-1.7.1-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041618" comment="postgresql15-pgaudit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041386" comment="postgresql15-pgvector-0.8.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041619" comment="postgresql15-pgvector is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045680" comment="postgresql15-plperl-15.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009742705" comment="postgresql15-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045681" comment="postgresql15-plpython-15.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009742706" comment="postgresql15-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045682" comment="postgresql15-pltcl-15.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009742707" comment="postgresql15-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045683" comment="postgresql15-server-15.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009742708" comment="postgresql15-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045684" comment="postgresql15-server-devel-15.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009742709" comment="postgresql15-server-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045685" comment="postgresql15-test-15.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009742710" comment="postgresql15-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041355" comment="postgresql16-16.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009811566" comment="postgresql16 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041356" comment="postgresql16-contrib-16.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009811567" comment="postgresql16-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041357" comment="postgresql16-devel-16.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009811568" comment="postgresql16-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041358" comment="postgresql16-docs-16.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009811570" comment="postgresql16-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041359" comment="postgresql16-llvmjit-16.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009811571" comment="postgresql16-llvmjit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041360" comment="postgresql16-llvmjit-devel-16.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009811572" comment="postgresql16-llvmjit-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041387" comment="postgresql16-pgaudit-16.1-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041620" comment="postgresql16-pgaudit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041388" comment="postgresql16-pgvector-0.8.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041621" comment="postgresql16-pgvector is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041361" comment="postgresql16-plperl-16.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009811573" comment="postgresql16-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041362" comment="postgresql16-plpython-16.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009811574" comment="postgresql16-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041363" comment="postgresql16-pltcl-16.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009811575" comment="postgresql16-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041364" comment="postgresql16-server-16.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009811576" comment="postgresql16-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041365" comment="postgresql16-server-devel-16.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009811577" comment="postgresql16-server-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041366" comment="postgresql16-test-16.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009811578" comment="postgresql16-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041389" comment="postgresql17-17.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009954906" comment="postgresql17 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041390" comment="postgresql17-contrib-17.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009954907" comment="postgresql17-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041391" comment="postgresql17-devel-17.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009954908" comment="postgresql17-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041392" comment="postgresql17-docs-17.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009954909" comment="postgresql17-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041393" comment="postgresql17-llvmjit-17.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009954910" comment="postgresql17-llvmjit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041394" comment="postgresql17-llvmjit-devel-17.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009954911" comment="postgresql17-llvmjit-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041395" comment="postgresql17-pgaudit-17.1-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041622" comment="postgresql17-pgaudit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041396" comment="postgresql17-pgvector-0.8.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041623" comment="postgresql17-pgvector is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041397" comment="postgresql17-plperl-17.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009954912" comment="postgresql17-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041398" comment="postgresql17-plpython-17.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009954913" comment="postgresql17-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041399" comment="postgresql17-pltcl-17.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009954914" comment="postgresql17-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041400" comment="postgresql17-server-17.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009954915" comment="postgresql17-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041401" comment="postgresql17-server-devel-17.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009954916" comment="postgresql17-server-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041402" comment="postgresql17-test-17.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009954917" comment="postgresql17-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050153" comment="postgresql18-18.1-160000.1.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033162" comment="postgresql18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050154" comment="postgresql18-contrib-18.1-160000.1.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033163" comment="postgresql18-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050155" comment="postgresql18-devel-18.1-160000.1.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033164" comment="postgresql18-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041406" comment="postgresql18-devel-mini-18.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041624" comment="postgresql18-devel-mini is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050156" comment="postgresql18-docs-18.1-160000.1.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033165" comment="postgresql18-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050157" comment="postgresql18-llvmjit-18.1-160000.1.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033166" comment="postgresql18-llvmjit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050158" comment="postgresql18-llvmjit-devel-18.1-160000.1.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033167" comment="postgresql18-llvmjit-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041410" comment="postgresql18-pgaudit-18.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041625" comment="postgresql18-pgaudit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041411" comment="postgresql18-pgvector-0.8.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041626" comment="postgresql18-pgvector is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050159" comment="postgresql18-plperl-18.1-160000.1.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033168" comment="postgresql18-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050160" comment="postgresql18-plpython-18.1-160000.1.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033169" comment="postgresql18-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050161" comment="postgresql18-pltcl-18.1-160000.1.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033170" comment="postgresql18-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050162" comment="postgresql18-server-18.1-160000.1.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033171" comment="postgresql18-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050163" comment="postgresql18-server-devel-18.1-160000.1.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033172" comment="postgresql18-server-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050164" comment="postgresql18-test-18.1-160000.1.2 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033173" comment="postgresql18-test is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202512839" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-12839</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-12839" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12839" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-12839" ref_url="https://www.suse.com/security/cve/CVE-2025-12839" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023550.html" source="SUSE-SU"/>
    <description>
    Academy Software Foundation OpenEXR EXR File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Academy Software Foundation OpenEXR. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within the parsing of EXR files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-27947.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-13"/>
	<updated date="2025-12-24"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-12839/">CVE-2025-12839 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12839">CVE-2025-12839 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253715">SUSE bug 1253715</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033326" comment="libIex-3_2-31-3.2.2-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010030593" comment="libIex-3_2-31 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033327" comment="libIex-3_2-31-x86-64-v3-3.2.2-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010030594" comment="libIex-3_2-31-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033328" comment="libIlmThread-3_2-31-3.2.2-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010030595" comment="libIlmThread-3_2-31 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033329" comment="libIlmThread-3_2-31-x86-64-v3-3.2.2-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010030596" comment="libIlmThread-3_2-31-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033330" comment="libOpenEXR-3_2-31-3.2.2-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010030597" comment="libOpenEXR-3_2-31 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033331" comment="libOpenEXR-3_2-31-x86-64-v3-3.2.2-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010030598" comment="libOpenEXR-3_2-31-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033332" comment="libOpenEXRCore-3_2-31-3.2.2-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010030599" comment="libOpenEXRCore-3_2-31 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033333" comment="libOpenEXRCore-3_2-31-x86-64-v3-3.2.2-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010030600" comment="libOpenEXRCore-3_2-31-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033334" comment="libOpenEXRUtil-3_2-31-3.2.2-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010030601" comment="libOpenEXRUtil-3_2-31 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033335" comment="libOpenEXRUtil-3_2-31-x86-64-v3-3.2.2-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010030602" comment="libOpenEXRUtil-3_2-31-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033336" comment="openexr-3.2.2-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172752" comment="openexr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033337" comment="openexr-devel-3.2.2-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151255" comment="openexr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033338" comment="openexr-doc-3.2.2-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172753" comment="openexr-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202512840" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-12840</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-12840" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-12840" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-12840" ref_url="https://www.suse.com/security/cve/CVE-2025-12840" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023550.html" source="SUSE-SU"/>
    <description>
    Academy Software Foundation OpenEXR EXR File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Academy Software Foundation OpenEXR. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within the parsing of EXR files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-27948.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-13"/>
	<updated date="2025-12-24"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-12840/">CVE-2025-12840 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-12840">CVE-2025-12840 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253713">SUSE bug 1253713</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033326" comment="libIex-3_2-31-3.2.2-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010030593" comment="libIex-3_2-31 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033327" comment="libIex-3_2-31-x86-64-v3-3.2.2-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010030594" comment="libIex-3_2-31-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033328" comment="libIlmThread-3_2-31-3.2.2-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010030595" comment="libIlmThread-3_2-31 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033329" comment="libIlmThread-3_2-31-x86-64-v3-3.2.2-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010030596" comment="libIlmThread-3_2-31-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033330" comment="libOpenEXR-3_2-31-3.2.2-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010030597" comment="libOpenEXR-3_2-31 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033331" comment="libOpenEXR-3_2-31-x86-64-v3-3.2.2-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010030598" comment="libOpenEXR-3_2-31-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033332" comment="libOpenEXRCore-3_2-31-3.2.2-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010030599" comment="libOpenEXRCore-3_2-31 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033333" comment="libOpenEXRCore-3_2-31-x86-64-v3-3.2.2-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010030600" comment="libOpenEXRCore-3_2-31-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033334" comment="libOpenEXRUtil-3_2-31-3.2.2-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010030601" comment="libOpenEXRUtil-3_2-31 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033335" comment="libOpenEXRUtil-3_2-31-x86-64-v3-3.2.2-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010030602" comment="libOpenEXRUtil-3_2-31-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033336" comment="openexr-3.2.2-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172752" comment="openexr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033337" comment="openexr-devel-3.2.2-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151255" comment="openexr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033338" comment="openexr-doc-3.2.2-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172753" comment="openexr-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202513012" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-13012</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-13012" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13012" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-13012" ref_url="https://www.suse.com/security/cve/CVE-2025-13012" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:21121" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002279.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21280" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003118.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21841" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002276.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21842" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003121.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21881" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002251.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22363" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023337.html" source="SUSE-SU"/>
    <description>
    Race condition in the Graphics component. This vulnerability was fixed in Firefox 145, Firefox ESR 140.5, Firefox ESR 115.30, Thunderbird 145, and Thunderbird 140.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-22"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-13012/">CVE-2025-13012 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13012">CVE-2025-13012 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253188">SUSE bug 1253188</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030561" comment="MozillaFirefox-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030562" comment="MozillaFirefox-branding-upstream-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030563" comment="MozillaFirefox-devel-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030564" comment="MozillaFirefox-translations-common-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030565" comment="MozillaFirefox-translations-other-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035654" comment="MozillaThunderbird-140.5.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035655" comment="MozillaThunderbird-openpgp-librnp-140.5.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025480" comment="MozillaThunderbird-openpgp-librnp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035656" comment="MozillaThunderbird-translations-common-140.5.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035657" comment="MozillaThunderbird-translations-other-140.5.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202513013" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-13013</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-13013" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13013" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-13013" ref_url="https://www.suse.com/security/cve/CVE-2025-13013" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:21121" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002279.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21280" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003118.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21841" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002276.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21842" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003121.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21881" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002251.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22363" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023337.html" source="SUSE-SU"/>
    <description>
    Mitigation bypass in the DOM: Core &amp; HTML component. This vulnerability was fixed in Firefox 145, Firefox ESR 140.5, Firefox ESR 115.30, Thunderbird 145, and Thunderbird 140.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-22"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-13013/">CVE-2025-13013 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13013">CVE-2025-13013 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253188">SUSE bug 1253188</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030561" comment="MozillaFirefox-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030562" comment="MozillaFirefox-branding-upstream-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030563" comment="MozillaFirefox-devel-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030564" comment="MozillaFirefox-translations-common-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030565" comment="MozillaFirefox-translations-other-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035654" comment="MozillaThunderbird-140.5.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035655" comment="MozillaThunderbird-openpgp-librnp-140.5.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025480" comment="MozillaThunderbird-openpgp-librnp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035656" comment="MozillaThunderbird-translations-common-140.5.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035657" comment="MozillaThunderbird-translations-other-140.5.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202513014" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-13014</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-13014" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13014" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-13014" ref_url="https://www.suse.com/security/cve/CVE-2025-13014" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:21121" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002279.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21280" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003118.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21841" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002276.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21842" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003121.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21881" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002251.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22363" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023337.html" source="SUSE-SU"/>
    <description>
    Use-after-free in the Audio/Video component. This vulnerability was fixed in Firefox 145, Firefox ESR 140.5, Firefox ESR 115.30, Thunderbird 145, and Thunderbird 140.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-22"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-13014/">CVE-2025-13014 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13014">CVE-2025-13014 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253188">SUSE bug 1253188</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030561" comment="MozillaFirefox-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030562" comment="MozillaFirefox-branding-upstream-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030563" comment="MozillaFirefox-devel-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030564" comment="MozillaFirefox-translations-common-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030565" comment="MozillaFirefox-translations-other-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035654" comment="MozillaThunderbird-140.5.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035655" comment="MozillaThunderbird-openpgp-librnp-140.5.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025480" comment="MozillaThunderbird-openpgp-librnp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035656" comment="MozillaThunderbird-translations-common-140.5.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035657" comment="MozillaThunderbird-translations-other-140.5.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202513015" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-13015</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-13015" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13015" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-13015" ref_url="https://www.suse.com/security/cve/CVE-2025-13015" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:21121" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002279.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21280" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003118.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21841" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002276.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21842" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003121.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21881" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002251.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22363" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023337.html" source="SUSE-SU"/>
    <description>
    Spoofing issue in Firefox. This vulnerability was fixed in Firefox 145, Firefox ESR 140.5, and Firefox ESR 115.30.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-22"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="low" cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-13015/">CVE-2025-13015 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13015">CVE-2025-13015 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253188">SUSE bug 1253188</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030561" comment="MozillaFirefox-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030562" comment="MozillaFirefox-branding-upstream-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030563" comment="MozillaFirefox-devel-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030564" comment="MozillaFirefox-translations-common-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030565" comment="MozillaFirefox-translations-other-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035654" comment="MozillaThunderbird-140.5.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035655" comment="MozillaThunderbird-openpgp-librnp-140.5.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025480" comment="MozillaThunderbird-openpgp-librnp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035656" comment="MozillaThunderbird-translations-common-140.5.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035657" comment="MozillaThunderbird-translations-other-140.5.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202513016" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-13016</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-13016" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13016" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-13016" ref_url="https://www.suse.com/security/cve/CVE-2025-13016" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:21121" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002279.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21280" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003118.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21841" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002276.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21842" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003121.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21881" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002251.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22363" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023337.html" source="SUSE-SU"/>
    <description>
    Incorrect boundary conditions in the JavaScript: WebAssembly component. This vulnerability was fixed in Firefox 145, Firefox ESR 140.5, Thunderbird 145, and Thunderbird 140.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-22"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-13016/">CVE-2025-13016 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13016">CVE-2025-13016 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253188">SUSE bug 1253188</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030561" comment="MozillaFirefox-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030562" comment="MozillaFirefox-branding-upstream-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030563" comment="MozillaFirefox-devel-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030564" comment="MozillaFirefox-translations-common-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030565" comment="MozillaFirefox-translations-other-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035654" comment="MozillaThunderbird-140.5.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035655" comment="MozillaThunderbird-openpgp-librnp-140.5.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025480" comment="MozillaThunderbird-openpgp-librnp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035656" comment="MozillaThunderbird-translations-common-140.5.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035657" comment="MozillaThunderbird-translations-other-140.5.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202513017" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-13017</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-13017" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13017" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-13017" ref_url="https://www.suse.com/security/cve/CVE-2025-13017" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:21121" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002279.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21280" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003118.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21841" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002276.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21842" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003121.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21881" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002251.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22363" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023337.html" source="SUSE-SU"/>
    <description>
    Same-origin policy bypass in the DOM: Notifications component. This vulnerability was fixed in Firefox 145, Firefox ESR 140.5, Thunderbird 145, and Thunderbird 140.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-22"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-13017/">CVE-2025-13017 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13017">CVE-2025-13017 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253188">SUSE bug 1253188</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030561" comment="MozillaFirefox-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030562" comment="MozillaFirefox-branding-upstream-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030563" comment="MozillaFirefox-devel-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030564" comment="MozillaFirefox-translations-common-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030565" comment="MozillaFirefox-translations-other-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035654" comment="MozillaThunderbird-140.5.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035655" comment="MozillaThunderbird-openpgp-librnp-140.5.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025480" comment="MozillaThunderbird-openpgp-librnp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035656" comment="MozillaThunderbird-translations-common-140.5.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035657" comment="MozillaThunderbird-translations-other-140.5.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202513018" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-13018</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-13018" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13018" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-13018" ref_url="https://www.suse.com/security/cve/CVE-2025-13018" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:21121" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002279.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21280" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003118.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21841" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002276.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21842" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003121.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21881" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002251.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22363" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023337.html" source="SUSE-SU"/>
    <description>
    Mitigation bypass in the DOM: Security component. This vulnerability was fixed in Firefox 145, Firefox ESR 140.5, Thunderbird 145, and Thunderbird 140.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-22"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-13018/">CVE-2025-13018 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13018">CVE-2025-13018 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253188">SUSE bug 1253188</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030561" comment="MozillaFirefox-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030562" comment="MozillaFirefox-branding-upstream-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030563" comment="MozillaFirefox-devel-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030564" comment="MozillaFirefox-translations-common-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030565" comment="MozillaFirefox-translations-other-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035654" comment="MozillaThunderbird-140.5.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035655" comment="MozillaThunderbird-openpgp-librnp-140.5.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025480" comment="MozillaThunderbird-openpgp-librnp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035656" comment="MozillaThunderbird-translations-common-140.5.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035657" comment="MozillaThunderbird-translations-other-140.5.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202513019" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-13019</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-13019" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13019" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-13019" ref_url="https://www.suse.com/security/cve/CVE-2025-13019" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:21121" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002279.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21280" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003118.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21841" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002276.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21842" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003121.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21881" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002251.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22363" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023337.html" source="SUSE-SU"/>
    <description>
    Same-origin policy bypass in the DOM: Workers component. This vulnerability was fixed in Firefox 145, Firefox ESR 140.5, Thunderbird 145, and Thunderbird 140.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-22"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-13019/">CVE-2025-13019 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13019">CVE-2025-13019 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253188">SUSE bug 1253188</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030561" comment="MozillaFirefox-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030562" comment="MozillaFirefox-branding-upstream-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030563" comment="MozillaFirefox-devel-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030564" comment="MozillaFirefox-translations-common-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030565" comment="MozillaFirefox-translations-other-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035654" comment="MozillaThunderbird-140.5.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035655" comment="MozillaThunderbird-openpgp-librnp-140.5.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025480" comment="MozillaThunderbird-openpgp-librnp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035656" comment="MozillaThunderbird-translations-common-140.5.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035657" comment="MozillaThunderbird-translations-other-140.5.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202513020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-13020</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-13020" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13020" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-13020" ref_url="https://www.suse.com/security/cve/CVE-2025-13020" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:21121" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002279.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21280" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003118.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21841" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002276.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21842" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003121.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21881" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002251.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22363" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023337.html" source="SUSE-SU"/>
    <description>
    Use-after-free in the WebRTC: Audio/Video component. This vulnerability was fixed in Firefox 145, Firefox ESR 140.5, Thunderbird 145, and Thunderbird 140.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-22"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-13020/">CVE-2025-13020 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13020">CVE-2025-13020 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253188">SUSE bug 1253188</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030561" comment="MozillaFirefox-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030562" comment="MozillaFirefox-branding-upstream-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030563" comment="MozillaFirefox-devel-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030564" comment="MozillaFirefox-translations-common-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030565" comment="MozillaFirefox-translations-other-140.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035654" comment="MozillaThunderbird-140.5.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035655" comment="MozillaThunderbird-openpgp-librnp-140.5.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025480" comment="MozillaThunderbird-openpgp-librnp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035656" comment="MozillaThunderbird-translations-common-140.5.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035657" comment="MozillaThunderbird-translations-other-140.5.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202513086" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-13086</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-13086" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13086" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-13086" ref_url="https://www.suse.com/security/cve/CVE-2025-13086" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024022.html" source="SUSE-SU"/>
    <description>
    Improper validation of source IP addresses in OpenVPN version 2.6.0 through 2.6.15 and 2.7_alpha1 through 2.7_rc1 allows an attacker to open a session from a different IP address which did not initiate the connection resulting in a denial of service for the originating client
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-06"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="4.6/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-13086/">CVE-2025-13086 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-13086">CVE-2025-13086 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254486">SUSE bug 1254486</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041449" comment="openvpn-2.6.10-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152221" comment="openvpn is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041450" comment="openvpn-auth-pam-plugin-2.6.10-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009157252" comment="openvpn-auth-pam-plugin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041451" comment="openvpn-devel-2.6.10-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009157253" comment="openvpn-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041452" comment="openvpn-down-root-plugin-2.6.10-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009157254" comment="openvpn-down-root-plugin is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202513151" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-13151</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-13151" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13151" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-13151" ref_url="https://www.suse.com/security/cve/CVE-2025-13151" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21001-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045405.html" source="SUSE-SU"/>
    <description>
    Stack-based buffer overflow in libtasn1 version: v4.20.0. The function fails to validate the size of input data resulting in a buffer overflow in asn1_expend_octet_string.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-10"/>
	<updated date="2026-04-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-13151/">CVE-2025-13151 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13151">CVE-2025-13151 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256341">SUSE bug 1256341</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010053369" comment="libtasn1-6-4.21.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152120" comment="libtasn1-6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010053370" comment="libtasn1-devel-4.21.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152122" comment="libtasn1-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010053371" comment="libtasn1-tools-4.21.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010053404" comment="libtasn1-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202513193" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-13193</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-13193" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13193" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-13193" ref_url="https://www.suse.com/security/cve/CVE-2025-13193" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21150-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023509.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0375-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023758.html" source="SUSE-SU"/>
    <description>
    A flaw was found in libvirt. External inactive snapshots for shut-down VMs are incorrectly created as world-readable, making it possible for unprivileged users to inspect the guest OS contents. This results in an information disclosure vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-02-05"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-13193/">CVE-2025-13193 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13193">CVE-2025-13193 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253703">SUSE bug 1253703</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032043" comment="libvirt-11.4.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151423" comment="libvirt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032044" comment="libvirt-client-11.4.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151424" comment="libvirt-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032045" comment="libvirt-client-qemu-11.4.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769741" comment="libvirt-client-qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032046" comment="libvirt-daemon-11.4.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151425" comment="libvirt-daemon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032047" comment="libvirt-daemon-common-11.4.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009865252" comment="libvirt-daemon-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032048" comment="libvirt-daemon-config-network-11.4.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151426" comment="libvirt-daemon-config-network is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032049" comment="libvirt-daemon-config-nwfilter-11.4.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151427" comment="libvirt-daemon-config-nwfilter is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032050" comment="libvirt-daemon-driver-network-11.4.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151431" comment="libvirt-daemon-driver-network is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032051" comment="libvirt-daemon-driver-nodedev-11.4.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151432" comment="libvirt-daemon-driver-nodedev is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032052" comment="libvirt-daemon-driver-nwfilter-11.4.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151433" comment="libvirt-daemon-driver-nwfilter is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032053" comment="libvirt-daemon-driver-qemu-11.4.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151434" comment="libvirt-daemon-driver-qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032054" comment="libvirt-daemon-driver-secret-11.4.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151435" comment="libvirt-daemon-driver-secret is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032055" comment="libvirt-daemon-driver-storage-11.4.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151436" comment="libvirt-daemon-driver-storage is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032056" comment="libvirt-daemon-driver-storage-core-11.4.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161274" comment="libvirt-daemon-driver-storage-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032057" comment="libvirt-daemon-driver-storage-disk-11.4.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161275" comment="libvirt-daemon-driver-storage-disk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032058" comment="libvirt-daemon-driver-storage-iscsi-11.4.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161276" comment="libvirt-daemon-driver-storage-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032059" comment="libvirt-daemon-driver-storage-iscsi-direct-11.4.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009631621" comment="libvirt-daemon-driver-storage-iscsi-direct is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032060" comment="libvirt-daemon-driver-storage-logical-11.4.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161277" comment="libvirt-daemon-driver-storage-logical is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032061" comment="libvirt-daemon-driver-storage-mpath-11.4.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161278" comment="libvirt-daemon-driver-storage-mpath is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032062" comment="libvirt-daemon-driver-storage-scsi-11.4.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161280" comment="libvirt-daemon-driver-storage-scsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032063" comment="libvirt-daemon-hooks-11.4.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009170836" comment="libvirt-daemon-hooks is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032064" comment="libvirt-daemon-lock-11.4.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009865253" comment="libvirt-daemon-lock is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032065" comment="libvirt-daemon-log-11.4.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009865254" comment="libvirt-daemon-log is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032066" comment="libvirt-daemon-plugin-lockd-11.4.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009865255" comment="libvirt-daemon-plugin-lockd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032067" comment="libvirt-daemon-proxy-11.4.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009865257" comment="libvirt-daemon-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032068" comment="libvirt-daemon-qemu-11.4.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151440" comment="libvirt-daemon-qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032069" comment="libvirt-devel-11.4.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152991" comment="libvirt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032070" comment="libvirt-doc-11.4.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152993" comment="libvirt-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032071" comment="libvirt-libs-11.4.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161281" comment="libvirt-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032072" comment="libvirt-nss-11.4.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009166269" comment="libvirt-nss is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032073" comment="libvirt-ssh-proxy-11.4.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032117" comment="libvirt-ssh-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032074" comment="wireshark-plugin-libvirt-11.4.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009223340" comment="wireshark-plugin-libvirt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202513223" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-13223</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-13223" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13223" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-13223" ref_url="https://www.suse.com/security/cve/CVE-2025-13223" source="SUSE CVE"/>
    <description>
    Type Confusion in V8 in Google Chrome prior to 142.0.7444.175 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-22"/>
	<updated date="2025-11-22"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-13223/">CVE-2025-13223 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13223">CVE-2025-13223 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253698">SUSE bug 1253698</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030585" comment="chromedriver-142.0.7444.162-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030586" comment="chromium-142.0.7444.162-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202513224" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-13224</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-13224" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13224" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-13224" ref_url="https://www.suse.com/security/cve/CVE-2025-13224" source="SUSE CVE"/>
    <description>
    Type Confusion in V8 in Google Chrome prior to 142.0.7444.175 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-22"/>
	<updated date="2025-11-22"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-13224/">CVE-2025-13224 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13224">CVE-2025-13224 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253698">SUSE bug 1253698</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030585" comment="chromedriver-142.0.7444.162-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030586" comment="chromium-142.0.7444.162-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202513327" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-13327</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-13327" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13327" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-13327" ref_url="https://www.suse.com/security/cve/CVE-2025-13327" source="SUSE CVE"/>
    <description>
    A flaw was found in uv. This vulnerability allows an attacker to execute malicious code during package resolution or installation via specially crafted ZIP (Zipped Information Package) archives that exploit parsing differentials, requiring user interaction to install an attacker-controlled package.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-08"/>
	<updated date="2026-03-19"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-13327/">CVE-2025-13327 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-13327">CVE-2025-13327 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258993">SUSE bug 1258993</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047672" comment="python313-uv-0.7.18-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037741" comment="python313-uv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047673" comment="python313-uv-bash-completion-0.7.18-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037742" comment="python313-uv-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047674" comment="python313-uv-fish-completion-0.7.18-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037743" comment="python313-uv-fish-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047675" comment="python313-uv-zsh-completion-0.7.18-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037744" comment="python313-uv-zsh-completion is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202513372" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-13372</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-13372" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13372" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-13372" ref_url="https://www.suse.com/security/cve/CVE-2025-13372" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023533.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in 5.2 before 5.2.9, 5.1 before 5.1.15, and 4.2 before 4.2.27.
`FilteredRelation` is subject to SQL injection in column aliases, using a suitably crafted dictionary, with dictionary expansion, as the `**kwargs` passed to `QuerySet.annotate()` or `QuerySet.alias()` on PostgreSQL.
Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected.
Django would like to thank Stackered for reporting this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-13"/>
	<updated date="2025-12-13"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-13372/">CVE-2025-13372 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13372">CVE-2025-13372 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254437">SUSE bug 1254437</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033371" comment="python313-Django-5.2.4-bp160.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025481" comment="python313-Django is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202513402" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-13402</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-13402" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13402" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-13402" ref_url="https://www.suse.com/security/cve/CVE-2025-13402" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2025-11-29"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-13402/">CVE-2025-13402 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13402">CVE-2025-13402 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253957">SUSE bug 1253957</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032104" comment="librnp0-0.18.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032118" comment="librnp0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032105" comment="rnp-0.18.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032119" comment="rnp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032106" comment="rnp-devel-0.18.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032120" comment="rnp-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202513465" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-13465</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-13465" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13465" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-13465" ref_url="https://www.suse.com/security/cve/CVE-2025-13465" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2452" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20232-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20338-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044345.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024598.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20576-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20653-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20695-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024728.html" source="SUSE-SU"/>
    <description>
    Lodash versions 4.0.0 through 4.17.22 are vulnerable to prototype pollution in the _.unset  and _.omit  functions. An attacker can pass crafted paths which cause Lodash to delete methods from global prototypes.

The issue permits deletion of properties but does not allow overwriting their original behavior.

This issue is patched on 4.17.23
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-06"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-13465/">CVE-2025-13465 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-13465">CVE-2025-13465 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257321">SUSE bug 1257321</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044370" comment="cockpit-354-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009874847" comment="cockpit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044371" comment="cockpit-bridge-354-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009874848" comment="cockpit-bridge is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044372" comment="cockpit-devel-354-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009874849" comment="cockpit-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044373" comment="cockpit-doc-354-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009874850" comment="cockpit-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044374" comment="cockpit-firewalld-354-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010042320" comment="cockpit-firewalld is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044375" comment="cockpit-kdump-354-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009874851" comment="cockpit-kdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044376" comment="cockpit-machines-346-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010044387" comment="cockpit-machines is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044377" comment="cockpit-networkmanager-354-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009874852" comment="cockpit-networkmanager is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044378" comment="cockpit-packagekit-354-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009874853" comment="cockpit-packagekit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042592" comment="cockpit-packages-3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010042636" comment="cockpit-packages is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047931" comment="cockpit-podman-117-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010047946" comment="cockpit-podman is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044577" comment="cockpit-repos-4.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010044612" comment="cockpit-repos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044379" comment="cockpit-selinux-354-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009874855" comment="cockpit-selinux is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044380" comment="cockpit-storaged-354-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009874856" comment="cockpit-storaged is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042306" comment="cockpit-subscriptions-12.1-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041633" comment="cockpit-subscriptions is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044381" comment="cockpit-system-354-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009874857" comment="cockpit-system is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044382" comment="cockpit-ws-354-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009874858" comment="cockpit-ws is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044383" comment="cockpit-ws-selinux-354-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010042321" comment="cockpit-ws-selinux is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042229" comment="golang-github-prometheus-prometheus-3.5.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630838" comment="golang-github-prometheus-prometheus is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202513470" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-13470</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-13470" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13470" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-13470" ref_url="https://www.suse.com/security/cve/CVE-2025-13470" source="SUSE CVE"/>
    <description>
    In RNP version 0.18.0 a refactoring regression causes the symmetric 
session key used for Public-Key Encrypted Session Key (PKESK) packets to
 be left uninitialized except for zeroing, resulting in it always being 
an all-zero byte array.

Any data encrypted using public-key encryption 
in this release can be decrypted trivially by supplying an all-zero 
session key, fully compromising confidentiality.

The vulnerability affects only public key encryption (PKESK packets).   Passphrase-based encryption (SKESK packets) is not affected.

Root cause: Vulnerable session key buffer used in PKESK packet generation.



The defect was introduced in commit `7bd9a8dc356aae756b40755be76d36205b6b161a` where initialization 
logic inside `encrypted_build_skesk()` only randomized the key for the 
SKESK path and omitted it for the PKESK path.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2025-12-19"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-13470/">CVE-2025-13470 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13470">CVE-2025-13470 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253957">SUSE bug 1253957</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032104" comment="librnp0-0.18.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032118" comment="librnp0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032105" comment="rnp-0.18.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032119" comment="rnp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032106" comment="rnp-devel-0.18.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032120" comment="rnp-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202513473" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-13473</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-13473" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13473" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-13473" ref_url="https://www.suse.com/security/cve/CVE-2025-13473" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024108.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4.2.28.
The `django.contrib.auth.handlers.modwsgi.check_password()` function for authentication via `mod_wsgi` allows remote attackers to enumerate users via a timing attack.
Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected.
Django would like to thank Stackered for reporting this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-08"/>
	<updated date="2026-02-12"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-13473/">CVE-2025-13473 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13473">CVE-2025-13473 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257401">SUSE bug 1257401</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042368" comment="python313-Django-5.2.4-bp160.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025481" comment="python313-Django is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202513499" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-13499</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-13499" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13499" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-13499" ref_url="https://www.suse.com/security/cve/CVE-2025-13499" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23142" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003129.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0454" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1169-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024065.html" source="SUSE-SU"/>
    <description>
    Kafka dissector crash in Wireshark 4.6.0 and 4.4.0 to 4.4.10 allows denial of service
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-13499/">CVE-2025-13499 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-13499">CVE-2025-13499 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254108">SUSE bug 1254108</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041589" comment="libwireshark18-4.4.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041611" comment="libwireshark18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041590" comment="libwiretap15-4.4.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041612" comment="libwiretap15 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041591" comment="libwsutil16-4.4.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041613" comment="libwsutil16 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041592" comment="wireshark-4.4.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041593" comment="wireshark-devel-4.4.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041594" comment="wireshark-ui-qt-4.4.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202513502" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-13502</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-13502" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13502" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-13502" ref_url="https://www.suse.com/security/cve/CVE-2025-13502" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:22789" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002280.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22790" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003113.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23110" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1150-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023882.html" source="SUSE-SU"/>
    <description>
    A flaw was found in WebKitGTK and WPE WebKit. This vulnerability allows an out-of-bounds read and integer underflow, leading to a UIProcess crash (DoS) via a crafted payload to the GLib remote inspector server.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-22"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-13502/">CVE-2025-13502 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13502">CVE-2025-13502 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254208">SUSE bug 1254208</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038439" comment="WebKitGTK-4.0-lang-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779926" comment="WebKitGTK-4.0-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038440" comment="WebKitGTK-4.1-lang-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779927" comment="WebKitGTK-4.1-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038441" comment="WebKitGTK-6.0-lang-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779928" comment="WebKitGTK-6.0-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038442" comment="libjavascriptcoregtk-4_0-18-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038443" comment="libjavascriptcoregtk-4_1-0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698039" comment="libjavascriptcoregtk-4_1-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038444" comment="libjavascriptcoregtk-6_0-1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779930" comment="libjavascriptcoregtk-6_0-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038445" comment="libwebkit2gtk-4_0-37-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038446" comment="libwebkit2gtk-4_1-0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698041" comment="libwebkit2gtk-4_1-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038447" comment="libwebkitgtk-6_0-4-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779932" comment="libwebkitgtk-6_0-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038448" comment="typelib-1_0-JavaScriptCore-4_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038449" comment="typelib-1_0-JavaScriptCore-4_1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698148" comment="typelib-1_0-JavaScriptCore-4_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038450" comment="typelib-1_0-JavaScriptCore-6_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779933" comment="typelib-1_0-JavaScriptCore-6_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038451" comment="typelib-1_0-WebKit-6_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779934" comment="typelib-1_0-WebKit-6_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038452" comment="typelib-1_0-WebKit2-4_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038453" comment="typelib-1_0-WebKit2-4_1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698149" comment="typelib-1_0-WebKit2-4_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038454" comment="typelib-1_0-WebKit2WebExtension-4_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038455" comment="typelib-1_0-WebKit2WebExtension-4_1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698150" comment="typelib-1_0-WebKit2WebExtension-4_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038456" comment="typelib-1_0-WebKitWebProcessExtension-6_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779935" comment="typelib-1_0-WebKitWebProcessExtension-6_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038457" comment="webkit-jsc-4-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038458" comment="webkit-jsc-4.1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698152" comment="webkit-jsc-4.1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038459" comment="webkit-jsc-6.0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779936" comment="webkit-jsc-6.0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038460" comment="webkit2gtk-4_0-injected-bundles-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038461" comment="webkit2gtk-4_1-injected-bundles-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698045" comment="webkit2gtk-4_1-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038462" comment="webkit2gtk3-devel-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038463" comment="webkit2gtk3-minibrowser-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038464" comment="webkit2gtk3-soup2-devel-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698154" comment="webkit2gtk3-soup2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038465" comment="webkit2gtk3-soup2-minibrowser-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698155" comment="webkit2gtk3-soup2-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038466" comment="webkit2gtk4-devel-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698156" comment="webkit2gtk4-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038467" comment="webkit2gtk4-minibrowser-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698157" comment="webkit2gtk4-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038468" comment="webkitgtk-6_0-injected-bundles-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779937" comment="webkitgtk-6_0-injected-bundles is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202513601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-13601</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-13601" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13601" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-13601" ref_url="https://www.suse.com/security/cve/CVE-2025-13601" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0936" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003174.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0991" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002426.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1465" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002447.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1608" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024480.html" source="SUSE-SU"/>
    <description>
    A heap-based buffer overflow problem was found in glib through an incorrect calculation of buffer size in the g_escape_uri_string() function. If the string to escape contains a very large number of unacceptable characters (which would need escaping), the calculation of the length of the escaped string could overflow, leading to a potential write off the end of the newly allocated string.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-13"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-13601/">CVE-2025-13601 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13601">CVE-2025-13601 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254297">SUSE bug 1254297</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037192" comment="gio-branding-upstream-2.84.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009241263" comment="gio-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037193" comment="glib2-devel-2.84.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151142" comment="glib2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037194" comment="glib2-devel-static-2.84.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009241266" comment="glib2-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037195" comment="glib2-doc-2.84.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009862594" comment="glib2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037196" comment="glib2-lang-2.84.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151143" comment="glib2-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037197" comment="glib2-tests-devel-2.84.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009755645" comment="glib2-tests-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037198" comment="glib2-tools-2.84.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151144" comment="glib2-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037199" comment="libgio-2_0-0-2.84.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151145" comment="libgio-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037200" comment="libgirepository-2_0-0-2.84.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037220" comment="libgirepository-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037201" comment="libglib-2_0-0-2.84.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151147" comment="libglib-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037202" comment="libgmodule-2_0-0-2.84.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151149" comment="libgmodule-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037203" comment="libgobject-2_0-0-2.84.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151151" comment="libgobject-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037204" comment="libgthread-2_0-0-2.84.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151153" comment="libgthread-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037205" comment="typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037221" comment="typelib-1_0-GIRepository-3_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037206" comment="typelib-1_0-GLib-2_0-2.84.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037222" comment="typelib-1_0-GLib-2_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037207" comment="typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037223" comment="typelib-1_0-GLibUnix-2_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037208" comment="typelib-1_0-GModule-2_0-2.84.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037224" comment="typelib-1_0-GModule-2_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037209" comment="typelib-1_0-GObject-2_0-2.84.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037225" comment="typelib-1_0-GObject-2_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037210" comment="typelib-1_0-Gio-2_0-2.84.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037226" comment="typelib-1_0-Gio-2_0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202513609" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-13609</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-13609" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13609" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-13609" ref_url="https://www.suse.com/security/cve/CVE-2025-13609" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23210" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023868.html" source="SUSE-SU"/>
    <description>
    A vulnerability has been identified in keylime where an attacker can exploit this flaw by registering a new agent using a different Trusted Platform Module (TPM) device but claiming an existing agent's unique identifier (UUID). This action overwrites the legitimate agent's identity, enabling the attacker to impersonate the compromised agent and potentially bypass security controls.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-15"/>
	<updated date="2026-04-11"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" cvss4="9.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:N/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-13609/">CVE-2025-13609 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13609">CVE-2025-13609 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254199">SUSE bug 1254199</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033436" comment="keylime-config-7.13.0+40-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009704319" comment="keylime-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033437" comment="keylime-firewalld-7.13.0+40-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009704320" comment="keylime-firewalld is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033438" comment="keylime-logrotate-7.13.0+40-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009777628" comment="keylime-logrotate is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033439" comment="keylime-registrar-7.13.0+40-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009704321" comment="keylime-registrar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033440" comment="keylime-tenant-7.13.0+40-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033448" comment="keylime-tenant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033441" comment="keylime-tpm_cert_store-7.13.0+40-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009704322" comment="keylime-tpm_cert_store is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033442" comment="keylime-verifier-7.13.0+40-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009704323" comment="keylime-verifier is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033443" comment="python313-keylime-7.13.0+40-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033449" comment="python313-keylime is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202513699" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-13699</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-13699" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13699" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-13699" ref_url="https://www.suse.com/security/cve/CVE-2025-13699" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0111" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002351.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0137" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003182.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0225" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002358.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0232" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002360.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0233" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002357.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0247" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003186.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0334" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023634.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023650.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023725.html" source="SUSE-SU"/>
    <description>
    MariaDB mariadb-dump Utility Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of MariaDB. Interaction with the mariadb-dump utility is required to exploit this vulnerability but attack vectors may vary depending on the implementation.

The specific flaw exists within the handling of view names. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-27000.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-13699/">CVE-2025-13699 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13699">CVE-2025-13699 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254313">SUSE bug 1254313</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035129" comment="libmariadbd-devel-11.8.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009338686" comment="libmariadbd-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035130" comment="libmariadbd19-11.8.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009338687" comment="libmariadbd19 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035131" comment="mariadb-11.8.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151099" comment="mariadb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035132" comment="mariadb-bench-11.8.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152841" comment="mariadb-bench is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035133" comment="mariadb-client-11.8.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151100" comment="mariadb-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035134" comment="mariadb-errormessages-11.8.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151101" comment="mariadb-errormessages is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035135" comment="mariadb-galera-11.8.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009178284" comment="mariadb-galera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035136" comment="mariadb-rpm-macros-11.8.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009338688" comment="mariadb-rpm-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035137" comment="mariadb-test-11.8.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152842" comment="mariadb-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035138" comment="mariadb-tools-11.8.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152843" comment="mariadb-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202513836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-13836</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-13836" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13836" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-13836" ref_url="https://www.suse.com/security/cve/CVE-2025-13836" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1374" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002442.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1408" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003158.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1410" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003202.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2419" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002500.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3900" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2026:0624-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202603:15322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202603:15324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20125-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024938.html" source="SUSE-SU"/>
    <description>
    When reading an HTTP response from a server, if no read amount is specified, the default behavior will be to use Content-Length. This allows a malicious server to cause the client to read large amounts of data into memory, potentially causing OOM or other DoS.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-25"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-13836/">CVE-2025-13836 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-13836">CVE-2025-13836 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254400">SUSE bug 1254400</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039656" comment="libpython3_13-1_0-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039739" comment="libpython3_13-1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039657" comment="libpython3_13-1_0-x86-64-v3-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039740" comment="libpython3_13-1_0-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039658" comment="libpython3_13t1_0-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039741" comment="libpython3_13t1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039659" comment="python313-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039742" comment="python313 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039660" comment="python313-base-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039743" comment="python313-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039661" comment="python313-base-x86-64-v3-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039744" comment="python313-base-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039662" comment="python313-curses-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039745" comment="python313-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039663" comment="python313-dbm-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039746" comment="python313-dbm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039664" comment="python313-devel-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039747" comment="python313-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039665" comment="python313-doc-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039748" comment="python313-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039666" comment="python313-doc-devhelp-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039749" comment="python313-doc-devhelp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039667" comment="python313-idle-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039750" comment="python313-idle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039668" comment="python313-nogil-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039751" comment="python313-nogil is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039669" comment="python313-nogil-base-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039752" comment="python313-nogil-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039670" comment="python313-nogil-curses-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039753" comment="python313-nogil-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039671" comment="python313-nogil-dbm-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039754" comment="python313-nogil-dbm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039672" comment="python313-nogil-devel-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039755" comment="python313-nogil-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039673" comment="python313-nogil-idle-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039756" comment="python313-nogil-idle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039674" comment="python313-nogil-testsuite-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039757" comment="python313-nogil-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039675" comment="python313-nogil-tk-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039758" comment="python313-nogil-tk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039676" comment="python313-nogil-tools-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039759" comment="python313-nogil-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051768" comment="python313-salt-3006.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010035674" comment="python313-salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051769" comment="python313-salt-testsuite-3006.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010035675" comment="python313-salt-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039677" comment="python313-testsuite-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039760" comment="python313-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039678" comment="python313-tk-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039761" comment="python313-tk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039679" comment="python313-tools-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039762" comment="python313-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039680" comment="python313-x86-64-v3-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039763" comment="python313-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051770" comment="salt-3006.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153592" comment="salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051771" comment="salt-api-3006.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153593" comment="salt-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051772" comment="salt-bash-completion-3006.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153594" comment="salt-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051773" comment="salt-cloud-3006.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153595" comment="salt-cloud is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051774" comment="salt-doc-3006.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153596" comment="salt-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051775" comment="salt-fish-completion-3006.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153597" comment="salt-fish-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051776" comment="salt-master-3006.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153598" comment="salt-master is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051777" comment="salt-minion-3006.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153599" comment="salt-minion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051778" comment="salt-proxy-3006.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153600" comment="salt-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051779" comment="salt-ssh-3006.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153602" comment="salt-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051780" comment="salt-standalone-formulas-configuration-3006.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280429" comment="salt-standalone-formulas-configuration is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051781" comment="salt-syndic-3006.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153603" comment="salt-syndic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051782" comment="salt-transactional-update-3006.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009479908" comment="salt-transactional-update is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051783" comment="salt-zsh-completion-3006.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153604" comment="salt-zsh-completion is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202513837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-13837</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-13837" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13837" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-13837" ref_url="https://www.suse.com/security/cve/CVE-2025-13837" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4538-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0025-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0299-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023922.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0314-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023761.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20125-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024893.html" source="SUSE-SU"/>
    <description>
    When loading a plist file, the plistlib module reads data in size specified by the file itself, meaning a malicious file can cause OOM and DoS issues
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-25"/>
	<updated date="2026-03-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="2.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-13837/">CVE-2025-13837 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-13837">CVE-2025-13837 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254401">SUSE bug 1254401</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039656" comment="libpython3_13-1_0-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039739" comment="libpython3_13-1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039657" comment="libpython3_13-1_0-x86-64-v3-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039740" comment="libpython3_13-1_0-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039658" comment="libpython3_13t1_0-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039741" comment="libpython3_13t1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039659" comment="python313-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039742" comment="python313 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039660" comment="python313-base-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039743" comment="python313-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039661" comment="python313-base-x86-64-v3-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039744" comment="python313-base-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039662" comment="python313-curses-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039745" comment="python313-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039663" comment="python313-dbm-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039746" comment="python313-dbm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039664" comment="python313-devel-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039747" comment="python313-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039665" comment="python313-doc-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039748" comment="python313-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039666" comment="python313-doc-devhelp-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039749" comment="python313-doc-devhelp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039667" comment="python313-idle-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039750" comment="python313-idle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039668" comment="python313-nogil-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039751" comment="python313-nogil is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039669" comment="python313-nogil-base-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039752" comment="python313-nogil-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039670" comment="python313-nogil-curses-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039753" comment="python313-nogil-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039671" comment="python313-nogil-dbm-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039754" comment="python313-nogil-dbm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039672" comment="python313-nogil-devel-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039755" comment="python313-nogil-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039673" comment="python313-nogil-idle-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039756" comment="python313-nogil-idle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039674" comment="python313-nogil-testsuite-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039757" comment="python313-nogil-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039675" comment="python313-nogil-tk-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039758" comment="python313-nogil-tk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039676" comment="python313-nogil-tools-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039759" comment="python313-nogil-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039677" comment="python313-testsuite-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039760" comment="python313-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039678" comment="python313-tk-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039761" comment="python313-tk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039679" comment="python313-tools-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039762" comment="python313-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039680" comment="python313-x86-64-v3-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039763" comment="python313-x86-64-v3 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202513878" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-13878</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-13878" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13878" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-13878" ref_url="https://www.suse.com/security/cve/CVE-2025-13878" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0348-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20135-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043736.html" source="SUSE-SU"/>
    <description>
    Malformed BRID/HHIT records can cause `named` to terminate unexpectedly.
This issue affects BIND 9 versions 9.18.40 through 9.18.43, 9.20.13 through 9.20.17, 9.21.12 through 9.21.16, 9.18.40-S1 through 9.18.43-S1, and 9.20.13-S1 through 9.20.17-S1.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-25"/>
	<updated date="2026-01-31"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-13878/">CVE-2025-13878 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13878">CVE-2025-13878 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256997">SUSE bug 1256997</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039712" comment="bind-9.20.18-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151203" comment="bind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039713" comment="bind-doc-9.20.18-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151205" comment="bind-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039714" comment="bind-modules-bdbhpt-9.20.18-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037911" comment="bind-modules-bdbhpt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039715" comment="bind-modules-generic-9.20.18-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037912" comment="bind-modules-generic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039716" comment="bind-modules-ldap-9.20.18-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037913" comment="bind-modules-ldap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039717" comment="bind-modules-mysql-9.20.18-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037914" comment="bind-modules-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039718" comment="bind-modules-perl-9.20.18-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037915" comment="bind-modules-perl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039719" comment="bind-modules-sqlite3-9.20.18-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037916" comment="bind-modules-sqlite3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039720" comment="bind-utils-9.20.18-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151207" comment="bind-utils is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202513945" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-13945</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-13945" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13945" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-13945" ref_url="https://www.suse.com/security/cve/CVE-2025-13945" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:1169-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024065.html" source="SUSE-SU"/>
    <description>
    HTTP3 dissector crash in Wireshark 4.6.0 and 4.6.1 allows denial of service
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-13945/">CVE-2025-13945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13945">CVE-2025-13945 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254471">SUSE bug 1254471</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041589" comment="libwireshark18-4.4.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041611" comment="libwireshark18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041590" comment="libwiretap15-4.4.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041612" comment="libwiretap15 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041591" comment="libwsutil16-4.4.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041613" comment="libwsutil16 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041592" comment="wireshark-4.4.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041593" comment="wireshark-devel-4.4.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041594" comment="wireshark-ui-qt-4.4.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202513946" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-13946</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-13946" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13946" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-13946" ref_url="https://www.suse.com/security/cve/CVE-2025-13946" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4413-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023560.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0817-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024581.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1169-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024065.html" source="SUSE-SU"/>
    <description>
    MEGACO dissector infinite loop in Wireshark 4.6.0 to 4.6.1 and 4.4.0 to 4.4.11 allows denial of service
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-13946/">CVE-2025-13946 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13946">CVE-2025-13946 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254472">SUSE bug 1254472</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041589" comment="libwireshark18-4.4.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041611" comment="libwireshark18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041590" comment="libwiretap15-4.4.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041612" comment="libwiretap15 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041591" comment="libwsutil16-4.4.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041613" comment="libwsutil16 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041592" comment="wireshark-4.4.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041593" comment="wireshark-devel-4.4.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041594" comment="wireshark-ui-qt-4.4.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202513947" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-13947</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-13947" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-13947" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-13947" ref_url="https://www.suse.com/security/cve/CVE-2025-13947" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:22789" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002280.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22790" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003113.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23110" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023882.html" source="SUSE-SU"/>
    <description>
    A flaw was found in WebKitGTK. This vulnerability allows remote, user-assisted information disclosure that can reveal any file the user is permitted to read via abusing the file drag-and-drop mechanism where WebKitGTK does not verify that drag operations originate from outside the browser.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-22"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-13947/">CVE-2025-13947 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-13947">CVE-2025-13947 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254473">SUSE bug 1254473</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038439" comment="WebKitGTK-4.0-lang-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779926" comment="WebKitGTK-4.0-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038440" comment="WebKitGTK-4.1-lang-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779927" comment="WebKitGTK-4.1-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038441" comment="WebKitGTK-6.0-lang-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779928" comment="WebKitGTK-6.0-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038442" comment="libjavascriptcoregtk-4_0-18-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038443" comment="libjavascriptcoregtk-4_1-0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698039" comment="libjavascriptcoregtk-4_1-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038444" comment="libjavascriptcoregtk-6_0-1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779930" comment="libjavascriptcoregtk-6_0-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038445" comment="libwebkit2gtk-4_0-37-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038446" comment="libwebkit2gtk-4_1-0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698041" comment="libwebkit2gtk-4_1-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038447" comment="libwebkitgtk-6_0-4-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779932" comment="libwebkitgtk-6_0-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038448" comment="typelib-1_0-JavaScriptCore-4_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038449" comment="typelib-1_0-JavaScriptCore-4_1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698148" comment="typelib-1_0-JavaScriptCore-4_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038450" comment="typelib-1_0-JavaScriptCore-6_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779933" comment="typelib-1_0-JavaScriptCore-6_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038451" comment="typelib-1_0-WebKit-6_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779934" comment="typelib-1_0-WebKit-6_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038452" comment="typelib-1_0-WebKit2-4_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038453" comment="typelib-1_0-WebKit2-4_1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698149" comment="typelib-1_0-WebKit2-4_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038454" comment="typelib-1_0-WebKit2WebExtension-4_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038455" comment="typelib-1_0-WebKit2WebExtension-4_1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698150" comment="typelib-1_0-WebKit2WebExtension-4_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038456" comment="typelib-1_0-WebKitWebProcessExtension-6_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779935" comment="typelib-1_0-WebKitWebProcessExtension-6_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038457" comment="webkit-jsc-4-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038458" comment="webkit-jsc-4.1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698152" comment="webkit-jsc-4.1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038459" comment="webkit-jsc-6.0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779936" comment="webkit-jsc-6.0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038460" comment="webkit2gtk-4_0-injected-bundles-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038461" comment="webkit2gtk-4_1-injected-bundles-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698045" comment="webkit2gtk-4_1-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038462" comment="webkit2gtk3-devel-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038463" comment="webkit2gtk3-minibrowser-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038464" comment="webkit2gtk3-soup2-devel-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698154" comment="webkit2gtk3-soup2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038465" comment="webkit2gtk3-soup2-minibrowser-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698155" comment="webkit2gtk3-soup2-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038466" comment="webkit2gtk4-devel-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698156" comment="webkit2gtk4-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038467" comment="webkit2gtk4-minibrowser-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698157" comment="webkit2gtk4-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038468" comment="webkitgtk-6_0-injected-bundles-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779937" comment="webkitgtk-6_0-injected-bundles is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202514017" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-14017</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-14017" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14017" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-14017" ref_url="https://www.suse.com/security/cve/CVE-2025-14017" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024325.html" source="SUSE-SU"/>
    <description>
    When doing multi-threaded LDAPS transfers (LDAP over TLS) with libcurl,
changing TLS options in one thread would inadvertently change them globally
and therefore possibly also affect other concurrently setup transfers.

Disabling certificate verification for a specific transfer could
unintentionally disable the feature for other threads as well.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-16"/>
	<updated date="2026-02-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" cvss4="7/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14017/">CVE-2025-14017 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14017">CVE-2025-14017 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256105">SUSE bug 1256105</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037720" comment="curl-8.14.1-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037721" comment="curl-fish-completion-8.14.1-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010031781" comment="curl-fish-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037722" comment="curl-zsh-completion-8.14.1-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010031782" comment="curl-zsh-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037723" comment="libcurl-devel-8.14.1-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151178" comment="libcurl-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037724" comment="libcurl-devel-doc-8.14.1-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010031783" comment="libcurl-devel-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037725" comment="libcurl4-8.14.1-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202514087" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-14087</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-14087" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14087" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-14087" ref_url="https://www.suse.com/security/cve/CVE-2025-14087" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024480.html" source="SUSE-SU"/>
    <description>
    A flaw was found in GLib (Gnome Lib). This vulnerability allows a remote attacker to cause heap corruption, leading to a denial of service or potential code execution via a buffer-underflow in the GVariant parser when processing maliciously crafted input strings.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-13"/>
	<updated date="2026-02-28"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14087/">CVE-2025-14087 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14087">CVE-2025-14087 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254662">SUSE bug 1254662</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037192" comment="gio-branding-upstream-2.84.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009241263" comment="gio-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037193" comment="glib2-devel-2.84.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151142" comment="glib2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037194" comment="glib2-devel-static-2.84.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009241266" comment="glib2-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037195" comment="glib2-doc-2.84.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009862594" comment="glib2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037196" comment="glib2-lang-2.84.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151143" comment="glib2-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037197" comment="glib2-tests-devel-2.84.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009755645" comment="glib2-tests-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037198" comment="glib2-tools-2.84.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151144" comment="glib2-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037199" comment="libgio-2_0-0-2.84.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151145" comment="libgio-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037200" comment="libgirepository-2_0-0-2.84.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037220" comment="libgirepository-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037201" comment="libglib-2_0-0-2.84.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151147" comment="libglib-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037202" comment="libgmodule-2_0-0-2.84.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151149" comment="libgmodule-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037203" comment="libgobject-2_0-0-2.84.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151151" comment="libgobject-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037204" comment="libgthread-2_0-0-2.84.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151153" comment="libgthread-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037205" comment="typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037221" comment="typelib-1_0-GIRepository-3_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037206" comment="typelib-1_0-GLib-2_0-2.84.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037222" comment="typelib-1_0-GLib-2_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037207" comment="typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037223" comment="typelib-1_0-GLibUnix-2_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037208" comment="typelib-1_0-GModule-2_0-2.84.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037224" comment="typelib-1_0-GModule-2_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037209" comment="typelib-1_0-GObject-2_0-2.84.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037225" comment="typelib-1_0-GObject-2_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037210" comment="typelib-1_0-Gio-2_0-2.84.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037226" comment="typelib-1_0-Gio-2_0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202514174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-14174</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-14174" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14174" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-14174" ref_url="https://www.suse.com/security/cve/CVE-2025-14174" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23700" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023882.html" source="SUSE-SU"/>
    <description>
    Out of bounds memory access in ANGLE in Google Chrome on Mac prior to 143.0.7499.110 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14174/">CVE-2025-14174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14174">CVE-2025-14174 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254776">SUSE bug 1254776</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038439" comment="WebKitGTK-4.0-lang-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779926" comment="WebKitGTK-4.0-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038440" comment="WebKitGTK-4.1-lang-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779927" comment="WebKitGTK-4.1-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038441" comment="WebKitGTK-6.0-lang-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779928" comment="WebKitGTK-6.0-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035671" comment="chromedriver-143.0.7499.146-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035672" comment="chromium-143.0.7499.146-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038442" comment="libjavascriptcoregtk-4_0-18-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038443" comment="libjavascriptcoregtk-4_1-0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698039" comment="libjavascriptcoregtk-4_1-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038444" comment="libjavascriptcoregtk-6_0-1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779930" comment="libjavascriptcoregtk-6_0-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038445" comment="libwebkit2gtk-4_0-37-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038446" comment="libwebkit2gtk-4_1-0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698041" comment="libwebkit2gtk-4_1-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038447" comment="libwebkitgtk-6_0-4-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779932" comment="libwebkitgtk-6_0-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038448" comment="typelib-1_0-JavaScriptCore-4_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038449" comment="typelib-1_0-JavaScriptCore-4_1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698148" comment="typelib-1_0-JavaScriptCore-4_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038450" comment="typelib-1_0-JavaScriptCore-6_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779933" comment="typelib-1_0-JavaScriptCore-6_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038451" comment="typelib-1_0-WebKit-6_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779934" comment="typelib-1_0-WebKit-6_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038452" comment="typelib-1_0-WebKit2-4_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038453" comment="typelib-1_0-WebKit2-4_1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698149" comment="typelib-1_0-WebKit2-4_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038454" comment="typelib-1_0-WebKit2WebExtension-4_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038455" comment="typelib-1_0-WebKit2WebExtension-4_1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698150" comment="typelib-1_0-WebKit2WebExtension-4_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038456" comment="typelib-1_0-WebKitWebProcessExtension-6_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779935" comment="typelib-1_0-WebKitWebProcessExtension-6_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038457" comment="webkit-jsc-4-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038458" comment="webkit-jsc-4.1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698152" comment="webkit-jsc-4.1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038459" comment="webkit-jsc-6.0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779936" comment="webkit-jsc-6.0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038460" comment="webkit2gtk-4_0-injected-bundles-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038461" comment="webkit2gtk-4_1-injected-bundles-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698045" comment="webkit2gtk-4_1-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038462" comment="webkit2gtk3-devel-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038463" comment="webkit2gtk3-minibrowser-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038464" comment="webkit2gtk3-soup2-devel-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698154" comment="webkit2gtk3-soup2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038465" comment="webkit2gtk3-soup2-minibrowser-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698155" comment="webkit2gtk3-soup2-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038466" comment="webkit2gtk4-devel-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698156" comment="webkit2gtk4-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038467" comment="webkit2gtk4-minibrowser-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698157" comment="webkit2gtk4-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038468" comment="webkitgtk-6_0-injected-bundles-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779937" comment="webkitgtk-6_0-injected-bundles is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202514177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-14177</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-14177" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14177" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-14177" ref_url="https://www.suse.com/security/cve/CVE-2025-14177" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1409" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003207.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1412" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002444.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1429" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003203.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2470" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002502.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2799" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023952.html" source="SUSE-SU"/>
    <description>
    In PHP versions:8.1.* before 8.1.34, 8.2.* before 8.2.30, 8.3.* before 8.3.29, 8.4.* before 8.4.16, 8.5.* before 8.5.1, the getimagesize() function may leak uninitialized heap memory into the APPn segments (e.g., APP1) when reading images in multi-chunk mode (such as via php://filter). This occurs due to a bug in php_read_stream_all_chunks() that overwrites the buffer without advancing the pointer, leaving tail bytes uninitialized. This may lead to information disclosure of sensitive heap data and affect the confidentiality of the target server.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-27"/>
	<updated date="2026-04-11"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14177/">CVE-2025-14177 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14177">CVE-2025-14177 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255710">SUSE bug 1255710</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040052" comment="apache2-mod_php8-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700639" comment="apache2-mod_php8 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040053" comment="php8-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700640" comment="php8 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040054" comment="php8-bcmath-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700641" comment="php8-bcmath is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040055" comment="php8-bz2-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700642" comment="php8-bz2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040056" comment="php8-calendar-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700643" comment="php8-calendar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040057" comment="php8-cli-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700644" comment="php8-cli is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040058" comment="php8-ctype-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700645" comment="php8-ctype is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040059" comment="php8-curl-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700646" comment="php8-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040060" comment="php8-dba-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700647" comment="php8-dba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040061" comment="php8-devel-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700648" comment="php8-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040062" comment="php8-dom-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700649" comment="php8-dom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040063" comment="php8-embed-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700650" comment="php8-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040064" comment="php8-enchant-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700651" comment="php8-enchant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040065" comment="php8-exif-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700652" comment="php8-exif is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040066" comment="php8-fastcgi-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700653" comment="php8-fastcgi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040067" comment="php8-ffi-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009948059" comment="php8-ffi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040068" comment="php8-fileinfo-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700654" comment="php8-fileinfo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040069" comment="php8-fpm-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700655" comment="php8-fpm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040070" comment="php8-fpm-apache-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009948060" comment="php8-fpm-apache is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040071" comment="php8-ftp-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700656" comment="php8-ftp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040072" comment="php8-gd-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700657" comment="php8-gd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040073" comment="php8-gettext-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700658" comment="php8-gettext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040074" comment="php8-gmp-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700659" comment="php8-gmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040075" comment="php8-iconv-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700660" comment="php8-iconv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040076" comment="php8-intl-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700661" comment="php8-intl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040077" comment="php8-ldap-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700662" comment="php8-ldap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040078" comment="php8-mbstring-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700663" comment="php8-mbstring is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040079" comment="php8-mysql-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700664" comment="php8-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040080" comment="php8-odbc-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700665" comment="php8-odbc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040081" comment="php8-opcache-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700666" comment="php8-opcache is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040082" comment="php8-openssl-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700667" comment="php8-openssl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040083" comment="php8-pcntl-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700668" comment="php8-pcntl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040084" comment="php8-pdo-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700669" comment="php8-pdo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040085" comment="php8-pgsql-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700670" comment="php8-pgsql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040086" comment="php8-phar-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700671" comment="php8-phar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040087" comment="php8-posix-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700672" comment="php8-posix is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040088" comment="php8-readline-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700673" comment="php8-readline is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040089" comment="php8-shmop-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700674" comment="php8-shmop is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040090" comment="php8-snmp-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700675" comment="php8-snmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040091" comment="php8-soap-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700676" comment="php8-soap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040092" comment="php8-sockets-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700677" comment="php8-sockets is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040093" comment="php8-sodium-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700678" comment="php8-sodium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040094" comment="php8-sqlite-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700679" comment="php8-sqlite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040095" comment="php8-sysvmsg-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700680" comment="php8-sysvmsg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040096" comment="php8-sysvsem-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700681" comment="php8-sysvsem is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040097" comment="php8-sysvshm-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700682" comment="php8-sysvshm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040098" comment="php8-test-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700683" comment="php8-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040099" comment="php8-tidy-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700684" comment="php8-tidy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040100" comment="php8-tokenizer-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700685" comment="php8-tokenizer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040101" comment="php8-xmlreader-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700686" comment="php8-xmlreader is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040102" comment="php8-xmlwriter-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700687" comment="php8-xmlwriter is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040103" comment="php8-xsl-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700688" comment="php8-xsl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040104" comment="php8-zip-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700689" comment="php8-zip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040105" comment="php8-zlib-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700690" comment="php8-zlib is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202514178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-14178</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-14178" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14178" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-14178" ref_url="https://www.suse.com/security/cve/CVE-2025-14178" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1187" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002450.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1190" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002453.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1409" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003207.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1412" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002444.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1429" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003203.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2470" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002502.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2799" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003214.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4086" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0370-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023952.html" source="SUSE-SU"/>
    <description>
    In PHP versions:8.1.* before 8.1.34, 8.2.* before 8.2.30, 8.3.* before 8.3.29, 8.4.* before 8.4.16, 8.5.* before 8.5.1, a heap buffer overflow occurs in array_merge() when the total element count of packed arrays exceeds 32-bit limits or HT_MAX_SIZE, due to an integer overflow in the precomputation of element counts using zend_hash_num_elements(). This may lead to memory corruption or crashes and affect the integrity and availability of the target server.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-27"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14178/">CVE-2025-14178 at SUSE</cve>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14178">CVE-2025-14178 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255711">SUSE bug 1255711</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040052" comment="apache2-mod_php8-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700639" comment="apache2-mod_php8 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040053" comment="php8-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700640" comment="php8 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040054" comment="php8-bcmath-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700641" comment="php8-bcmath is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040055" comment="php8-bz2-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700642" comment="php8-bz2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040056" comment="php8-calendar-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700643" comment="php8-calendar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040057" comment="php8-cli-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700644" comment="php8-cli is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040058" comment="php8-ctype-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700645" comment="php8-ctype is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040059" comment="php8-curl-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700646" comment="php8-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040060" comment="php8-dba-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700647" comment="php8-dba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040061" comment="php8-devel-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700648" comment="php8-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040062" comment="php8-dom-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700649" comment="php8-dom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040063" comment="php8-embed-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700650" comment="php8-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040064" comment="php8-enchant-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700651" comment="php8-enchant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040065" comment="php8-exif-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700652" comment="php8-exif is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040066" comment="php8-fastcgi-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700653" comment="php8-fastcgi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040067" comment="php8-ffi-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009948059" comment="php8-ffi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040068" comment="php8-fileinfo-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700654" comment="php8-fileinfo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040069" comment="php8-fpm-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700655" comment="php8-fpm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040070" comment="php8-fpm-apache-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009948060" comment="php8-fpm-apache is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040071" comment="php8-ftp-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700656" comment="php8-ftp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040072" comment="php8-gd-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700657" comment="php8-gd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040073" comment="php8-gettext-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700658" comment="php8-gettext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040074" comment="php8-gmp-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700659" comment="php8-gmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040075" comment="php8-iconv-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700660" comment="php8-iconv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040076" comment="php8-intl-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700661" comment="php8-intl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040077" comment="php8-ldap-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700662" comment="php8-ldap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040078" comment="php8-mbstring-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700663" comment="php8-mbstring is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040079" comment="php8-mysql-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700664" comment="php8-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040080" comment="php8-odbc-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700665" comment="php8-odbc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040081" comment="php8-opcache-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700666" comment="php8-opcache is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040082" comment="php8-openssl-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700667" comment="php8-openssl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040083" comment="php8-pcntl-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700668" comment="php8-pcntl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040084" comment="php8-pdo-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700669" comment="php8-pdo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040085" comment="php8-pgsql-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700670" comment="php8-pgsql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040086" comment="php8-phar-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700671" comment="php8-phar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040087" comment="php8-posix-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700672" comment="php8-posix is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040088" comment="php8-readline-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700673" comment="php8-readline is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040089" comment="php8-shmop-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700674" comment="php8-shmop is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040090" comment="php8-snmp-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700675" comment="php8-snmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040091" comment="php8-soap-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700676" comment="php8-soap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040092" comment="php8-sockets-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700677" comment="php8-sockets is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040093" comment="php8-sodium-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700678" comment="php8-sodium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040094" comment="php8-sqlite-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700679" comment="php8-sqlite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040095" comment="php8-sysvmsg-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700680" comment="php8-sysvmsg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040096" comment="php8-sysvsem-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700681" comment="php8-sysvsem is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040097" comment="php8-sysvshm-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700682" comment="php8-sysvshm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040098" comment="php8-test-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700683" comment="php8-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040099" comment="php8-tidy-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700684" comment="php8-tidy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040100" comment="php8-tokenizer-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700685" comment="php8-tokenizer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040101" comment="php8-xmlreader-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700686" comment="php8-xmlreader is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040102" comment="php8-xmlwriter-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700687" comment="php8-xmlwriter is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040103" comment="php8-xsl-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700688" comment="php8-xsl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040104" comment="php8-zip-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700689" comment="php8-zip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040105" comment="php8-zlib-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700690" comment="php8-zlib is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202514180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-14180</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-14180" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14180" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-14180" ref_url="https://www.suse.com/security/cve/CVE-2025-14180" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1187" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002450.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1190" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002453.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1409" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003207.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1412" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002444.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1429" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023952.html" source="SUSE-SU"/>
    <description>
    In PHP versions 8.1.* before 8.1.34, 8.2.* before 8.2.30, 8.3.* before 8.3.29, 8.4.* before 8.4.16, 8.5.* before 8.5.1 when using the PDO PostgreSQL driver with PDO::ATTR_EMULATE_PREPARES enabled, an invalid character sequence (such as \x99) in a prepared statement parameter may cause the quoting function PQescapeStringConn to return NULL, leading to a null pointer dereference in pdo_parse_params() function. This may lead to crashes (segmentation fault) and affect the availability of the target server.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-27"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14180/">CVE-2025-14180 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14180">CVE-2025-14180 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255712">SUSE bug 1255712</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040052" comment="apache2-mod_php8-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700639" comment="apache2-mod_php8 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040053" comment="php8-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700640" comment="php8 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040054" comment="php8-bcmath-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700641" comment="php8-bcmath is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040055" comment="php8-bz2-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700642" comment="php8-bz2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040056" comment="php8-calendar-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700643" comment="php8-calendar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040057" comment="php8-cli-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700644" comment="php8-cli is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040058" comment="php8-ctype-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700645" comment="php8-ctype is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040059" comment="php8-curl-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700646" comment="php8-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040060" comment="php8-dba-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700647" comment="php8-dba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040061" comment="php8-devel-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700648" comment="php8-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040062" comment="php8-dom-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700649" comment="php8-dom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040063" comment="php8-embed-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700650" comment="php8-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040064" comment="php8-enchant-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700651" comment="php8-enchant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040065" comment="php8-exif-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700652" comment="php8-exif is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040066" comment="php8-fastcgi-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700653" comment="php8-fastcgi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040067" comment="php8-ffi-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009948059" comment="php8-ffi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040068" comment="php8-fileinfo-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700654" comment="php8-fileinfo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040069" comment="php8-fpm-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700655" comment="php8-fpm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040070" comment="php8-fpm-apache-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009948060" comment="php8-fpm-apache is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040071" comment="php8-ftp-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700656" comment="php8-ftp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040072" comment="php8-gd-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700657" comment="php8-gd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040073" comment="php8-gettext-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700658" comment="php8-gettext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040074" comment="php8-gmp-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700659" comment="php8-gmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040075" comment="php8-iconv-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700660" comment="php8-iconv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040076" comment="php8-intl-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700661" comment="php8-intl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040077" comment="php8-ldap-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700662" comment="php8-ldap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040078" comment="php8-mbstring-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700663" comment="php8-mbstring is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040079" comment="php8-mysql-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700664" comment="php8-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040080" comment="php8-odbc-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700665" comment="php8-odbc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040081" comment="php8-opcache-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700666" comment="php8-opcache is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040082" comment="php8-openssl-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700667" comment="php8-openssl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040083" comment="php8-pcntl-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700668" comment="php8-pcntl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040084" comment="php8-pdo-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700669" comment="php8-pdo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040085" comment="php8-pgsql-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700670" comment="php8-pgsql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040086" comment="php8-phar-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700671" comment="php8-phar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040087" comment="php8-posix-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700672" comment="php8-posix is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040088" comment="php8-readline-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700673" comment="php8-readline is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040089" comment="php8-shmop-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700674" comment="php8-shmop is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040090" comment="php8-snmp-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700675" comment="php8-snmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040091" comment="php8-soap-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700676" comment="php8-soap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040092" comment="php8-sockets-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700677" comment="php8-sockets is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040093" comment="php8-sodium-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700678" comment="php8-sodium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040094" comment="php8-sqlite-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700679" comment="php8-sqlite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040095" comment="php8-sysvmsg-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700680" comment="php8-sysvmsg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040096" comment="php8-sysvsem-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700681" comment="php8-sysvsem is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040097" comment="php8-sysvshm-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700682" comment="php8-sysvshm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040098" comment="php8-test-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700683" comment="php8-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040099" comment="php8-tidy-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700684" comment="php8-tidy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040100" comment="php8-tokenizer-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700685" comment="php8-tokenizer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040101" comment="php8-xmlreader-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700686" comment="php8-xmlreader is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040102" comment="php8-xmlwriter-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700687" comment="php8-xmlwriter is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040103" comment="php8-xsl-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700688" comment="php8-xsl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040104" comment="php8-zip-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700689" comment="php8-zip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040105" comment="php8-zlib-8.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700690" comment="php8-zlib is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202514321" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-14321</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-14321" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14321" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-14321" ref_url="https://www.suse.com/security/cve/CVE-2025-14321" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23034" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003137.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23128" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002289.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003154.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0003" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002352.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0013" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002343.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0026" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023773.html" source="SUSE-SU"/>
    <description>
    Use-after-free in the WebRTC: Signaling component. This vulnerability was fixed in Firefox 146, Firefox ESR 140.6, Thunderbird 146, and Thunderbird 140.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-13"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14321/">CVE-2025-14321 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14321">CVE-2025-14321 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254551">SUSE bug 1254551</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037177" comment="MozillaFirefox-140.6.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037178" comment="MozillaFirefox-branding-upstream-140.6.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037179" comment="MozillaFirefox-devel-140.6.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037180" comment="MozillaFirefox-translations-common-140.6.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037181" comment="MozillaFirefox-translations-other-140.6.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037890" comment="MozillaThunderbird-140.6.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037891" comment="MozillaThunderbird-openpgp-librnp-140.6.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025480" comment="MozillaThunderbird-openpgp-librnp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037892" comment="MozillaThunderbird-translations-common-140.6.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037893" comment="MozillaThunderbird-translations-other-140.6.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202514322" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-14322</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-14322" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14322" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-14322" ref_url="https://www.suse.com/security/cve/CVE-2025-14322" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23034" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003137.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23128" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002289.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003154.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0003" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002352.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0013" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002343.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0026" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023773.html" source="SUSE-SU"/>
    <description>
    Sandbox escape due to incorrect boundary conditions in the Graphics: CanvasWebGL component. This vulnerability was fixed in Firefox 146, Firefox ESR 115.31, Firefox ESR 140.6, Thunderbird 146, and Thunderbird 140.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-13"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14322/">CVE-2025-14322 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14322">CVE-2025-14322 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254551">SUSE bug 1254551</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037177" comment="MozillaFirefox-140.6.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037178" comment="MozillaFirefox-branding-upstream-140.6.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037179" comment="MozillaFirefox-devel-140.6.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037180" comment="MozillaFirefox-translations-common-140.6.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037181" comment="MozillaFirefox-translations-other-140.6.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037890" comment="MozillaThunderbird-140.6.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037891" comment="MozillaThunderbird-openpgp-librnp-140.6.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025480" comment="MozillaThunderbird-openpgp-librnp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037892" comment="MozillaThunderbird-translations-common-140.6.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037893" comment="MozillaThunderbird-translations-other-140.6.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202514323" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-14323</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-14323" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14323" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-14323" ref_url="https://www.suse.com/security/cve/CVE-2025-14323" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23034" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003137.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23128" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002289.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003154.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0003" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002352.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0013" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002343.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0026" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023773.html" source="SUSE-SU"/>
    <description>
    Privilege escalation in the DOM: Notifications component. This vulnerability was fixed in Firefox 146, Firefox ESR 115.31, Firefox ESR 140.6, Thunderbird 146, and Thunderbird 140.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-13"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14323/">CVE-2025-14323 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14323">CVE-2025-14323 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254551">SUSE bug 1254551</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037177" comment="MozillaFirefox-140.6.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037178" comment="MozillaFirefox-branding-upstream-140.6.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037179" comment="MozillaFirefox-devel-140.6.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037180" comment="MozillaFirefox-translations-common-140.6.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037181" comment="MozillaFirefox-translations-other-140.6.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037890" comment="MozillaThunderbird-140.6.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037891" comment="MozillaThunderbird-openpgp-librnp-140.6.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025480" comment="MozillaThunderbird-openpgp-librnp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037892" comment="MozillaThunderbird-translations-common-140.6.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037893" comment="MozillaThunderbird-translations-other-140.6.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202514324" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-14324</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-14324" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14324" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-14324" ref_url="https://www.suse.com/security/cve/CVE-2025-14324" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23034" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003137.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23128" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002289.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003154.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0003" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002352.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0013" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002343.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0026" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023773.html" source="SUSE-SU"/>
    <description>
    JIT miscompilation in the JavaScript Engine: JIT component. This vulnerability was fixed in Firefox 146, Firefox ESR 115.31, Firefox ESR 140.6, Thunderbird 146, and Thunderbird 140.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-13"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14324/">CVE-2025-14324 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14324">CVE-2025-14324 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254551">SUSE bug 1254551</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037177" comment="MozillaFirefox-140.6.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037178" comment="MozillaFirefox-branding-upstream-140.6.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037179" comment="MozillaFirefox-devel-140.6.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037180" comment="MozillaFirefox-translations-common-140.6.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037181" comment="MozillaFirefox-translations-other-140.6.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037890" comment="MozillaThunderbird-140.6.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037891" comment="MozillaThunderbird-openpgp-librnp-140.6.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025480" comment="MozillaThunderbird-openpgp-librnp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037892" comment="MozillaThunderbird-translations-common-140.6.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037893" comment="MozillaThunderbird-translations-other-140.6.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202514325" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-14325</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-14325" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14325" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-14325" ref_url="https://www.suse.com/security/cve/CVE-2025-14325" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23034" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003137.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23128" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002289.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003154.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0003" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002352.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0013" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002343.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0026" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023773.html" source="SUSE-SU"/>
    <description>
    JIT miscompilation in the JavaScript Engine: JIT component. This vulnerability was fixed in Firefox 146, Firefox ESR 140.6, Thunderbird 146, and Thunderbird 140.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-13"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14325/">CVE-2025-14325 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14325">CVE-2025-14325 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254551">SUSE bug 1254551</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037177" comment="MozillaFirefox-140.6.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037178" comment="MozillaFirefox-branding-upstream-140.6.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037179" comment="MozillaFirefox-devel-140.6.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037180" comment="MozillaFirefox-translations-common-140.6.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037181" comment="MozillaFirefox-translations-other-140.6.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037890" comment="MozillaThunderbird-140.6.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037891" comment="MozillaThunderbird-openpgp-librnp-140.6.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025480" comment="MozillaThunderbird-openpgp-librnp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037892" comment="MozillaThunderbird-translations-common-140.6.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037893" comment="MozillaThunderbird-translations-other-140.6.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202514327" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-14327</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-14327" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14327" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-14327" ref_url="https://www.suse.com/security/cve/CVE-2025-14327" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0667" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002387.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0694" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003177.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0924" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003210.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1320" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002448.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2043" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002477.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2220" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023813.html" source="SUSE-SU"/>
    <description>
    Spoofing issue in the Downloads Panel component. This vulnerability was fixed in Firefox 146, Thunderbird 146, Firefox ESR 140.7, and Thunderbird 140.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-18"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14327/">CVE-2025-14327 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14327">CVE-2025-14327 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254551">SUSE bug 1254551</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037856" comment="MozillaFirefox-140.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037857" comment="MozillaFirefox-branding-upstream-140.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037858" comment="MozillaFirefox-devel-140.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037859" comment="MozillaFirefox-translations-common-140.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037860" comment="MozillaFirefox-translations-other-140.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050210" comment="MozillaThunderbird-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050211" comment="MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025480" comment="MozillaThunderbird-openpgp-librnp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050212" comment="MozillaThunderbird-translations-common-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050213" comment="MozillaThunderbird-translations-other-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202514328" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-14328</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-14328" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14328" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-14328" ref_url="https://www.suse.com/security/cve/CVE-2025-14328" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23034" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003137.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23128" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002289.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003154.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0003" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002352.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0013" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002343.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0026" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023773.html" source="SUSE-SU"/>
    <description>
    Privilege escalation in the Netmonitor component. This vulnerability was fixed in Firefox 146, Firefox ESR 140.6, Thunderbird 146, and Thunderbird 140.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-13"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14328/">CVE-2025-14328 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14328">CVE-2025-14328 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254551">SUSE bug 1254551</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037177" comment="MozillaFirefox-140.6.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037178" comment="MozillaFirefox-branding-upstream-140.6.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037179" comment="MozillaFirefox-devel-140.6.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037180" comment="MozillaFirefox-translations-common-140.6.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037181" comment="MozillaFirefox-translations-other-140.6.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037890" comment="MozillaThunderbird-140.6.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037891" comment="MozillaThunderbird-openpgp-librnp-140.6.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025480" comment="MozillaThunderbird-openpgp-librnp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037892" comment="MozillaThunderbird-translations-common-140.6.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037893" comment="MozillaThunderbird-translations-other-140.6.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202514329" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-14329</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-14329" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14329" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-14329" ref_url="https://www.suse.com/security/cve/CVE-2025-14329" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23034" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003137.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23128" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002289.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003154.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0003" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002352.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0013" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002343.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0026" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023773.html" source="SUSE-SU"/>
    <description>
    Privilege escalation in the Netmonitor component. This vulnerability was fixed in Firefox 146, Firefox ESR 140.6, Thunderbird 146, and Thunderbird 140.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-13"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14329/">CVE-2025-14329 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14329">CVE-2025-14329 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254551">SUSE bug 1254551</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037177" comment="MozillaFirefox-140.6.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037178" comment="MozillaFirefox-branding-upstream-140.6.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037179" comment="MozillaFirefox-devel-140.6.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037180" comment="MozillaFirefox-translations-common-140.6.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037181" comment="MozillaFirefox-translations-other-140.6.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037890" comment="MozillaThunderbird-140.6.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037891" comment="MozillaThunderbird-openpgp-librnp-140.6.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025480" comment="MozillaThunderbird-openpgp-librnp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037892" comment="MozillaThunderbird-translations-common-140.6.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037893" comment="MozillaThunderbird-translations-other-140.6.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202514330" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-14330</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-14330" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14330" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-14330" ref_url="https://www.suse.com/security/cve/CVE-2025-14330" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23034" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003137.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23128" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002289.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003154.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0003" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002352.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0013" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002343.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0026" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023773.html" source="SUSE-SU"/>
    <description>
    JIT miscompilation in the JavaScript Engine: JIT component. This vulnerability was fixed in Firefox 146, Firefox ESR 140.6, Thunderbird 146, and Thunderbird 140.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-13"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14330/">CVE-2025-14330 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14330">CVE-2025-14330 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254551">SUSE bug 1254551</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037177" comment="MozillaFirefox-140.6.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037178" comment="MozillaFirefox-branding-upstream-140.6.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037179" comment="MozillaFirefox-devel-140.6.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037180" comment="MozillaFirefox-translations-common-140.6.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037181" comment="MozillaFirefox-translations-other-140.6.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037890" comment="MozillaThunderbird-140.6.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037891" comment="MozillaThunderbird-openpgp-librnp-140.6.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025480" comment="MozillaThunderbird-openpgp-librnp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037892" comment="MozillaThunderbird-translations-common-140.6.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037893" comment="MozillaThunderbird-translations-other-140.6.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202514331" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-14331</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-14331" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14331" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-14331" ref_url="https://www.suse.com/security/cve/CVE-2025-14331" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23034" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003137.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23128" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002289.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003154.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0003" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002352.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0013" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002343.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0026" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023773.html" source="SUSE-SU"/>
    <description>
    Same-origin policy bypass in the Request Handling component. This vulnerability was fixed in Firefox 146, Firefox ESR 115.31, Firefox ESR 140.6, Thunderbird 146, and Thunderbird 140.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-13"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14331/">CVE-2025-14331 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14331">CVE-2025-14331 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254551">SUSE bug 1254551</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037177" comment="MozillaFirefox-140.6.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037178" comment="MozillaFirefox-branding-upstream-140.6.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037179" comment="MozillaFirefox-devel-140.6.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037180" comment="MozillaFirefox-translations-common-140.6.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037181" comment="MozillaFirefox-translations-other-140.6.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037890" comment="MozillaThunderbird-140.6.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037891" comment="MozillaThunderbird-openpgp-librnp-140.6.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025480" comment="MozillaThunderbird-openpgp-librnp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037892" comment="MozillaThunderbird-translations-common-140.6.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037893" comment="MozillaThunderbird-translations-other-140.6.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202514333" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-14333</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-14333" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14333" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-14333" ref_url="https://www.suse.com/security/cve/CVE-2025-14333" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23034" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003137.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23128" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002289.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23856" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003154.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0003" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002352.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0013" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002343.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0026" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023540.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023773.html" source="SUSE-SU"/>
    <description>
    Memory safety bugs present in Firefox ESR 140.5, Thunderbird ESR 140.5, Firefox 145 and Thunderbird 145. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability was fixed in Firefox 146, Firefox ESR 140.6, Thunderbird 146, and Thunderbird 140.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-13"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14333/">CVE-2025-14333 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14333">CVE-2025-14333 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254551">SUSE bug 1254551</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037177" comment="MozillaFirefox-140.6.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037178" comment="MozillaFirefox-branding-upstream-140.6.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037179" comment="MozillaFirefox-devel-140.6.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037180" comment="MozillaFirefox-translations-common-140.6.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037181" comment="MozillaFirefox-translations-other-140.6.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037890" comment="MozillaThunderbird-140.6.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037891" comment="MozillaThunderbird-openpgp-librnp-140.6.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025480" comment="MozillaThunderbird-openpgp-librnp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037892" comment="MozillaThunderbird-translations-common-140.6.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037893" comment="MozillaThunderbird-translations-other-140.6.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202514372" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-14372</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-14372" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14372" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-14372" ref_url="https://www.suse.com/security/cve/CVE-2025-14372" source="SUSE CVE"/>
    <description>
    Use after free in Password Manager in Google Chrome prior to 143.0.7499.110 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Medium)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-15"/>
	<updated date="2025-12-18"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-14372/">CVE-2025-14372 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14372">CVE-2025-14372 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254776">SUSE bug 1254776</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032563" comment="chromedriver-143.0.7499.40-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032564" comment="chromium-143.0.7499.40-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202514373" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-14373</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-14373" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14373" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-14373" ref_url="https://www.suse.com/security/cve/CVE-2025-14373" source="SUSE CVE"/>
    <description>
    Inappropriate implementation in Toolbar in Google Chrome on Android prior to 143.0.7499.110 allowed a remote attacker to perform domain spoofing via a crafted HTML page. (Chromium security severity: Medium)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-15"/>
	<updated date="2025-12-18"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-14373/">CVE-2025-14373 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14373">CVE-2025-14373 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254776">SUSE bug 1254776</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032563" comment="chromedriver-143.0.7499.40-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032564" comment="chromium-143.0.7499.40-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202514422" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-14422</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-14422" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14422" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-14422" ref_url="https://www.suse.com/security/cve/CVE-2025-14422" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0914" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003159.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1511" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002466.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1574" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023932.html" source="SUSE-SU"/>
    <description>
    GIMP PNM File Parsing Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within the parsing of PNM files. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28273.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-25"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14422/">CVE-2025-14422 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14422">CVE-2025-14422 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255293">SUSE bug 1255293</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041943" comment="gimp-3.0.8-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151540" comment="gimp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041944" comment="gimp-devel-3.0.8-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153688" comment="gimp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041945" comment="gimp-extension-goat-excercises-3.0.8-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037906" comment="gimp-extension-goat-excercises is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041946" comment="gimp-lang-3.0.8-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151542" comment="gimp-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041947" comment="gimp-plugin-aa-3.0.8-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151543" comment="gimp-plugin-aa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041948" comment="gimp-plugin-python3-3.0.8-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037907" comment="gimp-plugin-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041949" comment="gimp-vala-3.0.8-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037908" comment="gimp-vala is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041950" comment="libgimp-3_0-0-3.0.8-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037909" comment="libgimp-3_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041951" comment="libgimpui-3_0-0-3.0.8-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037910" comment="libgimpui-3_0-0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202514423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-14423</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-14423" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14423" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-14423" ref_url="https://www.suse.com/security/cve/CVE-2025-14423" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0914" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003159.html" source="SUSE-SU"/>
    <description>
    GIMP LBM File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within the parsing of LBM files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28311.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-25"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14423/">CVE-2025-14423 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14423">CVE-2025-14423 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255294">SUSE bug 1255294</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041943" comment="gimp-3.0.8-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151540" comment="gimp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041944" comment="gimp-devel-3.0.8-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153688" comment="gimp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041945" comment="gimp-extension-goat-excercises-3.0.8-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037906" comment="gimp-extension-goat-excercises is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041946" comment="gimp-lang-3.0.8-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151542" comment="gimp-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041947" comment="gimp-plugin-aa-3.0.8-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151543" comment="gimp-plugin-aa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041948" comment="gimp-plugin-python3-3.0.8-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037907" comment="gimp-plugin-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041949" comment="gimp-vala-3.0.8-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037908" comment="gimp-vala is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041950" comment="libgimp-3_0-0-3.0.8-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037909" comment="libgimp-3_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041951" comment="libgimpui-3_0-0-3.0.8-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037910" comment="libgimpui-3_0-0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202514424" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-14424</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-14424" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14424" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-14424" ref_url="https://www.suse.com/security/cve/CVE-2025-14424" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0914" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003159.html" source="SUSE-SU"/>
    <description>
    GIMP XCF File Parsing Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within the parsing of XCF files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28376.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-25"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14424/">CVE-2025-14424 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14424">CVE-2025-14424 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255295">SUSE bug 1255295</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041943" comment="gimp-3.0.8-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151540" comment="gimp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041944" comment="gimp-devel-3.0.8-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153688" comment="gimp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041945" comment="gimp-extension-goat-excercises-3.0.8-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037906" comment="gimp-extension-goat-excercises is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041946" comment="gimp-lang-3.0.8-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151542" comment="gimp-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041947" comment="gimp-plugin-aa-3.0.8-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151543" comment="gimp-plugin-aa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041948" comment="gimp-plugin-python3-3.0.8-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037907" comment="gimp-plugin-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041949" comment="gimp-vala-3.0.8-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037908" comment="gimp-vala is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041950" comment="libgimp-3_0-0-3.0.8-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037909" comment="libgimp-3_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041951" comment="libgimpui-3_0-0-3.0.8-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037910" comment="libgimpui-3_0-0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202514425" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-14425</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-14425" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14425" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-14425" ref_url="https://www.suse.com/security/cve/CVE-2025-14425" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0914" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003159.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1511" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023932.html" source="SUSE-SU"/>
    <description>
    GIMP JP2 File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within the parsing of JP2 files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28248.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-25"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14425/">CVE-2025-14425 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14425">CVE-2025-14425 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255296">SUSE bug 1255296</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041943" comment="gimp-3.0.8-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151540" comment="gimp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041944" comment="gimp-devel-3.0.8-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153688" comment="gimp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041945" comment="gimp-extension-goat-excercises-3.0.8-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037906" comment="gimp-extension-goat-excercises is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041946" comment="gimp-lang-3.0.8-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151542" comment="gimp-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041947" comment="gimp-plugin-aa-3.0.8-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151543" comment="gimp-plugin-aa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041948" comment="gimp-plugin-python3-3.0.8-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037907" comment="gimp-plugin-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041949" comment="gimp-vala-3.0.8-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037908" comment="gimp-vala is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041950" comment="libgimp-3_0-0-3.0.8-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037909" comment="libgimp-3_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041951" comment="libgimpui-3_0-0-3.0.8-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037910" comment="libgimpui-3_0-0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202514512" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-14512</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-14512" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14512" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-14512" ref_url="https://www.suse.com/security/cve/CVE-2025-14512" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4442-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024480.html" source="SUSE-SU"/>
    <description>
    A flaw was found in glib. This vulnerability allows a heap buffer overflow and denial-of-service (DoS) via an integer overflow in GLib's GIO (GLib Input/Output) escape_byte_string() function when processing malicious file or remote filesystem attribute values.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-13"/>
	<updated date="2026-02-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14512/">CVE-2025-14512 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14512">CVE-2025-14512 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254878">SUSE bug 1254878</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037192" comment="gio-branding-upstream-2.84.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009241263" comment="gio-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037193" comment="glib2-devel-2.84.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151142" comment="glib2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037194" comment="glib2-devel-static-2.84.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009241266" comment="glib2-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037195" comment="glib2-doc-2.84.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009862594" comment="glib2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037196" comment="glib2-lang-2.84.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151143" comment="glib2-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037197" comment="glib2-tests-devel-2.84.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009755645" comment="glib2-tests-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037198" comment="glib2-tools-2.84.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151144" comment="glib2-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037199" comment="libgio-2_0-0-2.84.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151145" comment="libgio-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037200" comment="libgirepository-2_0-0-2.84.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037220" comment="libgirepository-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037201" comment="libglib-2_0-0-2.84.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151147" comment="libglib-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037202" comment="libgmodule-2_0-0-2.84.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151149" comment="libgmodule-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037203" comment="libgobject-2_0-0-2.84.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151151" comment="libgobject-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037204" comment="libgthread-2_0-0-2.84.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151153" comment="libgthread-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037205" comment="typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037221" comment="typelib-1_0-GIRepository-3_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037206" comment="typelib-1_0-GLib-2_0-2.84.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037222" comment="typelib-1_0-GLib-2_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037207" comment="typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037223" comment="typelib-1_0-GLibUnix-2_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037208" comment="typelib-1_0-GModule-2_0-2.84.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037224" comment="typelib-1_0-GModule-2_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037209" comment="typelib-1_0-GObject-2_0-2.84.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037225" comment="typelib-1_0-GObject-2_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037210" comment="typelib-1_0-Gio-2_0-2.84.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037226" comment="typelib-1_0-Gio-2_0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202514523" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-14523</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-14523" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14523" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-14523" ref_url="https://www.suse.com/security/cve/CVE-2025-14523" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0422" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003170.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0907" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002419.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1509" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20053-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025111.html" source="SUSE-SU"/>
    <description>
    A flaw in libsoup's HTTP header handling allows multiple Host: headers in a request and returns the last occurrence for server-side processing. Common front proxies often honor the first Host: header, so this mismatch can cause vhost confusion where a proxy routes a request to one backend but the backend interprets it as destined for another host. This discrepancy enables request-smuggling style attacks, cache poisoning, or bypassing host-based access controls when an attacker supplies duplicate Host headers.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-14"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" cvss4="8.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14523/">CVE-2025-14523 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14523">CVE-2025-14523 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254876">SUSE bug 1254876</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048654" comment="libsoup-2_4-1-2.74.3-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151596" comment="libsoup-2_4-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050015" comment="libsoup-3_0-0-3.6.6-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698059" comment="libsoup-3_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050176" comment="libsoup-devel-3.6.6-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151597" comment="libsoup-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050177" comment="libsoup-lang-3.6.6-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151598" comment="libsoup-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048655" comment="libsoup2-devel-2.74.3-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009957647" comment="libsoup2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048656" comment="libsoup2-lang-2.74.3-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698060" comment="libsoup2-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048657" comment="typelib-1_0-Soup-2_4-2.74.3-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151599" comment="typelib-1_0-Soup-2_4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050178" comment="typelib-1_0-Soup-3_0-3.6.6-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698061" comment="typelib-1_0-Soup-3_0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202514524" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-14524</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-14524" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14524" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-14524" ref_url="https://www.suse.com/security/cve/CVE-2025-14524" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023878.html" source="SUSE-SU"/>
    <description>
    When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer
performs a cross-protocol redirect to a second URL that uses an IMAP, LDAP,
POP3 or SMTP scheme, curl might wrongly pass on the bearer token to the new
target host.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-16"/>
	<updated date="2026-02-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" cvss4="5.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14524/">CVE-2025-14524 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14524">CVE-2025-14524 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255731">SUSE bug 1255731</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037720" comment="curl-8.14.1-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037721" comment="curl-fish-completion-8.14.1-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010031781" comment="curl-fish-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037722" comment="curl-zsh-completion-8.14.1-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010031782" comment="curl-zsh-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037723" comment="libcurl-devel-8.14.1-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151178" comment="libcurl-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037724" comment="libcurl-devel-doc-8.14.1-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010031783" comment="libcurl-devel-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037725" comment="libcurl4-8.14.1-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202514550" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-14550</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-14550" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14550" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-14550" ref_url="https://www.suse.com/security/cve/CVE-2025-14550" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024108.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4.2.28.
`ASGIRequest` allows a remote attacker to cause a potential denial-of-service via a crafted request with multiple duplicate headers.
Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected.
Django would like to thank Jiyong Yang for reporting this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-08"/>
	<updated date="2026-02-12"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-14550/">CVE-2025-14550 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14550">CVE-2025-14550 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257403">SUSE bug 1257403</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042368" comment="python313-Django-5.2.4-bp160.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025481" comment="python313-Django is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202514765" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-14765</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-14765" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14765" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-14765" ref_url="https://www.suse.com/security/cve/CVE-2025-14765" source="SUSE CVE"/>
    <description>
    Use after free in WebGPU in Google Chrome prior to 143.0.7499.147 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-01-03"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-14765/">CVE-2025-14765 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14765">CVE-2025-14765 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255115">SUSE bug 1255115</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035671" comment="chromedriver-143.0.7499.146-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035672" comment="chromium-143.0.7499.146-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202514766" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-14766</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-14766" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14766" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-14766" ref_url="https://www.suse.com/security/cve/CVE-2025-14766" source="SUSE CVE"/>
    <description>
    Out of bounds read and write in V8 in Google Chrome prior to 143.0.7499.147 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-01-03"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-14766/">CVE-2025-14766 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-14766">CVE-2025-14766 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255115">SUSE bug 1255115</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035671" comment="chromedriver-143.0.7499.146-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035672" comment="chromium-143.0.7499.146-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202514819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-14819</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-14819" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14819" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-14819" ref_url="https://www.suse.com/security/cve/CVE-2025-14819" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023878.html" source="SUSE-SU"/>
    <description>
    When doing TLS related transfers with reused easy or multi handles and
altering the  `CURLSSLOPT_NO_PARTIALCHAIN` option, libcurl could accidentally
reuse a CA store cached in memory for which the partial chain option was
reversed. Contrary to the user's wishes and expectations. This could make
libcurl find and accept a trust chain that it otherwise would not.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-16"/>
	<updated date="2026-02-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" cvss4="6/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14819/">CVE-2025-14819 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14819">CVE-2025-14819 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255732">SUSE bug 1255732</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037720" comment="curl-8.14.1-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037721" comment="curl-fish-completion-8.14.1-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010031781" comment="curl-fish-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037722" comment="curl-zsh-completion-8.14.1-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010031782" comment="curl-zsh-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037723" comment="libcurl-devel-8.14.1-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151178" comment="libcurl-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037724" comment="libcurl-devel-doc-8.14.1-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010031783" comment="libcurl-devel-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037725" comment="libcurl4-8.14.1-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202514831" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-14831</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-14831" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14831" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-14831" ref_url="https://www.suse.com/security/cve/CVE-2025-14831" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:4188" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003274.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5585" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002624.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6630" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024672.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20654-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20708-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024718.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20962-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20968-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20984-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045347.html" source="SUSE-SU"/>
    <description>
    A flaw was found in GnuTLS. This vulnerability allows a denial of service (DoS) by excessive CPU (Central Processing Unit) and memory consumption via specially crafted malicious certificates containing a large number of name constraints and subject alternative names (SANs).
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-03"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14831/">CVE-2025-14831 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14831">CVE-2025-14831 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257960">SUSE bug 1257960</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052615" comment="gnutls-3.8.10-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151156" comment="gnutls is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052616" comment="libgnutls-devel-3.8.10-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151157" comment="libgnutls-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052617" comment="libgnutls-devel-doc-3.8.10-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010052705" comment="libgnutls-devel-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052618" comment="libgnutls30-3.8.10-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177128" comment="libgnutls30 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052619" comment="libgnutlsxx-devel-3.8.10-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153805" comment="libgnutlsxx-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052620" comment="libgnutlsxx30-3.8.10-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009967067" comment="libgnutlsxx30 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202514876" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-14876</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-14876" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14876" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-14876" ref_url="https://www.suse.com/security/cve/CVE-2025-14876" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20666-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024769.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the virtio-crypto device of QEMU. A malicious guest operating system can exploit a missing length limit in the AKCIPHER path, leading to uncontrolled memory allocation. This can result in a denial of service (DoS) on the host system by causing the QEMU process to terminate unexpectedly.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-14"/>
	<updated date="2026-03-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14876/">CVE-2025-14876 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14876">CVE-2025-14876 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255400">SUSE bug 1255400</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048658" comment="qemu-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048659" comment="qemu-SLOF-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009676699" comment="qemu-SLOF is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048660" comment="qemu-accel-qtest-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700691" comment="qemu-accel-qtest is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048661" comment="qemu-arm-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048662" comment="qemu-audio-alsa-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266837" comment="qemu-audio-alsa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048663" comment="qemu-audio-dbus-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009775936" comment="qemu-audio-dbus is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048664" comment="qemu-audio-jack-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700692" comment="qemu-audio-jack is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048665" comment="qemu-audio-oss-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266838" comment="qemu-audio-oss is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048666" comment="qemu-audio-pa-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266839" comment="qemu-audio-pa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048667" comment="qemu-audio-pipewire-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009881182" comment="qemu-audio-pipewire is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048668" comment="qemu-audio-spice-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623393" comment="qemu-audio-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048669" comment="qemu-block-curl-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048670" comment="qemu-block-dmg-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154081" comment="qemu-block-dmg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048671" comment="qemu-block-iscsi-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154082" comment="qemu-block-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048672" comment="qemu-block-nfs-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266841" comment="qemu-block-nfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048673" comment="qemu-block-rbd-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048674" comment="qemu-block-ssh-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154083" comment="qemu-block-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048675" comment="qemu-chardev-baum-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623394" comment="qemu-chardev-baum is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048676" comment="qemu-chardev-spice-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623395" comment="qemu-chardev-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048677" comment="qemu-doc-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009881183" comment="qemu-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048678" comment="qemu-extra-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048679" comment="qemu-guest-agent-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048680" comment="qemu-headless-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009881184" comment="qemu-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048681" comment="qemu-hw-display-qxl-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623396" comment="qemu-hw-display-qxl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048682" comment="qemu-hw-display-virtio-gpu-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623397" comment="qemu-hw-display-virtio-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048683" comment="qemu-hw-display-virtio-gpu-pci-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623398" comment="qemu-hw-display-virtio-gpu-pci is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048684" comment="qemu-hw-display-virtio-vga-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623399" comment="qemu-hw-display-virtio-vga is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048685" comment="qemu-hw-s390x-virtio-gpu-ccw-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623400" comment="qemu-hw-s390x-virtio-gpu-ccw is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048686" comment="qemu-hw-usb-host-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698021" comment="qemu-hw-usb-host is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048687" comment="qemu-hw-usb-redirect-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623401" comment="qemu-hw-usb-redirect is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048688" comment="qemu-hw-usb-smartcard-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623402" comment="qemu-hw-usb-smartcard is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048689" comment="qemu-img-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009881185" comment="qemu-img is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048690" comment="qemu-ipxe-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048691" comment="qemu-ivshmem-tools-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623403" comment="qemu-ivshmem-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048692" comment="qemu-ksm-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161270" comment="qemu-ksm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048693" comment="qemu-lang-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048694" comment="qemu-linux-user-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048695" comment="qemu-microvm-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291440" comment="qemu-microvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048696" comment="qemu-ppc-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048697" comment="qemu-pr-helper-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009881186" comment="qemu-pr-helper is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048698" comment="qemu-s390x-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623404" comment="qemu-s390x is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048699" comment="qemu-seabios-10.0.81.16.3_3_g3d33c746-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048700" comment="qemu-skiboot-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623405" comment="qemu-skiboot is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048701" comment="qemu-spice-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009881187" comment="qemu-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048702" comment="qemu-tools-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048703" comment="qemu-ui-curses-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266842" comment="qemu-ui-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048704" comment="qemu-ui-dbus-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009775937" comment="qemu-ui-dbus is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048705" comment="qemu-ui-gtk-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266843" comment="qemu-ui-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048706" comment="qemu-ui-opengl-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623406" comment="qemu-ui-opengl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048707" comment="qemu-ui-spice-app-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291441" comment="qemu-ui-spice-app is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048708" comment="qemu-ui-spice-core-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623407" comment="qemu-ui-spice-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048709" comment="qemu-vgabios-10.0.81.16.3_3_g3d33c746-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048710" comment="qemu-vhost-user-gpu-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291442" comment="qemu-vhost-user-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048711" comment="qemu-vmsr-helper-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010035142" comment="qemu-vmsr-helper is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048712" comment="qemu-x86-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202514905" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-14905</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-14905" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-14905" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-14905" ref_url="https://www.suse.com/security/cve/CVE-2025-14905" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3189" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003220.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4207" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002593.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5513" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002607.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20927-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045225.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the 389-ds-base server. A heap buffer overflow vulnerability exists in the `schema_attr_enum_callback` function within the `schema.c` file. This occurs because the code incorrectly calculates the buffer size by summing alias string lengths without accounting for additional formatting characters. When a large number of aliases are processed, this oversight can lead to a heap overflow, potentially allowing a remote attacker to cause a Denial of Service (DoS) or achieve Remote Code Execution (RCE).
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.2/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-14905/">CVE-2025-14905 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-14905">CVE-2025-14905 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258727">SUSE bug 1258727</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051798" comment="389-ds-3.0.6~git249.6688af9b2-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168666" comment="389-ds is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051799" comment="389-ds-devel-3.0.6~git249.6688af9b2-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168668" comment="389-ds-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051800" comment="389-ds-snmp-3.0.6~git249.6688af9b2-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009253606" comment="389-ds-snmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051801" comment="lib389-3.0.6~git249.6688af9b2-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009347740" comment="lib389 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051802" comment="libsvrcore0-3.0.6~git249.6688af9b2-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009347741" comment="libsvrcore0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202515059" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-15059</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-15059" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15059" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-15059" ref_url="https://www.suse.com/security/cve/CVE-2025-15059" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2707" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003251.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2930" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023718.html" source="SUSE-SU"/>
    <description>
    GIMP PSP File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within the parsing of PSP files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28232.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-04"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-15059/">CVE-2025-15059 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15059">CVE-2025-15059 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255766">SUSE bug 1255766</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041943" comment="gimp-3.0.8-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151540" comment="gimp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041944" comment="gimp-devel-3.0.8-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153688" comment="gimp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041945" comment="gimp-extension-goat-excercises-3.0.8-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037906" comment="gimp-extension-goat-excercises is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041946" comment="gimp-lang-3.0.8-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151542" comment="gimp-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041947" comment="gimp-plugin-aa-3.0.8-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151543" comment="gimp-plugin-aa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041948" comment="gimp-plugin-python3-3.0.8-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037907" comment="gimp-plugin-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041949" comment="gimp-vala-3.0.8-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037908" comment="gimp-vala is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041950" comment="libgimp-3_0-0-3.0.8-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037909" comment="libgimp-3_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041951" comment="libgimpui-3_0-0-3.0.8-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037910" comment="libgimpui-3_0-0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202515079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-15079</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-15079" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15079" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-15079" ref_url="https://www.suse.com/security/cve/CVE-2025-15079" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0066-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023878.html" source="SUSE-SU"/>
    <description>
    When doing SSH-based transfers using either SCP or SFTP, and setting the
known_hosts file, libcurl could still mistakenly accept connecting to hosts
*not present* in the specified file if they were added as recognized in the
libssh *global* known_hosts file.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-16"/>
	<updated date="2026-02-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" cvss4="6/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-15079/">CVE-2025-15079 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15079">CVE-2025-15079 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255733">SUSE bug 1255733</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037720" comment="curl-8.14.1-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037721" comment="curl-fish-completion-8.14.1-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010031781" comment="curl-fish-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037722" comment="curl-zsh-completion-8.14.1-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010031782" comment="curl-zsh-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037723" comment="libcurl-devel-8.14.1-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151178" comment="libcurl-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037724" comment="libcurl-devel-doc-8.14.1-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010031783" comment="libcurl-devel-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037725" comment="libcurl4-8.14.1-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202515224" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-15224</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-15224" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15224" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-15224" ref_url="https://www.suse.com/security/cve/CVE-2025-15224" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0052-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023878.html" source="SUSE-SU"/>
    <description>
    When doing SSH-based transfers using either SCP or SFTP, and asked to do
public key authentication, curl would wrongly still ask and authenticate using
a locally running SSH agent.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-16"/>
	<updated date="2026-02-14"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" cvss4="2.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-15224/">CVE-2025-15224 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15224">CVE-2025-15224 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255734">SUSE bug 1255734</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037720" comment="curl-8.14.1-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037721" comment="curl-fish-completion-8.14.1-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010031781" comment="curl-fish-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037722" comment="curl-zsh-completion-8.14.1-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010031782" comment="curl-zsh-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037723" comment="libcurl-devel-8.14.1-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151178" comment="libcurl-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037724" comment="libcurl-devel-doc-8.14.1-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010031783" comment="libcurl-devel-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037725" comment="libcurl4-8.14.1-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202515269" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-15269</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-15269" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15269" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-15269" ref_url="https://www.suse.com/security/cve/CVE-2025-15269" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2039" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003204.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2213" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024340.html" source="SUSE-SU"/>
    <description>
    FontForge SFD File Parsing Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of FontForge. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within the parsing of SFD files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-28564.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-18"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-15269/">CVE-2025-15269 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15269">CVE-2025-15269 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256032">SUSE bug 1256032</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044190" comment="fontforge-20251009-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276598" comment="fontforge is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044191" comment="fontforge-devel-20251009-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276599" comment="fontforge-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044192" comment="fontforge-doc-20251009-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276600" comment="fontforge-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202515275" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-15275</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-15275" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15275" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-15275" ref_url="https://www.suse.com/security/cve/CVE-2025-15275" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2039" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003204.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2213" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024340.html" source="SUSE-SU"/>
    <description>
    FontForge SFD File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of FontForge. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within the parsing of SFD files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-28543.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-18"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-15275/">CVE-2025-15275 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15275">CVE-2025-15275 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256025">SUSE bug 1256025</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044190" comment="fontforge-20251009-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276598" comment="fontforge is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044191" comment="fontforge-devel-20251009-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276599" comment="fontforge-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044192" comment="fontforge-doc-20251009-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276600" comment="fontforge-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202515279" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-15279</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-15279" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15279" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-15279" ref_url="https://www.suse.com/security/cve/CVE-2025-15279" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2039" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003204.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2213" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024340.html" source="SUSE-SU"/>
    <description>
    FontForge GUtils BMP File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of FontForge. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within the parsing of pixels within BMP files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-27517.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-18"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-15279/">CVE-2025-15279 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15279">CVE-2025-15279 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256013">SUSE bug 1256013</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044190" comment="fontforge-20251009-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276598" comment="fontforge is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044191" comment="fontforge-devel-20251009-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276599" comment="fontforge-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044192" comment="fontforge-doc-20251009-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276600" comment="fontforge-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202515281" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-15281</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-15281" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15281" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-15281" ref_url="https://www.suse.com/security/cve/CVE-2025-15281" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2786" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003249.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4772" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0680-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024576.html" source="SUSE-SU"/>
    <description>
    Calling wordexp with WRDE_REUSE in conjunction with WRDE_APPEND in the GNU C Library version 2.0 to version 2.42 may cause the interface to return uninitialized memory in the we_wordv member, which on subsequent calls to wordfree may abort the process.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-15281/">CVE-2025-15281 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15281">CVE-2025-15281 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257005">SUSE bug 1257005</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041421" comment="cross-aarch64-glibc-devel-2.40-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041605" comment="cross-aarch64-glibc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041422" comment="cross-ppc64le-glibc-devel-2.40-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041606" comment="cross-ppc64le-glibc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041423" comment="cross-riscv64-glibc-devel-2.40-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041607" comment="cross-riscv64-glibc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041424" comment="cross-s390x-glibc-devel-2.40-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041608" comment="cross-s390x-glibc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041425" comment="glibc-2.40-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151368" comment="glibc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041426" comment="glibc-devel-2.40-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151370" comment="glibc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041427" comment="glibc-devel-static-2.40-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152567" comment="glibc-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041428" comment="glibc-extra-2.40-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151371" comment="glibc-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041429" comment="glibc-gconv-modules-extra-2.40-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041609" comment="glibc-gconv-modules-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041430" comment="glibc-html-2.40-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152569" comment="glibc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041431" comment="glibc-i18ndata-2.40-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152570" comment="glibc-i18ndata is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041432" comment="glibc-info-2.40-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151372" comment="glibc-info is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041433" comment="glibc-lang-2.40-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009651309" comment="glibc-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041434" comment="glibc-locale-2.40-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151373" comment="glibc-locale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041435" comment="glibc-locale-base-2.40-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251612" comment="glibc-locale-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041436" comment="glibc-profile-2.40-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152572" comment="glibc-profile is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041437" comment="glibc-utils-2.40-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152575" comment="glibc-utils is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202515282" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-15282</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-15282" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15282" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-15282" ref_url="https://www.suse.com/security/cve/CVE-2025-15282" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024893.html" source="SUSE-SU"/>
    <description>
    User-controlled data URLs parsed by urllib.request.DataHandler allow injecting headers through newlines in the data URL mediatype.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-22"/>
	<updated date="2026-03-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" cvss4="5.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-15282/">CVE-2025-15282 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15282">CVE-2025-15282 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257046">SUSE bug 1257046</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044584" comment="libpython3_13-1_0-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039739" comment="libpython3_13-1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044585" comment="libpython3_13-1_0-x86-64-v3-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039740" comment="libpython3_13-1_0-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044586" comment="libpython3_13t1_0-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039741" comment="libpython3_13t1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044587" comment="python313-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039742" comment="python313 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044588" comment="python313-base-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039743" comment="python313-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044589" comment="python313-base-x86-64-v3-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039744" comment="python313-base-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044590" comment="python313-curses-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039745" comment="python313-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044591" comment="python313-dbm-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039746" comment="python313-dbm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044592" comment="python313-devel-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039747" comment="python313-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044593" comment="python313-doc-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039748" comment="python313-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044594" comment="python313-doc-devhelp-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039749" comment="python313-doc-devhelp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044595" comment="python313-idle-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039750" comment="python313-idle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044596" comment="python313-nogil-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039751" comment="python313-nogil is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044597" comment="python313-nogil-base-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039752" comment="python313-nogil-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044598" comment="python313-nogil-curses-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039753" comment="python313-nogil-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044599" comment="python313-nogil-dbm-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039754" comment="python313-nogil-dbm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044600" comment="python313-nogil-devel-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039755" comment="python313-nogil-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044601" comment="python313-nogil-idle-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039756" comment="python313-nogil-idle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044602" comment="python313-nogil-testsuite-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039757" comment="python313-nogil-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044603" comment="python313-nogil-tk-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039758" comment="python313-nogil-tk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044604" comment="python313-nogil-tools-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039759" comment="python313-nogil-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044605" comment="python313-testsuite-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039760" comment="python313-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044606" comment="python313-tk-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039761" comment="python313-tk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044607" comment="python313-tools-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039762" comment="python313-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044608" comment="python313-x86-64-v3-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039763" comment="python313-x86-64-v3 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202515444" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-15444</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-15444" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15444" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-15444" ref_url="https://www.suse.com/security/cve/CVE-2025-15444" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0194-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20242-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024241.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20448-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20484-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20756-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025102.html" source="SUSE-SU"/>
    <description>
    Crypt::Sodium::XS module versions prior to  0.000042,  for Perl, include a vulnerable version of libsodium

libsodium &lt;= 1.0.20 or a version of libsodium released before December 30, 2025 contains a vulnerability documented as CVE-2025-69277   https://www.cve.org/CVERecord?id=CVE-2025-69277 .

The libsodium vulnerability states:

In atypical use cases involving certain custom cryptography or untrusted data to crypto_core_ed25519_is_valid_point, mishandles checks for whether an elliptic curve point is valid because it sometimes allows points that aren't in the main cryptographic group.

0.000042 includes a version of  libsodium updated to 1.0.20-stable, released January 3, 2026, which includes a fix for the vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-15444/">CVE-2025-15444 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15444">CVE-2025-15444 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256070">SUSE bug 1256070</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050722" comment="libsodium-devel-1.0.20-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039417" comment="libsodium-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050020" comment="libsodium26-1.0.20-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010051917" comment="libsodium26 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202515467" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-15467</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-15467" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15467" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-15467" ref_url="https://www.suse.com/security/cve/CVE-2025-15467" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1473" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003157.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1503" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024609.html" source="SUSE-SU"/>
    <description>
    Issue summary: Parsing CMS AuthEnvelopedData or EnvelopedData message with
maliciously crafted AEAD parameters can trigger a stack buffer overflow.

Impact summary: A stack buffer overflow may lead to a crash, causing Denial
of Service, or potentially remote code execution.

When parsing CMS (Auth)EnvelopedData structures that use AEAD ciphers such as
AES-GCM, the IV (Initialization Vector) encoded in the ASN.1 parameters is
copied into a fixed-size stack buffer without verifying that its length fits
the destination. An attacker can supply a crafted CMS message with an
oversized IV, causing a stack-based out-of-bounds write before any
authentication or tag verification occurs.

Applications and services that parse untrusted CMS or PKCS#7 content using
AEAD ciphers (e.g., S/MIME (Auth)EnvelopedData with AES-GCM) are vulnerable.
Because the overflow occurs prior to authentication, no valid key material
is required to trigger it. While exploitability to remote code execution
depends on platform and toolchain mitigations, the stack-based write
primitive represents a severe risk.

The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this
issue, as the CMS implementation is outside the OpenSSL FIPS module
boundary.

OpenSSL 3.6, 3.5, 3.4, 3.3 and 3.0 are vulnerable to this issue.

OpenSSL 1.1.1 and 1.0.2 are not affected by this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-04-11"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-15467/">CVE-2025-15467 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15467">CVE-2025-15467 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256830">SUSE bug 1256830</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256876">SUSE bug 1256876</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041595" comment="libopenssl-3-devel-3.5.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700693" comment="libopenssl-3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041596" comment="libopenssl-3-fips-provider-3.5.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009868077" comment="libopenssl-3-fips-provider is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041597" comment="libopenssl-3-fips-provider-x86-64-v3-3.5.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010034160" comment="libopenssl-3-fips-provider-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041598" comment="libopenssl3-3.5.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700695" comment="libopenssl3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041599" comment="libopenssl3-x86-64-v3-3.5.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010034161" comment="libopenssl3-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041600" comment="openssl-3-3.5.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700697" comment="openssl-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041601" comment="openssl-3-doc-3.5.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700698" comment="openssl-3-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202515468" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-15468</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-15468" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15468" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-15468" ref_url="https://www.suse.com/security/cve/CVE-2025-15468" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1473" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024609.html" source="SUSE-SU"/>
    <description>
    Issue summary: If an application using the SSL_CIPHER_find() function in
a QUIC protocol client or server receives an unknown cipher suite from
the peer, a NULL dereference occurs.

Impact summary: A NULL pointer dereference leads to abnormal termination of
the running process causing Denial of Service.

Some applications call SSL_CIPHER_find() from the client_hello_cb callback
on the cipher ID received from the peer. If this is done with an SSL object
implementing the QUIC protocol, NULL pointer dereference will happen if
the examined cipher ID is unknown or unsupported.

As it is not very common to call this function in applications using the QUIC 
protocol and the worst outcome is Denial of Service, the issue was assessed
as Low severity.

The vulnerable code was introduced in the 3.2 version with the addition
of the QUIC protocol support.

The FIPS modules in 3.6, 3.5, 3.4 and 3.3 are not affected by this issue,
as the QUIC implementation is outside the OpenSSL FIPS module boundary.

OpenSSL 3.6, 3.5, 3.4 and 3.3 are vulnerable to this issue.

OpenSSL 3.0, 1.1.1 and 1.0.2 are not affected by this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-15468/">CVE-2025-15468 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15468">CVE-2025-15468 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256831">SUSE bug 1256831</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256880">SUSE bug 1256880</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041595" comment="libopenssl-3-devel-3.5.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700693" comment="libopenssl-3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041596" comment="libopenssl-3-fips-provider-3.5.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009868077" comment="libopenssl-3-fips-provider is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041597" comment="libopenssl-3-fips-provider-x86-64-v3-3.5.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010034160" comment="libopenssl-3-fips-provider-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041598" comment="libopenssl3-3.5.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700695" comment="libopenssl3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041599" comment="libopenssl3-x86-64-v3-3.5.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010034161" comment="libopenssl3-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041600" comment="openssl-3-3.5.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700697" comment="openssl-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041601" comment="openssl-3-doc-3.5.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700698" comment="openssl-3-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202515469" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-15469</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-15469" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-15469" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-15469" ref_url="https://www.suse.com/security/cve/CVE-2025-15469" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1473" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024331.html" source="SUSE-SU"/>
    <description>
    Issue summary: The 'openssl dgst' command-line tool silently truncates input
data to 16MB when using one-shot signing algorithms and reports success instead
of an error.

Impact summary: A user signing or verifying files larger than 16MB with
one-shot algorithms (such as Ed25519, Ed448, or ML-DSA) may believe the entire
file is authenticated while trailing data beyond 16MB remains unauthenticated.

When the 'openssl dgst' command is used with algorithms that only support
one-shot signing (Ed25519, Ed448, ML-DSA-44, ML-DSA-65, ML-DSA-87), the input
is buffered with a 16MB limit. If the input exceeds this limit, the tool
silently truncates to the first 16MB and continues without signaling an error,
contrary to what the documentation states. This creates an integrity gap where
trailing bytes can be modified without detection if both signing and
verification are performed using the same affected codepath.

The issue affects only the command-line tool behavior. Verifiers that process
the full message using library APIs will reject the signature, so the risk
primarily affects workflows that both sign and verify with the affected
'openssl dgst' command. Streaming digest algorithms for 'openssl dgst' and
library users are unaffected.

The FIPS modules in 3.5 and 3.6 are not affected by this issue, as the
command-line tools are outside the OpenSSL FIPS module boundary.

OpenSSL 3.5 and 3.6 are vulnerable to this issue.

OpenSSL 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are not affected by this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-15469/">CVE-2025-15469 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-15469">CVE-2025-15469 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256832">SUSE bug 1256832</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041595" comment="libopenssl-3-devel-3.5.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700693" comment="libopenssl-3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041596" comment="libopenssl-3-fips-provider-3.5.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009868077" comment="libopenssl-3-fips-provider is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041597" comment="libopenssl-3-fips-provider-x86-64-v3-3.5.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010034160" comment="libopenssl-3-fips-provider-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041598" comment="libopenssl3-3.5.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700695" comment="libopenssl3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041599" comment="libopenssl3-x86-64-v3-3.5.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010034161" comment="libopenssl3-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041600" comment="openssl-3-3.5.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700697" comment="openssl-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041601" comment="openssl-3-doc-3.5.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700698" comment="openssl-3-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521613" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21613</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21613" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21613" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21613" ref_url="https://www.suse.com/security/cve/CVE-2025-21613" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:0401" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020175.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0622-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0624-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-February/020387.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0056-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DUNHR7ATZWEF5LQKUNEXKL22CUQAND3A/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14624-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UV63VQGB6Y3V7AIZHIKF3PMFVIHM32MI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14654-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/7QSEEGCXESHJEGKAU72IDMBWDF5OZ7OZ/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14658-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HGZ4GQ4F4IPEEALT5FY24GUNPPFHNUUO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14713-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JZAWXH6WKGE2WACLTZWYMHTDCJMU3X6R/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14752-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LPGUMR2BGDOUL27DRQF2DU6LQTTNFUNA/" source="SUSE-SU"/>
    <description>
    go-git is a highly extensible git implementation library written in pure Go. An argument injection vulnerability was discovered in go-git versions prior to v5.13. Successful exploitation of this vulnerability could allow an attacker to set arbitrary values to git-upload-pack flags. This only happens when the file transport protocol is being used, as that is the only protocol that shells out to git binaries. This vulnerability is fixed in 5.13.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2025-12-24"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-21613/">CVE-2025-21613 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21613">CVE-2025-21613 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1235572">SUSE bug 1235572</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035139" comment="cheat-4.4.2-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961128" comment="cheat is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032107" comment="trivy-0.66.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698141" comment="trivy is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521614" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21614</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21614" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21614" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21614" ref_url="https://www.suse.com/security/cve/CVE-2025-21614" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:0401" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-January/000799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0060-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-January/020087.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0056-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DUNHR7ATZWEF5LQKUNEXKL22CUQAND3A/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14624-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/UV63VQGB6Y3V7AIZHIKF3PMFVIHM32MI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14634-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/VCY3UOSZNLMH6IOLEYWFNO3UOF3DLF3P/" source="SUSE-SU"/>
    <description>
    go-git is a highly extensible git implementation library written in pure Go. A denial of service (DoS) vulnerability was discovered in go-git versions prior to v5.13. This vulnerability allows an attacker to perform denial of service attacks by providing specially crafted responses from a Git server which triggers resource exhaustion in go-git clients. Users running versions of go-git from v4 and above are recommended to upgrade to v5.13 in order to mitigate this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2025-12-24"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-21614/">CVE-2025-21614 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-21614">CVE-2025-21614 at NVD</cve>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035139" comment="cheat-4.4.2-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961128" comment="cheat is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032107" comment="trivy-0.66.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698141" comment="trivy is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202521816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-21816</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-21816" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-21816" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-21816" ref_url="https://www.suse.com/security/cve/CVE-2025-21816" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hrtimers: Force migrate away hrtimers queued after CPUHP_AP_HRTIMERS_DYING

hrtimers are migrated away from the dying CPU to any online target at
the CPUHP_AP_HRTIMERS_DYING stage in order not to delay bandwidth timers
handling tasks involved in the CPU hotplug forward progress.

However wakeups can still be performed by the outgoing CPU after
CPUHP_AP_HRTIMERS_DYING. Those can result again in bandwidth timers being
armed. Depending on several considerations (crystal ball power management
based election, earliest timer already enqueued, timer migration enabled or
not), the target may eventually be the current CPU even if offline. If that
happens, the timer is eventually ignored.

The most notable example is RCU which had to deal with each and every of
those wake-ups by deferring them to an online CPU, along with related
workarounds:

_ e787644caf76 (rcu: Defer RCU kthreads wakeup when CPU is dying)
_ 9139f93209d1 (rcu/nocb: Fix RT throttling hrtimer armed from offline CPU)
_ f7345ccc62a4 (rcu/nocb: Fix rcuog wake-up from offline softirq)

The problem isn't confined to RCU though as the stop machine kthread
(which runs CPUHP_AP_HRTIMERS_DYING) reports its completion at the end
of its work through cpu_stop_signal_done() and performs a wake up that
eventually arms the deadline server timer:

   WARNING: CPU: 94 PID: 588 at kernel/time/hrtimer.c:1086 hrtimer_start_range_ns+0x289/0x2d0
   CPU: 94 UID: 0 PID: 588 Comm: migration/94 Not tainted
   Stopper: multi_cpu_stop+0x0/0x120 &lt;- stop_machine_cpuslocked+0x66/0xc0
   RIP: 0010:hrtimer_start_range_ns+0x289/0x2d0
   Call Trace:
   &lt;TASK&gt;
     start_dl_timer
     enqueue_dl_entity
     dl_server_start
     enqueue_task_fair
     enqueue_task
     ttwu_do_activate
     try_to_wake_up
     complete
     cpu_stopper_thread

Instead of providing yet another bandaid to work around the situation, fix
it in the hrtimers infrastructure instead: always migrate away a timer to
an online target whenever it is enqueued from an offline CPU.

This will also allow to revert all the above RCU disgraceful hacks.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-21816/">CVE-2025-21816 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-21816">CVE-2025-21816 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238472">SUSE bug 1238472</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031708" comment="cluster-md-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031709" comment="cluster-md-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031710" comment="cluster-md-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031711" comment="dlm-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031712" comment="dlm-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031713" comment="dlm-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031714" comment="dtb-allwinner-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031715" comment="dtb-altera-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031716" comment="dtb-amazon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031717" comment="dtb-amd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031718" comment="dtb-amlogic-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031719" comment="dtb-apm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031720" comment="dtb-apple-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031721" comment="dtb-arm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031722" comment="dtb-broadcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031723" comment="dtb-cavium-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031724" comment="dtb-exynos-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031725" comment="dtb-freescale-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031726" comment="dtb-hisilicon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031727" comment="dtb-lg-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031728" comment="dtb-marvell-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031729" comment="dtb-mediatek-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031730" comment="dtb-nvidia-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031731" comment="dtb-qcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031732" comment="dtb-renesas-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031733" comment="dtb-rockchip-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031734" comment="dtb-socionext-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031735" comment="dtb-sprd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031736" comment="dtb-xilinx-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031737" comment="gfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031738" comment="gfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031739" comment="gfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031742" comment="kernel-64kb-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031743" comment="kernel-64kb-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031747" comment="kernel-default-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031748" comment="kernel-default-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031750" comment="kernel-docs-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031751" comment="kernel-docs-html-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031752" comment="kernel-kvmsmall-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031754" comment="kernel-kvmsmall-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031756" comment="kernel-obs-build-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031757" comment="kernel-obs-qa-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031760" comment="kernel-rt-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031761" comment="kernel-rt-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031762" comment="kernel-rt-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031764" comment="kernel-source-vanilla-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031765" comment="kernel-syms-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031766" comment="kernel-zfcpdump-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031767" comment="kselftests-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031768" comment="kselftests-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031769" comment="kselftests-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031770" comment="ocfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031771" comment="ocfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031772" comment="ocfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202522034" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-22034</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-22034" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22034" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-22034" ref_url="https://www.suse.com/security/cve/CVE-2025-22034" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/gup: reject FOLL_SPLIT_PMD with hugetlb VMAs

Patch series "mm: fixes for device-exclusive entries (hmm)", v2.

Discussing the PageTail() call in make_device_exclusive_range() with
Willy, I recently discovered [1] that device-exclusive handling does not
properly work with THP, making the hmm-tests selftests fail if THPs are
enabled on the system.

Looking into more details, I found that hugetlb is not properly fenced,
and I realized that something that was bugging me for longer -- how
device-exclusive entries interact with mapcounts -- completely breaks
migration/swapout/split/hwpoison handling of these folios while they have
device-exclusive PTEs.

The program below can be used to allocate 1 GiB worth of pages and making
them device-exclusive on a kernel with CONFIG_TEST_HMM.

Once they are device-exclusive, these folios cannot get swapped out
(proc$pid/smaps_rollup will always indicate 1 GiB RSS no matter how much
one forces memory reclaim), and when having a memory block onlined to
ZONE_MOVABLE, trying to offline it will loop forever and complain about
failed migration of a page that should be movable.

# echo offline &gt; /sys/devices/system/memory/memory136/state
# echo online_movable &gt; /sys/devices/system/memory/memory136/state
# ./hmm-swap &amp;
... wait until everything is device-exclusive
# echo offline &gt; /sys/devices/system/memory/memory136/state
[  285.193431][T14882] page: refcount:2 mapcount:0 mapping:0000000000000000
  index:0x7f20671f7 pfn:0x442b6a
[  285.196618][T14882] memcg:ffff888179298000
[  285.198085][T14882] anon flags: 0x5fff0000002091c(referenced|uptodate|
  dirty|active|owner_2|swapbacked|node=1|zone=3|lastcpupid=0x7ff)
[  285.201734][T14882] raw: ...
[  285.204464][T14882] raw: ...
[  285.207196][T14882] page dumped because: migration failure
[  285.209072][T14882] page_owner tracks the page as allocated
[  285.210915][T14882] page last allocated via order 0, migratetype
  Movable, gfp_mask 0x140dca(GFP_HIGHUSER_MOVABLE|__GFP_COMP|__GFP_ZERO),
  id 14926, tgid 14926 (hmm-swap), ts 254506295376, free_ts 227402023774
[  285.216765][T14882]  post_alloc_hook+0x197/0x1b0
[  285.218874][T14882]  get_page_from_freelist+0x76e/0x3280
[  285.220864][T14882]  __alloc_frozen_pages_noprof+0x38e/0x2740
[  285.223302][T14882]  alloc_pages_mpol+0x1fc/0x540
[  285.225130][T14882]  folio_alloc_mpol_noprof+0x36/0x340
[  285.227222][T14882]  vma_alloc_folio_noprof+0xee/0x1a0
[  285.229074][T14882]  __handle_mm_fault+0x2b38/0x56a0
[  285.230822][T14882]  handle_mm_fault+0x368/0x9f0
...

This series fixes all issues I found so far.  There is no easy way to fix
without a bigger rework/cleanup.  I have a bunch of cleanups on top (some
previous sent, some the result of the discussion in v1) that I will send
out separately once this landed and I get to it.

I wish we could just use some special present PROT_NONE PTEs instead of
these (non-present, non-none) fake-swap entries; but that just results in
the same problem we keep having (lack of spare PTE bits), and staring at
other similar fake-swap entries, that ship has sailed.

With this series, make_device_exclusive() doesn't actually belong into
mm/rmap.c anymore, but I'll leave moving that for another day.

I only tested this series with the hmm-tests selftests due to lack of HW,
so I'd appreciate some testing, especially if the interaction between two
GPUs wanting a device-exclusive entry works as expected.

&lt;program&gt;
#include &lt;stdio.h&gt;
#include &lt;fcntl.h&gt;
#include &lt;stdint.h&gt;
#include &lt;unistd.h&gt;
#include &lt;stdlib.h&gt;
#include &lt;string.h&gt;
#include &lt;sys/mman.h&gt;
#include &lt;sys/ioctl.h&gt;
#include &lt;linux/types.h&gt;
#include &lt;linux/ioctl.h&gt;

#define HMM_DMIRROR_EXCLUSIVE _IOWR('H', 0x05, struct hmm_dmirror_cmd)

struct hmm_dmirror_cmd {
	__u64 addr;
	__u64 ptr;
	__u64 npages;
	__u64 cpages;
	__u64 faults;
};

const size_t size = 1 * 1024 * 1024 * 1024ul;
const size_t chunk_size = 2 * 1024 * 1024ul;

int m
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22034/">CVE-2025-22034 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22034">CVE-2025-22034 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1241435">SUSE bug 1241435</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202522077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-22077</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-22077" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22077" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-22077" ref_url="https://www.suse.com/security/cve/CVE-2025-22077" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Revert "smb: client: fix TCP timers deadlock after rmmod"

This reverts commit e9f2517a3e18a54a3943c098d2226b245d488801.

Commit e9f2517a3e18 ("smb: client: fix TCP timers deadlock after
rmmod") is intended to fix a null-ptr-deref in LOCKDEP, which is
mentioned as CVE-2024-54680, but is actually did not fix anything;
The issue can be reproduced on top of it. [0]

Also, it reverted the change by commit ef7134c7fc48 ("smb: client:
Fix use-after-free of network namespace.") and introduced a real
issue by reviving the kernel TCP socket.

When a reconnect happens for a CIFS connection, the socket state
transitions to FIN_WAIT_1.  Then, inet_csk_clear_xmit_timers_sync()
in tcp_close() stops all timers for the socket.

If an incoming FIN packet is lost, the socket will stay at FIN_WAIT_1
forever, and such sockets could be leaked up to net.ipv4.tcp_max_orphans.

Usually, FIN can be retransmitted by the peer, but if the peer aborts
the connection, the issue comes into reality.

I warned about this privately by pointing out the exact report [1],
but the bogus fix was finally merged.

So, we should not stop the timers to finally kill the connection on
our side in that case, meaning we must not use a kernel socket for
TCP whose sk-&gt;sk_net_refcnt is 0.

The kernel socket does not have a reference to its netns to make it
possible to tear down netns without cleaning up every resource in it.

For example, tunnel devices use a UDP socket internally, but we can
destroy netns without removing such devices and let it complete
during exit.  Otherwise, netns would be leaked when the last application
died.

However, this is problematic for TCP sockets because TCP has timers to
close the connection gracefully even after the socket is close()d.  The
lifetime of the socket and its netns is different from the lifetime of
the underlying connection.

If the socket user does not maintain the netns lifetime, the timer could
be fired after the socket is close()d and its netns is freed up, resulting
in use-after-free.

Actually, we have seen so many similar issues and converted such sockets
to have a reference to netns.

That's why I converted the CIFS client socket to have a reference to
netns (sk-&gt;sk_net_refcnt == 1), which is somehow mentioned as out-of-scope
of CIFS and technically wrong in e9f2517a3e18, but **is in-scope and right
fix**.

Regarding the LOCKDEP issue, we can prevent the module unload by
bumping the module refcount when switching the LOCKDDEP key in
sock_lock_init_class_and_name(). [2]

For a while, let's revert the bogus fix.

Note that now we can use sk_net_refcnt_upgrade() for the socket
conversion, but I'll do so later separately to make backport easy.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22077/">CVE-2025-22077 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-22077">CVE-2025-22077 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1241403">SUSE bug 1241403</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202522868" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-22868</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-22868" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22868" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-22868" ref_url="https://www.suse.com/security/cve/CVE-2025-22868" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02014-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02035-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02040-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02041-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02046-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02097-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03540-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020507.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1005-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1062-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-March/038860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1102-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1333-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20377-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20393-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20515-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20550-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044567.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0091-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3WXUOMZG43G5AZBMH5HY5IUTZ2CLZL6M/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0103-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4JTZ2DTLVURMW7SOEALLXE6GW75RG2MM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14843-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CKYE7I5OJNC37LL7255HIGX5ALO2LO5S/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14868-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LNQ27T4HTWIIJODQRGADXNKI7X2EGTL6/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14869-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AU4XP3W2PVBNVPQA4YEB63MRXXOHFOUY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14870-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/P2BVMS3UPZ5WY4VHA7P2XTPDJMOKLPXM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14874-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/3KAY6CKW45XK546N3GCKSKWNPBQG7GUO/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14905-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WXSUXV2PEOLT2UD2VEZ6IZQTHDWIVZNI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14923-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IKWQ6ES2RHURE5QOZDDNTWPTMPKEXYXM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14988-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IQWUH5CIGBJCVZRE6D76AYCLT3MS47XX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14990-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IC2EUYZRCX6GXM6Y26SHEX6QS2URIZ2I/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15184-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/27CRURJAEL5XMMKNEMZUVGHMUILSPME2/" source="SUSE-SU"/>
    <description>
    An attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22868/">CVE-2025-22868 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22868">CVE-2025-22868 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1239185">SUSE bug 1239185</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1239186">SUSE bug 1239186</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045691" comment="containerized-data-importer-api-1.64.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624359" comment="containerized-data-importer-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045692" comment="containerized-data-importer-cloner-1.64.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624360" comment="containerized-data-importer-cloner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045693" comment="containerized-data-importer-controller-1.64.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624361" comment="containerized-data-importer-controller is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045694" comment="containerized-data-importer-importer-1.64.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624362" comment="containerized-data-importer-importer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045695" comment="containerized-data-importer-manifests-1.64.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624363" comment="containerized-data-importer-manifests is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045696" comment="containerized-data-importer-operator-1.64.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624364" comment="containerized-data-importer-operator is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045697" comment="containerized-data-importer-uploadproxy-1.64.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624365" comment="containerized-data-importer-uploadproxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045698" comment="containerized-data-importer-uploadserver-1.64.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624366" comment="containerized-data-importer-uploadserver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045699" comment="obs-service-cdi_containers_meta-1.64.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009714767" comment="obs-service-cdi_containers_meta is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032107" comment="trivy-0.66.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698141" comment="trivy is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202522869" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-22869</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-22869" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22869" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-22869" ref_url="https://www.suse.com/security/cve/CVE-2025-22869" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:3210" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/000997.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:3336" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001010.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:3833" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-April/001061.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7391" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001348.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7416" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2025:02091-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2025:02092-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2025:02093-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03540-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03545-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1017-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020607.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020613.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1062-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-March/038860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1094-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1102-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1333-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-May/020909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20360-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20373-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20377-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20393-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024659.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0094-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LKOLRH73CIQLMQ327IYGUHNSFKCU5MPI/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14843-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CKYE7I5OJNC37LL7255HIGX5ALO2LO5S/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14881-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FLILESXTUSI5RA744QQ3PZ6BOEUIKZJA/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14887-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/XKHXEY6EIRYIRT5OFXFAGRE6PTYMVUZF/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14909-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BIPGSRATX6BG2ZXWE7566EGQCKXLC4RV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14918-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R2WDHFL2CJ54WXZCWMM62SG3EEXCUE7B/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14919-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SLMCPFY73CP4P47VPVL2WKQEHQZDTY6B/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14923-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IKWQ6ES2RHURE5QOZDDNTWPTMPKEXYXM/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14988-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IQWUH5CIGBJCVZRE6D76AYCLT3MS47XX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14990-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IC2EUYZRCX6GXM6Y26SHEX6QS2URIZ2I/" source="SUSE-SU"/>
    <description>
    SSH servers which implement file transfer protocols are vulnerable to a denial of service attack from clients which complete the key exchange slowly, or not at all, causing pending content to be read into memory, but never transmitted.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22869/">CVE-2025-22869 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22869">CVE-2025-22869 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1239322">SUSE bug 1239322</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035139" comment="cheat-4.4.2-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961128" comment="cheat is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032565" comment="git-bug-0.10.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009969399" comment="git-bug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032566" comment="git-bug-bash-completion-0.10.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009969400" comment="git-bug-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032567" comment="git-bug-fish-completion-0.10.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009969401" comment="git-bug-fish-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032568" comment="git-bug-zsh-completion-0.10.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009969402" comment="git-bug-zsh-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047314" comment="podman-5.4.2-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266791" comment="podman is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047315" comment="podman-docker-5.4.2-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009707063" comment="podman-docker is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047316" comment="podman-remote-5.4.2-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009707064" comment="podman-remote is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047317" comment="podmansh-5.4.2-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009853422" comment="podmansh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042598" comment="tailscale-1.94.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010042637" comment="tailscale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042599" comment="tailscale-bash-completion-1.94.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010042638" comment="tailscale-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042600" comment="tailscale-fish-completion-1.94.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010042639" comment="tailscale-fish-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042601" comment="tailscale-zsh-completion-1.94.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010042640" comment="tailscale-zsh-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032107" comment="trivy-0.66.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698141" comment="trivy is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202522870" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-22870</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-22870" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22870" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-22870" ref_url="https://www.suse.com/security/cve/CVE-2025-22870" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01731-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01985-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01987-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040351.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01988-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01989-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040349.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01990-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040348.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040347.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01992-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02014-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03159-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1094-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/038880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1333-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-May/020909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20373-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20504-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20505-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20515-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024365.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14855-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/CFCIWTRB7LZ4UHY2QXBXQKKZLF4LAY6Y/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14856-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SGP5DLOANFXXCPCB6D6IN7LAI2JGB47U/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14867-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/AA2WDF72ZMPW2Q4NGHAG34I3VJ537V57/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14906-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZCJXWQL2R6EHXY7YCD624TCTDR3SLYJD/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14909-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BIPGSRATX6BG2ZXWE7566EGQCKXLC4RV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14918-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/R2WDHFL2CJ54WXZCWMM62SG3EEXCUE7B/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14988-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IQWUH5CIGBJCVZRE6D76AYCLT3MS47XX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15145-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QLZDGCKYKLU6M3753VM7UMQPAHBYR63F/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15162-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/KHSZPRYNEYI2KIIJZMPPNQRPAMZ5ILGP/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15178-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RHPU2FCHAZXEG7LBQYJMUZPYCQLI5OUG/" source="SUSE-SU"/>
    <description>
    Matching of hosts against proxy patterns can improperly treat an IPv6 zone ID as a hostname component. For example, when the NO_PROXY environment variable is set to "*.example.com", a request to "[::1%25.example.com]:80` will incorrectly match and not be proxied.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-02-21"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-22870/">CVE-2025-22870 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22870">CVE-2025-22870 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1238572">SUSE bug 1238572</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1238611">SUSE bug 1238611</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035139" comment="cheat-4.4.2-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961128" comment="cheat is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202522872" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-22872</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-22872" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22872" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-22872" ref_url="https://www.suse.com/security/cve/CVE-2025-22872" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01940-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01941-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01945-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040282.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01985-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01987-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040351.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01989-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040349.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040347.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02121-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02289-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02289-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02336-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02350-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02350-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02351-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040763.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02366-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02366-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02383-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02383-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02423-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02423-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041192.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02424-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02515-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02515-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03278-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20457-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20510-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20516-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20535-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024607.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15034-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IJN6I53PLG7NO5USQWWJUIVQTZDQDRHC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15036-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QPKEZWS6JMWB5YHJ6IJNYFNNGZGXQM55/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15147-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QA73DOMVV4XIT7C22BBHOSQN2YR3QNWF/" source="SUSE-SU"/>
    <description>
    The tokenizer incorrectly interprets tags with unquoted attribute values that end with a solidus character (/) as self-closing. When directly using Tokenizer, this can result in such tags incorrectly being marked as self-closing, and when using the Parse functions, this can result in content following such tags as being placed in the wrong scope during DOM construction, but only when tags are in foreign content (e.g. &lt;math&gt;, &lt;svg&gt;, etc contexts).
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:L/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2025-22872/">CVE-2025-22872 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-22872">CVE-2025-22872 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1241710">SUSE bug 1241710</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041418" comment="elemental-register-1.8.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041627" comment="elemental-register is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041419" comment="elemental-support-1.8.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041628" comment="elemental-support is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041420" comment="elemental-toolkit-2.3.2-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041629" comment="elemental-toolkit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037905" comment="go-sendxmpp-0.15.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010015344" comment="go-sendxmpp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033446" comment="hauler-1.3.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033447" comment="hauler is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045700" comment="kubevirt-container-disk-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624367" comment="kubevirt-container-disk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045701" comment="kubevirt-manifests-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624368" comment="kubevirt-manifests is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045702" comment="kubevirt-pr-helper-conf-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009871691" comment="kubevirt-pr-helper-conf is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045703" comment="kubevirt-sidecar-shim-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010045808" comment="kubevirt-sidecar-shim is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045704" comment="kubevirt-tests-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624369" comment="kubevirt-tests is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045705" comment="kubevirt-virt-api-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624370" comment="kubevirt-virt-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045706" comment="kubevirt-virt-controller-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624371" comment="kubevirt-virt-controller is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045707" comment="kubevirt-virt-exportproxy-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009814386" comment="kubevirt-virt-exportproxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045708" comment="kubevirt-virt-exportserver-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009814387" comment="kubevirt-virt-exportserver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045709" comment="kubevirt-virt-handler-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624372" comment="kubevirt-virt-handler is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045710" comment="kubevirt-virt-launcher-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624373" comment="kubevirt-virt-launcher is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045711" comment="kubevirt-virt-operator-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624374" comment="kubevirt-virt-operator is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045712" comment="kubevirt-virt-synchronization-controller-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010045809" comment="kubevirt-virt-synchronization-controller is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045713" comment="kubevirt-virtctl-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624375" comment="kubevirt-virtctl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045714" comment="obs-service-kubevirt_containers_meta-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009662899" comment="obs-service-kubevirt_containers_meta is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032107" comment="trivy-0.66.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698141" comment="trivy is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202523141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-23141</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-23141" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23141" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-23141" ref_url="https://www.suse.com/security/cve/CVE-2025-23141" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01965-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02000-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02254-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02307-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02333-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20413-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20419-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20421-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: x86: Acquire SRCU in KVM_GET_MP_STATE to protect guest memory accesses

Acquire a lock on kvm-&gt;srcu when userspace is getting MP state to handle a
rather extreme edge case where "accepting" APIC events, i.e. processing
pending INIT or SIPI, can trigger accesses to guest memory.  If the vCPU
is in L2 with INIT *and* a TRIPLE_FAULT request pending, then getting MP
state will trigger a nested VM-Exit by way of -&gt;check_nested_events(), and
emuating the nested VM-Exit can access guest memory.

The splat was originally hit by syzkaller on a Google-internal kernel, and
reproduced on an upstream kernel by hacking the triple_fault_event_test
selftest to stuff a pending INIT, store an MSR on VM-Exit (to generate a
memory access on VMX), and do vcpu_mp_state_get() to trigger the scenario.

  =============================
  WARNING: suspicious RCU usage
  6.14.0-rc3-b112d356288b-vmx/pi_lockdep_false_pos-lock #3 Not tainted
  -----------------------------
  include/linux/kvm_host.h:1058 suspicious rcu_dereference_check() usage!

  other info that might help us debug this:

  rcu_scheduler_active = 2, debug_locks = 1
  1 lock held by triple_fault_ev/1256:
   #0: ffff88810df5a330 (&amp;vcpu-&gt;mutex){+.+.}-{4:4}, at: kvm_vcpu_ioctl+0x8b/0x9a0 [kvm]

  stack backtrace:
  CPU: 11 UID: 1000 PID: 1256 Comm: triple_fault_ev Not tainted 6.14.0-rc3-b112d356288b-vmx #3
  Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015
  Call Trace:
   &lt;TASK&gt;
   dump_stack_lvl+0x7f/0x90
   lockdep_rcu_suspicious+0x144/0x190
   kvm_vcpu_gfn_to_memslot+0x156/0x180 [kvm]
   kvm_vcpu_read_guest+0x3e/0x90 [kvm]
   read_and_check_msr_entry+0x2e/0x180 [kvm_intel]
   __nested_vmx_vmexit+0x550/0xde0 [kvm_intel]
   kvm_check_nested_events+0x1b/0x30 [kvm]
   kvm_apic_accept_events+0x33/0x100 [kvm]
   kvm_arch_vcpu_ioctl_get_mpstate+0x30/0x1d0 [kvm]
   kvm_vcpu_ioctl+0x33e/0x9a0 [kvm]
   __x64_sys_ioctl+0x8b/0xb0
   do_syscall_64+0x6c/0x170
   entry_SYSCALL_64_after_hwframe+0x4b/0x53
   &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23141/">CVE-2025-23141 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-23141">CVE-2025-23141 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242782">SUSE bug 1242782</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202523259" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-23259</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-23259" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23259" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-23259" ref_url="https://www.suse.com/security/cve/CVE-2025-23259" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023847.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20055-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024069.html" source="SUSE-SU"/>
    <description>
    NVIDIA Mellanox DPDK contains a vulnerability in Poll Mode Driver (PMD), where an attacker on a VM in the system might be able to cause information disclosure and denial of service on the network interface.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-02-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="7/CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-23259/">CVE-2025-23259 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-23259">CVE-2025-23259 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254161">SUSE bug 1254161</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041563" comment="dpdk-24.11.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173355" comment="dpdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041564" comment="dpdk-devel-24.11.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173356" comment="dpdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041565" comment="dpdk-devel-static-24.11.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009959140" comment="dpdk-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041566" comment="dpdk-doc-24.11.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173357" comment="dpdk-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041567" comment="dpdk-examples-24.11.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173358" comment="dpdk-examples is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041568" comment="dpdk-tools-24.11.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009173360" comment="dpdk-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041569" comment="libdpdk-25-24.11.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041630" comment="libdpdk-25 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20252337" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-2337</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-2337" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2337" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-2337" ref_url="https://www.suse.com/security/cve/CVE-2025-2337" source="SUSE CVE"/>
    <description>
    A vulnerability, which was classified as critical, has been found in tbeu matio 1.5.28. This issue affects the function Mat_VarPrint of the file src/mat.c. The manipulation leads to heap-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-13"/>
	<updated date="2026-01-13"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-2337/">CVE-2025-2337 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-2337">CVE-2025-2337 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1239678">SUSE bug 1239678</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037214" comment="libmatio-devel-1.5.29-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009727698" comment="libmatio-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037215" comment="libmatio13-1.5.29-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037227" comment="libmatio13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037216" comment="matio-tools-1.5.29-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009727700" comment="matio-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20252338" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-2338</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-2338" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2338" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-2338" ref_url="https://www.suse.com/security/cve/CVE-2025-2338" source="SUSE CVE"/>
    <description>
    A vulnerability, which was classified as critical, was found in tbeu matio 1.5.28. Affected is the function strdup_vprintf of the file src/io.c. The manipulation leads to heap-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-13"/>
	<updated date="2026-01-13"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-2338/">CVE-2025-2338 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-2338">CVE-2025-2338 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1239677">SUSE bug 1239677</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037214" comment="libmatio-devel-1.5.29-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009727698" comment="libmatio-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037215" comment="libmatio13-1.5.29-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037227" comment="libmatio13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037216" comment="matio-tools-1.5.29-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009727700" comment="matio-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202526623" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-26623</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-26623" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26623" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-26623" ref_url="https://www.suse.com/security/cve/CVE-2025-26623" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045229.html" source="SUSE-SU"/>
    <description>
    Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and ICC image metadata. A heap buffer overflow was found in Exiv2 versions v0.28.0 to v0.28.4. Versions prior to v0.28.0, such as v0.27.7, are **not** affected. Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. The heap overflow is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to gain code execution, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as `fixiso`. The bug is fixed in version v0.28.5. Users are advised to upgrade. There are no known workarounds for this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-26623/">CVE-2025-26623 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-26623">CVE-2025-26623 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237347">SUSE bug 1237347</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051765" comment="exiv2-0.28.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154125" comment="exiv2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051766" comment="exiv2-lang-0.28.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154126" comment="exiv2-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050764" comment="libexiv2-28-0.28.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010051915" comment="libexiv2-28 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050765" comment="libexiv2-28-x86-64-v3-0.28.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010051916" comment="libexiv2-28-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051767" comment="libexiv2-devel-0.28.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152552" comment="libexiv2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202527144" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-27144</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-27144" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-27144" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-27144" ref_url="https://www.suse.com/security/cve/CVE-2025-27144" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:7389" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001565.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7391" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001348.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7397" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2025:02091-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2025:02092-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2025:02093-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01985-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:0980-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1009-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1010-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1017-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020607.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1018-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-March/020613.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1333-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20279-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20363-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024365.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:0080-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/N7HT377S427BEOJBVSVDIDXHCBYPR7BR/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14865-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/A6CKDKOLFT3FBRNIKECBJKGOC3PU3UIC/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14871-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BSWXCPWQTROX3SPB557CKOCT4MAX7ILY/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14909-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/BIPGSRATX6BG2ZXWE7566EGQCKXLC4RV/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14988-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IQWUH5CIGBJCVZRE6D76AYCLT3MS47XX/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14990-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IC2EUYZRCX6GXM6Y26SHEX6QS2URIZ2I/" source="SUSE-SU"/>
    <description>
    Go JOSE provides an implementation of the Javascript Object Signing and Encryption set of standards in Go, including support for JSON Web Encryption (JWE), JSON Web Signature (JWS), and JSON Web Token (JWT) standards. In versions on the 4.x branch prior to version 4.0.5, when parsing compact JWS or JWE input, Go JOSE could use excessive memory. The code used strings.Split(token, ".") to split JWT tokens, which is vulnerable to excessive memory consumption when processing maliciously crafted tokens with a large number of `.` characters.  An attacker could exploit this by sending numerous malformed tokens, leading to memory exhaustion and a Denial of Service. Version 4.0.5 fixes this issue. As a workaround, applications could pre-validate that payloads passed to Go JOSE do not contain an excessive number of `.` characters.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-02-21"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-27144/">CVE-2025-27144 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-27144">CVE-2025-27144 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237608">SUSE bug 1237608</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1237609">SUSE bug 1237609</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032107" comment="trivy-0.66.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698141" comment="trivy is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20252760" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-2760</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-2760" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2760" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-2760" ref_url="https://www.suse.com/security/cve/CVE-2025-2760" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03075-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041517.html" source="SUSE-SU"/>
    <description>
    GIMP XWD File Parsing Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within the parsing of XWD files. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-25082.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-18"/>
	<updated date="2026-01-18"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-2760/">CVE-2025-2760 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-2760">CVE-2025-2760 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1241690">SUSE bug 1241690</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037896" comment="gimp-3.0.6-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151540" comment="gimp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037897" comment="gimp-devel-3.0.6-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153688" comment="gimp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037898" comment="gimp-extension-goat-excercises-3.0.6-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037906" comment="gimp-extension-goat-excercises is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037899" comment="gimp-lang-3.0.6-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151542" comment="gimp-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037900" comment="gimp-plugin-aa-3.0.6-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151543" comment="gimp-plugin-aa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037901" comment="gimp-plugin-python3-3.0.6-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037907" comment="gimp-plugin-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037902" comment="gimp-vala-3.0.6-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037908" comment="gimp-vala is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037903" comment="libgimp-3_0-0-3.0.6-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037909" comment="libgimp-3_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037904" comment="libgimpui-3_0-0-3.0.6-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037910" comment="libgimpui-3_0-0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202528162" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-28162</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-28162" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-28162" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-28162" ref_url="https://www.suse.com/security/cve/CVE-2025-28162" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024834.html" source="SUSE-SU"/>
    <description>
    Buffer Overflow vulnerability in libpng 1.6.43-1.6.46 allows a local attacker to cause a denial of service via the pngimage with AddressSanitizer (ASan), the program leaks memory in various locations, eventually leading to high memory usage and causing the program to become unresponsive
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-25"/>
	<updated date="2026-03-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-28162/">CVE-2025-28162 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-28162">CVE-2025-28162 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257364">SUSE bug 1257364</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050012" comment="libpng16-16-1.6.44-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151414" comment="libpng16-16 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050165" comment="libpng16-16-x86-64-v3-1.6.44-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037228" comment="libpng16-16-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050166" comment="libpng16-compat-devel-1.6.44-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151416" comment="libpng16-compat-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050167" comment="libpng16-compat-devel-x86-64-v3-1.6.44-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037229" comment="libpng16-compat-devel-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050168" comment="libpng16-devel-1.6.44-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151417" comment="libpng16-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050169" comment="libpng16-devel-x86-64-v3-1.6.44-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037230" comment="libpng16-devel-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050170" comment="libpng16-tools-1.6.44-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153137" comment="libpng16-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202528164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-28164</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-28164" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-28164" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-28164" ref_url="https://www.suse.com/security/cve/CVE-2025-28164" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024834.html" source="SUSE-SU"/>
    <description>
    Buffer Overflow vulnerability in libpng 1.6.43-1.6.46 allows a local attacker to cause a denial of service via png_create_read_struct() function.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-25"/>
	<updated date="2026-03-25"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-28164/">CVE-2025-28164 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-28164">CVE-2025-28164 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257365">SUSE bug 1257365</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050012" comment="libpng16-16-1.6.44-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151414" comment="libpng16-16 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050165" comment="libpng16-16-x86-64-v3-1.6.44-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037228" comment="libpng16-16-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050166" comment="libpng16-compat-devel-1.6.44-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151416" comment="libpng16-compat-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050167" comment="libpng16-compat-devel-x86-64-v3-1.6.44-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037229" comment="libpng16-compat-devel-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050168" comment="libpng16-devel-1.6.44-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151417" comment="libpng16-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050169" comment="libpng16-devel-x86-64-v3-1.6.44-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037230" comment="libpng16-devel-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050170" comment="libpng16-tools-1.6.44-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153137" comment="libpng16-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:2025297850" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-297850</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-297850" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-297850" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-297850" ref_url="https://www.suse.com/security/cve/CVE-2025-297850" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2025:15193-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6VC5VIU6SCJITOKTLOBAGZU62Z2CRZJH/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15195-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JV7NP5OZ7ALMJGBCJN5YCPVJGO2QVZPR/" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-02"/>
	<updated date="2026-01-03"/>
	<cve href="https://www.suse.com/security/cve/CVE-2025-297850/">CVE-2025-297850 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-297850">CVE-2025-297850 at NVD</cve>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035663" comment="golang-github-teddysun-v2ray-plugin-5.25.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010018580" comment="golang-github-teddysun-v2ray-plugin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035664" comment="golang-github-v2fly-v2ray-core-5.40.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010015623" comment="golang-github-v2fly-v2ray-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035665" comment="shadowsocks-v2ray-plugin-5.25.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010018581" comment="shadowsocks-v2ray-plugin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035666" comment="v2ray-core-5.40.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010015624" comment="v2ray-core is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202530187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-30187</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-30187" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30187" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-30187" ref_url="https://www.suse.com/security/cve/CVE-2025-30187" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20995-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045336.html" source="SUSE-SU"/>
    <description>
    In some circumstances, when DNSdist is configured to use the nghttp2 library to process incoming DNS over HTTPS queries, an attacker might be able to cause a denial of service by crafting a DoH exchange that triggers an unbounded I/O read loop, causing an unexpected consumption of CPU resources.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-09"/>
	<updated date="2026-04-10"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30187/">CVE-2025-30187 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30187">CVE-2025-30187 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250054">SUSE bug 1250054</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010053168" comment="dnsdist-1.9.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009815139" comment="dnsdist is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202530189" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-30189</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-30189" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30189" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-30189" ref_url="https://www.suse.com/security/cve/CVE-2025-30189" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023506.html" source="SUSE-SU"/>
    <description>
    When cache is enabled, some passdb/userdb drivers incorrectly cache all users with same cache key, causing wrong cached information to be used for these users. After cached login, all subsequent logins are for same user. Install fixed version or disable caching either globally or for the impacted passdb/userdb drivers. No publicly available exploits are known.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2025-12-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30189/">CVE-2025-30189 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30189">CVE-2025-30189 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252839">SUSE bug 1252839</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032086" comment="dovecot24-2.4.2-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032121" comment="dovecot24 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032087" comment="dovecot24-backend-mysql-2.4.2-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032122" comment="dovecot24-backend-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032088" comment="dovecot24-backend-pgsql-2.4.2-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032123" comment="dovecot24-backend-pgsql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032089" comment="dovecot24-backend-sqlite-2.4.2-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032124" comment="dovecot24-backend-sqlite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032090" comment="dovecot24-devel-2.4.2-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032125" comment="dovecot24-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032091" comment="dovecot24-fts-2.4.2-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032126" comment="dovecot24-fts is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032092" comment="dovecot24-fts-flatcurve-2.4.2-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032127" comment="dovecot24-fts-flatcurve is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032093" comment="dovecot24-fts-solr-2.4.2-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032128" comment="dovecot24-fts-solr is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202530204" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-30204</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-30204" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30204" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-30204" ref_url="https://www.suse.com/security/cve/CVE-2025-30204" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:3344" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-March/001003.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:7404" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001522.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02769-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1285-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1332-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-April/039053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0659-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025026.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14937-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NEVFAGUWHTVZSJTUAIU6C4S26DP2KIGB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14954-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/RDRQUFBQNFRUIM2F2EPVEBMFI6LKYQ4J/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14956-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MGGR7W7ANU3YEPLMZP3LOTAKB42X53A7/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14973-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/EULP2ZKPR2GRWBMBH66KSSP6XBVLEOIS/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14989-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/4WVLSK4BXQRTF3JIGHVYEEVTW7AMWO4M/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:14990-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IC2EUYZRCX6GXM6Y26SHEX6QS2URIZ2I/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15037-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/SOIW5K4UTSFQ2FUGGOHNDTI4Y4PCBWTB/" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15052-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2PKSIUOW7HIED3L6UVUD2KMZSPDHNUTO/" source="SUSE-SU"/>
    <description>
    golang-jwt is a Go implementation of JSON Web Tokens. Starting in version 3.2.0 and prior to versions 5.2.2 and 4.5.2, the function parse.ParseUnverified splits (via a call to strings.Split) its argument (which is untrusted data) on periods. As a result, in the face of a malicious request whose Authorization header consists of Bearer  followed by many period characters, a call to that function incurs allocations to the tune of O(n) bytes (where n stands for the length of the function's argument), with a constant factor of about 16. This issue is fixed in 5.2.2 and 4.5.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-03-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30204/">CVE-2025-30204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30204">CVE-2025-30204 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240441">SUSE bug 1240441</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1240442">SUSE bug 1240442</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049119" comment="docker-stable-24.0.9_ce-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009956652" comment="docker-stable is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049120" comment="docker-stable-bash-completion-24.0.9_ce-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009956653" comment="docker-stable-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049121" comment="docker-stable-buildx-0.25.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010049137" comment="docker-stable-buildx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049122" comment="docker-stable-fish-completion-24.0.9_ce-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009956654" comment="docker-stable-fish-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049123" comment="docker-stable-rootless-extras-24.0.9_ce-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009956655" comment="docker-stable-rootless-extras is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049124" comment="docker-stable-zsh-completion-24.0.9_ce-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009956656" comment="docker-stable-zsh-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032107" comment="trivy-0.66.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698141" comment="trivy is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202530219" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-30219</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-30219" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30219" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-30219" ref_url="https://www.suse.com/security/cve/CVE-2025-30219" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01548-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-May/020799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:1548-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20126-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043747.html" source="SUSE-SU"/>
    <description>
    RabbitMQ is a messaging and streaming broker. Versions prior to 4.0.3 are vulnerable to a sophisticated attack that could modify virtual host name on disk and then make it unrecoverable (with other on disk file modifications) can lead to arbitrary JavaScript code execution in the browsers of management UI users. When a virtual host on a RabbitMQ node fails to start, recent versions
will display an error message (a notification) in the management UI. The error message includes virtual host name, which was not escaped prior to open source RabbitMQ 4.0.3 and Tanzu RabbitMQ 4.0.3, 3.13.8. An attack that both makes a virtual host fail to start and creates a new virtual host name with an XSS code snippet or changes the name of an existing virtual host on disk could trigger arbitrary JavaScript code execution in the management UI (the user's browser). Open source RabbitMQ `4.0.3` and Tanzu RabbitMQ `4.0.3` and `3.13.8` patch the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-25"/>
	<updated date="2026-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:N/A:L" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30219/">CVE-2025-30219 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30219">CVE-2025-30219 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240071">SUSE bug 1240071</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039681" comment="erlang-rabbitmq-client-4.1.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154286" comment="erlang-rabbitmq-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039682" comment="rabbitmq-server-4.1.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154287" comment="rabbitmq-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039683" comment="rabbitmq-server-bash-completion-4.1.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039764" comment="rabbitmq-server-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039684" comment="rabbitmq-server-plugins-4.1.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154288" comment="rabbitmq-server-plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039685" comment="rabbitmq-server-zsh-completion-4.1.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039765" comment="rabbitmq-server-zsh-completion is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20253063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-3063</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-3063" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3063" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-3063" ref_url="https://www.suse.com/security/cve/CVE-2025-3063" source="SUSE CVE"/>
    <description>
    The Shopper Approved Reviews plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the ajax_callback_update_sa_option() function in versions 2.0 to 2.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-02-28"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-3063/">CVE-2025-3063 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-3063">CVE-2025-3063 at NVD</cve>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045806" comment="chromedriver-145.0.7632.116-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045807" comment="chromium-145.0.7632.116-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202530706" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-30706</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-30706" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-30706" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-30706" ref_url="https://www.suse.com/security/cve/CVE-2025-30706" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023513.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2025-12-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-30706/">CVE-2025-30706 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-30706">CVE-2025-30706 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1241693">SUSE bug 1241693</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031701" comment="mysql-connector-java-9.3.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152673" comment="mysql-connector-java is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202531133" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-31133</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-31133" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31133" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-31133" ref_url="https://www.suse.com/security/cve/CVE-2025-31133" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:19927" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002207.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20957" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003086.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21232" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023397.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21136-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4073-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20123-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024659.html" source="SUSE-SU"/>
    <description>
    runc is a CLI tool for spawning and running containers according to the OCI specification. In versions 1.2.7 and below, 1.3.0-rc.1 through 1.3.1, 1.4.0-rc.1 and 1.4.0-rc.2 files, runc would not perform sufficient verification that the source of the bind-mount (i.e., the container's /dev/null) was actually a real /dev/null inode when using the container's /dev/null to mask. This exposes two methods of attack:  an arbitrary mount gadget, leading to host information disclosure, host denial of service, container escape, or a bypassing of maskedPaths. This issue is fixed in versions 1.2.8, 1.3.3 and 1.4.0-rc.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-22"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-31133/">CVE-2025-31133 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-31133">CVE-2025-31133 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252232">SUSE bug 1252232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255063">SUSE bug 1255063</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041462" comment="alloy-1.12.2-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010030590" comment="alloy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039655" comment="buildah-1.39.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266828" comment="buildah is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047314" comment="podman-5.4.2-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266791" comment="podman is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047315" comment="podman-docker-5.4.2-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009707063" comment="podman-docker is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047316" comment="podman-remote-5.4.2-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009707064" comment="podman-remote is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047317" comment="podmansh-5.4.2-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009853422" comment="podmansh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030577" comment="runc-1.3.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153867" comment="runc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202531648" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-31648</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-31648" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-31648" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-31648" ref_url="https://www.suse.com/security/cve/CVE-2025-31648" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0668-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0670-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20522-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024500.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20682-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024736.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20758-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20941-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045211.html" source="SUSE-SU"/>
    <description>
    Improper handling of values in the microcode flow for some Intel(R) Processor Family may allow an escalation of privilege. Startup code and smm adversary with a privileged user combined with a high complexity attack may enable escalation of privilege. This result may potentially occur via local access when attack requirements are present with special internal knowledge and requires no user interaction. The potential vulnerability may impact the confidentiality (low), integrity (low) and availability (none) of the vulnerable system, resulting in subsequent system confidentiality (low), integrity (low) and availability (none) impacts.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N" cvss4="1.8/CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-31648/">CVE-2025-31648 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-31648">CVE-2025-31648 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258046">SUSE bug 1258046</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050021" comment="ucode-intel-20260210-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009169251" comment="ucode-intel is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20253198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-3198</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-3198" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3198" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-3198" ref_url="https://www.suse.com/security/cve/CVE-2025-3198" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023286.html" source="SUSE-SU"/>
    <description>
    A vulnerability has been found in GNU Binutils 2.43/2.44 and classified as problematic. Affected by this vulnerability is the function display_info of the file binutils/bucomm.c of the component objdump. The manipulation leads to memory leak. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The patch is named ba6ad3a18cb26b79e0e3b84c39f707535bbc344d. It is recommended to apply a patch to fix this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-13"/>
	<updated date="2025-12-19"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-3198/">CVE-2025-3198 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-3198">CVE-2025-3198 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240870">SUSE bug 1240870</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033339" comment="binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033340" comment="binutils-devel-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033444" comment="bpftool-7.5.0-160000.2.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009955992" comment="bpftool is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033445" comment="bpftool-bash-completion-7.5.0-160000.2.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033375" comment="bpftool-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033343" comment="cross-aarch64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167594" comment="cross-aarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033344" comment="cross-arm-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167596" comment="cross-arm-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033345" comment="cross-avr-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167598" comment="cross-avr-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033346" comment="cross-bpf-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010029579" comment="cross-bpf-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033347" comment="cross-epiphany-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238034" comment="cross-epiphany-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033348" comment="cross-hppa-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167600" comment="cross-hppa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033349" comment="cross-hppa64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167602" comment="cross-hppa64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033350" comment="cross-i386-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167604" comment="cross-i386-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033351" comment="cross-ia64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167606" comment="cross-ia64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033352" comment="cross-loongarch64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033376" comment="cross-loongarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033353" comment="cross-m68k-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167608" comment="cross-m68k-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033354" comment="cross-mips-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167610" comment="cross-mips-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033355" comment="cross-ppc-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167612" comment="cross-ppc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033356" comment="cross-ppc64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167614" comment="cross-ppc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033357" comment="cross-ppc64le-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167616" comment="cross-ppc64le-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033358" comment="cross-pru-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010029580" comment="cross-pru-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033359" comment="cross-riscv64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238035" comment="cross-riscv64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033360" comment="cross-rx-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238036" comment="cross-rx-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033361" comment="cross-s390-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167618" comment="cross-s390-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033362" comment="cross-s390x-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167620" comment="cross-s390x-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033363" comment="cross-sparc-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167622" comment="cross-sparc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033364" comment="cross-sparc64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167624" comment="cross-sparc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033365" comment="cross-spu-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167626" comment="cross-spu-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033366" comment="cross-x86_64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167628" comment="cross-x86_64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033367" comment="cross-xtensa-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297932" comment="cross-xtensa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033368" comment="gprofng-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033377" comment="gprofng is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033369" comment="libctf-nobfd0-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297779" comment="libctf-nobfd0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033370" comment="libctf0-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297780" comment="libctf0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202532049" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-32049</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-32049" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32049" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-32049" ref_url="https://www.suse.com/security/cve/CVE-2025-32049" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:8126" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001317.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:8132" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-May/001157.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9179" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20649-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025111.html" source="SUSE-SU"/>
    <description>
    A flaw was found in libsoup. The SoupWebsocketConnection may accept a large WebSocket message, which may cause libsoup to allocate memory and lead to a denial of service (DoS).
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-14"/>
	<updated date="2026-04-02"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-32049/">CVE-2025-32049 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-32049">CVE-2025-32049 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1240751">SUSE bug 1240751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250562">SUSE bug 1250562</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048654" comment="libsoup-2_4-1-2.74.3-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151596" comment="libsoup-2_4-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050015" comment="libsoup-3_0-0-3.6.6-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698059" comment="libsoup-3_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050176" comment="libsoup-devel-3.6.6-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151597" comment="libsoup-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050177" comment="libsoup-lang-3.6.6-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151598" comment="libsoup-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048655" comment="libsoup2-devel-2.74.3-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009957647" comment="libsoup2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048656" comment="libsoup2-lang-2.74.3-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698060" comment="libsoup2-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048657" comment="typelib-1_0-Soup-2_4-2.74.3-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151599" comment="typelib-1_0-Soup-2_4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050178" comment="typelib-1_0-Soup-3_0-3.6.6-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698061" comment="typelib-1_0-Soup-3_0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202537744" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-37744</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-37744" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37744" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-37744" ref_url="https://www.suse.com/security/cve/CVE-2025-37744" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath12k: fix memory leak in ath12k_pci_remove()

Kmemleak reported this error:

  unreferenced object 0xffff1c165cec3060 (size 32):
    comm "insmod", pid 560, jiffies 4296964570 (age 235.596s)
    backtrace:
      [&lt;000000005434db68&gt;] __kmem_cache_alloc_node+0x1f4/0x2c0
      [&lt;000000001203b155&gt;] kmalloc_trace+0x40/0x88
      [&lt;0000000028adc9c8&gt;] _request_firmware+0xb8/0x608
      [&lt;00000000cad1aef7&gt;] firmware_request_nowarn+0x50/0x80
      [&lt;000000005011a682&gt;] local_pci_probe+0x48/0xd0
      [&lt;00000000077cd295&gt;] pci_device_probe+0xb4/0x200
      [&lt;0000000087184c94&gt;] really_probe+0x150/0x2c0

The firmware memory was allocated in ath12k_pci_probe(), but not
freed in ath12k_pci_remove() in case ATH12K_FLAG_QMI_FAIL bit is
set. So call ath12k_fw_unmap() to free the memory.

Tested-on: WCN7850 hw2.0 PCI WLAN.HMT.2.0-02280-QCAHMTSWPL_V1.0_V2.0_SILICONZ-1
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37744/">CVE-2025-37744 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37744">CVE-2025-37744 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243662">SUSE bug 1243662</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202537751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-37751</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-37751" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37751" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-37751" ref_url="https://www.suse.com/security/cve/CVE-2025-37751" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/cpu: Avoid running off the end of an AMD erratum table

The NULL array terminator at the end of erratum_1386_microcode was
removed during the switch from x86_cpu_desc to x86_cpu_id. This
causes readers to run off the end of the array.

Replace the NULL.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37751/">CVE-2025-37751 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37751">CVE-2025-37751 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242505">SUSE bug 1242505</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202537798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-37798</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-37798" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37798" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-37798" ref_url="https://www.suse.com/security/cve/CVE-2025-37798" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01707-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01965-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01972-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02000-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02254-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02264-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02307-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02308-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-July/021812.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02322-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02333-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02848-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02849-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02850-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02851-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02852-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20354-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20355-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/039504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20413-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20419-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20421-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

codel: remove sch-&gt;q.qlen check before qdisc_tree_reduce_backlog()

After making all -&gt;qlen_notify() callbacks idempotent, now it is safe to
remove the check of qlen!=0 from both fq_codel_dequeue() and
codel_qdisc_dequeue().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-37798/">CVE-2025-37798 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37798">CVE-2025-37798 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242414">SUSE bug 1242414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1242417">SUSE bug 1242417</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202537821" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-37821</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-37821" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37821" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-37821" ref_url="https://www.suse.com/security/cve/CVE-2025-37821" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sched/eevdf: Fix se-&gt;slice being set to U64_MAX and resulting crash

There is a code path in dequeue_entities() that can set the slice of a
sched_entity to U64_MAX, which sometimes results in a crash.

The offending case is when dequeue_entities() is called to dequeue a
delayed group entity, and then the entity's parent's dequeue is delayed.
In that case:

1. In the if (entity_is_task(se)) else block at the beginning of
   dequeue_entities(), slice is set to
   cfs_rq_min_slice(group_cfs_rq(se)). If the entity was delayed, then
   it has no queued tasks, so cfs_rq_min_slice() returns U64_MAX.
2. The first for_each_sched_entity() loop dequeues the entity.
3. If the entity was its parent's only child, then the next iteration
   tries to dequeue the parent.
4. If the parent's dequeue needs to be delayed, then it breaks from the
   first for_each_sched_entity() loop _without updating slice_.
5. The second for_each_sched_entity() loop sets the parent's -&gt;slice to
   the saved slice, which is still U64_MAX.

This throws off subsequent calculations with potentially catastrophic
results. A manifestation we saw in production was:

6. In update_entity_lag(), se-&gt;slice is used to calculate limit, which
   ends up as a huge negative number.
7. limit is used in se-&gt;vlag = clamp(vlag, -limit, limit). Because limit
   is negative, vlag &gt; limit, so se-&gt;vlag is set to the same huge
   negative number.
8. In place_entity(), se-&gt;vlag is scaled, which overflows and results in
   another huge (positive or negative) number.
9. The adjusted lag is subtracted from se-&gt;vruntime, which increases or
   decreases se-&gt;vruntime by a huge number.
10. pick_eevdf() calls entity_eligible()/vruntime_eligible(), which
    incorrectly returns false because the vruntime is so far from the
    other vruntimes on the queue, causing the
    (vruntime - cfs_rq-&gt;min_vruntime) * load calulation to overflow.
11. Nothing appears to be eligible, so pick_eevdf() returns NULL.
12. pick_next_entity() tries to dereference the return value of
    pick_eevdf() and crashes.

Dumping the cfs_rq states from the core dumps with drgn showed tell-tale
huge vruntime ranges and bogus vlag values, and I also traced se-&gt;slice
being set to U64_MAX on live systems (which was usually "benign" since
the rest of the runqueue needed to be in a particular state to crash).

Fix it in dequeue_entities() by always setting slice from the first
non-empty cfs_rq.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37821/">CVE-2025-37821 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37821">CVE-2025-37821 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242864">SUSE bug 1242864</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202537841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-37841</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-37841" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37841" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-37841" ref_url="https://www.suse.com/security/cve/CVE-2025-37841" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01965-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02000-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02254-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02307-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02333-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20413-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20419-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20421-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pm: cpupower: bench: Prevent NULL dereference on malloc failure

If malloc returns NULL due to low memory, 'config' pointer can be NULL.
Add a check to prevent NULL dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37841/">CVE-2025-37841 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37841">CVE-2025-37841 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242974">SUSE bug 1242974</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202537845" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-37845</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-37845" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37845" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-37845" ref_url="https://www.suse.com/security/cve/CVE-2025-37845" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tracing: fprobe events: Fix possible UAF on modules

Commit ac91052f0ae5 ("tracing: tprobe-events: Fix leakage of module
refcount") moved try_module_get() from __find_tracepoint_module_cb()
to find_tracepoint() caller, but that introduced a possible UAF
because the module can be unloaded before try_module_get(). In this
case, the module object should be freed too. Thus, try_module_get()
does not only fail but may access to the freed object.

To avoid that, try_module_get() in __find_tracepoint_module_cb()
again.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37845/">CVE-2025-37845 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37845">CVE-2025-37845 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242986">SUSE bug 1242986</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202537849" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-37849</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-37849" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37849" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-37849" ref_url="https://www.suse.com/security/cve/CVE-2025-37849" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01965-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-June/021535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02000-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02254-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02307-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02333-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20413-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20419-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20421-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20328-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: arm64: Tear down vGIC on failed vCPU creation

If kvm_arch_vcpu_create() fails to share the vCPU page with the
hypervisor, we propagate the error back to the ioctl but leave the
vGIC vCPU data initialised. Note only does this leak the corresponding
memory when the vCPU is destroyed but it can also lead to use-after-free
if the redistributor device handling tries to walk into the vCPU.

Add the missing cleanup to kvm_arch_vcpu_create(), ensuring that the
vGIC vCPU structures are destroyed on error.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-37849/">CVE-2025-37849 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37849">CVE-2025-37849 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243000">SUSE bug 1243000</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202537856" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-37856</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-37856" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37856" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-37856" ref_url="https://www.suse.com/security/cve/CVE-2025-37856" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: harden block_group::bg_list against list_del() races

As far as I can tell, these calls of list_del_init() on bg_list cannot
run concurrently with btrfs_mark_bg_unused() or btrfs_mark_bg_to_reclaim(),
as they are in transaction error paths and situations where the block
group is readonly.

However, if there is any chance at all of racing with mark_bg_unused(),
or a different future user of bg_list, better to be safe than sorry.

Otherwise we risk the following interleaving (bg_list refcount in parens)

T1 (some random op)                       T2 (btrfs_mark_bg_unused)
                                        !list_empty(&amp;bg-&gt;bg_list); (1)
list_del_init(&amp;bg-&gt;bg_list); (1)
                                        list_move_tail (1)
btrfs_put_block_group (0)
                                        btrfs_delete_unused_bgs
                                             bg = list_first_entry
                                             list_del_init(&amp;bg-&gt;bg_list);
                                             btrfs_put_block_group(bg); (-1)

Ultimately, this results in a broken ref count that hits zero one deref
early and the real final deref underflows the refcount, resulting in a WARNING.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37856/">CVE-2025-37856 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37856">CVE-2025-37856 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243068">SUSE bug 1243068</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202537861" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-37861</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-37861" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37861" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-37861" ref_url="https://www.suse.com/security/cve/CVE-2025-37861" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3088" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02254-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02307-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02333-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: mpi3mr: Synchronous access b/w reset and tm thread for reply queue

When the task management thread processes reply queues while the reset
thread resets them, the task management thread accesses an invalid queue ID
(0xFFFF), set by the reset thread, which points to unallocated memory,
causing a crash.

Add flag 'io_admin_reset_sync' to synchronize access between the reset,
I/O, and admin threads. Before a reset, the reset handler sets this flag to
block I/O and admin processing threads. If any thread bypasses the initial
check, the reset thread waits up to 10 seconds for processing to finish. If
the wait exceeds 10 seconds, the controller is marked as unrecoverable.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37861/">CVE-2025-37861 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37861">CVE-2025-37861 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243055">SUSE bug 1243055</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202537864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-37864</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-37864" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37864" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-37864" ref_url="https://www.suse.com/security/cve/CVE-2025-37864" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: dsa: clean up FDB, MDB, VLAN entries on unbind

As explained in many places such as commit b117e1e8a86d ("net: dsa:
delete dsa_legacy_fdb_add and dsa_legacy_fdb_del"), DSA is written given
the assumption that higher layers have balanced additions/deletions.
As such, it only makes sense to be extremely vocal when those
assumptions are violated and the driver unbinds with entries still
present.

But Ido Schimmel points out a very simple situation where that is wrong:
https://lore.kernel.org/netdev/ZDazSM5UsPPjQuKr@shredder/
(also briefly discussed by me in the aforementioned commit).

Basically, while the bridge bypass operations are not something that DSA
explicitly documents, and for the majority of DSA drivers this API
simply causes them to go to promiscuous mode, that isn't the case for
all drivers. Some have the necessary requirements for bridge bypass
operations to do something useful - see dsa_switch_supports_uc_filtering().

Although in tools/testing/selftests/net/forwarding/local_termination.sh,
we made an effort to popularize better mechanisms to manage address
filters on DSA interfaces from user space - namely macvlan for unicast,
and setsockopt(IP_ADD_MEMBERSHIP) - through mtools - for multicast, the
fact is that 'bridge fdb add ... self static local' also exists as
kernel UAPI, and might be useful to someone, even if only for a quick
hack.

It seems counter-productive to block that path by implementing shim
.ndo_fdb_add and .ndo_fdb_del operations which just return -EOPNOTSUPP
in order to prevent the ndo_dflt_fdb_add() and ndo_dflt_fdb_del() from
running, although we could do that.

Accepting that cleanup is necessary seems to be the only option.
Especially since we appear to be coming back at this from a different
angle as well. Russell King is noticing that the WARN_ON() triggers even
for VLANs:
https://lore.kernel.org/netdev/Z_li8Bj8bD4-BYKQ@shell.armlinux.org.uk/

What happens in the bug report above is that dsa_port_do_vlan_del() fails,
then the VLAN entry lingers on, and then we warn on unbind and leak it.

This is not a straight revert of the blamed commit, but we now add an
informational print to the kernel log (to still have a way to see
that bugs exist), and some extra comments gathered from past years'
experience, to justify the logic.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37864/">CVE-2025-37864 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37864">CVE-2025-37864 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1242965">SUSE bug 1242965</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202537904" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-37904</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-37904" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37904" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-37904" ref_url="https://www.suse.com/security/cve/CVE-2025-37904" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix the inode leak in btrfs_iget()

[BUG]
There is a bug report that a syzbot reproducer can lead to the following
busy inode at unmount time:

  BTRFS info (device loop1): last unmount of filesystem 1680000e-3c1e-4c46-84b6-56bd3909af50
  VFS: Busy inodes after unmount of loop1 (btrfs)
  ------------[ cut here ]------------
  kernel BUG at fs/super.c:650!
  Oops: invalid opcode: 0000 [#1] SMP KASAN NOPTI
  CPU: 0 UID: 0 PID: 48168 Comm: syz-executor Not tainted 6.15.0-rc2-00471-g119009db2674 #2 PREEMPT(full)
  Hardware name: QEMU Ubuntu 24.04 PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
  RIP: 0010:generic_shutdown_super+0x2e9/0x390 fs/super.c:650
  Call Trace:
   &lt;TASK&gt;
   kill_anon_super+0x3a/0x60 fs/super.c:1237
   btrfs_kill_super+0x3b/0x50 fs/btrfs/super.c:2099
   deactivate_locked_super+0xbe/0x1a0 fs/super.c:473
   deactivate_super fs/super.c:506 [inline]
   deactivate_super+0xe2/0x100 fs/super.c:502
   cleanup_mnt+0x21f/0x440 fs/namespace.c:1435
   task_work_run+0x14d/0x240 kernel/task_work.c:227
   resume_user_mode_work include/linux/resume_user_mode.h:50 [inline]
   exit_to_user_mode_loop kernel/entry/common.c:114 [inline]
   exit_to_user_mode_prepare include/linux/entry-common.h:329 [inline]
   __syscall_exit_to_user_mode_work kernel/entry/common.c:207 [inline]
   syscall_exit_to_user_mode+0x269/0x290 kernel/entry/common.c:218
   do_syscall_64+0xd4/0x250 arch/x86/entry/syscall_64.c:100
   entry_SYSCALL_64_after_hwframe+0x77/0x7f
   &lt;/TASK&gt;

[CAUSE]
When btrfs_alloc_path() failed, btrfs_iget() directly returned without
releasing the inode already allocated by btrfs_iget_locked().

This results the above busy inode and trigger the kernel BUG.

[FIX]
Fix it by calling iget_failed() if btrfs_alloc_path() failed.

If we hit error inside btrfs_read_locked_inode(), it will properly call
iget_failed(), so nothing to worry about.

Although the iget_failed() cleanup inside btrfs_read_locked_inode() is a
break of the normal error handling scheme, let's fix the obvious bug
and backport first, then rework the error handling later.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37904/">CVE-2025-37904 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37904">CVE-2025-37904 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243452">SUSE bug 1243452</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202537916" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-37916</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-37916" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37916" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-37916" ref_url="https://www.suse.com/security/cve/CVE-2025-37916" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pds_core: remove write-after-free of client_id

A use-after-free error popped up in stress testing:

[Mon Apr 21 21:21:33 2025] BUG: KFENCE: use-after-free write in pdsc_auxbus_dev_del+0xef/0x160 [pds_core]
[Mon Apr 21 21:21:33 2025] Use-after-free write at 0x000000007013ecd1 (in kfence-#47):
[Mon Apr 21 21:21:33 2025]  pdsc_auxbus_dev_del+0xef/0x160 [pds_core]
[Mon Apr 21 21:21:33 2025]  pdsc_remove+0xc0/0x1b0 [pds_core]
[Mon Apr 21 21:21:33 2025]  pci_device_remove+0x24/0x70
[Mon Apr 21 21:21:33 2025]  device_release_driver_internal+0x11f/0x180
[Mon Apr 21 21:21:33 2025]  driver_detach+0x45/0x80
[Mon Apr 21 21:21:33 2025]  bus_remove_driver+0x83/0xe0
[Mon Apr 21 21:21:33 2025]  pci_unregister_driver+0x1a/0x80

The actual device uninit usually happens on a separate thread
scheduled after this code runs, but there is no guarantee of order
of thread execution, so this could be a problem.  There's no
actual need to clear the client_id at this point, so simply
remove the offending code.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-37916/">CVE-2025-37916 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37916">CVE-2025-37916 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243474">SUSE bug 1243474</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1243535">SUSE bug 1243535</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202537955" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-37955</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-37955" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-37955" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-37955" ref_url="https://www.suse.com/security/cve/CVE-2025-37955" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

virtio-net: free xsk_buffs on error in virtnet_xsk_pool_enable()

The selftests added to our CI by Bui Quang Minh recently reveals
that there is a mem leak on the error path of virtnet_xsk_pool_enable():

unreferenced object 0xffff88800a68a000 (size 2048):
  comm "xdp_helper", pid 318, jiffies 4294692778
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace (crc 0):
    __kvmalloc_node_noprof+0x402/0x570
    virtnet_xsk_pool_enable+0x293/0x6a0 (drivers/net/virtio_net.c:5882)
    xp_assign_dev+0x369/0x670 (net/xdp/xsk_buff_pool.c:226)
    xsk_bind+0x6a5/0x1ae0
    __sys_bind+0x15e/0x230
    __x64_sys_bind+0x72/0xb0
    do_syscall_64+0xc1/0x1d0
    entry_SYSCALL_64_after_hwframe+0x77/0x7f
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-37955/">CVE-2025-37955 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-37955">CVE-2025-37955 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243507">SUSE bug 1243507</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538006" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38006</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38006" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38006" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38006" ref_url="https://www.suse.com/security/cve/CVE-2025-38006" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: mctp: Don't access ifa_index when missing

In mctp_dump_addrinfo, ifa_index can be used to filter interfaces, but
only when the struct ifaddrmsg is provided. Otherwise it will be
comparing to uninitialised memory - reproducible in the syzkaller case from
dhcpd, or busybox "ip addr show".

The kernel MCTP implementation has always filtered by ifa_index, so
existing userspace programs expecting to dump MCTP addresses must
already be passing a valid ifa_index value (either 0 or a real index).

BUG: KMSAN: uninit-value in mctp_dump_addrinfo+0x208/0xac0 net/mctp/device.c:128
 mctp_dump_addrinfo+0x208/0xac0 net/mctp/device.c:128
 rtnl_dump_all+0x3ec/0x5b0 net/core/rtnetlink.c:4380
 rtnl_dumpit+0xd5/0x2f0 net/core/rtnetlink.c:6824
 netlink_dump+0x97b/0x1690 net/netlink/af_netlink.c:2309
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38006/">CVE-2025-38006 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38006">CVE-2025-38006 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244930">SUSE bug 1244930</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538008" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38008</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38008" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38008" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38008" ref_url="https://www.suse.com/security/cve/CVE-2025-38008" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/page_alloc: fix race condition in unaccepted memory handling

The page allocator tracks the number of zones that have unaccepted memory
using static_branch_enc/dec() and uses that static branch in hot paths to
determine if it needs to deal with unaccepted memory.

Borislav and Thomas pointed out that the tracking is racy: operations on
static_branch are not serialized against adding/removing unaccepted pages
to/from the zone.

Sanity checks inside static_branch machinery detects it:

WARNING: CPU: 0 PID: 10 at kernel/jump_label.c:276 __static_key_slow_dec_cpuslocked+0x8e/0xa0

The comment around the WARN() explains the problem:

	/*
	 * Warn about the '-1' case though; since that means a
	 * decrement is concurrent with a first (0-&gt;1) increment. IOW
	 * people are trying to disable something that wasn't yet fully
	 * enabled. This suggests an ordering problem on the user side.
	 */

The effect of this static_branch optimization is only visible on
microbenchmark.

Instead of adding more complexity around it, remove it altogether.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38008/">CVE-2025-38008 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38008">CVE-2025-38008 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244939">SUSE bug 1244939</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538019" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38019</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38019" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38019" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38019" ref_url="https://www.suse.com/security/cve/CVE-2025-38019" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mlxsw: spectrum_router: Fix use-after-free when deleting GRE net devices

The driver only offloads neighbors that are constructed on top of net
devices registered by it or their uppers (which are all Ethernet). The
device supports GRE encapsulation and decapsulation of forwarded
traffic, but the driver will not offload dummy neighbors constructed on
top of GRE net devices as they are not uppers of its net devices:

 # ip link add name gre1 up type gre tos inherit local 192.0.2.1 remote 198.51.100.1
 # ip neigh add 0.0.0.0 lladdr 0.0.0.0 nud noarp dev gre1
 $ ip neigh show dev gre1 nud noarp
 0.0.0.0 lladdr 0.0.0.0 NOARP

(Note that the neighbor is not marked with 'offload')

When the driver is reloaded and the existing configuration is replayed,
the driver does not perform the same check regarding existing neighbors
and offloads the previously added one:

 # devlink dev reload pci/0000:01:00.0
 $ ip neigh show dev gre1 nud noarp
 0.0.0.0 lladdr 0.0.0.0 offload NOARP

If the neighbor is later deleted, the driver will ignore the
notification (given the GRE net device is not its upper) and will
therefore keep referencing freed memory, resulting in a use-after-free
[1] when the net device is deleted:

 # ip neigh del 0.0.0.0 lladdr 0.0.0.0 dev gre1
 # ip link del dev gre1

Fix by skipping neighbor replay if the net device for which the replay
is performed is not our upper.

[1]
BUG: KASAN: slab-use-after-free in mlxsw_sp_neigh_entry_update+0x1ea/0x200
Read of size 8 at addr ffff888155b0e420 by task ip/2282
[...]
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0x6f/0xa0
 print_address_description.constprop.0+0x6f/0x350
 print_report+0x108/0x205
 kasan_report+0xdf/0x110
 mlxsw_sp_neigh_entry_update+0x1ea/0x200
 mlxsw_sp_router_rif_gone_sync+0x2a8/0x440
 mlxsw_sp_rif_destroy+0x1e9/0x750
 mlxsw_sp_netdevice_ipip_ol_event+0x3c9/0xdc0
 mlxsw_sp_router_netdevice_event+0x3ac/0x15e0
 notifier_call_chain+0xca/0x150
 call_netdevice_notifiers_info+0x7f/0x100
 unregister_netdevice_many_notify+0xc8c/0x1d90
 rtnl_dellink+0x34e/0xa50
 rtnetlink_rcv_msg+0x6fb/0xb70
 netlink_rcv_skb+0x131/0x360
 netlink_unicast+0x426/0x710
 netlink_sendmsg+0x75a/0xc20
 __sock_sendmsg+0xc1/0x150
 ____sys_sendmsg+0x5aa/0x7b0
 ___sys_sendmsg+0xfc/0x180
 __sys_sendmsg+0x121/0x1b0
 do_syscall_64+0xbb/0x1d0
 entry_SYSCALL_64_after_hwframe+0x4b/0x53
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38019/">CVE-2025-38019 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38019">CVE-2025-38019 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245000">SUSE bug 1245000</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538034" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38034</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38034" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38034" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38034" ref_url="https://www.suse.com/security/cve/CVE-2025-38034" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: correct the order of prelim_ref arguments in btrfs__prelim_ref

btrfs_prelim_ref() calls the old and new reference variables in the
incorrect order. This causes a NULL pointer dereference because oldref
is passed as NULL to trace_btrfs_prelim_ref_insert().

Note, trace_btrfs_prelim_ref_insert() is being called with newref as
oldref (and oldref as NULL) on purpose in order to print out
the values of newref.

To reproduce:
echo 1 &gt; /sys/kernel/debug/tracing/events/btrfs/btrfs_prelim_ref_insert/enable

Perform some writeback operations.

Backtrace:
BUG: kernel NULL pointer dereference, address: 0000000000000018
 #PF: supervisor read access in kernel mode
 #PF: error_code(0x0000) - not-present page
 PGD 115949067 P4D 115949067 PUD 11594a067 PMD 0
 Oops: Oops: 0000 [#1] SMP NOPTI
 CPU: 1 UID: 0 PID: 1188 Comm: fsstress Not tainted 6.15.0-rc2-tester+ #47 PREEMPT(voluntary)  7ca2cef72d5e9c600f0c7718adb6462de8149622
 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.16.3-2-gc13ff2cd-prebuilt.qemu.org 04/01/2014
 RIP: 0010:trace_event_raw_event_btrfs__prelim_ref+0x72/0x130
 Code: e8 43 81 9f ff 48 85 c0 74 78 4d 85 e4 0f 84 8f 00 00 00 49 8b 94 24 c0 06 00 00 48 8b 0a 48 89 48 08 48 8b 52 08 48 89 50 10 &lt;49&gt; 8b 55 18 48 89 50 18 49 8b 55 20 48 89 50 20 41 0f b6 55 28 88
 RSP: 0018:ffffce44820077a0 EFLAGS: 00010286
 RAX: ffff8c6b403f9014 RBX: ffff8c6b55825730 RCX: 304994edf9cf506b
 RDX: d8b11eb7f0fdb699 RSI: ffff8c6b403f9010 RDI: ffff8c6b403f9010
 RBP: 0000000000000001 R08: 0000000000000001 R09: 0000000000000010
 R10: 00000000ffffffff R11: 0000000000000000 R12: ffff8c6b4e8fb000
 R13: 0000000000000000 R14: ffffce44820077a8 R15: ffff8c6b4abd1540
 FS:  00007f4dc6813740(0000) GS:ffff8c6c1d378000(0000) knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: 0000000000000018 CR3: 000000010eb42000 CR4: 0000000000750ef0
 PKRU: 55555554
 Call Trace:
  &lt;TASK&gt;
  prelim_ref_insert+0x1c1/0x270
  find_parent_nodes+0x12a6/0x1ee0
  ? __entry_text_end+0x101f06/0x101f09
  ? srso_alias_return_thunk+0x5/0xfbef5
  ? srso_alias_return_thunk+0x5/0xfbef5
  ? srso_alias_return_thunk+0x5/0xfbef5
  ? srso_alias_return_thunk+0x5/0xfbef5
  btrfs_is_data_extent_shared+0x167/0x640
  ? fiemap_process_hole+0xd0/0x2c0
  extent_fiemap+0xa5c/0xbc0
  ? __entry_text_end+0x101f05/0x101f09
  btrfs_fiemap+0x7e/0xd0
  do_vfs_ioctl+0x425/0x9d0
  __x64_sys_ioctl+0x75/0xc0
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38034/">CVE-2025-38034 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38034">CVE-2025-38034 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244792">SUSE bug 1244792</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538038" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38038</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38038" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38038" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38038" ref_url="https://www.suse.com/security/cve/CVE-2025-38038" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cpufreq: amd-pstate: Remove unnecessary driver_lock in set_boost

set_boost is a per-policy function call, hence a driver wide lock is
unnecessary. Also this mutex_acquire can collide with the mutex_acquire
from the mode-switch path in status_store(), which can lead to a
deadlock. So, remove it.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38038/">CVE-2025-38038 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38038">CVE-2025-38038 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244812">SUSE bug 1244812</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538052" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38052</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38052" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38052" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38052" ref_url="https://www.suse.com/security/cve/CVE-2025-38052" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:12746" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001874.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:12752" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/tipc: fix slab-use-after-free Read in tipc_aead_encrypt_done

Syzbot reported a slab-use-after-free with the following call trace:

  ==================================================================
  BUG: KASAN: slab-use-after-free in tipc_aead_encrypt_done+0x4bd/0x510 net/tipc/crypto.c:840
  Read of size 8 at addr ffff88807a733000 by task kworker/1:0/25

  Call Trace:
   kasan_report+0xd9/0x110 mm/kasan/report.c:601
   tipc_aead_encrypt_done+0x4bd/0x510 net/tipc/crypto.c:840
   crypto_request_complete include/crypto/algapi.h:266
   aead_request_complete include/crypto/internal/aead.h:85
   cryptd_aead_crypt+0x3b8/0x750 crypto/cryptd.c:772
   crypto_request_complete include/crypto/algapi.h:266
   cryptd_queue_worker+0x131/0x200 crypto/cryptd.c:181
   process_one_work+0x9fb/0x1b60 kernel/workqueue.c:3231

  Allocated by task 8355:
   kzalloc_noprof include/linux/slab.h:778
   tipc_crypto_start+0xcc/0x9e0 net/tipc/crypto.c:1466
   tipc_init_net+0x2dd/0x430 net/tipc/core.c:72
   ops_init+0xb9/0x650 net/core/net_namespace.c:139
   setup_net+0x435/0xb40 net/core/net_namespace.c:343
   copy_net_ns+0x2f0/0x670 net/core/net_namespace.c:508
   create_new_namespaces+0x3ea/0xb10 kernel/nsproxy.c:110
   unshare_nsproxy_namespaces+0xc0/0x1f0 kernel/nsproxy.c:228
   ksys_unshare+0x419/0x970 kernel/fork.c:3323
   __do_sys_unshare kernel/fork.c:3394

  Freed by task 63:
   kfree+0x12a/0x3b0 mm/slub.c:4557
   tipc_crypto_stop+0x23c/0x500 net/tipc/crypto.c:1539
   tipc_exit_net+0x8c/0x110 net/tipc/core.c:119
   ops_exit_list+0xb0/0x180 net/core/net_namespace.c:173
   cleanup_net+0x5b7/0xbf0 net/core/net_namespace.c:640
   process_one_work+0x9fb/0x1b60 kernel/workqueue.c:3231

After freed the tipc_crypto tx by delete namespace, tipc_aead_encrypt_done
may still visit it in cryptd_queue_worker workqueue.

I reproduce this issue by:
  ip netns add ns1
  ip link add veth1 type veth peer name veth2
  ip link set veth1 netns ns1
  ip netns exec ns1 tipc bearer enable media eth dev veth1
  ip netns exec ns1 tipc node set key this_is_a_master_key master
  ip netns exec ns1 tipc bearer disable media eth dev veth1
  ip netns del ns1

The key of reproduction is that, simd_aead_encrypt is interrupted, leading
to crypto_simd_usable() return false. Thus, the cryptd_queue_worker is
triggered, and the tipc_crypto tx will be visited.

  tipc_disc_timeout
    tipc_bearer_xmit_skb
      tipc_crypto_xmit
        tipc_aead_encrypt
          crypto_aead_encrypt
            // encrypt()
            simd_aead_encrypt
              // crypto_simd_usable() is false
              child = &amp;ctx-&gt;cryptd_tfm-&gt;base;

  simd_aead_encrypt
    crypto_aead_encrypt
      // encrypt()
      cryptd_aead_encrypt_enqueue
        cryptd_aead_enqueue
          cryptd_enqueue_request
            // trigger cryptd_queue_worker
            queue_work_on(smp_processor_id(), cryptd_wq, &amp;cpu_queue-&gt;work)

Fix this by holding net reference count before encrypt.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38052/">CVE-2025-38052 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38052">CVE-2025-38052 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244749">SUSE bug 1244749</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538058" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38058</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38058" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38058" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38058" ref_url="https://www.suse.com/security/cve/CVE-2025-38058" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

__legitimize_mnt(): check for MNT_SYNC_UMOUNT should be under mount_lock

... or we risk stealing final mntput from sync umount - raising mnt_count
after umount(2) has verified that victim is not busy, but before it
has set MNT_SYNC_UMOUNT; in that case __legitimize_mnt() doesn't see
that it's safe to quietly undo mnt_count increment and leaves dropping
the reference to caller, where it'll be a full-blown mntput().

Check under mount_lock is needed; leaving the current one done before
taking that makes no sense - it's nowhere near common enough to bother
with.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38058/">CVE-2025-38058 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38058">CVE-2025-38058 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245151">SUSE bug 1245151</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38062</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38062" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38062" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38062" ref_url="https://www.suse.com/security/cve/CVE-2025-38062" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

genirq/msi: Store the IOMMU IOVA directly in msi_desc instead of iommu_cookie

The IOMMU translation for MSI message addresses has been a 2-step process,
separated in time:

 1) iommu_dma_prepare_msi(): A cookie pointer containing the IOVA address
    is stored in the MSI descriptor when an MSI interrupt is allocated.

 2) iommu_dma_compose_msi_msg(): this cookie pointer is used to compute a
    translated message address.

This has an inherent lifetime problem for the pointer stored in the cookie
that must remain valid between the two steps. However, there is no locking
at the irq layer that helps protect the lifetime. Today, this works under
the assumption that the iommu domain is not changed while MSI interrupts
being programmed. This is true for normal DMA API users within the kernel,
as the iommu domain is attached before the driver is probed and cannot be
changed while a driver is attached.

Classic VFIO type1 also prevented changing the iommu domain while VFIO was
running as it does not support changing the "container" after starting up.

However, iommufd has improved this so that the iommu domain can be changed
during VFIO operation. This potentially allows userspace to directly race
VFIO_DEVICE_ATTACH_IOMMUFD_PT (which calls iommu_attach_group()) and
VFIO_DEVICE_SET_IRQS (which calls into iommu_dma_compose_msi_msg()).

This potentially causes both the cookie pointer and the unlocked call to
iommu_get_domain_for_dev() on the MSI translation path to become UAFs.

Fix the MSI cookie UAF by removing the cookie pointer. The translated IOVA
address is already known during iommu_dma_prepare_msi() and cannot change.
Thus, it can simply be stored as an integer in the MSI descriptor.

The other UAF related to iommu_get_domain_for_dev() will be addressed in
patch "iommu: Make iommu_dma_prepare_msi() into a generic operation" by
using the IOMMU group mutex.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38062/">CVE-2025-38062 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38062">CVE-2025-38062 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245216">SUSE bug 1245216</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38075</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38075" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38075" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38075" ref_url="https://www.suse.com/security/cve/CVE-2025-38075" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: target: iscsi: Fix timeout on deleted connection

NOPIN response timer may expire on a deleted connection and crash with
such logs:

Did not receive response to NOPIN on CID: 0, failing connection for I_T Nexus (null),i,0x00023d000125,iqn.2017-01.com.iscsi.target,t,0x3d

BUG: Kernel NULL pointer dereference on read at 0x00000000
NIP  strlcpy+0x8/0xb0
LR iscsit_fill_cxn_timeout_err_stats+0x5c/0xc0 [iscsi_target_mod]
Call Trace:
 iscsit_handle_nopin_response_timeout+0xfc/0x120 [iscsi_target_mod]
 call_timer_fn+0x58/0x1f0
 run_timer_softirq+0x740/0x860
 __do_softirq+0x16c/0x420
 irq_exit+0x188/0x1c0
 timer_interrupt+0x184/0x410

That is because nopin response timer may be re-started on nopin timer
expiration.

Stop nopin timer before stopping the nopin response timer to be sure
that no one of them will be re-started.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38075/">CVE-2025-38075 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38075">CVE-2025-38075 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244734">SUSE bug 1244734</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538084" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38084</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38084" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38084" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38084" ref_url="https://www.suse.com/security/cve/CVE-2025-38084" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:13962" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/hugetlb: unshare page tables during VMA split, not before

Currently, __split_vma() triggers hugetlb page table unsharing through
vm_ops-&gt;may_split().  This happens before the VMA lock and rmap locks are
taken - which is too early, it allows racing VMA-locked page faults in our
process and racing rmap walks from other processes to cause page tables to
be shared again before we actually perform the split.

Fix it by explicitly calling into the hugetlb unshare logic from
__split_vma() in the same place where THP splitting also happens.  At that
point, both the VMA and the rmap(s) are write-locked.

An annoying detail is that we can now call into the helper
hugetlb_unshare_pmds() from two different locking contexts:

1. from hugetlb_split(), holding:
    - mmap lock (exclusively)
    - VMA lock
    - file rmap lock (exclusively)
2. hugetlb_unshare_all_pmds(), which I think is designed to be able to
   call us with only the mmap lock held (in shared mode), but currently
   only runs while holding mmap lock (exclusively) and VMA lock

Backporting note:
This commit fixes a racy protection that was introduced in commit
b30c14cd6102 ("hugetlb: unshare some PMDs when splitting VMAs"); that
commit claimed to fix an issue introduced in 5.13, but it should actually
also go all the way back.

[jannh@google.com: v2]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38084/">CVE-2025-38084 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38084">CVE-2025-38084 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245498">SUSE bug 1245498</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538085" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38085</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38085" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38085" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38085" ref_url="https://www.suse.com/security/cve/CVE-2025-38085" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:13589" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001909.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:13962" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/hugetlb: fix huge_pmd_unshare() vs GUP-fast race

huge_pmd_unshare() drops a reference on a page table that may have
previously been shared across processes, potentially turning it into a
normal page table used in another process in which unrelated VMAs can
afterwards be installed.

If this happens in the middle of a concurrent gup_fast(), gup_fast() could
end up walking the page tables of another process.  While I don't see any
way in which that immediately leads to kernel memory corruption, it is
really weird and unexpected.

Fix it with an explicit broadcast IPI through tlb_remove_table_sync_one(),
just like we do in khugepaged when removing page tables for a THP
collapse.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38085/">CVE-2025-38085 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38085">CVE-2025-38085 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245499">SUSE bug 1245499</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538087" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38087</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38087" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38087" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38087" ref_url="https://www.suse.com/security/cve/CVE-2025-38087" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:12746" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03097-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041543.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03100-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041542.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03104-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03106-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03108-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03109-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03111-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03123-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03209-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03210-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03212-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041693.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03213-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03215-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03217-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041701.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03222-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041700.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03223-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03226-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041707.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03235-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041706.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20698-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20699-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20700-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20701-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20702-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041752.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20703-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20704-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041750.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20705-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20706-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20707-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20709-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20710-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20711-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20712-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20714-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20762-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20763-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20764-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20766-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20767-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20775-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20776-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20777-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20778-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20779-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041872.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20780-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20782-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: fix use-after-free in taprio_dev_notifier

Since taprio's taprio_dev_notifier() isn't protected by an
RCU read-side critical section, a race with advance_sched()
can lead to a use-after-free.

Adding rcu_read_lock() inside taprio_dev_notifier() prevents this.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38087/">CVE-2025-38087 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38087">CVE-2025-38087 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245504">SUSE bug 1245504</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245505">SUSE bug 1245505</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538088" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38088</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38088" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38088" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38088" ref_url="https://www.suse.com/security/cve/CVE-2025-38088" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02849-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02851-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02852-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/powernv/memtrace: Fix out of bounds issue in memtrace mmap

memtrace mmap issue has an out of bounds issue. This patch fixes the by
checking that the requested mapping region size should stay within the
allocated region size.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38088/">CVE-2025-38088 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38088">CVE-2025-38088 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245506">SUSE bug 1245506</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245507">SUSE bug 1245507</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538089" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38089</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38089" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38089" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38089" ref_url="https://www.suse.com/security/cve/CVE-2025-38089" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:11411" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03465-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03468-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03469-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03470-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03472-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03476-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03494-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03495-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03563-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03566-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03567-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03569-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03572-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03575-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20806-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20807-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20808-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20810-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20811-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20813-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20814-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20815-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20816-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20817-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20818-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20819-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20826-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20827-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20828-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20829-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20830-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20831-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20832-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20833-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20834-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20835-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20836-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20837-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20838-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20840-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20841-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sunrpc: handle SVC_GARBAGE during svc auth processing as auth error

tianshuo han reported a remotely-triggerable crash if the client sends a
kernel RPC server a specially crafted packet. If decoding the RPC reply
fails in such a way that SVC_GARBAGE is returned without setting the
rq_accept_statp pointer, then that pointer can be dereferenced and a
value stored there.

If it's the first time the thread has processed an RPC, then that
pointer will be set to NULL and the kernel will crash. In other cases,
it could create a memory scribble.

The server sunrpc code treats a SVC_GARBAGE return from svc_authenticate
or pg_authenticate as if it should send a GARBAGE_ARGS reply. RFC 5531
says that if authentication fails that the RPC should be rejected
instead with a status of AUTH_ERR.

Handle a SVC_GARBAGE return as an AUTH_ERROR, with a reason of
AUTH_BADCRED instead of returning GARBAGE_ARGS in that case. This
sidesteps the whole problem of touching the rpc_accept_statp pointer in
this situation and avoids the crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38089/">CVE-2025-38089 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38089">CVE-2025-38089 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245508">SUSE bug 1245508</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245509">SUSE bug 1245509</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538090" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38090</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38090" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38090" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38090" ref_url="https://www.suse.com/security/cve/CVE-2025-38090" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drivers/rapidio/rio_cm.c: prevent possible heap overwrite

In

riocm_cdev_ioctl(RIO_CM_CHAN_SEND)
   -&gt; cm_chan_msg_send()
      -&gt; riocm_ch_send()

cm_chan_msg_send() checks that userspace didn't send too much data but
riocm_ch_send() failed to check that userspace sent sufficient data.  The
result is that riocm_ch_send() can write to fields in the rio_ch_chan_hdr
which were outside the bounds of the space which cm_chan_msg_send()
allocated.

Address this by teaching riocm_ch_send() to check that the entire
rio_ch_chan_hdr was copied in from userspace.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38090/">CVE-2025-38090 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38090">CVE-2025-38090 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245510">SUSE bug 1245510</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245511">SUSE bug 1245511</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538091" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38091</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38091" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38091" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38091" ref_url="https://www.suse.com/security/cve/CVE-2025-38091" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: check stream id dml21 wrapper to get plane_id

[Why &amp; How]
Fix a false positive warning which occurs due to lack of correct checks
when querying plane_id in DML21. This fixes the warning when performing a
mode1 reset (cat /sys/kernel/debug/dri/1/amdgpu_gpu_recover):

[   35.751250] WARNING: CPU: 11 PID: 326 at /tmp/amd.PHpyAl7v/amd/amdgpu/../display/dc/dml2/dml2_dc_resource_mgmt.c:91 dml2_map_dc_pipes+0x243d/0x3f40 [amdgpu]
[   35.751434] Modules linked in: amdgpu(OE) amddrm_ttm_helper(OE) amdttm(OE) amddrm_buddy(OE) amdxcp(OE) amddrm_exec(OE) amd_sched(OE) amdkcl(OE) drm_suballoc_helper drm_ttm_helper ttm drm_display_helper cec rc_core i2c_algo_bit rfcomm qrtr cmac algif_hash algif_skcipher af_alg bnep amd_atl intel_rapl_msr intel_rapl_common snd_hda_codec_hdmi snd_hda_intel edac_mce_amd snd_intel_dspcfg snd_intel_sdw_acpi snd_hda_codec kvm_amd snd_hda_core snd_hwdep snd_pcm kvm snd_seq_midi snd_seq_midi_event snd_rawmidi crct10dif_pclmul polyval_clmulni polyval_generic btusb ghash_clmulni_intel sha256_ssse3 btrtl sha1_ssse3 snd_seq btintel aesni_intel btbcm btmtk snd_seq_device crypto_simd sunrpc cryptd bluetooth snd_timer ccp binfmt_misc rapl snd i2c_piix4 wmi_bmof gigabyte_wmi k10temp i2c_smbus soundcore gpio_amdpt mac_hid sch_fq_codel msr parport_pc ppdev lp parport efi_pstore nfnetlink dmi_sysfs ip_tables x_tables autofs4 hid_generic usbhid hid crc32_pclmul igc ahci xhci_pci libahci xhci_pci_renesas video wmi
[   35.751501] CPU: 11 UID: 0 PID: 326 Comm: kworker/u64:9 Tainted: G           OE      6.11.0-21-generic #21~24.04.1-Ubuntu
[   35.751504] Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE
[   35.751505] Hardware name: Gigabyte Technology Co., Ltd. X670E AORUS PRO X/X670E AORUS PRO X, BIOS F30 05/22/2024
[   35.751506] Workqueue: amdgpu-reset-dev amdgpu_debugfs_reset_work [amdgpu]
[   35.751638] RIP: 0010:dml2_map_dc_pipes+0x243d/0x3f40 [amdgpu]
[   35.751794] Code: 6d 0c 00 00 8b 84 24 88 00 00 00 41 3b 44 9c 20 0f 84 fc 07 00 00 48 83 c3 01 48 83 fb 06 75 b3 4c 8b 64 24 68 4c 8b 6c 24 40 &lt;0f&gt; 0b b8 06 00 00 00 49 8b 94 24 a0 49 00 00 89 c3 83 f8 07 0f 87
[   35.751796] RSP: 0018:ffffbfa3805d7680 EFLAGS: 00010246
[   35.751798] RAX: 0000000000010000 RBX: 0000000000000006 RCX: 0000000000000000
[   35.751799] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000000
[   35.751800] RBP: ffffbfa3805d78f0 R08: 0000000000000000 R09: 0000000000000000
[   35.751801] R10: 0000000000000000 R11: 0000000000000000 R12: ffffbfa383249000
[   35.751802] R13: ffffa0e68f280000 R14: ffffbfa383249658 R15: 0000000000000000
[   35.751803] FS:  0000000000000000(0000) GS:ffffa0edbe580000(0000) knlGS:0000000000000000
[   35.751804] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   35.751805] CR2: 00005d847ef96c58 CR3: 000000041de3e000 CR4: 0000000000f50ef0
[   35.751806] PKRU: 55555554
[   35.751807] Call Trace:
[   35.751810]  &lt;TASK&gt;
[   35.751816]  ? show_regs+0x6c/0x80
[   35.751820]  ? __warn+0x88/0x140
[   35.751822]  ? dml2_map_dc_pipes+0x243d/0x3f40 [amdgpu]
[   35.751964]  ? report_bug+0x182/0x1b0
[   35.751969]  ? handle_bug+0x6e/0xb0
[   35.751972]  ? exc_invalid_op+0x18/0x80
[   35.751974]  ? asm_exc_invalid_op+0x1b/0x20
[   35.751978]  ? dml2_map_dc_pipes+0x243d/0x3f40 [amdgpu]
[   35.752117]  ? math_pow+0x48/0xa0 [amdgpu]
[   35.752256]  ? srso_alias_return_thunk+0x5/0xfbef5
[   35.752260]  ? math_pow+0x48/0xa0 [amdgpu]
[   35.752400]  ? srso_alias_return_thunk+0x5/0xfbef5
[   35.752403]  ? math_pow+0x11/0xa0 [amdgpu]
[   35.752524]  ? srso_alias_return_thunk+0x5/0xfbef5
[   35.752526]  ? core_dcn4_mode_programming+0xe4d/0x20d0 [amdgpu]
[   35.752663]  ? srso_alias_return_thunk+0x5/0xfbef5
[   35.752669]  dml21_validate+0x3d4/0x980 [amdgpu]

(cherry picked from commit f8ad62c0a93e5dd94243e10f1b742232e4d6411e)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38091/">CVE-2025-38091 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38091">CVE-2025-38091 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245621">SUSE bug 1245621</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38095</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38095" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38095" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38095" ref_url="https://www.suse.com/security/cve/CVE-2025-38095" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dma-buf: insert memory barrier before updating num_fences

smp_store_mb() inserts memory barrier after storing operation.
It is different with what the comment is originally aiming so Null
pointer dereference can be happened if memory update is reordered.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38095/">CVE-2025-38095 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38095">CVE-2025-38095 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245658">SUSE bug 1245658</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538096" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38096</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38096" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38096" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38096" ref_url="https://www.suse.com/security/cve/CVE-2025-38096" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: iwlwifi: don't warn when if there is a FW error

iwl_trans_reclaim is warning if it is called when the FW is not alive.
But if it is called when there is a pending restart, i.e. after a FW
error, there is no need to warn, instead - return silently.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38096/">CVE-2025-38096 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38096">CVE-2025-38096 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245657">SUSE bug 1245657</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38098</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38098" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38098" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38098" ref_url="https://www.suse.com/security/cve/CVE-2025-38098" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Don't treat wb connector as physical in create_validate_stream_for_sink

Don't try to operate on a drm_wb_connector as an amdgpu_dm_connector.
While dereferencing aconnector-&gt;base will "work" it's wrong and
might lead to unknown bad things. Just... don't.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38098/">CVE-2025-38098 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38098">CVE-2025-38098 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245654">SUSE bug 1245654</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538099" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38099</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38099" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38099" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38099" ref_url="https://www.suse.com/security/cve/CVE-2025-38099" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: Disable SCO support if READ_VOICE_SETTING is unsupported/broken

A SCO connection without the proper voice_setting can cause
the controller to lock up.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38099/">CVE-2025-38099 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38099">CVE-2025-38099 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245671">SUSE bug 1245671</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538101" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38101</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38101" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38101" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38101" ref_url="https://www.suse.com/security/cve/CVE-2025-38101" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ring-buffer: Fix buffer locking in ring_buffer_subbuf_order_set()

Enlarge the critical section in ring_buffer_subbuf_order_set() to
ensure that error handling takes place with per-buffer mutex held,
thus preventing list corruption and other concurrency-related issues.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38101/">CVE-2025-38101 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38101">CVE-2025-38101 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245659">SUSE bug 1245659</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538102" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38102</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38102" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38102" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38102" ref_url="https://www.suse.com/security/cve/CVE-2025-38102" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

VMCI: fix race between vmci_host_setup_notify and vmci_ctx_unset_notify

During our test, it is found that a warning can be trigger in try_grab_folio
as follow:

  ------------[ cut here ]------------
  WARNING: CPU: 0 PID: 1678 at mm/gup.c:147 try_grab_folio+0x106/0x130
  Modules linked in:
  CPU: 0 UID: 0 PID: 1678 Comm: syz.3.31 Not tainted 6.15.0-rc5 #163 PREEMPT(undef)
  RIP: 0010:try_grab_folio+0x106/0x130
  Call Trace:
   &lt;TASK&gt;
   follow_huge_pmd+0x240/0x8e0
   follow_pmd_mask.constprop.0.isra.0+0x40b/0x5c0
   follow_pud_mask.constprop.0.isra.0+0x14a/0x170
   follow_page_mask+0x1c2/0x1f0
   __get_user_pages+0x176/0x950
   __gup_longterm_locked+0x15b/0x1060
   ? gup_fast+0x120/0x1f0
   gup_fast_fallback+0x17e/0x230
   get_user_pages_fast+0x5f/0x80
   vmci_host_unlocked_ioctl+0x21c/0xf80
  RIP: 0033:0x54d2cd
  ---[ end trace 0000000000000000 ]---

Digging into the source, context-&gt;notify_page may init by get_user_pages_fast
and can be seen in vmci_ctx_unset_notify which will try to put_page. However
get_user_pages_fast is not finished here and lead to following
try_grab_folio warning. The race condition is shown as follow:

cpu0			cpu1
vmci_host_do_set_notify
vmci_host_setup_notify
get_user_pages_fast(uva, 1, FOLL_WRITE, &amp;context-&gt;notify_page);
lockless_pages_from_mm
gup_pgd_range
gup_huge_pmd  // update &amp;context-&gt;notify_page
			vmci_host_do_set_notify
			vmci_ctx_unset_notify
			notify_page = context-&gt;notify_page;
			if (notify_page)
			put_page(notify_page);	// page is freed
__gup_longterm_locked
__get_user_pages
follow_trans_huge_pmd
try_grab_folio // warn here

To slove this, use local variable page to make notify_page can be seen
after finish get_user_pages_fast.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38102/">CVE-2025-38102 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38102">CVE-2025-38102 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245669">SUSE bug 1245669</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538103" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38103</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38103" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38103" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38103" ref_url="https://www.suse.com/security/cve/CVE-2025-38103" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: usbhid: Eliminate recurrent out-of-bounds bug in usbhid_parse()

Update struct hid_descriptor to better reflect the mandatory and
optional parts of the HID Descriptor as per USB HID 1.11 specification.
Note: the kernel currently does not parse any optional HID class
descriptors, only the mandatory report descriptor.

Update all references to member element desc[0] to rpt_desc.

Add test to verify bLength and bNumDescriptors values are valid.

Replace the for loop with direct access to the mandatory HID class
descriptor member for the report descriptor. This eliminates the
possibility of getting an out-of-bounds fault.

Add a warning message if the HID descriptor contains any unsupported
optional HID class descriptors.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38103/">CVE-2025-38103 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38103">CVE-2025-38103 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245663">SUSE bug 1245663</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538106" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38106</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38106" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38106" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38106" ref_url="https://www.suse.com/security/cve/CVE-2025-38106" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3088" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002621.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

io_uring: fix use-after-free of sq-&gt;thread in __io_uring_show_fdinfo()

syzbot reports:

BUG: KASAN: slab-use-after-free in getrusage+0x1109/0x1a60
Read of size 8 at addr ffff88810de2d2c8 by task a.out/304

CPU: 0 UID: 0 PID: 304 Comm: a.out Not tainted 6.16.0-rc1 #1 PREEMPT(voluntary)
Hardware name: QEMU Ubuntu 24.04 PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0x53/0x70
 print_report+0xd0/0x670
 ? __pfx__raw_spin_lock_irqsave+0x10/0x10
 ? getrusage+0x1109/0x1a60
 kasan_report+0xce/0x100
 ? getrusage+0x1109/0x1a60
 getrusage+0x1109/0x1a60
 ? __pfx_getrusage+0x10/0x10
 __io_uring_show_fdinfo+0x9fe/0x1790
 ? ksys_read+0xf7/0x1c0
 ? do_syscall_64+0xa4/0x260
 ? vsnprintf+0x591/0x1100
 ? __pfx___io_uring_show_fdinfo+0x10/0x10
 ? __pfx_vsnprintf+0x10/0x10
 ? mutex_trylock+0xcf/0x130
 ? __pfx_mutex_trylock+0x10/0x10
 ? __pfx_show_fd_locks+0x10/0x10
 ? io_uring_show_fdinfo+0x57/0x80
 io_uring_show_fdinfo+0x57/0x80
 seq_show+0x38c/0x690
 seq_read_iter+0x3f7/0x1180
 ? inode_set_ctime_current+0x160/0x4b0
 seq_read+0x271/0x3e0
 ? __pfx_seq_read+0x10/0x10
 ? __pfx__raw_spin_lock+0x10/0x10
 ? __mark_inode_dirty+0x402/0x810
 ? selinux_file_permission+0x368/0x500
 ? file_update_time+0x10f/0x160
 vfs_read+0x177/0xa40
 ? __pfx___handle_mm_fault+0x10/0x10
 ? __pfx_vfs_read+0x10/0x10
 ? mutex_lock+0x81/0xe0
 ? __pfx_mutex_lock+0x10/0x10
 ? fdget_pos+0x24d/0x4b0
 ksys_read+0xf7/0x1c0
 ? __pfx_ksys_read+0x10/0x10
 ? do_user_addr_fault+0x43b/0x9c0
 do_syscall_64+0xa4/0x260
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f0f74170fc9
Code: 00 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 8b 8
RSP: 002b:00007fffece049e8 EFLAGS: 00000206 ORIG_RAX: 0000000000000000
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f0f74170fc9
RDX: 0000000000001000 RSI: 00007fffece049f0 RDI: 0000000000000004
RBP: 00007fffece05ad0 R08: 0000000000000000 R09: 00007fffece04d90
R10: 0000000000000000 R11: 0000000000000206 R12: 00005651720a1100
R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
 &lt;/TASK&gt;

Allocated by task 298:
 kasan_save_stack+0x33/0x60
 kasan_save_track+0x14/0x30
 __kasan_slab_alloc+0x6e/0x70
 kmem_cache_alloc_node_noprof+0xe8/0x330
 copy_process+0x376/0x5e00
 create_io_thread+0xab/0xf0
 io_sq_offload_create+0x9ed/0xf20
 io_uring_setup+0x12b0/0x1cc0
 do_syscall_64+0xa4/0x260
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

Freed by task 22:
 kasan_save_stack+0x33/0x60
 kasan_save_track+0x14/0x30
 kasan_save_free_info+0x3b/0x60
 __kasan_slab_free+0x37/0x50
 kmem_cache_free+0xc4/0x360
 rcu_core+0x5ff/0x19f0
 handle_softirqs+0x18c/0x530
 run_ksoftirqd+0x20/0x30
 smpboot_thread_fn+0x287/0x6c0
 kthread+0x30d/0x630
 ret_from_fork+0xef/0x1a0
 ret_from_fork_asm+0x1a/0x30

Last potentially related work creation:
 kasan_save_stack+0x33/0x60
 kasan_record_aux_stack+0x8c/0xa0
 __call_rcu_common.constprop.0+0x68/0x940
 __schedule+0xff2/0x2930
 __cond_resched+0x4c/0x80
 mutex_lock+0x5c/0xe0
 io_uring_del_tctx_node+0xe1/0x2b0
 io_uring_clean_tctx+0xb7/0x160
 io_uring_cancel_generic+0x34e/0x760
 do_exit+0x240/0x2350
 do_group_exit+0xab/0x220
 __x64_sys_exit_group+0x39/0x40
 x64_sys_call+0x1243/0x1840
 do_syscall_64+0xa4/0x260
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

The buggy address belongs to the object at ffff88810de2cb00
 which belongs to the cache task_struct of size 3712
The buggy address is located 1992 bytes inside of
 freed 3712-byte region [ffff88810de2cb00, ffff88810de2d980)

which is caused by the task_struct pointed to by sq-&gt;thread being
released while it is being used in the function
__io_uring_show_fdinfo(). Holding ctx-&gt;uring_lock does not prevent ehre
relase or exit of sq-&gt;thread.

Fix this by assigning and looking up -&gt;thread under RCU, and grabbing a
reference to the task_struct. This e
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38106/">CVE-2025-38106 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38106">CVE-2025-38106 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245664">SUSE bug 1245664</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538107" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38107</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38107" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38107" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38107" ref_url="https://www.suse.com/security/cve/CVE-2025-38107" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net_sched: ets: fix a race in ets_qdisc_change()

Gerrard Tai reported a race condition in ETS, whenever SFQ perturb timer
fires at the wrong time.

The race is as follows:

CPU 0                                 CPU 1
[1]: lock root
[2]: qdisc_tree_flush_backlog()
[3]: unlock root
 |
 |                                    [5]: lock root
 |                                    [6]: rehash
 |                                    [7]: qdisc_tree_reduce_backlog()
 |
[4]: qdisc_put()

This can be abused to underflow a parent's qlen.

Calling qdisc_purge_queue() instead of qdisc_tree_flush_backlog()
should fix the race, because all packets will be purged from the qdisc
before releasing the lock.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38107/">CVE-2025-38107 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38107">CVE-2025-38107 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245676">SUSE bug 1245676</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538108" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38108</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38108" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38108" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38108" ref_url="https://www.suse.com/security/cve/CVE-2025-38108" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net_sched: red: fix a race in __red_change()

Gerrard Tai reported a race condition in RED, whenever SFQ perturb timer
fires at the wrong time.

The race is as follows:

CPU 0                                 CPU 1
[1]: lock root
[2]: qdisc_tree_flush_backlog()
[3]: unlock root
 |
 |                                    [5]: lock root
 |                                    [6]: rehash
 |                                    [7]: qdisc_tree_reduce_backlog()
 |
[4]: qdisc_put()

This can be abused to underflow a parent's qlen.

Calling qdisc_purge_queue() instead of qdisc_tree_flush_backlog()
should fix the race, because all packets will be purged from the qdisc
before releasing the lock.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38108/">CVE-2025-38108 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38108">CVE-2025-38108 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245675">SUSE bug 1245675</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538109" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38109</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38109" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38109" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38109" ref_url="https://www.suse.com/security/cve/CVE-2025-38109" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:6570" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03317-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03341-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03406-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03410-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03412-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03418-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03419-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20722-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20723-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20724-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20726-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20727-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20728-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20729-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20730-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20731-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20733-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20734-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20735-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20737-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20738-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20768-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20769-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20770-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20771-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20772-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20774-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20784-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20785-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20786-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20787-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20788-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20789-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20790-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: Fix ECVF vports unload on shutdown flow

Fix shutdown flow UAF when a virtual function is created on the embedded
chip (ECVF) of a BlueField device. In such case the vport acl ingress
table is not properly destroyed.

ECVF functionality is independent of ecpf_vport_exists capability and
thus functions mlx5_eswitch_(enable|disable)_pf_vf_vports() should not
test it when enabling/disabling ECVF vports.

kernel log:
[] refcount_t: underflow; use-after-free.
[] WARNING: CPU: 3 PID: 1 at lib/refcount.c:28
   refcount_warn_saturate+0x124/0x220
----------------
[] Call trace:
[] refcount_warn_saturate+0x124/0x220
[] tree_put_node+0x164/0x1e0 [mlx5_core]
[] mlx5_destroy_flow_table+0x98/0x2c0 [mlx5_core]
[] esw_acl_ingress_table_destroy+0x28/0x40 [mlx5_core]
[] esw_acl_ingress_lgcy_cleanup+0x80/0xf4 [mlx5_core]
[] esw_legacy_vport_acl_cleanup+0x44/0x60 [mlx5_core]
[] esw_vport_cleanup+0x64/0x90 [mlx5_core]
[] mlx5_esw_vport_disable+0xc0/0x1d0 [mlx5_core]
[] mlx5_eswitch_unload_ec_vf_vports+0xcc/0x150 [mlx5_core]
[] mlx5_eswitch_disable_sriov+0x198/0x2a0 [mlx5_core]
[] mlx5_device_disable_sriov+0xb8/0x1e0 [mlx5_core]
[] mlx5_sriov_detach+0x40/0x50 [mlx5_core]
[] mlx5_unload+0x40/0xc4 [mlx5_core]
[] mlx5_unload_one_devl_locked+0x6c/0xe4 [mlx5_core]
[] mlx5_unload_one+0x3c/0x60 [mlx5_core]
[] shutdown+0x7c/0xa4 [mlx5_core]
[] pci_device_shutdown+0x3c/0xa0
[] device_shutdown+0x170/0x340
[] __do_sys_reboot+0x1f4/0x2a0
[] __arm64_sys_reboot+0x2c/0x40
[] invoke_syscall+0x78/0x100
[] el0_svc_common.constprop.0+0x54/0x184
[] do_el0_svc+0x30/0xac
[] el0_svc+0x48/0x160
[] el0t_64_sync_handler+0xa4/0x12c
[] el0t_64_sync+0x1a4/0x1a8
[] --[ end trace 9c4601d68c70030e ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38109/">CVE-2025-38109 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38109">CVE-2025-38109 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245684">SUSE bug 1245684</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245685">SUSE bug 1245685</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538110" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38110</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38110" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38110" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38110" ref_url="https://www.suse.com/security/cve/CVE-2025-38110" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:11861" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023108.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3742-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3748-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3755-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3762-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3765-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3768-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3771-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mdiobus: Fix potential out-of-bounds clause 45 read/write access

When using publicly available tools like 'mdio-tools' to read/write data
from/to network interface and its PHY via C45 (clause 45) mdiobus,
there is no verification of parameters passed to the ioctl and
it accepts any mdio address.
Currently there is support for 32 addresses in kernel via PHY_MAX_ADDR define,
but it is possible to pass higher value than that via ioctl.
While read/write operation should generally fail in this case,
mdiobus provides stats array, where wrong address may allow out-of-bounds
read/write.

Fix that by adding address verification before C45 read/write operation.
While this excludes this access from any statistics, it improves security of
read/write operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38110/">CVE-2025-38110 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38110">CVE-2025-38110 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245665">SUSE bug 1245665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249458">SUSE bug 1249458</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38111</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38111" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38111" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38111" ref_url="https://www.suse.com/security/cve/CVE-2025-38111" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20455-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20456-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20457-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20458-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20459-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20460-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20461-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20462-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20463-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20464-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mdiobus: Fix potential out-of-bounds read/write access

When using publicly available tools like 'mdio-tools' to read/write data
from/to network interface and its PHY via mdiobus, there is no verification of
parameters passed to the ioctl and it accepts any mdio address.
Currently there is support for 32 addresses in kernel via PHY_MAX_ADDR define,
but it is possible to pass higher value than that via ioctl.
While read/write operation should generally fail in this case,
mdiobus provides stats array, where wrong address may allow out-of-bounds
read/write.

Fix that by adding address verification before read/write operation.
While this excludes this access from any statistics, it improves security of
read/write operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38111/">CVE-2025-38111 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38111">CVE-2025-38111 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245666">SUSE bug 1245666</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249455">SUSE bug 1249455</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38112</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38112" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38112" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38112" ref_url="https://www.suse.com/security/cve/CVE-2025-38112" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: Fix TOCTOU issue in sk_is_readable()

sk-&gt;sk_prot-&gt;sock_is_readable is a valid function pointer when sk resides
in a sockmap. After the last sk_psock_put() (which usually happens when
socket is removed from sockmap), sk-&gt;sk_prot gets restored and
sk-&gt;sk_prot-&gt;sock_is_readable becomes NULL.

This makes sk_is_readable() racy, if the value of sk-&gt;sk_prot is reloaded
after the initial check. Which in turn may lead to a null pointer
dereference.

Ensure the function pointer does not turn NULL after the check.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38112/">CVE-2025-38112 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38112">CVE-2025-38112 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245668">SUSE bug 1245668</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538113" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38113</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38113" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38113" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38113" ref_url="https://www.suse.com/security/cve/CVE-2025-38113" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ACPI: CPPC: Fix NULL pointer dereference when nosmp is used

With nosmp in cmdline, other CPUs are not brought up, leaving
their cpc_desc_ptr NULL. CPU0's iteration via for_each_possible_cpu()
dereferences these NULL pointers, causing panic.

Panic backtrace:

[    0.401123] Unable to handle kernel NULL pointer dereference at virtual address 00000000000000b8
...
[    0.403255] [&lt;ffffffff809a5818&gt;] cppc_allow_fast_switch+0x6a/0xd4
...
Kernel panic - not syncing: Attempted to kill init!

[ rjw: New subject ]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38113/">CVE-2025-38113 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38113">CVE-2025-38113 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245683">SUSE bug 1245683</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538114" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38114</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38114" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38114" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38114" ref_url="https://www.suse.com/security/cve/CVE-2025-38114" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

e1000: Move cancel_work_sync to avoid deadlock

Previously, e1000_down called cancel_work_sync for the e1000 reset task
(via e1000_down_and_stop), which takes RTNL.

As reported by users and syzbot, a deadlock is possible in the following
scenario:

CPU 0:
  - RTNL is held
  - e1000_close
  - e1000_down
  - cancel_work_sync (cancel / wait for e1000_reset_task())

CPU 1:
  - process_one_work
  - e1000_reset_task
  - take RTNL

To remedy this, avoid calling cancel_work_sync from e1000_down
(e1000_reset_task does nothing if the device is down anyway). Instead,
call cancel_work_sync for e1000_reset_task when the device is being
removed.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38114/">CVE-2025-38114 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38114">CVE-2025-38114 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245686">SUSE bug 1245686</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538117" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38117</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38117" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38117" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38117" ref_url="https://www.suse.com/security/cve/CVE-2025-38117" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: MGMT: Protect mgmt_pending list with its own lock

This uses a mutex to protect from concurrent access of mgmt_pending
list which can cause crashes like:

==================================================================
BUG: KASAN: slab-use-after-free in hci_sock_get_channel+0x60/0x68 net/bluetooth/hci_sock.c:91
Read of size 2 at addr ffff0000c48885b2 by task syz.4.334/7318

CPU: 0 UID: 0 PID: 7318 Comm: syz.4.334 Not tainted 6.15.0-rc7-syzkaller-g187899f4124a #0 PREEMPT
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025
Call trace:
 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:466 (C)
 __dump_stack+0x30/0x40 lib/dump_stack.c:94
 dump_stack_lvl+0xd8/0x12c lib/dump_stack.c:120
 print_address_description+0xa8/0x254 mm/kasan/report.c:408
 print_report+0x68/0x84 mm/kasan/report.c:521
 kasan_report+0xb0/0x110 mm/kasan/report.c:634
 __asan_report_load2_noabort+0x20/0x2c mm/kasan/report_generic.c:379
 hci_sock_get_channel+0x60/0x68 net/bluetooth/hci_sock.c:91
 mgmt_pending_find+0x7c/0x140 net/bluetooth/mgmt_util.c:223
 pending_find net/bluetooth/mgmt.c:947 [inline]
 remove_adv_monitor+0x44/0x1a4 net/bluetooth/mgmt.c:5445
 hci_mgmt_cmd+0x780/0xc00 net/bluetooth/hci_sock.c:1712
 hci_sock_sendmsg+0x544/0xbb0 net/bluetooth/hci_sock.c:1832
 sock_sendmsg_nosec net/socket.c:712 [inline]
 __sock_sendmsg net/socket.c:727 [inline]
 sock_write_iter+0x25c/0x378 net/socket.c:1131
 new_sync_write fs/read_write.c:591 [inline]
 vfs_write+0x62c/0x97c fs/read_write.c:684
 ksys_write+0x120/0x210 fs/read_write.c:736
 __do_sys_write fs/read_write.c:747 [inline]
 __se_sys_write fs/read_write.c:744 [inline]
 __arm64_sys_write+0x7c/0x90 fs/read_write.c:744
 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline]
 invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49
 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132
 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151
 el0_svc+0x58/0x17c arch/arm64/kernel/entry-common.c:767
 el0t_64_sync_handler+0x78/0x108 arch/arm64/kernel/entry-common.c:786
 el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:600

Allocated by task 7037:
 kasan_save_stack mm/kasan/common.c:47 [inline]
 kasan_save_track+0x40/0x78 mm/kasan/common.c:68
 kasan_save_alloc_info+0x44/0x54 mm/kasan/generic.c:562
 poison_kmalloc_redzone mm/kasan/common.c:377 [inline]
 __kasan_kmalloc+0x9c/0xb4 mm/kasan/common.c:394
 kasan_kmalloc include/linux/kasan.h:260 [inline]
 __do_kmalloc_node mm/slub.c:4327 [inline]
 __kmalloc_noprof+0x2fc/0x4c8 mm/slub.c:4339
 kmalloc_noprof include/linux/slab.h:909 [inline]
 sk_prot_alloc+0xc4/0x1f0 net/core/sock.c:2198
 sk_alloc+0x44/0x3ac net/core/sock.c:2254
 bt_sock_alloc+0x4c/0x300 net/bluetooth/af_bluetooth.c:148
 hci_sock_create+0xa8/0x194 net/bluetooth/hci_sock.c:2202
 bt_sock_create+0x14c/0x24c net/bluetooth/af_bluetooth.c:132
 __sock_create+0x43c/0x91c net/socket.c:1541
 sock_create net/socket.c:1599 [inline]
 __sys_socket_create net/socket.c:1636 [inline]
 __sys_socket+0xd4/0x1c0 net/socket.c:1683
 __do_sys_socket net/socket.c:1697 [inline]
 __se_sys_socket net/socket.c:1695 [inline]
 __arm64_sys_socket+0x7c/0x94 net/socket.c:1695
 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline]
 invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49
 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132
 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151
 el0_svc+0x58/0x17c arch/arm64/kernel/entry-common.c:767
 el0t_64_sync_handler+0x78/0x108 arch/arm64/kernel/entry-common.c:786
 el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:600

Freed by task 6607:
 kasan_save_stack mm/kasan/common.c:47 [inline]
 kasan_save_track+0x40/0x78 mm/kasan/common.c:68
 kasan_save_free_info+0x58/0x70 mm/kasan/generic.c:576
 poison_slab_object mm/kasan/common.c:247 [inline]
 __kasan_slab_free+0x68/0x88 mm/kasan/common.c:264
 kasan_slab_free include/linux/kasan.h:233 [inline
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38117/">CVE-2025-38117 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38117">CVE-2025-38117 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245695">SUSE bug 1245695</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538118" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38118</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38118" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38118" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38118" ref_url="https://www.suse.com/security/cve/CVE-2025-38118" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: MGMT: Fix UAF on mgmt_remove_adv_monitor_complete

This reworks MGMT_OP_REMOVE_ADV_MONITOR to not use mgmt_pending_add to
avoid crashes like bellow:

==================================================================
BUG: KASAN: slab-use-after-free in mgmt_remove_adv_monitor_complete+0xe5/0x540 net/bluetooth/mgmt.c:5406
Read of size 8 at addr ffff88801c53f318 by task kworker/u5:5/5341

CPU: 0 UID: 0 PID: 5341 Comm: kworker/u5:5 Not tainted 6.15.0-syzkaller-10402-g4cb6c8af8591 #0 PREEMPT(full)
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
Workqueue: hci0 hci_cmd_sync_work
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120
 print_address_description mm/kasan/report.c:408 [inline]
 print_report+0xd2/0x2b0 mm/kasan/report.c:521
 kasan_report+0x118/0x150 mm/kasan/report.c:634
 mgmt_remove_adv_monitor_complete+0xe5/0x540 net/bluetooth/mgmt.c:5406
 hci_cmd_sync_work+0x261/0x3a0 net/bluetooth/hci_sync.c:334
 process_one_work kernel/workqueue.c:3238 [inline]
 process_scheduled_works+0xade/0x17b0 kernel/workqueue.c:3321
 worker_thread+0x8a0/0xda0 kernel/workqueue.c:3402
 kthread+0x711/0x8a0 kernel/kthread.c:464
 ret_from_fork+0x3fc/0x770 arch/x86/kernel/process.c:148
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
 &lt;/TASK&gt;

Allocated by task 5987:
 kasan_save_stack mm/kasan/common.c:47 [inline]
 kasan_save_track+0x3e/0x80 mm/kasan/common.c:68
 poison_kmalloc_redzone mm/kasan/common.c:377 [inline]
 __kasan_kmalloc+0x93/0xb0 mm/kasan/common.c:394
 kasan_kmalloc include/linux/kasan.h:260 [inline]
 __kmalloc_cache_noprof+0x230/0x3d0 mm/slub.c:4358
 kmalloc_noprof include/linux/slab.h:905 [inline]
 kzalloc_noprof include/linux/slab.h:1039 [inline]
 mgmt_pending_new+0x65/0x240 net/bluetooth/mgmt_util.c:252
 mgmt_pending_add+0x34/0x120 net/bluetooth/mgmt_util.c:279
 remove_adv_monitor+0x103/0x1b0 net/bluetooth/mgmt.c:5454
 hci_mgmt_cmd+0x9c9/0xef0 net/bluetooth/hci_sock.c:1719
 hci_sock_sendmsg+0x6ca/0xef0 net/bluetooth/hci_sock.c:1839
 sock_sendmsg_nosec net/socket.c:712 [inline]
 __sock_sendmsg+0x219/0x270 net/socket.c:727
 sock_write_iter+0x258/0x330 net/socket.c:1131
 new_sync_write fs/read_write.c:593 [inline]
 vfs_write+0x548/0xa90 fs/read_write.c:686
 ksys_write+0x145/0x250 fs/read_write.c:738
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

Freed by task 5989:
 kasan_save_stack mm/kasan/common.c:47 [inline]
 kasan_save_track+0x3e/0x80 mm/kasan/common.c:68
 kasan_save_free_info+0x46/0x50 mm/kasan/generic.c:576
 poison_slab_object mm/kasan/common.c:247 [inline]
 __kasan_slab_free+0x62/0x70 mm/kasan/common.c:264
 kasan_slab_free include/linux/kasan.h:233 [inline]
 slab_free_hook mm/slub.c:2380 [inline]
 slab_free mm/slub.c:4642 [inline]
 kfree+0x18e/0x440 mm/slub.c:4841
 mgmt_pending_foreach+0xc9/0x120 net/bluetooth/mgmt_util.c:242
 mgmt_index_removed+0x10d/0x2f0 net/bluetooth/mgmt.c:9366
 hci_sock_bind+0xbe9/0x1000 net/bluetooth/hci_sock.c:1314
 __sys_bind_socket net/socket.c:1810 [inline]
 __sys_bind+0x2c3/0x3e0 net/socket.c:1841
 __do_sys_bind net/socket.c:1846 [inline]
 __se_sys_bind net/socket.c:1844 [inline]
 __x64_sys_bind+0x7a/0x90 net/socket.c:1844
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38118/">CVE-2025-38118 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38118">CVE-2025-38118 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245670">SUSE bug 1245670</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250826">SUSE bug 1250826</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538119" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38119</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38119" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38119" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38119" ref_url="https://www.suse.com/security/cve/CVE-2025-38119" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: core: ufs: Fix a hang in the error handler

ufshcd_err_handling_prepare() calls ufshcd_rpm_get_sync(). The latter
function can only succeed if UFSHCD_EH_IN_PROGRESS is not set because
resuming involves submitting a SCSI command and ufshcd_queuecommand()
returns SCSI_MLQUEUE_HOST_BUSY if UFSHCD_EH_IN_PROGRESS is set. Fix this
hang by setting UFSHCD_EH_IN_PROGRESS after ufshcd_rpm_get_sync() has
been called instead of before.

Backtrace:
__switch_to+0x174/0x338
__schedule+0x600/0x9e4
schedule+0x7c/0xe8
schedule_timeout+0xa4/0x1c8
io_schedule_timeout+0x48/0x70
wait_for_common_io+0xa8/0x160 //waiting on START_STOP
wait_for_completion_io_timeout+0x10/0x20
blk_execute_rq+0xe4/0x1e4
scsi_execute_cmd+0x108/0x244
ufshcd_set_dev_pwr_mode+0xe8/0x250
__ufshcd_wl_resume+0x94/0x354
ufshcd_wl_runtime_resume+0x3c/0x174
scsi_runtime_resume+0x64/0xa4
rpm_resume+0x15c/0xa1c
__pm_runtime_resume+0x4c/0x90 // Runtime resume ongoing
ufshcd_err_handler+0x1a0/0xd08
process_one_work+0x174/0x808
worker_thread+0x15c/0x490
kthread+0xf4/0x1ec
ret_from_fork+0x10/0x20

[ bvanassche: rewrote patch description ]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38119/">CVE-2025-38119 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38119">CVE-2025-38119 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245700">SUSE bug 1245700</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538120" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38120</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38120" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38120" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38120" ref_url="https://www.suse.com/security/cve/CVE-2025-38120" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02848-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02849-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02850-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02851-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02852-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_set_pipapo_avx2: fix initial map fill

If the first field doesn't cover the entire start map, then we must zero
out the remainder, else we leak those bits into the next match round map.

The early fix was incomplete and did only fix up the generic C
implementation.

A followup patch adds a test case to nft_concat_range.sh.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38120/">CVE-2025-38120 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38120">CVE-2025-38120 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245711">SUSE bug 1245711</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538122" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38122</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38122" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38122" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38122" ref_url="https://www.suse.com/security/cve/CVE-2025-38122" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gve: add missing NULL check for gve_alloc_pending_packet() in TX DQO

gve_alloc_pending_packet() can return NULL, but gve_tx_add_skb_dqo()
did not check for this case before dereferencing the returned pointer.

Add a missing NULL check to prevent a potential NULL pointer
dereference when allocation fails.

This improves robustness in low-memory scenarios.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38122/">CVE-2025-38122 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38122">CVE-2025-38122 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245746">SUSE bug 1245746</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538123" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38123</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38123" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38123" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38123" ref_url="https://www.suse.com/security/cve/CVE-2025-38123" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: wwan: t7xx: Fix napi rx poll issue

When driver handles the napi rx polling requests, the netdev might
have been released by the dellink logic triggered by the disconnect
operation on user plane. However, in the logic of processing skb in
polling, an invalid netdev is still being used, which causes a panic.

BUG: kernel NULL pointer dereference, address: 00000000000000f1
Oops: 0000 [#1] PREEMPT SMP NOPTI
RIP: 0010:dev_gro_receive+0x3a/0x620
[...]
Call Trace:
 &lt;IRQ&gt;
 ? __die_body+0x68/0xb0
 ? page_fault_oops+0x379/0x3e0
 ? exc_page_fault+0x4f/0xa0
 ? asm_exc_page_fault+0x22/0x30
 ? __pfx_t7xx_ccmni_recv_skb+0x10/0x10 [mtk_t7xx (HASH:1400 7)]
 ? dev_gro_receive+0x3a/0x620
 napi_gro_receive+0xad/0x170
 t7xx_ccmni_recv_skb+0x48/0x70 [mtk_t7xx (HASH:1400 7)]
 t7xx_dpmaif_napi_rx_poll+0x590/0x800 [mtk_t7xx (HASH:1400 7)]
 net_rx_action+0x103/0x470
 irq_exit_rcu+0x13a/0x310
 sysvec_apic_timer_interrupt+0x56/0x90
 &lt;/IRQ&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38123/">CVE-2025-38123 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38123">CVE-2025-38123 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245688">SUSE bug 1245688</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538124" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38124</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38124" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38124" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38124" ref_url="https://www.suse.com/security/cve/CVE-2025-38124" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:13962" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: fix udp gso skb_segment after pull from frag_list

Commit a1e40ac5b5e9 ("net: gso: fix udp gso fraglist segmentation after
pull from frag_list") detected invalid geometry in frag_list skbs and
redirects them from skb_segment_list to more robust skb_segment. But some
packets with modified geometry can also hit bugs in that code. We don't
know how many such cases exist. Addressing each one by one also requires
touching the complex skb_segment code, which risks introducing bugs for
other types of skbs. Instead, linearize all these packets that fail the
basic invariants on gso fraglist skbs. That is more robust.

If only part of the fraglist payload is pulled into head_skb, it will
always cause exception when splitting skbs by skb_segment. For detailed
call stack information, see below.

Valid SKB_GSO_FRAGLIST skbs
- consist of two or more segments
- the head_skb holds the protocol headers plus first gso_size
- one or more frag_list skbs hold exactly one segment
- all but the last must be gso_size

Optional datapath hooks such as NAT and BPF (bpf_skb_pull_data) can
modify fraglist skbs, breaking these invariants.

In extreme cases they pull one part of data into skb linear. For UDP,
this  causes three payloads with lengths of (11,11,10) bytes were
pulled tail to become (12,10,10) bytes.

The skbs no longer meets the above SKB_GSO_FRAGLIST conditions because
payload was pulled into head_skb, it needs to be linearized before pass
to regular skb_segment.

    skb_segment+0xcd0/0xd14
    __udp_gso_segment+0x334/0x5f4
    udp4_ufo_fragment+0x118/0x15c
    inet_gso_segment+0x164/0x338
    skb_mac_gso_segment+0xc4/0x13c
    __skb_gso_segment+0xc4/0x124
    validate_xmit_skb+0x9c/0x2c0
    validate_xmit_skb_list+0x4c/0x80
    sch_direct_xmit+0x70/0x404
    __dev_queue_xmit+0x64c/0xe5c
    neigh_resolve_output+0x178/0x1c4
    ip_finish_output2+0x37c/0x47c
    __ip_finish_output+0x194/0x240
    ip_finish_output+0x20/0xf4
    ip_output+0x100/0x1a0
    NF_HOOK+0xc4/0x16c
    ip_forward+0x314/0x32c
    ip_rcv+0x90/0x118
    __netif_receive_skb+0x74/0x124
    process_backlog+0xe8/0x1a4
    __napi_poll+0x5c/0x1f8
    net_rx_action+0x154/0x314
    handle_softirqs+0x154/0x4b8

    [118.376811] [C201134] rxq0_pus: [name:bug&amp;]kernel BUG at net/core/skbuff.c:4278!
    [118.376829] [C201134] rxq0_pus: [name:traps&amp;]Internal error: Oops - BUG: 00000000f2000800 [#1] PREEMPT SMP
    [118.470774] [C201134] rxq0_pus: [name:mrdump&amp;]Kernel Offset: 0x178cc00000 from 0xffffffc008000000
    [118.470810] [C201134] rxq0_pus: [name:mrdump&amp;]PHYS_OFFSET: 0x40000000
    [118.470827] [C201134] rxq0_pus: [name:mrdump&amp;]pstate: 60400005 (nZCv daif +PAN -UAO)
    [118.470848] [C201134] rxq0_pus: [name:mrdump&amp;]pc : [0xffffffd79598aefc] skb_segment+0xcd0/0xd14
    [118.470900] [C201134] rxq0_pus: [name:mrdump&amp;]lr : [0xffffffd79598a5e8] skb_segment+0x3bc/0xd14
    [118.470928] [C201134] rxq0_pus: [name:mrdump&amp;]sp : ffffffc008013770
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38124/">CVE-2025-38124 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38124">CVE-2025-38124 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245690">SUSE bug 1245690</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538125" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38125</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38125" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38125" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38125" ref_url="https://www.suse.com/security/cve/CVE-2025-38125" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: stmmac: make sure that ptp_rate is not 0 before configuring EST

If the ptp_rate recorded earlier in the driver happens to be 0, this
bogus value will propagate up to EST configuration, where it will
trigger a division by 0.

Prevent this division by 0 by adding the corresponding check and error
code.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38125/">CVE-2025-38125 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38125">CVE-2025-38125 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245710">SUSE bug 1245710</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538127" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38127</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38127" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38127" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38127" ref_url="https://www.suse.com/security/cve/CVE-2025-38127" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: fix Tx scheduler error handling in XDP callback

When the XDP program is loaded, the XDP callback adds new Tx queues.
This means that the callback must update the Tx scheduler with the new
queue number. In the event of a Tx scheduler failure, the XDP callback
should also fail and roll back any changes previously made for XDP
preparation.

The previous implementation had a bug that not all changes made by the
XDP callback were rolled back. This caused the crash with the following
call trace:

[  +9.549584] ice 0000:ca:00.0: Failed VSI LAN queue config for XDP, error: -5
[  +0.382335] Oops: general protection fault, probably for non-canonical address 0x50a2250a90495525: 0000 [#1] SMP NOPTI
[  +0.010710] CPU: 103 UID: 0 PID: 0 Comm: swapper/103 Not tainted 6.14.0-net-next-mar-31+ #14 PREEMPT(voluntary)
[  +0.010175] Hardware name: Intel Corporation M50CYP2SBSTD/M50CYP2SBSTD, BIOS SE5C620.86B.01.01.0005.2202160810 02/16/2022
[  +0.010946] RIP: 0010:__ice_update_sample+0x39/0xe0 [ice]

[...]

[  +0.002715] Call Trace:
[  +0.002452]  &lt;IRQ&gt;
[  +0.002021]  ? __die_body.cold+0x19/0x29
[  +0.003922]  ? die_addr+0x3c/0x60
[  +0.003319]  ? exc_general_protection+0x17c/0x400
[  +0.004707]  ? asm_exc_general_protection+0x26/0x30
[  +0.004879]  ? __ice_update_sample+0x39/0xe0 [ice]
[  +0.004835]  ice_napi_poll+0x665/0x680 [ice]
[  +0.004320]  __napi_poll+0x28/0x190
[  +0.003500]  net_rx_action+0x198/0x360
[  +0.003752]  ? update_rq_clock+0x39/0x220
[  +0.004013]  handle_softirqs+0xf1/0x340
[  +0.003840]  ? sched_clock_cpu+0xf/0x1f0
[  +0.003925]  __irq_exit_rcu+0xc2/0xe0
[  +0.003665]  common_interrupt+0x85/0xa0
[  +0.003839]  &lt;/IRQ&gt;
[  +0.002098]  &lt;TASK&gt;
[  +0.002106]  asm_common_interrupt+0x26/0x40
[  +0.004184] RIP: 0010:cpuidle_enter_state+0xd3/0x690

Fix this by performing the missing unmapping of XDP queues from
q_vectors and setting the XDP rings pointer back to NULL after all those
queues are released.
Also, add an immediate exit from the XDP callback in case of ring
preparation failure.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38127/">CVE-2025-38127 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38127">CVE-2025-38127 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245705">SUSE bug 1245705</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538128" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38128</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38128" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38128" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38128" ref_url="https://www.suse.com/security/cve/CVE-2025-38128" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: MGMT: reject malformed HCI_CMD_SYNC commands

In 'mgmt_hci_cmd_sync()', check whether the size of parameters passed
in 'struct mgmt_cp_hci_cmd_sync' matches the total size of the data
(i.e. 'sizeof(struct mgmt_cp_hci_cmd_sync)' plus trailing bytes).
Otherwise, large invalid 'params_len' will cause 'hci_cmd_sync_alloc()'
to do 'skb_put_data()' from an area beyond the one actually passed to
'mgmt_hci_cmd_sync()'.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-04-08"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38128/">CVE-2025-38128 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38128">CVE-2025-38128 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245703">SUSE bug 1245703</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245704">SUSE bug 1245704</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538129" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38129</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38129" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38129" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38129" ref_url="https://www.suse.com/security/cve/CVE-2025-38129" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3066" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003235.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3083" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024513.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024512.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0725-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0731-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024509.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0734-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0736-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0745-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024521.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20672-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20673-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20674-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024742.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20678-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20679-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20680-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20681-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20699-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20700-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024725.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20701-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20702-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024722.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20704-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024721.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20705-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024720.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

page_pool: Fix use-after-free in page_pool_recycle_in_ring

syzbot reported a uaf in page_pool_recycle_in_ring:

BUG: KASAN: slab-use-after-free in lock_release+0x151/0xa30 kernel/locking/lockdep.c:5862
Read of size 8 at addr ffff8880286045a0 by task syz.0.284/6943

CPU: 0 UID: 0 PID: 6943 Comm: syz.0.284 Not tainted 6.13.0-rc3-syzkaller-gdfa94ce54f41 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:94 [inline]
 dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120
 print_address_description mm/kasan/report.c:378 [inline]
 print_report+0x169/0x550 mm/kasan/report.c:489
 kasan_report+0x143/0x180 mm/kasan/report.c:602
 lock_release+0x151/0xa30 kernel/locking/lockdep.c:5862
 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:165 [inline]
 _raw_spin_unlock_bh+0x1b/0x40 kernel/locking/spinlock.c:210
 spin_unlock_bh include/linux/spinlock.h:396 [inline]
 ptr_ring_produce_bh include/linux/ptr_ring.h:164 [inline]
 page_pool_recycle_in_ring net/core/page_pool.c:707 [inline]
 page_pool_put_unrefed_netmem+0x748/0xb00 net/core/page_pool.c:826
 page_pool_put_netmem include/net/page_pool/helpers.h:323 [inline]
 page_pool_put_full_netmem include/net/page_pool/helpers.h:353 [inline]
 napi_pp_put_page+0x149/0x2b0 net/core/skbuff.c:1036
 skb_pp_recycle net/core/skbuff.c:1047 [inline]
 skb_free_head net/core/skbuff.c:1094 [inline]
 skb_release_data+0x6c4/0x8a0 net/core/skbuff.c:1125
 skb_release_all net/core/skbuff.c:1190 [inline]
 __kfree_skb net/core/skbuff.c:1204 [inline]
 sk_skb_reason_drop+0x1c9/0x380 net/core/skbuff.c:1242
 kfree_skb_reason include/linux/skbuff.h:1263 [inline]
 __skb_queue_purge_reason include/linux/skbuff.h:3343 [inline]

root cause is:

page_pool_recycle_in_ring
  ptr_ring_produce
    spin_lock(&amp;r-&gt;producer_lock);
    WRITE_ONCE(r-&gt;queue[r-&gt;producer++], ptr)
      //recycle last page to pool
				page_pool_release
				  page_pool_scrub
				    page_pool_empty_ring
				      ptr_ring_consume
				      page_pool_return_page  //release all page
				  __page_pool_destroy
				     free_percpu(pool-&gt;recycle_stats);
				     free(pool) //free

     spin_unlock(&amp;r-&gt;producer_lock); //pool-&gt;ring uaf read
  recycle_stat_inc(pool, ring);

page_pool can be free while page pool recycle the last page in ring.
Add producer-lock barrier to page_pool_release to prevent the page
pool from being free before all pages have been recycled.

recycle_stat_inc() is empty when CONFIG_PAGE_POOL_STATS is not
enabled, which will trigger Wempty-body build warning. Add definition
for pool stat macro to fix warning.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38129/">CVE-2025-38129 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38129">CVE-2025-38129 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245723">SUSE bug 1245723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258139">SUSE bug 1258139</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538134" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38134</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38134" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38134" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38134" ref_url="https://www.suse.com/security/cve/CVE-2025-38134" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: acpi: Prevent null pointer dereference in usb_acpi_add_usb4_devlink()

As demonstrated by the fix for update_port_device_state,
commit 12783c0b9e2c ("usb: core: Prevent null pointer dereference in update_port_device_state"),
usb_hub_to_struct_hub() can return NULL in certain scenarios,
such as during hub driver unbind or teardown race conditions,
even if the underlying usb_device structure exists.

Plus, all other places that call usb_hub_to_struct_hub() in the same file
do check for NULL return values.

If usb_hub_to_struct_hub() returns NULL, the subsequent access to
hub-&gt;ports[udev-&gt;portnum - 1] will cause a null pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38134/">CVE-2025-38134 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38134">CVE-2025-38134 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245678">SUSE bug 1245678</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38135</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38135" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38135" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38135" ref_url="https://www.suse.com/security/cve/CVE-2025-38135" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

serial: Fix potential null-ptr-deref in mlb_usio_probe()

devm_ioremap() can return NULL on error. Currently, mlb_usio_probe()
does not check for this case, which could result in a NULL pointer
dereference.

Add NULL check after devm_ioremap() to prevent this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38135/">CVE-2025-38135 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38135">CVE-2025-38135 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246023">SUSE bug 1246023</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38136</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38136" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38136" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38136" ref_url="https://www.suse.com/security/cve/CVE-2025-38136" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: renesas_usbhs: Reorder clock handling and power management in probe

Reorder the initialization sequence in `usbhs_probe()` to enable runtime
PM before accessing registers, preventing potential crashes due to
uninitialized clocks.

Currently, in the probe path, registers are accessed before enabling the
clocks, leading to a synchronous external abort on the RZ/V2H SoC.
The problematic call flow is as follows:

    usbhs_probe()
        usbhs_sys_clock_ctrl()
            usbhs_bset()
                usbhs_write()
                    iowrite16()  &lt;-- Register access before enabling clocks

Since `iowrite16()` is performed without ensuring the required clocks are
enabled, this can lead to access errors. To fix this, enable PM runtime
early in the probe function and ensure clocks are acquired before register
access, preventing crashes like the following on RZ/V2H:

[13.272640] Internal error: synchronous external abort: 0000000096000010 [#1] PREEMPT SMP
[13.280814] Modules linked in: cec renesas_usbhs(+) drm_kms_helper fuse drm backlight ipv6
[13.289088] CPU: 1 UID: 0 PID: 195 Comm: (udev-worker) Not tainted 6.14.0-rc7+ #98
[13.296640] Hardware name: Renesas RZ/V2H EVK Board based on r9a09g057h44 (DT)
[13.303834] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[13.310770] pc : usbhs_bset+0x14/0x4c [renesas_usbhs]
[13.315831] lr : usbhs_probe+0x2e4/0x5ac [renesas_usbhs]
[13.321138] sp : ffff8000827e3850
[13.324438] x29: ffff8000827e3860 x28: 0000000000000000 x27: ffff8000827e3ca0
[13.331554] x26: ffff8000827e3ba0 x25: ffff800081729668 x24: 0000000000000025
[13.338670] x23: ffff0000c0f08000 x22: 0000000000000000 x21: ffff0000c0f08010
[13.345783] x20: 0000000000000000 x19: ffff0000c3b52080 x18: 00000000ffffffff
[13.352895] x17: 0000000000000000 x16: 0000000000000000 x15: ffff8000827e36ce
[13.360009] x14: 00000000000003d7 x13: 00000000000003d7 x12: 0000000000000000
[13.367122] x11: 0000000000000000 x10: 0000000000000aa0 x9 : ffff8000827e3750
[13.374235] x8 : ffff0000c1850b00 x7 : 0000000003826060 x6 : 000000000000001c
[13.381347] x5 : 000000030d5fcc00 x4 : ffff8000825c0000 x3 : 0000000000000000
[13.388459] x2 : 0000000000000400 x1 : 0000000000000000 x0 : ffff0000c3b52080
[13.395574] Call trace:
[13.398013]  usbhs_bset+0x14/0x4c [renesas_usbhs] (P)
[13.403076]  platform_probe+0x68/0xdc
[13.406738]  really_probe+0xbc/0x2c0
[13.410306]  __driver_probe_device+0x78/0x120
[13.414653]  driver_probe_device+0x3c/0x154
[13.418825]  __driver_attach+0x90/0x1a0
[13.422647]  bus_for_each_dev+0x7c/0xe0
[13.426470]  driver_attach+0x24/0x30
[13.430032]  bus_add_driver+0xe4/0x208
[13.433766]  driver_register+0x68/0x130
[13.437587]  __platform_driver_register+0x24/0x30
[13.442273]  renesas_usbhs_driver_init+0x20/0x1000 [renesas_usbhs]
[13.448450]  do_one_initcall+0x60/0x1d4
[13.452276]  do_init_module+0x54/0x1f8
[13.456014]  load_module+0x1754/0x1c98
[13.459750]  init_module_from_file+0x88/0xcc
[13.464004]  __arm64_sys_finit_module+0x1c4/0x328
[13.468689]  invoke_syscall+0x48/0x104
[13.472426]  el0_svc_common.constprop.0+0xc0/0xe0
[13.477113]  do_el0_svc+0x1c/0x28
[13.480415]  el0_svc+0x30/0xcc
[13.483460]  el0t_64_sync_handler+0x10c/0x138
[13.487800]  el0t_64_sync+0x198/0x19c
[13.491453] Code: 2a0103e1 12003c42 12003c63 8b010084 (79400084)
[13.497522] ---[ end trace 0000000000000000 ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38136/">CVE-2025-38136 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38136">CVE-2025-38136 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245691">SUSE bug 1245691</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38137</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38137" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38137" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38137" ref_url="https://www.suse.com/security/cve/CVE-2025-38137" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

PCI/pwrctrl: Cancel outstanding rescan work when unregistering

It's possible to trigger use-after-free here by:

  (a) forcing rescan_work_func() to take a long time and
  (b) utilizing a pwrctrl driver that may be unloaded for some reason

Cancel outstanding work to ensure it is finished before we allow our data
structures to be cleaned up.

[bhelgaas: tidy commit log]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-04-08"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38137/">CVE-2025-38137 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38137">CVE-2025-38137 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245721">SUSE bug 1245721</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245722">SUSE bug 1245722</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38138</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38138" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38138" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38138" ref_url="https://www.suse.com/security/cve/CVE-2025-38138" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dmaengine: ti: Add NULL check in udma_probe()

devm_kasprintf() returns NULL when memory allocation fails. Currently,
udma_probe() does not check for this case, which results in a NULL
pointer dereference.

Add NULL check after devm_kasprintf() to prevent this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38138/">CVE-2025-38138 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38138">CVE-2025-38138 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245719">SUSE bug 1245719</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38140</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38140" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38140" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38140" ref_url="https://www.suse.com/security/cve/CVE-2025-38140" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dm: limit swapping tables for devices with zone write plugs

dm_revalidate_zones() only allowed new or previously unzoned devices to
call blk_revalidate_disk_zones(). If the device was already zoned,
disk-&gt;nr_zones would always equal md-&gt;nr_zones, so dm_revalidate_zones()
returned without doing any work. This would make the zoned settings for
the device not match the new table. If the device had zone write plug
resources, it could run into errors like bdev_zone_is_seq() reading
invalid memory because disk-&gt;conv_zones_bitmap was the wrong size.

If the device doesn't have any zone write plug resources, calling
blk_revalidate_disk_zones() will always correctly update device.  If
blk_revalidate_disk_zones() fails, it can still overwrite or clear the
current disk-&gt;nr_zones value. In this case, DM must restore the previous
value of disk-&gt;nr_zones, so that the zoned settings will continue to
match the previous value that it fell back to.

If the device already has zone write plug resources,
blk_revalidate_disk_zones() will not correctly update them, if it is
called for arbitrary zoned device changes.  Since there is not much need
for this ability, the easiest solution is to disallow any table reloads
that change the zoned settings, for devices that already have zone plug
resources.  Specifically, if a device already has zone plug resources
allocated, it can only switch to another zoned table that also emulates
zone append.  Also, it cannot change the device size or the zone size. A
device can switch to an error target.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38140/">CVE-2025-38140 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38140">CVE-2025-38140 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245717">SUSE bug 1245717</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38141</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38141" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38141" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38141" ref_url="https://www.suse.com/security/cve/CVE-2025-38141" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1143" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dm: fix dm_blk_report_zones

If dm_get_live_table() returned NULL, dm_put_live_table() was never
called. Also, it is possible that md-&gt;zone_revalidate_map will change
while calling this function. Only read it once, so that we are always
using the same value. Otherwise we might miss a call to
dm_put_live_table().

Finally, while md-&gt;zone_revalidate_map is set and a process is calling
blk_revalidate_disk_zones() to set up the zone append emulation
resources, it is possible that another process, perhaps triggered by
blkdev_report_zones_ioctl(), will call dm_blk_report_zones(). If
blk_revalidate_disk_zones() fails, these resources can be freed while
the other process is still using them, causing a use-after-free error.

blk_revalidate_disk_zones() will only ever be called when initially
setting up the zone append emulation resources, such as when setting up
a zoned dm-crypt table for the first time. Further table swaps will not
set md-&gt;zone_revalidate_map or call blk_revalidate_disk_zones().
However it must be called using the new table (referenced by
md-&gt;zone_revalidate_map) and the new queue limits while the DM device is
suspended. dm_blk_report_zones() needs some way to distinguish between a
call from blk_revalidate_disk_zones(), which must be allowed to use
md-&gt;zone_revalidate_map to access this not yet activated table, and all
other calls to dm_blk_report_zones(), which should not be allowed while
the device is suspended and cannot use md-&gt;zone_revalidate_map, since
the zone resources might be freed by the process currently calling
blk_revalidate_disk_zones().

Solve this by tracking the process that sets md-&gt;zone_revalidate_map in
dm_revalidate_zones() and only allowing that process to make use of it
in dm_blk_report_zones().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38141/">CVE-2025-38141 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38141">CVE-2025-38141 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245715">SUSE bug 1245715</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245716">SUSE bug 1245716</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38142</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38142" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38142" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38142" ref_url="https://www.suse.com/security/cve/CVE-2025-38142" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hwmon: (asus-ec-sensors) check sensor index in read_string()

Prevent a potential invalid memory access when the requested sensor
is not found.

find_ec_sensor_index() may return a negative value (e.g. -ENOENT),
but its result was used without checking, which could lead to
undefined behavior when passed to get_sensor_info().

Add a proper check to return -EINVAL if sensor_index is negative.

Found by Linux Verification Center (linuxtesting.org) with SVACE.

[groeck: Return error code returned from find_ec_sensor_index]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38142/">CVE-2025-38142 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38142">CVE-2025-38142 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245713">SUSE bug 1245713</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38143</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38143" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38143" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38143" ref_url="https://www.suse.com/security/cve/CVE-2025-38143" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

backlight: pm8941: Add NULL check in wled_configure()

devm_kasprintf() returns NULL when memory allocation fails. Currently,
wled_configure() does not check for this case, which results in a NULL
pointer dereference.

Add NULL check after devm_kasprintf() to prevent this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38143/">CVE-2025-38143 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38143">CVE-2025-38143 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245714">SUSE bug 1245714</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38145</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38145" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38145" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38145" ref_url="https://www.suse.com/security/cve/CVE-2025-38145" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

soc: aspeed: Add NULL check in aspeed_lpc_enable_snoop()

devm_kasprintf() returns NULL when memory allocation fails. Currently,
aspeed_lpc_enable_snoop() does not check for this case, which results in a
NULL pointer dereference.

Add NULL check after devm_kasprintf() to prevent this issue.

[arj: Fix Fixes: tag to use subject from 3772e5da4454]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38145/">CVE-2025-38145 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38145">CVE-2025-38145 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245765">SUSE bug 1245765</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38146</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38146" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38146" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38146" ref_url="https://www.suse.com/security/cve/CVE-2025-38146" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: openvswitch: Fix the dead loop of MPLS parse

The unexpected MPLS packet may not end with the bottom label stack.
When there are many stacks, The label count value has wrapped around.
A dead loop occurs, soft lockup/CPU stuck finally.

stack backtrace:
UBSAN: array-index-out-of-bounds in /build/linux-0Pa0xK/linux-5.15.0/net/openvswitch/flow.c:662:26
index -1 is out of range for type '__be32 [3]'
CPU: 34 PID: 0 Comm: swapper/34 Kdump: loaded Tainted: G           OE   5.15.0-121-generic #131-Ubuntu
Hardware name: Dell Inc. PowerEdge C6420/0JP9TF, BIOS 2.12.2 07/14/2021
Call Trace:
 &lt;IRQ&gt;
 show_stack+0x52/0x5c
 dump_stack_lvl+0x4a/0x63
 dump_stack+0x10/0x16
 ubsan_epilogue+0x9/0x36
 __ubsan_handle_out_of_bounds.cold+0x44/0x49
 key_extract_l3l4+0x82a/0x840 [openvswitch]
 ? kfree_skbmem+0x52/0xa0
 key_extract+0x9c/0x2b0 [openvswitch]
 ovs_flow_key_extract+0x124/0x350 [openvswitch]
 ovs_vport_receive+0x61/0xd0 [openvswitch]
 ? kernel_init_free_pages.part.0+0x4a/0x70
 ? get_page_from_freelist+0x353/0x540
 netdev_port_receive+0xc4/0x180 [openvswitch]
 ? netdev_port_receive+0x180/0x180 [openvswitch]
 netdev_frame_hook+0x1f/0x40 [openvswitch]
 __netif_receive_skb_core.constprop.0+0x23a/0xf00
 __netif_receive_skb_list_core+0xfa/0x240
 netif_receive_skb_list_internal+0x18e/0x2a0
 napi_complete_done+0x7a/0x1c0
 bnxt_poll+0x155/0x1c0 [bnxt_en]
 __napi_poll+0x30/0x180
 net_rx_action+0x126/0x280
 ? bnxt_msix+0x67/0x80 [bnxt_en]
 handle_softirqs+0xda/0x2d0
 irq_exit_rcu+0x96/0xc0
 common_interrupt+0x8e/0xa0
 &lt;/IRQ&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38146/">CVE-2025-38146 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38146">CVE-2025-38146 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245767">SUSE bug 1245767</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38148</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38148" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38148" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38148" ref_url="https://www.suse.com/security/cve/CVE-2025-38148" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: phy: mscc: Fix memory leak when using one step timestamping

Fix memory leak when running one-step timestamping. When running
one-step sync timestamping, the HW is configured to insert the TX time
into the frame, so there is no reason to keep the skb anymore. As in
this case the HW will never generate an interrupt to say that the frame
was timestamped, then the frame will never released.
Fix this by freeing the frame in case of one-step timestamping.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38148/">CVE-2025-38148 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38148">CVE-2025-38148 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245735">SUSE bug 1245735</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538149" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38149</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38149" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38149" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38149" ref_url="https://www.suse.com/security/cve/CVE-2025-38149" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: phy: clear phydev-&gt;devlink when the link is deleted

There is a potential crash issue when disabling and re-enabling the
network port. When disabling the network port, phy_detach() calls
device_link_del() to remove the device link, but it does not clear
phydev-&gt;devlink, so phydev-&gt;devlink is not a NULL pointer. Then the
network port is re-enabled, but if phy_attach_direct() fails before
calling device_link_add(), the code jumps to the "error" label and
calls phy_detach(). Since phydev-&gt;devlink retains the old value from
the previous attach/detach cycle, device_link_del() uses the old value,
which accesses a NULL pointer and causes a crash. The simplified crash
log is as follows.

[   24.702421] Call trace:
[   24.704856]  device_link_put_kref+0x20/0x120
[   24.709124]  device_link_del+0x30/0x48
[   24.712864]  phy_detach+0x24/0x168
[   24.716261]  phy_attach_direct+0x168/0x3a4
[   24.720352]  phylink_fwnode_phy_connect+0xc8/0x14c
[   24.725140]  phylink_of_phy_connect+0x1c/0x34

Therefore, phydev-&gt;devlink needs to be cleared when the device link is
deleted.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38149/">CVE-2025-38149 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38149">CVE-2025-38149 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245737">SUSE bug 1245737</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538151" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38151</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38151" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38151" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38151" ref_url="https://www.suse.com/security/cve/CVE-2025-38151" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/cma: Fix hang when cma_netevent_callback fails to queue_work

The cited commit fixed a crash when cma_netevent_callback was called for
a cma_id while work on that id from a previous call had not yet started.
The work item was re-initialized in the second call, which corrupted the
work item currently in the work queue.

However, it left a problem when queue_work fails (because the item is
still pending in the work queue from a previous call). In this case,
cma_id_put (which is called in the work handler) is therefore not
called. This results in a userspace process hang (zombie process).

Fix this by calling cma_id_put() if queue_work fails.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38151/">CVE-2025-38151 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38151">CVE-2025-38151 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245745">SUSE bug 1245745</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38153</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38153" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38153" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38153" ref_url="https://www.suse.com/security/cve/CVE-2025-38153" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: usb: aqc111: fix error handling of usbnet read calls

Syzkaller, courtesy of syzbot, identified an error (see report [1]) in
aqc111 driver, caused by incomplete sanitation of usb read calls'
results. This problem is quite similar to the one fixed in commit
920a9fa27e78 ("net: asix: add proper error handling of usb read errors").

For instance, usbnet_read_cmd() may read fewer than 'size' bytes,
even if the caller expected the full amount, and aqc111_read_cmd()
will not check its result properly. As [1] shows, this may lead
to MAC address in aqc111_bind() being only partly initialized,
triggering KMSAN warnings.

Fix the issue by verifying that the number of bytes read is
as expected and not less.

[1] Partial syzbot report:
BUG: KMSAN: uninit-value in is_valid_ether_addr include/linux/etherdevice.h:208 [inline]
BUG: KMSAN: uninit-value in usbnet_probe+0x2e57/0x4390 drivers/net/usb/usbnet.c:1830
 is_valid_ether_addr include/linux/etherdevice.h:208 [inline]
 usbnet_probe+0x2e57/0x4390 drivers/net/usb/usbnet.c:1830
 usb_probe_interface+0xd01/0x1310 drivers/usb/core/driver.c:396
 call_driver_probe drivers/base/dd.c:-1 [inline]
 really_probe+0x4d1/0xd90 drivers/base/dd.c:658
 __driver_probe_device+0x268/0x380 drivers/base/dd.c:800
...

Uninit was stored to memory at:
 dev_addr_mod+0xb0/0x550 net/core/dev_addr_lists.c:582
 __dev_addr_set include/linux/netdevice.h:4874 [inline]
 eth_hw_addr_set include/linux/etherdevice.h:325 [inline]
 aqc111_bind+0x35f/0x1150 drivers/net/usb/aqc111.c:717
 usbnet_probe+0xbe6/0x4390 drivers/net/usb/usbnet.c:1772
 usb_probe_interface+0xd01/0x1310 drivers/usb/core/driver.c:396
...

Uninit was stored to memory at:
 ether_addr_copy include/linux/etherdevice.h:305 [inline]
 aqc111_read_perm_mac drivers/net/usb/aqc111.c:663 [inline]
 aqc111_bind+0x794/0x1150 drivers/net/usb/aqc111.c:713
 usbnet_probe+0xbe6/0x4390 drivers/net/usb/usbnet.c:1772
 usb_probe_interface+0xd01/0x1310 drivers/usb/core/driver.c:396
 call_driver_probe drivers/base/dd.c:-1 [inline]
...

Local variable buf.i created at:
 aqc111_read_perm_mac drivers/net/usb/aqc111.c:656 [inline]
 aqc111_bind+0x221/0x1150 drivers/net/usb/aqc111.c:713
 usbnet_probe+0xbe6/0x4390 drivers/net/usb/usbnet.c:1772
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38153/">CVE-2025-38153 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38153">CVE-2025-38153 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245744">SUSE bug 1245744</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38154</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38154" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38154" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38154" ref_url="https://www.suse.com/security/cve/CVE-2025-38154" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3520" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002628.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf, sockmap: Avoid using sk_socket after free when sending

The sk-&gt;sk_socket is not locked or referenced in backlog thread, and
during the call to skb_send_sock(), there is a race condition with
the release of sk_socket. All types of sockets(tcp/udp/unix/vsock)
will be affected.

Race conditions:
'''
CPU0                               CPU1

backlog::skb_send_sock
  sendmsg_unlocked
    sock_sendmsg
      sock_sendmsg_nosec
                                   close(fd):
                                     ...
                                     ops-&gt;release() -&gt; sock_map_close()
                                     sk_socket-&gt;ops = NULL
                                     free(socket)
      sock-&gt;ops-&gt;sendmsg
            ^
            panic here
'''

The ref of psock become 0 after sock_map_close() executed.
'''
void sock_map_close()
{
    ...
    if (likely(psock)) {
    ...
    // !! here we remove psock and the ref of psock become 0
    sock_map_remove_links(sk, psock)
    psock = sk_psock_get(sk);
    if (unlikely(!psock))
        goto no_psock; &lt;=== Control jumps here via goto
        ...
        cancel_delayed_work_sync(&amp;psock-&gt;work); &lt;=== not executed
        sk_psock_put(sk, psock);
        ...
}
'''

Based on the fact that we already wait for the workqueue to finish in
sock_map_close() if psock is held, we simply increase the psock
reference count to avoid race conditions.

With this patch, if the backlog thread is running, sock_map_close() will
wait for the backlog thread to complete and cancel all pending work.

If no backlog running, any pending work that hasn't started by then will
fail when invoked by sk_psock_get(), as the psock reference count have
been zeroed, and sk_psock_drop() will cancel all jobs via
cancel_delayed_work_sync().

In summary, we require synchronization to coordinate the backlog thread
and close() thread.

The panic I catched:
'''
Workqueue: events sk_psock_backlog
RIP: 0010:sock_sendmsg+0x21d/0x440
RAX: 0000000000000000 RBX: ffffc9000521fad8 RCX: 0000000000000001
...
Call Trace:
 &lt;TASK&gt;
 ? die_addr+0x40/0xa0
 ? exc_general_protection+0x14c/0x230
 ? asm_exc_general_protection+0x26/0x30
 ? sock_sendmsg+0x21d/0x440
 ? sock_sendmsg+0x3e0/0x440
 ? __pfx_sock_sendmsg+0x10/0x10
 __skb_send_sock+0x543/0xb70
 sk_psock_backlog+0x247/0xb80
...
'''
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38154/">CVE-2025-38154 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38154">CVE-2025-38154 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245749">SUSE bug 1245749</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38155</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38155" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38155" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38155" ref_url="https://www.suse.com/security/cve/CVE-2025-38155" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mt76: mt7915: Fix null-ptr-deref in mt7915_mmio_wed_init()

devm_ioremap() returns NULL on error. Currently, mt7915_mmio_wed_init()
does not check for this case, which results in a NULL pointer
dereference.

Prevent null pointer dereference in mt7915_mmio_wed_init().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38155/">CVE-2025-38155 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38155">CVE-2025-38155 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245748">SUSE bug 1245748</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38156</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38156" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38156" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38156" ref_url="https://www.suse.com/security/cve/CVE-2025-38156" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mt76: mt7996: Fix null-ptr-deref in mt7996_mmio_wed_init()

devm_ioremap() returns NULL on error. Currently, mt7996_mmio_wed_init()
does not check for this case, which results in a NULL pointer
dereference.

Prevent null pointer dereference in mt7996_mmio_wed_init()
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38156/">CVE-2025-38156 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38156">CVE-2025-38156 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246034">SUSE bug 1246034</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538157" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38157</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38157" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38157" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38157" ref_url="https://www.suse.com/security/cve/CVE-2025-38157" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath9k_htc: Abort software beacon handling if disabled

A malicious USB device can send a WMI_SWBA_EVENTID event from an
ath9k_htc-managed device before beaconing has been enabled. This causes
a device-by-zero error in the driver, leading to either a crash or an
out of bounds read.

Prevent this by aborting the handling in ath9k_htc_swba() if beacons are
not enabled.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38157/">CVE-2025-38157 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38157">CVE-2025-38157 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245747">SUSE bug 1245747</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538159" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38159</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38159" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38159" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38159" ref_url="https://www.suse.com/security/cve/CVE-2025-38159" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:13589" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001909.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:13962" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0992-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024847.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20891-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20892-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20893-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045161.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: rtw88: fix the 'para' buffer size to avoid reading out of bounds

Set the size to 6 instead of 2, since 'para' array is passed to
'rtw_fw_bt_wifi_control(rtwdev, para[0], &amp;para[1])', which reads
5 bytes:

void rtw_fw_bt_wifi_control(struct rtw_dev *rtwdev, u8 op_code, u8 *data)
{
    ...
    SET_BT_WIFI_CONTROL_DATA1(h2c_pkt, *data);
    SET_BT_WIFI_CONTROL_DATA2(h2c_pkt, *(data + 1));
    ...
    SET_BT_WIFI_CONTROL_DATA5(h2c_pkt, *(data + 4));

Detected using the static analysis tool - Svace.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-31"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38159/">CVE-2025-38159 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38159">CVE-2025-38159 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245751">SUSE bug 1245751</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257629">SUSE bug 1257629</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38160</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38160" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38160" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38160" ref_url="https://www.suse.com/security/cve/CVE-2025-38160" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

clk: bcm: rpi: Add NULL check in raspberrypi_clk_register()

devm_kasprintf() returns NULL when memory allocation fails. Currently,
raspberrypi_clk_register() does not check for this case, which results
in a NULL pointer dereference.

Add NULL check after devm_kasprintf() to prevent this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38160/">CVE-2025-38160 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38160">CVE-2025-38160 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245780">SUSE bug 1245780</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538161" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38161</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38161" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38161" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38161" ref_url="https://www.suse.com/security/cve/CVE-2025-38161" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/mlx5: Fix error flow upon firmware failure for RQ destruction

Upon RQ destruction if the firmware command fails which is the
last resource to be destroyed some SW resources were already cleaned
regardless of the failure.

Now properly rollback the object to its original state upon such failure.

In order to avoid a use-after free in case someone tries to destroy the
object again, which results in the following kernel trace:
refcount_t: underflow; use-after-free.
WARNING: CPU: 0 PID: 37589 at lib/refcount.c:28 refcount_warn_saturate+0xf4/0x148
Modules linked in: rdma_ucm(OE) rdma_cm(OE) iw_cm(OE) ib_ipoib(OE) ib_cm(OE) ib_umad(OE) mlx5_ib(OE) rfkill mlx5_core(OE) mlxdevm(OE) ib_uverbs(OE) ib_core(OE) psample mlxfw(OE) mlx_compat(OE) macsec tls pci_hyperv_intf sunrpc vfat fat virtio_net net_failover failover fuse loop nfnetlink vsock_loopback vmw_vsock_virtio_transport_common vmw_vsock_vmci_transport vmw_vmci vsock xfs crct10dif_ce ghash_ce sha2_ce sha256_arm64 sha1_ce virtio_console virtio_gpu virtio_blk virtio_dma_buf virtio_mmio dm_mirror dm_region_hash dm_log dm_mod xpmem(OE)
CPU: 0 UID: 0 PID: 37589 Comm: python3 Kdump: loaded Tainted: G           OE     -------  ---  6.12.0-54.el10.aarch64 #1
Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE
Hardware name: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015
pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : refcount_warn_saturate+0xf4/0x148
lr : refcount_warn_saturate+0xf4/0x148
sp : ffff80008b81b7e0
x29: ffff80008b81b7e0 x28: ffff000133d51600 x27: 0000000000000001
x26: 0000000000000000 x25: 00000000ffffffea x24: ffff00010ae80f00
x23: ffff00010ae80f80 x22: ffff0000c66e5d08 x21: 0000000000000000
x20: ffff0000c66e0000 x19: ffff00010ae80340 x18: 0000000000000006
x17: 0000000000000000 x16: 0000000000000020 x15: ffff80008b81b37f
x14: 0000000000000000 x13: 2e656572662d7265 x12: ffff80008283ef78
x11: ffff80008257efd0 x10: ffff80008283efd0 x9 : ffff80008021ed90
x8 : 0000000000000001 x7 : 00000000000bffe8 x6 : c0000000ffff7fff
x5 : ffff0001fb8e3408 x4 : 0000000000000000 x3 : ffff800179993000
x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff000133d51600
Call trace:
 refcount_warn_saturate+0xf4/0x148
 mlx5_core_put_rsc+0x88/0xa0 [mlx5_ib]
 mlx5_core_destroy_rq_tracked+0x64/0x98 [mlx5_ib]
 mlx5_ib_destroy_wq+0x34/0x80 [mlx5_ib]
 ib_destroy_wq_user+0x30/0xc0 [ib_core]
 uverbs_free_wq+0x28/0x58 [ib_uverbs]
 destroy_hw_idr_uobject+0x34/0x78 [ib_uverbs]
 uverbs_destroy_uobject+0x48/0x240 [ib_uverbs]
 __uverbs_cleanup_ufile+0xd4/0x1a8 [ib_uverbs]
 uverbs_destroy_ufile_hw+0x48/0x120 [ib_uverbs]
 ib_uverbs_close+0x2c/0x100 [ib_uverbs]
 __fput+0xd8/0x2f0
 __fput_sync+0x50/0x70
 __arm64_sys_close+0x40/0x90
 invoke_syscall.constprop.0+0x74/0xd0
 do_el0_svc+0x48/0xe8
 el0_svc+0x44/0x1d0
 el0t_64_sync_handler+0x120/0x130
 el0t_64_sync+0x1a4/0x1a8
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38161/">CVE-2025-38161 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38161">CVE-2025-38161 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245777">SUSE bug 1245777</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538165" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38165</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38165" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38165" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38165" ref_url="https://www.suse.com/security/cve/CVE-2025-38165" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf, sockmap: Fix panic when calling skb_linearize

The panic can be reproduced by executing the command:
./bench sockmap -c 2 -p 1 -a --rx-verdict-ingress --rx-strp 100000

Then a kernel panic was captured:
'''
[  657.460555] kernel BUG at net/core/skbuff.c:2178!
[  657.462680] Tainted: [W]=WARN
[  657.463287] Workqueue: events sk_psock_backlog
...
[  657.469610]  &lt;TASK&gt;
[  657.469738]  ? die+0x36/0x90
[  657.469916]  ? do_trap+0x1d0/0x270
[  657.470118]  ? pskb_expand_head+0x612/0xf40
[  657.470376]  ? pskb_expand_head+0x612/0xf40
[  657.470620]  ? do_error_trap+0xa3/0x170
[  657.470846]  ? pskb_expand_head+0x612/0xf40
[  657.471092]  ? handle_invalid_op+0x2c/0x40
[  657.471335]  ? pskb_expand_head+0x612/0xf40
[  657.471579]  ? exc_invalid_op+0x2d/0x40
[  657.471805]  ? asm_exc_invalid_op+0x1a/0x20
[  657.472052]  ? pskb_expand_head+0xd1/0xf40
[  657.472292]  ? pskb_expand_head+0x612/0xf40
[  657.472540]  ? lock_acquire+0x18f/0x4e0
[  657.472766]  ? find_held_lock+0x2d/0x110
[  657.472999]  ? __pfx_pskb_expand_head+0x10/0x10
[  657.473263]  ? __kmalloc_cache_noprof+0x5b/0x470
[  657.473537]  ? __pfx___lock_release.isra.0+0x10/0x10
[  657.473826]  __pskb_pull_tail+0xfd/0x1d20
[  657.474062]  ? __kasan_slab_alloc+0x4e/0x90
[  657.474707]  sk_psock_skb_ingress_enqueue+0x3bf/0x510
[  657.475392]  ? __kasan_kmalloc+0xaa/0xb0
[  657.476010]  sk_psock_backlog+0x5cf/0xd70
[  657.476637]  process_one_work+0x858/0x1a20
'''

The panic originates from the assertion BUG_ON(skb_shared(skb)) in
skb_linearize(). A previous commit(see Fixes tag) introduced skb_get()
to avoid race conditions between skb operations in the backlog and skb
release in the recvmsg path. However, this caused the panic to always
occur when skb_linearize is executed.

The "--rx-strp 100000" parameter forces the RX path to use the strparser
module which aggregates data until it reaches 100KB before calling sockmap
logic. The 100KB payload exceeds MAX_MSG_FRAGS, triggering skb_linearize.

To fix this issue, just move skb_get into sk_psock_skb_ingress_enqueue.

'''
sk_psock_backlog:
    sk_psock_handle_skb
       skb_get(skb) &lt;== we move it into 'sk_psock_skb_ingress_enqueue'
       sk_psock_skb_ingress____________
                                       v
                                       |
                                       | -&gt; sk_psock_skb_ingress_self
                                       |      sk_psock_skb_ingress_enqueue
sk_psock_verdict_apply_________________^          skb_linearize
'''

Note that for verdict_apply path, the skb_get operation is unnecessary so
we add 'take_ref' param to control it's behavior.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38165/">CVE-2025-38165 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38165">CVE-2025-38165 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245757">SUSE bug 1245757</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538168" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38168</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38168" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38168" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38168" ref_url="https://www.suse.com/security/cve/CVE-2025-38168" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

perf: arm-ni: Unregister PMUs on probe failure

When a resource allocation fails in one clock domain of an NI device,
we need to properly roll back all previously registered perf PMUs in
other clock domains of the same device.

Otherwise, it can lead to kernel panics.

Calling arm_ni_init+0x0/0xff8 [arm_ni] @ 2374
arm-ni ARMHCB70:00: Failed to request PMU region 0x1f3c13000
arm-ni ARMHCB70:00: probe with driver arm-ni failed with error -16
list_add corruption: next-&gt;prev should be prev (fffffd01e9698a18),
but was 0000000000000000. (next=ffff10001a0decc8).
pstate: 6340009 (nZCv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)
pc : list_add_valid_or_report+0x7c/0xb8
lr : list_add_valid_or_report+0x7c/0xb8
Call trace:
 __list_add_valid_or_report+0x7c/0xb8
 perf_pmu_register+0x22c/0x3a0
 arm_ni_probe+0x554/0x70c [arm_ni]
 platform_probe+0x70/0xe8
 really_probe+0xc6/0x4d8
 driver_probe_device+0x48/0x170
 __driver_attach+0x8e/0x1c0
 bus_for_each_dev+0x64/0xf0
 driver_add+0x138/0x260
 bus_add_driver+0x68/0x138
 __platform_driver_register+0x2c/0x40
 arm_ni_init+0x14/0x2a [arm_ni]
 do_init_module+0x36/0x298
---[ end trace 0000000000000000 ]---
Kernel panic - not syncing: Oops - BUG: Fatal exception
SMP: stopping secondary CPUs
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38168/">CVE-2025-38168 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38168">CVE-2025-38168 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245763">SUSE bug 1245763</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38169</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38169" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38169" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38169" ref_url="https://www.suse.com/security/cve/CVE-2025-38169" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

arm64/fpsimd: Avoid clobbering kernel FPSIMD state with SMSTOP

On system with SME, a thread's kernel FPSIMD state may be erroneously
clobbered during a context switch immediately after that state is
restored. Systems without SME are unaffected.

If the CPU happens to be in streaming SVE mode before a context switch
to a thread with kernel FPSIMD state, fpsimd_thread_switch() will
restore the kernel FPSIMD state using fpsimd_load_kernel_state() while
the CPU is still in streaming SVE mode. When fpsimd_thread_switch()
subsequently calls fpsimd_flush_cpu_state(), this will execute an
SMSTOP, causing an exit from streaming SVE mode. The exit from
streaming SVE mode will cause the hardware to reset a number of
FPSIMD/SVE/SME registers, clobbering the FPSIMD state.

Fix this by calling fpsimd_flush_cpu_state() before restoring the kernel
FPSIMD state.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38169/">CVE-2025-38169 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38169">CVE-2025-38169 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245784">SUSE bug 1245784</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38170</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38170" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38170" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38170" ref_url="https://www.suse.com/security/cve/CVE-2025-38170" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

arm64/fpsimd: Discard stale CPU state when handling SME traps

The logic for handling SME traps manipulates saved FPSIMD/SVE/SME state
incorrectly, and a race with preemption can result in a task having
TIF_SME set and TIF_FOREIGN_FPSTATE clear even though the live CPU state
is stale (e.g. with SME traps enabled). This can result in warnings from
do_sme_acc() where SME traps are not expected while TIF_SME is set:

|        /* With TIF_SME userspace shouldn't generate any traps */
|        if (test_and_set_thread_flag(TIF_SME))
|                WARN_ON(1);

This is very similar to the SVE issue we fixed in commit:

  751ecf6afd6568ad ("arm64/sve: Discard stale CPU state when handling SVE traps")

The race can occur when the SME trap handler is preempted before and
after manipulating the saved FPSIMD/SVE/SME state, starting and ending on
the same CPU, e.g.

| void do_sme_acc(unsigned long esr, struct pt_regs *regs)
| {
|         // Trap on CPU 0 with TIF_SME clear, SME traps enabled
|         // task-&gt;fpsimd_cpu is 0.
|         // per_cpu_ptr(&amp;fpsimd_last_state, 0) is task.
|
|         ...
|
|         // Preempted; migrated from CPU 0 to CPU 1.
|         // TIF_FOREIGN_FPSTATE is set.
|
|         get_cpu_fpsimd_context();
|
|         /* With TIF_SME userspace shouldn't generate any traps */
|         if (test_and_set_thread_flag(TIF_SME))
|                 WARN_ON(1);
|
|         if (!test_thread_flag(TIF_FOREIGN_FPSTATE)) {
|                 unsigned long vq_minus_one =
|                         sve_vq_from_vl(task_get_sme_vl(current)) - 1;
|                 sme_set_vq(vq_minus_one);
|
|                 fpsimd_bind_task_to_cpu();
|         }
|
|         put_cpu_fpsimd_context();
|
|         // Preempted; migrated from CPU 1 to CPU 0.
|         // task-&gt;fpsimd_cpu is still 0
|         // If per_cpu_ptr(&amp;fpsimd_last_state, 0) is still task then:
|         // - Stale HW state is reused (with SME traps enabled)
|         // - TIF_FOREIGN_FPSTATE is cleared
|         // - A return to userspace skips HW state restore
| }

Fix the case where the state is not live and TIF_FOREIGN_FPSTATE is set
by calling fpsimd_flush_task_state() to detach from the saved CPU
state. This ensures that a subsequent context switch will not reuse the
stale CPU state, and will instead set TIF_FOREIGN_FPSTATE, forcing the
new state to be reloaded from memory prior to a return to userspace.

Note: this was originallly posted as [1].

[ Rutland: rewrite commit message ]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38170/">CVE-2025-38170 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38170">CVE-2025-38170 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245785">SUSE bug 1245785</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538172" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38172</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38172" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38172" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38172" ref_url="https://www.suse.com/security/cve/CVE-2025-38172" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

erofs: avoid using multiple devices with different type

For multiple devices, both primary and extra devices should be the
same type. `erofs_init_device` has already guaranteed that if the
primary is a file-backed device, extra devices should also be
regular files.

However, if the primary is a block device while the extra device
is a file-backed device, `erofs_init_device` will get an ENOTBLK,
which is not treated as an error in `erofs_fc_get_tree`, and that
leads to an UAF:

  erofs_fc_get_tree
    get_tree_bdev_flags(erofs_fc_fill_super)
      erofs_read_superblock
        erofs_init_device  // sbi-&gt;dif0 is not inited yet,
                           // return -ENOTBLK
      deactivate_locked_super
        free(sbi)
    if (err is -ENOTBLK)
      sbi-&gt;dif0.file = filp_open()  // sbi UAF

So if -ENOTBLK is hitted in `erofs_init_device`, it means the
primary device must be a block device, and the extra device
is not a block device. The error can be converted to -EINVAL.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38172/">CVE-2025-38172 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38172">CVE-2025-38172 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245787">SUSE bug 1245787</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538173" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38173</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38173" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38173" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38173" ref_url="https://www.suse.com/security/cve/CVE-2025-38173" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: marvell/cesa - Handle zero-length skcipher requests

Do not access random memory for zero-length skcipher requests.
Just return 0.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38173/">CVE-2025-38173 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38173">CVE-2025-38173 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245769">SUSE bug 1245769</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38174</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38174" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38174" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38174" ref_url="https://www.suse.com/security/cve/CVE-2025-38174" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

thunderbolt: Do not double dequeue a configuration request

Some of our devices crash in tb_cfg_request_dequeue():

 general protection fault, probably for non-canonical address 0xdead000000000122

 CPU: 6 PID: 91007 Comm: kworker/6:2 Tainted: G U W 6.6.65
 RIP: 0010:tb_cfg_request_dequeue+0x2d/0xa0
 Call Trace:
 &lt;TASK&gt;
 ? tb_cfg_request_dequeue+0x2d/0xa0
 tb_cfg_request_work+0x33/0x80
 worker_thread+0x386/0x8f0
 kthread+0xed/0x110
 ret_from_fork+0x38/0x50
 ret_from_fork_asm+0x1b/0x30

The circumstances are unclear, however, the theory is that
tb_cfg_request_work() can be scheduled twice for a request:
first time via frame.callback from ring_work() and second
time from tb_cfg_request().  Both times kworkers will execute
tb_cfg_request_dequeue(), which results in double list_del()
from the ctl-&gt;request_queue (the list poison deference hints
at it: 0xdead000000000122).

Do not dequeue requests that don't have TB_CFG_REQUEST_ACTIVE
bit set.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38174/">CVE-2025-38174 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38174">CVE-2025-38174 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245781">SUSE bug 1245781</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38177</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38177" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38177" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38177" ref_url="https://www.suse.com/security/cve/CVE-2025-38177" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:14748" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02848-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02849-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02850-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02851-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02852-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03317-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03329-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03336-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03337-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03341-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03342-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03370-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041847.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03374-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03375-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03387-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03391-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03393-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03395-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03397-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03400-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03406-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03410-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03414-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03418-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20722-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20723-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20724-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20726-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20727-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20728-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20729-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20730-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20733-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20734-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20737-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20738-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20768-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20769-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20770-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20771-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20774-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20784-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20785-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20786-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20787-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20788-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20789-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0688-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024506.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sch_hfsc: make hfsc_qlen_notify() idempotent

hfsc_qlen_notify() is not idempotent either and not friendly
to its callers, like fq_codel_dequeue(). Let's make it idempotent
to ease qdisc_tree_reduce_backlog() callers' life:

1. update_vf() decreases cl-&gt;cl_nactive, so we can check whether it is
non-zero before calling it.

2. eltree_remove() always removes RB node cl-&gt;el_node, but we can use
   RB_EMPTY_NODE() + RB_CLEAR_NODE() to make it safe.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38177/">CVE-2025-38177 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38177">CVE-2025-38177 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1237312">SUSE bug 1237312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245986">SUSE bug 1245986</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246356">SUSE bug 1246356</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247374">SUSE bug 1247374</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38180</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38180" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38180" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38180" ref_url="https://www.suse.com/security/cve/CVE-2025-38180" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:6037" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002632.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6153" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03283-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03310-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03314-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: atm: fix /proc/net/atm/lec handling

/proc/net/atm/lec must ensure safety against dev_lec[] changes.

It appears it had dev_put() calls without prior dev_hold(),
leading to imbalance and UAF.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38180/">CVE-2025-38180 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38180">CVE-2025-38180 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245970">SUSE bug 1245970</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1245971">SUSE bug 1245971</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38181</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38181" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38181" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38181" ref_url="https://www.suse.com/security/cve/CVE-2025-38181" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02588-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02848-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02849-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02850-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02851-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02852-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03317-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03329-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041816.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03336-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03337-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03339-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03341-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03342-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041834.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022637.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03362-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03363-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03370-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041847.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03374-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03375-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03387-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03389-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03391-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03393-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03395-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03396-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03397-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03400-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03406-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03410-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03412-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03414-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03418-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03419-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20722-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20723-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20724-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20726-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20727-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20728-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20729-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20730-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20731-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20733-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20734-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20735-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20737-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20738-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20768-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20769-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20770-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20771-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20772-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20774-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20784-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20785-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20786-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20787-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20788-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20789-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20790-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

calipso: Fix null-ptr-deref in calipso_req_{set,del}attr().

syzkaller reported a null-ptr-deref in sock_omalloc() while allocating
a CALIPSO option.  [0]

The NULL is of struct sock, which was fetched by sk_to_full_sk() in
calipso_req_setattr().

Since commit a1a5344ddbe8 ("tcp: avoid two atomic ops for syncookies"),
reqsk-&gt;rsk_listener could be NULL when SYN Cookie is returned to its
client, as hinted by the leading SYN Cookie log.

Here are 3 options to fix the bug:

  1) Return 0 in calipso_req_setattr()
  2) Return an error in calipso_req_setattr()
  3) Alaways set rsk_listener

1) is no go as it bypasses LSM, but 2) effectively disables SYN Cookie
for CALIPSO.  3) is also no go as there have been many efforts to reduce
atomic ops and make TCP robust against DDoS.  See also commit 3b24d854cb35
("tcp/dccp: do not touch listener sk_refcnt under synflood").

As of the blamed commit, SYN Cookie already did not need refcounting,
and no one has stumbled on the bug for 9 years, so no CALIPSO user will
care about SYN Cookie.

Let's return an error in calipso_req_setattr() and calipso_req_delattr()
in the SYN Cookie case.

This can be reproduced by [1] on Fedora and now connect() of nc times out.

[0]:
TCP: request_sock_TCPv6: Possible SYN flooding on port [::]:20002. Sending cookies.
Oops: general protection fault, probably for non-canonical address 0xdffffc0000000006: 0000 [#1] PREEMPT SMP KASAN NOPTI
KASAN: null-ptr-deref in range [0x0000000000000030-0x0000000000000037]
CPU: 3 UID: 0 PID: 12262 Comm: syz.1.2611 Not tainted 6.14.0 #2
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014
RIP: 0010:read_pnet include/net/net_namespace.h:406 [inline]
RIP: 0010:sock_net include/net/sock.h:655 [inline]
RIP: 0010:sock_kmalloc+0x35/0x170 net/core/sock.c:2806
Code: 89 d5 41 54 55 89 f5 53 48 89 fb e8 25 e3 c6 fd e8 f0 91 e3 00 48 8d 7b 30 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 &lt;80&gt; 3c 02 00 0f 85 26 01 00 00 48 b8 00 00 00 00 00 fc ff df 4c 8b
RSP: 0018:ffff88811af89038 EFLAGS: 00010216
RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffff888105266400
RDX: 0000000000000006 RSI: ffff88800c890000 RDI: 0000000000000030
RBP: 0000000000000050 R08: 0000000000000000 R09: ffff88810526640e
R10: ffffed1020a4cc81 R11: ffff88810526640f R12: 0000000000000000
R13: 0000000000000820 R14: ffff888105266400 R15: 0000000000000050
FS:  00007f0653a07640(0000) GS:ffff88811af80000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f863ba096f4 CR3: 00000000163c0005 CR4: 0000000000770ef0
PKRU: 80000000
Call Trace:
 &lt;IRQ&gt;
 ipv6_renew_options+0x279/0x950 net/ipv6/exthdrs.c:1288
 calipso_req_setattr+0x181/0x340 net/ipv6/calipso.c:1204
 calipso_req_setattr+0x56/0x80 net/netlabel/netlabel_calipso.c:597
 netlbl_req_setattr+0x18a/0x440 net/netlabel/netlabel_kapi.c:1249
 selinux_netlbl_inet_conn_request+0x1fb/0x320 security/selinux/netlabel.c:342
 selinux_inet_conn_request+0x1eb/0x2c0 security/selinux/hooks.c:5551
 security_inet_conn_request+0x50/0xa0 security/security.c:4945
 tcp_v6_route_req+0x22c/0x550 net/ipv6/tcp_ipv6.c:825
 tcp_conn_request+0xec8/0x2b70 net/ipv4/tcp_input.c:7275
 tcp_v6_conn_request+0x1e3/0x440 net/ipv6/tcp_ipv6.c:1328
 tcp_rcv_state_process+0xafa/0x52b0 net/ipv4/tcp_input.c:6781
 tcp_v6_do_rcv+0x8a6/0x1a40 net/ipv6/tcp_ipv6.c:1667
 tcp_v6_rcv+0x505e/0x5b50 net/ipv6/tcp_ipv6.c:1904
 ip6_protocol_deliver_rcu+0x17c/0x1da0 net/ipv6/ip6_input.c:436
 ip6_input_finish+0x103/0x180 net/ipv6/ip6_input.c:480
 NF_HOOK include/linux/netfilter.h:314 [inline]
 NF_HOOK include/linux/netfilter.h:308 [inline]
 ip6_input+0x13c/0x6b0 net/ipv6/ip6_input.c:491
 dst_input include/net/dst.h:469 [inline]
 ip6_rcv_finish net/ipv6/ip6_input.c:79 [inline]
 ip6_rcv_finish+0xb6/0x490 net/ipv6/ip6_input.c:69
 NF_HOOK include/linux/netfilter.h:314 [inline]
 NF_HOOK include/linux/netf
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38181/">CVE-2025-38181 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38181">CVE-2025-38181 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246000">SUSE bug 1246000</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246001">SUSE bug 1246001</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38182</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38182" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38182" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38182" ref_url="https://www.suse.com/security/cve/CVE-2025-38182" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ublk: santizize the arguments from userspace when adding a device

Sanity check the values for queue depth and number of queues
we get from userspace when adding a device.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38182/">CVE-2025-38182 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38182">CVE-2025-38182 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245937">SUSE bug 1245937</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538184" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38184</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38184" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38184" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38184" ref_url="https://www.suse.com/security/cve/CVE-2025-38184" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03283-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03626-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tipc: fix null-ptr-deref when acquiring remote ip of ethernet bearer

The reproduction steps:
1. create a tun interface
2. enable l2 bearer
3. TIPC_NL_UDP_GET_REMOTEIP with media name set to tun

tipc: Started in network mode
tipc: Node identity 8af312d38a21, cluster identity 4711
tipc: Enabled bearer &lt;eth:syz_tun&gt;, priority 1
Oops: general protection fault
KASAN: null-ptr-deref in range
CPU: 1 UID: 1000 PID: 559 Comm: poc Not tainted 6.16.0-rc1+ #117 PREEMPT
Hardware name: QEMU Ubuntu 24.04 PC
RIP: 0010:tipc_udp_nl_dump_remoteip+0x4a4/0x8f0

the ub was in fact a struct dev.

when bid != 0 &amp;&amp; skip_cnt != 0, bearer_list[bid] may be NULL or
other media when other thread changes it.

fix this by checking media_id.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38184/">CVE-2025-38184 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38184">CVE-2025-38184 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245956">SUSE bug 1245956</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38185</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38185" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38185" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38185" ref_url="https://www.suse.com/security/cve/CVE-2025-38185" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

atm: atmtcp: Free invalid length skb in atmtcp_c_send().

syzbot reported the splat below. [0]

vcc_sendmsg() copies data passed from userspace to skb and passes
it to vcc-&gt;dev-&gt;ops-&gt;send().

atmtcp_c_send() accesses skb-&gt;data as struct atmtcp_hdr after
checking if skb-&gt;len is 0, but it's not enough.

Also, when skb-&gt;len == 0, skb and sk (vcc) were leaked because
dev_kfree_skb() is not called and sk_wmem_alloc adjustment is missing
to revert atm_account_tx() in vcc_sendmsg(), which is expected
to be done in atm_pop_raw().

Let's properly free skb with an invalid length in atmtcp_c_send().

[0]:
BUG: KMSAN: uninit-value in atmtcp_c_send+0x255/0xed0 drivers/atm/atmtcp.c:294
 atmtcp_c_send+0x255/0xed0 drivers/atm/atmtcp.c:294
 vcc_sendmsg+0xd7c/0xff0 net/atm/common.c:644
 sock_sendmsg_nosec net/socket.c:712 [inline]
 __sock_sendmsg+0x330/0x3d0 net/socket.c:727
 ____sys_sendmsg+0x7e0/0xd80 net/socket.c:2566
 ___sys_sendmsg+0x271/0x3b0 net/socket.c:2620
 __sys_sendmsg net/socket.c:2652 [inline]
 __do_sys_sendmsg net/socket.c:2657 [inline]
 __se_sys_sendmsg net/socket.c:2655 [inline]
 __x64_sys_sendmsg+0x211/0x3e0 net/socket.c:2655
 x64_sys_call+0x32fb/0x3db0 arch/x86/include/generated/asm/syscalls_64.h:47
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xd9/0x210 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

Uninit was created at:
 slab_post_alloc_hook mm/slub.c:4154 [inline]
 slab_alloc_node mm/slub.c:4197 [inline]
 kmem_cache_alloc_node_noprof+0x818/0xf00 mm/slub.c:4249
 kmalloc_reserve+0x13c/0x4b0 net/core/skbuff.c:579
 __alloc_skb+0x347/0x7d0 net/core/skbuff.c:670
 alloc_skb include/linux/skbuff.h:1336 [inline]
 vcc_sendmsg+0xb40/0xff0 net/atm/common.c:628
 sock_sendmsg_nosec net/socket.c:712 [inline]
 __sock_sendmsg+0x330/0x3d0 net/socket.c:727
 ____sys_sendmsg+0x7e0/0xd80 net/socket.c:2566
 ___sys_sendmsg+0x271/0x3b0 net/socket.c:2620
 __sys_sendmsg net/socket.c:2652 [inline]
 __do_sys_sendmsg net/socket.c:2657 [inline]
 __se_sys_sendmsg net/socket.c:2655 [inline]
 __x64_sys_sendmsg+0x211/0x3e0 net/socket.c:2655
 x64_sys_call+0x32fb/0x3db0 arch/x86/include/generated/asm/syscalls_64.h:47
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xd9/0x210 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

CPU: 1 UID: 0 PID: 5798 Comm: syz-executor192 Not tainted 6.16.0-rc1-syzkaller-00010-g2c4a1f3fe03e #0 PREEMPT(undef)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38185/">CVE-2025-38185 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38185">CVE-2025-38185 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246012">SUSE bug 1246012</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38186</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38186" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38186" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38186" ref_url="https://www.suse.com/security/cve/CVE-2025-38186" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bnxt_en: Fix double invocation of bnxt_ulp_stop()/bnxt_ulp_start()

Before the commit under the Fixes tag below, bnxt_ulp_stop() and
bnxt_ulp_start() were always invoked in pairs.  After that commit,
the new bnxt_ulp_restart() can be invoked after bnxt_ulp_stop()
has been called.  This may result in the RoCE driver's aux driver
.suspend() method being invoked twice.  The 2nd bnxt_re_suspend()
call will crash when it dereferences a NULL pointer:

(NULL ib_device): Handle device suspend call
BUG: kernel NULL pointer dereference, address: 0000000000000b78
PGD 0 P4D 0
Oops: Oops: 0000 [#1] SMP PTI
CPU: 20 UID: 0 PID: 181 Comm: kworker/u96:5 Tainted: G S                  6.15.0-rc1 #4 PREEMPT(voluntary)
Tainted: [S]=CPU_OUT_OF_SPEC
Hardware name: Dell Inc. PowerEdge R730/072T6D, BIOS 2.4.3 01/17/2017
Workqueue: bnxt_pf_wq bnxt_sp_task [bnxt_en]
RIP: 0010:bnxt_re_suspend+0x45/0x1f0 [bnxt_re]
Code: 8b 05 a7 3c 5b f5 48 89 44 24 18 31 c0 49 8b 5c 24 08 4d 8b 2c 24 e8 ea 06 0a f4 48 c7 c6 04 60 52 c0 48 89 df e8 1b ce f9 ff &lt;48&gt; 8b 83 78 0b 00 00 48 8b 80 38 03 00 00 a8 40 0f 85 b5 00 00 00
RSP: 0018:ffffa2e84084fd88 EFLAGS: 00010246
RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000001
RDX: 0000000000000000 RSI: ffffffffb4b6b934 RDI: 00000000ffffffff
RBP: ffffa1760954c9c0 R08: 0000000000000000 R09: c0000000ffffdfff
R10: 0000000000000001 R11: ffffa2e84084fb50 R12: ffffa176031ef070
R13: ffffa17609775000 R14: ffffa17603adc180 R15: 0000000000000000
FS:  0000000000000000(0000) GS:ffffa17daa397000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000b78 CR3: 00000004aaa30003 CR4: 00000000003706f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
&lt;TASK&gt;
bnxt_ulp_stop+0x69/0x90 [bnxt_en]
bnxt_sp_task+0x678/0x920 [bnxt_en]
? __schedule+0x514/0xf50
process_scheduled_works+0x9d/0x400
worker_thread+0x11c/0x260
? __pfx_worker_thread+0x10/0x10
kthread+0xfe/0x1e0
? __pfx_kthread+0x10/0x10
ret_from_fork+0x2b/0x40
? __pfx_kthread+0x10/0x10
ret_from_fork_asm+0x1a/0x30

Check the BNXT_EN_FLAG_ULP_STOPPED flag and do not proceed if the flag
is already set.  This will preserve the original symmetrical
bnxt_ulp_stop() and bnxt_ulp_start().

Also, inside bnxt_ulp_start(), clear the BNXT_EN_FLAG_ULP_STOPPED
flag after taking the mutex to avoid any race condition.  And for
symmetry, only proceed in bnxt_ulp_start() if the
BNXT_EN_FLAG_ULP_STOPPED is set.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38186/">CVE-2025-38186 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38186">CVE-2025-38186 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245955">SUSE bug 1245955</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38188</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38188" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38188" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38188" ref_url="https://www.suse.com/security/cve/CVE-2025-38188" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/msm/a7xx: Call CP_RESET_CONTEXT_STATE

Calling this packet is necessary when we switch contexts because there
are various pieces of state used by userspace to synchronize between BR
and BV that are persistent across submits and we need to make sure that
they are in a "safe" state when switching contexts. Otherwise a
userspace submission in one context could cause another context to
function incorrectly and hang, effectively a denial of service (although
without leaking data). This was missed during initial a7xx bringup.

Patchwork: https://patchwork.freedesktop.org/patch/654924/
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38188/">CVE-2025-38188 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38188">CVE-2025-38188 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246098">SUSE bug 1246098</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538189" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38189</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38189" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38189" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38189" ref_url="https://www.suse.com/security/cve/CVE-2025-38189" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/v3d: Avoid NULL pointer dereference in `v3d_job_update_stats()`

The following kernel Oops was recently reported by Mesa CI:

[  800.139824] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000588
[  800.148619] Mem abort info:
[  800.151402]   ESR = 0x0000000096000005
[  800.155141]   EC = 0x25: DABT (current EL), IL = 32 bits
[  800.160444]   SET = 0, FnV = 0
[  800.163488]   EA = 0, S1PTW = 0
[  800.166619]   FSC = 0x05: level 1 translation fault
[  800.171487] Data abort info:
[  800.174357]   ISV = 0, ISS = 0x00000005, ISS2 = 0x00000000
[  800.179832]   CM = 0, WnR = 0, TnD = 0, TagAccess = 0
[  800.184873]   GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0
[  800.190176] user pgtable: 4k pages, 39-bit VAs, pgdp=00000001014c2000
[  800.196607] [0000000000000588] pgd=0000000000000000, p4d=0000000000000000, pud=0000000000000000
[  800.205305] Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP
[  800.211564] Modules linked in: vc4 snd_soc_hdmi_codec drm_display_helper v3d cec gpu_sched drm_dma_helper drm_shmem_helper drm_kms_helper drm drm_panel_orientation_quirks snd_soc_core snd_compress snd_pcm_dmaengine snd_pcm i2c_brcmstb snd_timer snd backlight
[  800.234448] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Not tainted 6.12.25+rpt-rpi-v8 #1  Debian 1:6.12.25-1+rpt1
[  800.244182] Hardware name: Raspberry Pi 4 Model B Rev 1.4 (DT)
[  800.250005] pstate: 600000c5 (nZCv daIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[  800.256959] pc : v3d_job_update_stats+0x60/0x130 [v3d]
[  800.262112] lr : v3d_job_update_stats+0x48/0x130 [v3d]
[  800.267251] sp : ffffffc080003e60
[  800.270555] x29: ffffffc080003e60 x28: ffffffd842784980 x27: 0224012000000000
[  800.277687] x26: ffffffd84277f630 x25: ffffff81012fd800 x24: 0000000000000020
[  800.284818] x23: ffffff8040238b08 x22: 0000000000000570 x21: 0000000000000158
[  800.291948] x20: 0000000000000000 x19: ffffff8040238000 x18: 0000000000000000
[  800.299078] x17: ffffffa8c1bd2000 x16: ffffffc080000000 x15: 0000000000000000
[  800.306208] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[  800.313338] x11: 0000000000000040 x10: 0000000000001a40 x9 : ffffffd83b39757c
[  800.320468] x8 : ffffffd842786420 x7 : 7fffffffffffffff x6 : 0000000000ef32b0
[  800.327598] x5 : 00ffffffffffffff x4 : 0000000000000015 x3 : ffffffd842784980
[  800.334728] x2 : 0000000000000004 x1 : 0000000000010002 x0 : 000000ba4c0ca382
[  800.341859] Call trace:
[  800.344294]  v3d_job_update_stats+0x60/0x130 [v3d]
[  800.349086]  v3d_irq+0x124/0x2e0 [v3d]
[  800.352835]  __handle_irq_event_percpu+0x58/0x218
[  800.357539]  handle_irq_event+0x54/0xb8
[  800.361369]  handle_fasteoi_irq+0xac/0x240
[  800.365458]  handle_irq_desc+0x48/0x68
[  800.369200]  generic_handle_domain_irq+0x24/0x38
[  800.373810]  gic_handle_irq+0x48/0xd8
[  800.377464]  call_on_irq_stack+0x24/0x58
[  800.381379]  do_interrupt_handler+0x88/0x98
[  800.385554]  el1_interrupt+0x34/0x68
[  800.389123]  el1h_64_irq_handler+0x18/0x28
[  800.393211]  el1h_64_irq+0x64/0x68
[  800.396603]  default_idle_call+0x3c/0x168
[  800.400606]  do_idle+0x1fc/0x230
[  800.403827]  cpu_startup_entry+0x40/0x50
[  800.407742]  rest_init+0xe4/0xf0
[  800.410962]  start_kernel+0x5e8/0x790
[  800.414616]  __primary_switched+0x80/0x90
[  800.418622] Code: 8b170277 8b160296 11000421 b9000861 (b9401ac1)
[  800.424707] ---[ end trace 0000000000000000 ]---
[  800.457313] ---[ end Kernel panic - not syncing: Oops: Fatal exception in interrupt ]---

This issue happens when the file descriptor is closed before the jobs
submitted by it are completed. When the job completes, we update the
global GPU stats and the per-fd GPU stats, which are exposed through
fdinfo. If the file descriptor was closed, then the struct `v3d_file_priv`
and its stats were already freed and we can't update the per-fd stats.

Therefore, if the file descriptor was already closed, don't u
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38189/">CVE-2025-38189 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38189">CVE-2025-38189 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245812">SUSE bug 1245812</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538190" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38190</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38190" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38190" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38190" ref_url="https://www.suse.com/security/cve/CVE-2025-38190" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

atm: Revert atm_account_tx() if copy_from_iter_full() fails.

In vcc_sendmsg(), we account skb-&gt;truesize to sk-&gt;sk_wmem_alloc by
atm_account_tx().

It is expected to be reverted by atm_pop_raw() later called by
vcc-&gt;dev-&gt;ops-&gt;send(vcc, skb).

However, vcc_sendmsg() misses the same revert when copy_from_iter_full()
fails, and then we will leak a socket.

Let's factorise the revert part as atm_return_tx() and call it in
the failure path.

Note that the corresponding sk_wmem_alloc operation can be found in
alloc_tx() as of the blamed commit.

  $ git blame -L:alloc_tx net/atm/common.c c55fa3cccbc2c~
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38190/">CVE-2025-38190 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38190">CVE-2025-38190 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245973">SUSE bug 1245973</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538193" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38193</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38193" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38193" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38193" ref_url="https://www.suse.com/security/cve/CVE-2025-38193" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net_sched: sch_sfq: reject invalid perturb period

Gerrard Tai reported that SFQ perturb_period has no range check yet,
and this can be used to trigger a race condition fixed in a separate patch.

We want to make sure ctl-&gt;perturb_period * HZ will not overflow
and is positive.


tc qd add dev lo root sfq perturb -10   # negative value : error
Error: sch_sfq: invalid perturb period.

tc qd add dev lo root sfq perturb 1000000000 # too big : error
Error: sch_sfq: invalid perturb period.

tc qd add dev lo root sfq perturb 2000000 # acceptable value
tc -s -d qd sh dev lo
qdisc sfq 8005: root refcnt 2 limit 127p quantum 64Kb depth 127 flows 128 divisor 1024 perturb 2000000sec
 Sent 0 bytes 0 pkt (dropped 0, overlimits 0 requeues 0)
 backlog 0b 0p requeues 0
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38193/">CVE-2025-38193 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38193">CVE-2025-38193 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245945">SUSE bug 1245945</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38197</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38197" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38197" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38197" ref_url="https://www.suse.com/security/cve/CVE-2025-38197" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

platform/x86: dell_rbu: Fix list usage

Pass the correct list head to list_for_each_entry*() when looping through
the packet list.

Without this patch, reading the packet data via sysfs will show the data
incorrectly (because it starts at the wrong packet), and clearing the
packet list will result in a NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38197/">CVE-2025-38197 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38197">CVE-2025-38197 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246047">SUSE bug 1246047</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38198</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38198" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38198" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38198" ref_url="https://www.suse.com/security/cve/CVE-2025-38198" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fbcon: Make sure modelist not set on unregistered console

It looks like attempting to write to the "store_modes" sysfs node will
run afoul of unregistered consoles:

UBSAN: array-index-out-of-bounds in drivers/video/fbdev/core/fbcon.c:122:28
index -1 is out of range for type 'fb_info *[32]'
...
 fbcon_info_from_console+0x192/0x1a0 drivers/video/fbdev/core/fbcon.c:122
 fbcon_new_modelist+0xbf/0x2d0 drivers/video/fbdev/core/fbcon.c:3048
 fb_new_modelist+0x328/0x440 drivers/video/fbdev/core/fbmem.c:673
 store_modes+0x1c9/0x3e0 drivers/video/fbdev/core/fbsysfs.c:113
 dev_attr_store+0x55/0x80 drivers/base/core.c:2439

static struct fb_info *fbcon_registered_fb[FB_MAX];
...
static signed char con2fb_map[MAX_NR_CONSOLES];
...
static struct fb_info *fbcon_info_from_console(int console)
...
        return fbcon_registered_fb[con2fb_map[console]];

If con2fb_map contains a -1 things go wrong here. Instead, return NULL,
as callers of fbcon_info_from_console() are trying to compare against
existing "info" pointers, so error handling should kick in correctly.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38198/">CVE-2025-38198 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38198">CVE-2025-38198 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245952">SUSE bug 1245952</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38201</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38201" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38201" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38201" ref_url="https://www.suse.com/security/cve/CVE-2025-38201" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nft_set_pipapo: clamp maximum map bucket size to INT_MAX

Otherwise, it is possible to hit WARN_ON_ONCE in __kvmalloc_node_noprof()
when resizing hashtable because __GFP_NOWARN is unset.

Similar to:

  b541ba7d1f5a ("netfilter: conntrack: clamp maximum hashtable size to INT_MAX")
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38201/">CVE-2025-38201 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38201">CVE-2025-38201 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245977">SUSE bug 1245977</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538205" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38205</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38205" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38205" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38205" ref_url="https://www.suse.com/security/cve/CVE-2025-38205" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Avoid divide by zero by initializing dummy pitch to 1

[Why]
If the dummy values in `populate_dummy_dml_surface_cfg()` aren't updated
then they can lead to a divide by zero in downstream callers like
CalculateVMAndRowBytes()

[How]
Initialize dummy value to a value to avoid divide by zero.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38205/">CVE-2025-38205 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38205">CVE-2025-38205 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246005">SUSE bug 1246005</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38208</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38208" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38208" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38208" ref_url="https://www.suse.com/security/cve/CVE-2025-38208" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: client: add NULL check in automount_fullpath

page is checked for null in __build_path_from_dentry_optional_prefix
when tcon-&gt;origin_fullpath is not set. However, the check is missing when
it is set.
Add a check to prevent a potential NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38208/">CVE-2025-38208 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38208">CVE-2025-38208 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245815">SUSE bug 1245815</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38209</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38209" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38209" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38209" ref_url="https://www.suse.com/security/cve/CVE-2025-38209" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvme-tcp: remove tag set when second admin queue config fails

Commit 104d0e2f6222 ("nvme-fabrics: reset admin connection for secure
concatenation") modified nvme_tcp_setup_ctrl() to call
nvme_tcp_configure_admin_queue() twice. The first call prepares for
DH-CHAP negotitation, and the second call is required for secure
concatenation. However, this change triggered BUG KASAN slab-use-after-
free in blk_mq_queue_tag_busy_iter(). This BUG can be recreated by
repeating the blktests test case nvme/063 a few times [1].

When the BUG happens, nvme_tcp_create_ctrl() fails in the call chain
below:

nvme_tcp_create_ctrl()
 nvme_tcp_alloc_ctrl() new=true             ... Alloc nvme_tcp_ctrl and admin_tag_set
 nvme_tcp_setup_ctrl() new=true
  nvme_tcp_configure_admin_queue() new=true ... Succeed
   nvme_alloc_admin_tag_set()               ... Alloc the tag set for admin_tag_set
  nvme_stop_keep_alive()
  nvme_tcp_teardown_admin_queue() remove=false
  nvme_tcp_configure_admin_queue() new=false
   nvme_tcp_alloc_admin_queue()             ... Fail, but do not call nvme_remove_admin_tag_set()
 nvme_uninit_ctrl()
 nvme_put_ctrl()                            ... Free up the nvme_tcp_ctrl and admin_tag_set

The first call of nvme_tcp_configure_admin_queue() succeeds with
new=true argument. The second call fails with new=false argument. This
second call does not call nvme_remove_admin_tag_set() on failure, due to
the new=false argument. Then the admin tag set is not removed. However,
nvme_tcp_create_ctrl() assumes that nvme_tcp_setup_ctrl() would call
nvme_remove_admin_tag_set(). Then it frees up struct nvme_tcp_ctrl which
has admin_tag_set field. Later on, the timeout handler accesses the
admin_tag_set field and causes the BUG KASAN slab-use-after-free.

To not leave the admin tag set, call nvme_remove_admin_tag_set() when
the second nvme_tcp_configure_admin_queue() call fails. Do not return
from nvme_tcp_setup_ctrl() on failure. Instead, jump to "destroy_admin"
go-to label to call nvme_tcp_teardown_admin_queue() which calls
nvme_remove_admin_tag_set().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38209/">CVE-2025-38209 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38209">CVE-2025-38209 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246022">SUSE bug 1246022</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538211" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38211</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38211" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38211" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38211" ref_url="https://www.suse.com/security/cve/CVE-2025-38211" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:15008" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001974.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:15011" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/iwcm: Fix use-after-free of work objects after cm_id destruction

The commit 59c68ac31e15 ("iw_cm: free cm_id resources on the last
deref") simplified cm_id resource management by freeing cm_id once all
references to the cm_id were removed. The references are removed either
upon completion of iw_cm event handlers or when the application destroys
the cm_id. This commit introduced the use-after-free condition where
cm_id_private object could still be in use by event handler works during
the destruction of cm_id. The commit aee2424246f9 ("RDMA/iwcm: Fix a
use-after-free related to destroying CM IDs") addressed this use-after-
free by flushing all pending works at the cm_id destruction.

However, still another use-after-free possibility remained. It happens
with the work objects allocated for each cm_id_priv within
alloc_work_entries() during cm_id creation, and subsequently freed in
dealloc_work_entries() once all references to the cm_id are removed.
If the cm_id's last reference is decremented in the event handler work,
the work object for the work itself gets removed, and causes the use-
after-free BUG below:

  BUG: KASAN: slab-use-after-free in __pwq_activate_work+0x1ff/0x250
  Read of size 8 at addr ffff88811f9cf800 by task kworker/u16:1/147091

  CPU: 2 UID: 0 PID: 147091 Comm: kworker/u16:1 Not tainted 6.15.0-rc2+ #27 PREEMPT(voluntary)
  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-3.fc41 04/01/2014
  Workqueue:  0x0 (iw_cm_wq)
  Call Trace:
   &lt;TASK&gt;
   dump_stack_lvl+0x6a/0x90
   print_report+0x174/0x554
   ? __virt_addr_valid+0x208/0x430
   ? __pwq_activate_work+0x1ff/0x250
   kasan_report+0xae/0x170
   ? __pwq_activate_work+0x1ff/0x250
   __pwq_activate_work+0x1ff/0x250
   pwq_dec_nr_in_flight+0x8c5/0xfb0
   process_one_work+0xc11/0x1460
   ? __pfx_process_one_work+0x10/0x10
   ? assign_work+0x16c/0x240
   worker_thread+0x5ef/0xfd0
   ? __pfx_worker_thread+0x10/0x10
   kthread+0x3b0/0x770
   ? __pfx_kthread+0x10/0x10
   ? rcu_is_watching+0x11/0xb0
   ? _raw_spin_unlock_irq+0x24/0x50
   ? rcu_is_watching+0x11/0xb0
   ? __pfx_kthread+0x10/0x10
   ret_from_fork+0x30/0x70
   ? __pfx_kthread+0x10/0x10
   ret_from_fork_asm+0x1a/0x30
   &lt;/TASK&gt;

  Allocated by task 147416:
   kasan_save_stack+0x2c/0x50
   kasan_save_track+0x10/0x30
   __kasan_kmalloc+0xa6/0xb0
   alloc_work_entries+0xa9/0x260 [iw_cm]
   iw_cm_connect+0x23/0x4a0 [iw_cm]
   rdma_connect_locked+0xbfd/0x1920 [rdma_cm]
   nvme_rdma_cm_handler+0x8e5/0x1b60 [nvme_rdma]
   cma_cm_event_handler+0xae/0x320 [rdma_cm]
   cma_work_handler+0x106/0x1b0 [rdma_cm]
   process_one_work+0x84f/0x1460
   worker_thread+0x5ef/0xfd0
   kthread+0x3b0/0x770
   ret_from_fork+0x30/0x70
   ret_from_fork_asm+0x1a/0x30

  Freed by task 147091:
   kasan_save_stack+0x2c/0x50
   kasan_save_track+0x10/0x30
   kasan_save_free_info+0x37/0x60
   __kasan_slab_free+0x4b/0x70
   kfree+0x13a/0x4b0
   dealloc_work_entries+0x125/0x1f0 [iw_cm]
   iwcm_deref_id+0x6f/0xa0 [iw_cm]
   cm_work_handler+0x136/0x1ba0 [iw_cm]
   process_one_work+0x84f/0x1460
   worker_thread+0x5ef/0xfd0
   kthread+0x3b0/0x770
   ret_from_fork+0x30/0x70
   ret_from_fork_asm+0x1a/0x30

  Last potentially related work creation:
   kasan_save_stack+0x2c/0x50
   kasan_record_aux_stack+0xa3/0xb0
   __queue_work+0x2ff/0x1390
   queue_work_on+0x67/0xc0
   cm_event_handler+0x46a/0x820 [iw_cm]
   siw_cm_upcall+0x330/0x650 [siw]
   siw_cm_work_handler+0x6b9/0x2b20 [siw]
   process_one_work+0x84f/0x1460
   worker_thread+0x5ef/0xfd0
   kthread+0x3b0/0x770
   ret_from_fork+0x30/0x70
   ret_from_fork_asm+0x1a/0x30

This BUG is reproducible by repeating the blktests test case nvme/061
for the rdma transport and the siw driver.

To avoid the use-after-free of cm_id_private work objects, ensure that
the last reference to the cm_id is decremented not in the event handler
works, but in the cm_id destruction context. For that purpose, mo
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38211/">CVE-2025-38211 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38211">CVE-2025-38211 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246008">SUSE bug 1246008</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538213" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38213</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38213" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38213" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38213" ref_url="https://www.suse.com/security/cve/CVE-2025-38213" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02588-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02844-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02844-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02848-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02849-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02850-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02851-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02852-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38213/">CVE-2025-38213 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-38213">CVE-2025-38213 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246037">SUSE bug 1246037</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246039">SUSE bug 1246039</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38214</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38214" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38214" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38214" ref_url="https://www.suse.com/security/cve/CVE-2025-38214" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fbdev: Fix fb_set_var to prevent null-ptr-deref in fb_videomode_to_var

If fb_add_videomode() in fb_set_var() fails to allocate memory for
fb_videomode, later it may lead to a null-ptr dereference in
fb_videomode_to_var(), as the fb_info is registered while not having the
mode in modelist that is expected to be there, i.e. the one that is
described in fb_info-&gt;var.

================================================================
general protection fault, probably for non-canonical address 0xdffffc0000000001: 0000 [#1] PREEMPT SMP KASAN NOPTI
KASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f]
CPU: 1 PID: 30371 Comm: syz-executor.1 Not tainted 5.10.226-syzkaller #0
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
RIP: 0010:fb_videomode_to_var+0x24/0x610 drivers/video/fbdev/core/modedb.c:901
Call Trace:
 display_to_var+0x3a/0x7c0 drivers/video/fbdev/core/fbcon.c:929
 fbcon_resize+0x3e2/0x8f0 drivers/video/fbdev/core/fbcon.c:2071
 resize_screen drivers/tty/vt/vt.c:1176 [inline]
 vc_do_resize+0x53a/0x1170 drivers/tty/vt/vt.c:1263
 fbcon_modechanged+0x3ac/0x6e0 drivers/video/fbdev/core/fbcon.c:2720
 fbcon_update_vcs+0x43/0x60 drivers/video/fbdev/core/fbcon.c:2776
 do_fb_ioctl+0x6d2/0x740 drivers/video/fbdev/core/fbmem.c:1128
 fb_ioctl+0xe7/0x150 drivers/video/fbdev/core/fbmem.c:1203
 vfs_ioctl fs/ioctl.c:48 [inline]
 __do_sys_ioctl fs/ioctl.c:753 [inline]
 __se_sys_ioctl fs/ioctl.c:739 [inline]
 __x64_sys_ioctl+0x19a/0x210 fs/ioctl.c:739
 do_syscall_64+0x33/0x40 arch/x86/entry/common.c:46
 entry_SYSCALL_64_after_hwframe+0x67/0xd1
================================================================

The reason is that fb_info-&gt;var is being modified in fb_set_var(), and
then fb_videomode_to_var() is called. If it fails to add the mode to
fb_info-&gt;modelist, fb_set_var() returns error, but does not restore the
old value of fb_info-&gt;var. Restore fb_info-&gt;var on failure the same way
it is done earlier in the function.

Found by Linux Verification Center (linuxtesting.org) with Syzkaller.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38214/">CVE-2025-38214 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38214">CVE-2025-38214 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246042">SUSE bug 1246042</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538215" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38215</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38215" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38215" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38215" ref_url="https://www.suse.com/security/cve/CVE-2025-38215" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fbdev: Fix do_register_framebuffer to prevent null-ptr-deref in fb_videomode_to_var

If fb_add_videomode() in do_register_framebuffer() fails to allocate
memory for fb_videomode, it will later lead to a null-ptr dereference in
fb_videomode_to_var(), as the fb_info is registered while not having the
mode in modelist that is expected to be there, i.e. the one that is
described in fb_info-&gt;var.

================================================================
general protection fault, probably for non-canonical address 0xdffffc0000000001: 0000 [#1] PREEMPT SMP KASAN NOPTI
KASAN: null-ptr-deref in range [0x0000000000000008-0x000000000000000f]
CPU: 1 PID: 30371 Comm: syz-executor.1 Not tainted 5.10.226-syzkaller #0
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
RIP: 0010:fb_videomode_to_var+0x24/0x610 drivers/video/fbdev/core/modedb.c:901
Call Trace:
 display_to_var+0x3a/0x7c0 drivers/video/fbdev/core/fbcon.c:929
 fbcon_resize+0x3e2/0x8f0 drivers/video/fbdev/core/fbcon.c:2071
 resize_screen drivers/tty/vt/vt.c:1176 [inline]
 vc_do_resize+0x53a/0x1170 drivers/tty/vt/vt.c:1263
 fbcon_modechanged+0x3ac/0x6e0 drivers/video/fbdev/core/fbcon.c:2720
 fbcon_update_vcs+0x43/0x60 drivers/video/fbdev/core/fbcon.c:2776
 do_fb_ioctl+0x6d2/0x740 drivers/video/fbdev/core/fbmem.c:1128
 fb_ioctl+0xe7/0x150 drivers/video/fbdev/core/fbmem.c:1203
 vfs_ioctl fs/ioctl.c:48 [inline]
 __do_sys_ioctl fs/ioctl.c:753 [inline]
 __se_sys_ioctl fs/ioctl.c:739 [inline]
 __x64_sys_ioctl+0x19a/0x210 fs/ioctl.c:739
 do_syscall_64+0x33/0x40 arch/x86/entry/common.c:46
 entry_SYSCALL_64_after_hwframe+0x67/0xd1
================================================================

Even though fbcon_init() checks beforehand if fb_match_mode() in
var_to_display() fails, it can not prevent the panic because fbcon_init()
does not return error code. Considering this and the comment in the code
about fb_match_mode() returning NULL - "This should not happen" - it is
better to prevent registering the fb_info if its mode was not set
successfully. Also move fb_add_videomode() closer to the beginning of
do_register_framebuffer() to avoid having to do the cleanup on fail.

Found by Linux Verification Center (linuxtesting.org) with Syzkaller.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38215/">CVE-2025-38215 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38215">CVE-2025-38215 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246109">SUSE bug 1246109</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538216" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38216</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38216" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38216" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38216" ref_url="https://www.suse.com/security/cve/CVE-2025-38216" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03626-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommu/vt-d: Restore context entry setup order for aliased devices

Commit 2031c469f816 ("iommu/vt-d: Add support for static identity domain")
changed the context entry setup during domain attachment from a
set-and-check policy to a clear-and-reset approach. This inadvertently
introduced a regression affecting PCI aliased devices behind PCIe-to-PCI
bridges.

Specifically, keyboard and touchpad stopped working on several Apple
Macbooks with below messages:

 kernel: platform pxa2xx-spi.3: Adding to iommu group 20
 kernel: input: Apple SPI Keyboard as
 /devices/pci0000:00/0000:00:1e.3/pxa2xx-spi.3/spi_master/spi2/spi-APP000D:00/input/input0
 kernel: DMAR: DRHD: handling fault status reg 3
 kernel: DMAR: [DMA Read NO_PASID] Request device [00:1e.3] fault addr
 0xffffa000 [fault reason 0x06] PTE Read access is not set
 kernel: DMAR: DRHD: handling fault status reg 3
 kernel: DMAR: [DMA Read NO_PASID] Request device [00:1e.3] fault addr
 0xffffa000 [fault reason 0x06] PTE Read access is not set
 kernel: applespi spi-APP000D:00: Error writing to device: 01 0e 00 00
 kernel: DMAR: DRHD: handling fault status reg 3
 kernel: DMAR: [DMA Read NO_PASID] Request device [00:1e.3] fault addr
 0xffffa000 [fault reason 0x06] PTE Read access is not set
 kernel: DMAR: DRHD: handling fault status reg 3
 kernel: applespi spi-APP000D:00: Error writing to device: 01 0e 00 00

Fix this by restoring the previous context setup order.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38216/">CVE-2025-38216 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38216">CVE-2025-38216 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245963">SUSE bug 1245963</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38217</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38217" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38217" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38217" ref_url="https://www.suse.com/security/cve/CVE-2025-38217" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hwmon: (ftsteutates) Fix TOCTOU race in fts_read()

In the fts_read() function, when handling hwmon_pwm_auto_channels_temp,
the code accesses the shared variable data-&gt;fan_source[channel] twice
without holding any locks. It is first checked against
FTS_FAN_SOURCE_INVALID, and if the check passes, it is read again
when used as an argument to the BIT() macro.

This creates a Time-of-Check to Time-of-Use (TOCTOU) race condition.
Another thread executing fts_update_device() can modify the value of
data-&gt;fan_source[channel] between the check and its use. If the value
is changed to FTS_FAN_SOURCE_INVALID (0xff) during this window, the
BIT() macro will be called with a large shift value (BIT(255)).
A bit shift by a value greater than or equal to the type width is
undefined behavior and can lead to a crash or incorrect values being
returned to userspace.

Fix this by reading data-&gt;fan_source[channel] into a local variable
once, eliminating the race condition. Additionally, add a bounds check
to ensure the value is less than BITS_PER_LONG before passing it to
the BIT() macro, making the code more robust against undefined behavior.

This possible bug was found by an experimental static analysis tool
developed by our team.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38217/">CVE-2025-38217 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38217">CVE-2025-38217 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246002">SUSE bug 1246002</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538220" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38220</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38220" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38220" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38220" ref_url="https://www.suse.com/security/cve/CVE-2025-38220" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: only dirty folios when data journaling regular files

fstest generic/388 occasionally reproduces a crash that looks as
follows:

BUG: kernel NULL pointer dereference, address: 0000000000000000
...
Call Trace:
 &lt;TASK&gt;
 ext4_block_zero_page_range+0x30c/0x380 [ext4]
 ext4_truncate+0x436/0x440 [ext4]
 ext4_process_orphan+0x5d/0x110 [ext4]
 ext4_orphan_cleanup+0x124/0x4f0 [ext4]
 ext4_fill_super+0x262d/0x3110 [ext4]
 get_tree_bdev_flags+0x132/0x1d0
 vfs_get_tree+0x26/0xd0
 vfs_cmd_create+0x59/0xe0
 __do_sys_fsconfig+0x4ed/0x6b0
 do_syscall_64+0x82/0x170
 ...

This occurs when processing a symlink inode from the orphan list. The
partial block zeroing code in the truncate path calls
ext4_dirty_journalled_data() -&gt; folio_mark_dirty(). The latter calls
mapping-&gt;a_ops-&gt;dirty_folio(), but symlink inodes are not assigned an
a_ops vector in ext4, hence the crash.

To avoid this problem, update the ext4_dirty_journalled_data() helper to
only mark the folio dirty on regular files (for which a_ops is
assigned). This also matches the journaling logic in the ext4_symlink()
creation path, where ext4_handle_dirty_metadata() is called directly.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38220/">CVE-2025-38220 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38220">CVE-2025-38220 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245966">SUSE bug 1245966</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538222" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38222</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38222" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38222" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38222" ref_url="https://www.suse.com/security/cve/CVE-2025-38222" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: inline: fix len overflow in ext4_prepare_inline_data

When running the following code on an ext4 filesystem with inline_data
feature enabled, it will lead to the bug below.

        fd = open("file1", O_RDWR | O_CREAT | O_TRUNC, 0666);
        ftruncate(fd, 30);
        pwrite(fd, "a", 1, (1UL &lt;&lt; 40) + 5UL);

That happens because write_begin will succeed as when
ext4_generic_write_inline_data calls ext4_prepare_inline_data, pos + len
will be truncated, leading to ext4_prepare_inline_data parameter to be 6
instead of 0x10000000006.

Then, later when write_end is called, we hit:

        BUG_ON(pos + len &gt; EXT4_I(inode)-&gt;i_inline_size);

at ext4_write_inline_data.

Fix it by using a loff_t type for the len parameter in
ext4_prepare_inline_data instead of an unsigned int.

[   44.545164] ------------[ cut here ]------------
[   44.545530] kernel BUG at fs/ext4/inline.c:240!
[   44.545834] Oops: invalid opcode: 0000 [#1] SMP NOPTI
[   44.546172] CPU: 3 UID: 0 PID: 343 Comm: test Not tainted 6.15.0-rc2-00003-g9080916f4863 #45 PREEMPT(full)  112853fcebfdb93254270a7959841d2c6aa2c8bb
[   44.546523] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[   44.546523] RIP: 0010:ext4_write_inline_data+0xfe/0x100
[   44.546523] Code: 3c 0e 48 83 c7 48 48 89 de 5b 41 5c 41 5d 41 5e 41 5f 5d e9 e4 fa 43 01 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc cc 0f 0b &lt;0f&gt; 0b 0f 1f 44 00 00 55 41 57 41 56 41 55 41 54 53 48 83 ec 20 49
[   44.546523] RSP: 0018:ffffb342008b79a8 EFLAGS: 00010216
[   44.546523] RAX: 0000000000000001 RBX: ffff9329c579c000 RCX: 0000010000000006
[   44.546523] RDX: 000000000000003c RSI: ffffb342008b79f0 RDI: ffff9329c158e738
[   44.546523] RBP: 0000000000000001 R08: 0000000000000001 R09: 0000000000000000
[   44.546523] R10: 00007ffffffff000 R11: ffffffff9bd0d910 R12: 0000006210000000
[   44.546523] R13: fffffc7e4015e700 R14: 0000010000000005 R15: ffff9329c158e738
[   44.546523] FS:  00007f4299934740(0000) GS:ffff932a60179000(0000) knlGS:0000000000000000
[   44.546523] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   44.546523] CR2: 00007f4299a1ec90 CR3: 0000000002886002 CR4: 0000000000770eb0
[   44.546523] PKRU: 55555554
[   44.546523] Call Trace:
[   44.546523]  &lt;TASK&gt;
[   44.546523]  ext4_write_inline_data_end+0x126/0x2d0
[   44.546523]  generic_perform_write+0x17e/0x270
[   44.546523]  ext4_buffered_write_iter+0xc8/0x170
[   44.546523]  vfs_write+0x2be/0x3e0
[   44.546523]  __x64_sys_pwrite64+0x6d/0xc0
[   44.546523]  do_syscall_64+0x6a/0xf0
[   44.546523]  ? __wake_up+0x89/0xb0
[   44.546523]  ? xas_find+0x72/0x1c0
[   44.546523]  ? next_uptodate_folio+0x317/0x330
[   44.546523]  ? set_pte_range+0x1a6/0x270
[   44.546523]  ? filemap_map_pages+0x6ee/0x840
[   44.546523]  ? ext4_setattr+0x2fa/0x750
[   44.546523]  ? do_pte_missing+0x128/0xf70
[   44.546523]  ? security_inode_post_setattr+0x3e/0xd0
[   44.546523]  ? ___pte_offset_map+0x19/0x100
[   44.546523]  ? handle_mm_fault+0x721/0xa10
[   44.546523]  ? do_user_addr_fault+0x197/0x730
[   44.546523]  ? do_syscall_64+0x76/0xf0
[   44.546523]  ? arch_exit_to_user_mode_prepare+0x1e/0x60
[   44.546523]  ? irqentry_exit_to_user_mode+0x79/0x90
[   44.546523]  entry_SYSCALL_64_after_hwframe+0x55/0x5d
[   44.546523] RIP: 0033:0x7f42999c6687
[   44.546523] Code: 48 89 fa 4c 89 df e8 58 b3 00 00 8b 93 08 03 00 00 59 5e 48 83 f8 fc 74 1a 5b c3 0f 1f 84 00 00 00 00 00 48 8b 44 24 10 0f 05 &lt;5b&gt; c3 0f 1f 80 00 00 00 00 83 e2 39 83 fa 08 75 de e8 23 ff ff ff
[   44.546523] RSP: 002b:00007ffeae4a7930 EFLAGS: 00000202 ORIG_RAX: 0000000000000012
[   44.546523] RAX: ffffffffffffffda RBX: 00007f4299934740 RCX: 00007f42999c6687
[   44.546523] RDX: 0000000000000001 RSI: 000055ea6149200f RDI: 0000000000000003
[   44.546523] RBP: 00007ffeae4a79a0 R08: 0000000000000000 R09: 0000000000000000
[   44.546523] R10: 0000010000000005 R11: 0000000000000202 R12: 0000
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38222/">CVE-2025-38222 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38222">CVE-2025-38222 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245976">SUSE bug 1245976</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538224" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38224</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38224" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38224" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38224" ref_url="https://www.suse.com/security/cve/CVE-2025-38224" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: kvaser_pciefd: refine error prone echo_skb_max handling logic

echo_skb_max should define the supported upper limit of echo_skb[]
allocated inside the netdevice's priv. The corresponding size value
provided by this driver to alloc_candev() is KVASER_PCIEFD_CAN_TX_MAX_COUNT
which is 17.

But later echo_skb_max is rounded up to the nearest power of two (for the
max case, that would be 32) and the tx/ack indices calculated further
during tx/rx may exceed the upper array boundary. Kasan reported this for
the ack case inside kvaser_pciefd_handle_ack_packet(), though the xmit
function has actually caught the same thing earlier.

 BUG: KASAN: slab-out-of-bounds in kvaser_pciefd_handle_ack_packet+0x2d7/0x92a drivers/net/can/kvaser_pciefd.c:1528
 Read of size 8 at addr ffff888105e4f078 by task swapper/4/0

 CPU: 4 UID: 0 PID: 0 Comm: swapper/4 Not tainted 6.15.0 #12 PREEMPT(voluntary)
 Call Trace:
  &lt;IRQ&gt;
 dump_stack_lvl lib/dump_stack.c:122
 print_report mm/kasan/report.c:521
 kasan_report mm/kasan/report.c:634
 kvaser_pciefd_handle_ack_packet drivers/net/can/kvaser_pciefd.c:1528
 kvaser_pciefd_read_packet drivers/net/can/kvaser_pciefd.c:1605
 kvaser_pciefd_read_buffer drivers/net/can/kvaser_pciefd.c:1656
 kvaser_pciefd_receive_irq drivers/net/can/kvaser_pciefd.c:1684
 kvaser_pciefd_irq_handler drivers/net/can/kvaser_pciefd.c:1733
 __handle_irq_event_percpu kernel/irq/handle.c:158
 handle_irq_event kernel/irq/handle.c:210
 handle_edge_irq kernel/irq/chip.c:833
 __common_interrupt arch/x86/kernel/irq.c:296
 common_interrupt arch/x86/kernel/irq.c:286
  &lt;/IRQ&gt;

Tx max count definitely matters for kvaser_pciefd_tx_avail(), but for seq
numbers' generation that's not the case - we're free to calculate them as
would be more convenient, not taking tx max count into account. The only
downside is that the size of echo_skb[] should correspond to the max seq
number (not tx max count), so in some situations a bit more memory would
be consumed than could be.

Thus make the size of the underlying echo_skb[] sufficient for the rounded
max tx value.

Found by Linux Verification Center (linuxtesting.org) with Syzkaller.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38224/">CVE-2025-38224 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38224">CVE-2025-38224 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246166">SUSE bug 1246166</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538225" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38225</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38225" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38225" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38225" ref_url="https://www.suse.com/security/cve/CVE-2025-38225" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: imx-jpeg: Cleanup after an allocation error

When allocation failures are not cleaned up by the driver, further
allocation errors will be false-positives, which will cause buffers to
remain uninitialized and cause NULL pointer dereferences.
Ensure proper cleanup of failed allocations to prevent these issues.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38225/">CVE-2025-38225 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38225">CVE-2025-38225 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246041">SUSE bug 1246041</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538226" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38226</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38226" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38226" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38226" ref_url="https://www.suse.com/security/cve/CVE-2025-38226" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: vivid: Change the siize of the composing

syzkaller found a bug:

BUG: KASAN: vmalloc-out-of-bounds in tpg_fill_plane_pattern drivers/media/common/v4l2-tpg/v4l2-tpg-core.c:2608 [inline]
BUG: KASAN: vmalloc-out-of-bounds in tpg_fill_plane_buffer+0x1a9c/0x5af0 drivers/media/common/v4l2-tpg/v4l2-tpg-core.c:2705
Write of size 1440 at addr ffffc9000d0ffda0 by task vivid-000-vid-c/5304

CPU: 0 UID: 0 PID: 5304 Comm: vivid-000-vid-c Not tainted 6.14.0-rc2-syzkaller-00039-g09fbf3d50205 #0
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014

Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:94 [inline]
 dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120
 print_address_description mm/kasan/report.c:378 [inline]
 print_report+0x169/0x550 mm/kasan/report.c:489
 kasan_report+0x143/0x180 mm/kasan/report.c:602
 kasan_check_range+0x282/0x290 mm/kasan/generic.c:189
 __asan_memcpy+0x40/0x70 mm/kasan/shadow.c:106
 tpg_fill_plane_pattern drivers/media/common/v4l2-tpg/v4l2-tpg-core.c:2608 [inline]
 tpg_fill_plane_buffer+0x1a9c/0x5af0 drivers/media/common/v4l2-tpg/v4l2-tpg-core.c:2705
 vivid_fillbuff drivers/media/test-drivers/vivid/vivid-kthread-cap.c:470 [inline]
 vivid_thread_vid_cap_tick+0xf8e/0x60d0 drivers/media/test-drivers/vivid/vivid-kthread-cap.c:629
 vivid_thread_vid_cap+0x8aa/0xf30 drivers/media/test-drivers/vivid/vivid-kthread-cap.c:767
 kthread+0x7a9/0x920 kernel/kthread.c:464
 ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:148
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
 &lt;/TASK&gt;

The composition size cannot be larger than the size of fmt_cap_rect.
So execute v4l2_rect_map_inside() even if has_compose_cap == 0.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38226/">CVE-2025-38226 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38226">CVE-2025-38226 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246050">SUSE bug 1246050</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246051">SUSE bug 1246051</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538227" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38227</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38227" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38227" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38227" ref_url="https://www.suse.com/security/cve/CVE-2025-38227" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: vidtv: Terminating the subsequent process of initialization failure

syzbot reported a slab-use-after-free Read in vidtv_mux_init. [1]

After PSI initialization fails, the si member is accessed again, resulting
in this uaf.

After si initialization fails, the subsequent process needs to be exited.

[1]
BUG: KASAN: slab-use-after-free in vidtv_mux_pid_ctx_init drivers/media/test-drivers/vidtv/vidtv_mux.c:78 [inline]
BUG: KASAN: slab-use-after-free in vidtv_mux_init+0xac2/0xbe0 drivers/media/test-drivers/vidtv/vidtv_mux.c:524
Read of size 8 at addr ffff88802fa42acc by task syz.2.37/6059

CPU: 0 UID: 0 PID: 6059 Comm: syz.2.37 Not tainted 6.14.0-rc5-syzkaller #0
Hardware name: Google Compute Engine, BIOS Google 02/12/2025
Call Trace:
&lt;TASK&gt;
__dump_stack lib/dump_stack.c:94 [inline]
dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:120
print_address_description mm/kasan/report.c:408 [inline]
print_report+0xc3/0x670 mm/kasan/report.c:521
kasan_report+0xd9/0x110 mm/kasan/report.c:634
vidtv_mux_pid_ctx_init drivers/media/test-drivers/vidtv/vidtv_mux.c:78
vidtv_mux_init+0xac2/0xbe0 drivers/media/test-drivers/vidtv/vidtv_mux.c:524
vidtv_start_streaming drivers/media/test-drivers/vidtv/vidtv_bridge.c:194
vidtv_start_feed drivers/media/test-drivers/vidtv/vidtv_bridge.c:239
dmx_section_feed_start_filtering drivers/media/dvb-core/dvb_demux.c:973
dvb_dmxdev_feed_start drivers/media/dvb-core/dmxdev.c:508 [inline]
dvb_dmxdev_feed_restart.isra.0 drivers/media/dvb-core/dmxdev.c:537
dvb_dmxdev_filter_stop+0x2b4/0x3a0 drivers/media/dvb-core/dmxdev.c:564
dvb_dmxdev_filter_free drivers/media/dvb-core/dmxdev.c:840 [inline]
dvb_demux_release+0x92/0x550 drivers/media/dvb-core/dmxdev.c:1246
__fput+0x3ff/0xb70 fs/file_table.c:464
task_work_run+0x14e/0x250 kernel/task_work.c:227
exit_task_work include/linux/task_work.h:40 [inline]
do_exit+0xad8/0x2d70 kernel/exit.c:938
do_group_exit+0xd3/0x2a0 kernel/exit.c:1087
__do_sys_exit_group kernel/exit.c:1098 [inline]
__se_sys_exit_group kernel/exit.c:1096 [inline]
__x64_sys_exit_group+0x3e/0x50 kernel/exit.c:1096
x64_sys_call+0x151f/0x1720 arch/x86/include/generated/asm/syscalls_64.h:232
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f871d58d169
Code: Unable to access opcode bytes at 0x7f871d58d13f.
RSP: 002b:00007fff4b19a788 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f871d58d169
RDX: 0000000000000064 RSI: 0000000000000000 RDI: 0000000000000000
RBP: 00007fff4b19a7ec R08: 0000000b4b19a87f R09: 00000000000927c0
R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000003
R13: 00000000000927c0 R14: 000000000001d553 R15: 00007fff4b19a840
 &lt;/TASK&gt;

Allocated by task 6059:
 kasan_save_stack+0x33/0x60 mm/kasan/common.c:47
 kasan_save_track+0x14/0x30 mm/kasan/common.c:68
 poison_kmalloc_redzone mm/kasan/common.c:377 [inline]
 __kasan_kmalloc+0xaa/0xb0 mm/kasan/common.c:394
 kmalloc_noprof include/linux/slab.h:901 [inline]
 kzalloc_noprof include/linux/slab.h:1037 [inline]
 vidtv_psi_pat_table_init drivers/media/test-drivers/vidtv/vidtv_psi.c:970
 vidtv_channel_si_init drivers/media/test-drivers/vidtv/vidtv_channel.c:423
 vidtv_mux_init drivers/media/test-drivers/vidtv/vidtv_mux.c:519
 vidtv_start_streaming drivers/media/test-drivers/vidtv/vidtv_bridge.c:194
 vidtv_start_feed drivers/media/test-drivers/vidtv/vidtv_bridge.c:239
 dmx_section_feed_start_filtering drivers/media/dvb-core/dvb_demux.c:973
 dvb_dmxdev_feed_start drivers/media/dvb-core/dmxdev.c:508 [inline]
 dvb_dmxdev_feed_restart.isra.0 drivers/media/dvb-core/dmxdev.c:537
 dvb_dmxdev_filter_stop+0x2b4/0x3a0 drivers/media/dvb-core/dmxdev.c:564
 dvb_dmxdev_filter_free drivers/media/dvb-core/dmxdev.c:840 [inline]
 dvb_demux_release+0x92/0x550 drivers/media/dvb-core/dmxdev.c:1246
 __fput+0x3ff/0xb70 fs/file_tabl
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38227/">CVE-2025-38227 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38227">CVE-2025-38227 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246031">SUSE bug 1246031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246032">SUSE bug 1246032</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538228" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38228</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38228" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38228" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38228" ref_url="https://www.suse.com/security/cve/CVE-2025-38228" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: imagination: fix a potential memory leak in e5010_probe()

Add video_device_release() to release the memory allocated by
video_device_alloc() if something goes wrong.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38228/">CVE-2025-38228 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38228">CVE-2025-38228 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245814">SUSE bug 1245814</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538229" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38229</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38229" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38229" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38229" ref_url="https://www.suse.com/security/cve/CVE-2025-38229" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: cxusb: no longer judge rbuf when the write fails

syzbot reported a uninit-value in cxusb_i2c_xfer. [1]

Only when the write operation of usb_bulk_msg() in dvb_usb_generic_rw()
succeeds and rlen is greater than 0, the read operation of usb_bulk_msg()
will be executed to read rlen bytes of data from the dvb device into the
rbuf.

In this case, although rlen is 1, the write operation failed which resulted
in the dvb read operation not being executed, and ultimately variable i was
not initialized.

[1]
BUG: KMSAN: uninit-value in cxusb_gpio_tuner drivers/media/usb/dvb-usb/cxusb.c:124 [inline]
BUG: KMSAN: uninit-value in cxusb_i2c_xfer+0x153a/0x1a60 drivers/media/usb/dvb-usb/cxusb.c:196
 cxusb_gpio_tuner drivers/media/usb/dvb-usb/cxusb.c:124 [inline]
 cxusb_i2c_xfer+0x153a/0x1a60 drivers/media/usb/dvb-usb/cxusb.c:196
 __i2c_transfer+0xe25/0x3150 drivers/i2c/i2c-core-base.c:-1
 i2c_transfer+0x317/0x4a0 drivers/i2c/i2c-core-base.c:2315
 i2c_transfer_buffer_flags+0x125/0x1e0 drivers/i2c/i2c-core-base.c:2343
 i2c_master_send include/linux/i2c.h:109 [inline]
 i2cdev_write+0x210/0x280 drivers/i2c/i2c-dev.c:183
 do_loop_readv_writev fs/read_write.c:848 [inline]
 vfs_writev+0x963/0x14e0 fs/read_write.c:1057
 do_writev+0x247/0x5c0 fs/read_write.c:1101
 __do_sys_writev fs/read_write.c:1169 [inline]
 __se_sys_writev fs/read_write.c:1166 [inline]
 __x64_sys_writev+0x98/0xe0 fs/read_write.c:1166
 x64_sys_call+0x2229/0x3c80 arch/x86/include/generated/asm/syscalls_64.h:21
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xcd/0x1e0 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38229/">CVE-2025-38229 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38229">CVE-2025-38229 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246049">SUSE bug 1246049</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38231</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38231" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38231" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38231" ref_url="https://www.suse.com/security/cve/CVE-2025-38231" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfsd: Initialize ssc before laundromat_work to prevent NULL dereference

In nfs4_state_start_net(), laundromat_work may access nfsd_ssc through
nfs4_laundromat -&gt; nfsd4_ssc_expire_umount. If nfsd_ssc isn't initialized,
this can cause NULL pointer dereference.

Normally the delayed start of laundromat_work allows sufficient time for
nfsd_ssc initialization to complete. However, when the kernel waits too
long for userspace responses (e.g. in nfs4_state_start_net -&gt;
nfsd4_end_grace -&gt; nfsd4_record_grace_done -&gt; nfsd4_cld_grace_done -&gt;
cld_pipe_upcall -&gt; __cld_pipe_upcall -&gt; wait_for_completion path), the
delayed work may start before nfsd_ssc initialization finishes.

Fix this by moving nfsd_ssc initialization before starting laundromat_work.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38231/">CVE-2025-38231 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38231">CVE-2025-38231 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246055">SUSE bug 1246055</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38232</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38232" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38232" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38232" ref_url="https://www.suse.com/security/cve/CVE-2025-38232" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFSD: fix race between nfsd registration and exports_proc

As of now nfsd calls create_proc_exports_entry() at start of init_nfsd
and cleanup by remove_proc_entry() at last of exit_nfsd.

Which causes kernel OOPs if there is race between below 2 operations:
(i) exportfs -r
(ii) mount -t nfsd none /proc/fs/nfsd

for 5.4 kernel ARM64:

CPU 1:
el1_irq+0xbc/0x180
arch_counter_get_cntvct+0x14/0x18
running_clock+0xc/0x18
preempt_count_add+0x88/0x110
prep_new_page+0xb0/0x220
get_page_from_freelist+0x2d8/0x1778
__alloc_pages_nodemask+0x15c/0xef0
__vmalloc_node_range+0x28c/0x478
__vmalloc_node_flags_caller+0x8c/0xb0
kvmalloc_node+0x88/0xe0
nfsd_init_net+0x6c/0x108 [nfsd]
ops_init+0x44/0x170
register_pernet_operations+0x114/0x270
register_pernet_subsys+0x34/0x50
init_nfsd+0xa8/0x718 [nfsd]
do_one_initcall+0x54/0x2e0

CPU 2 :
Unable to handle kernel NULL pointer dereference at virtual address 0000000000000010

PC is at : exports_net_open+0x50/0x68 [nfsd]

Call trace:
exports_net_open+0x50/0x68 [nfsd]
exports_proc_open+0x2c/0x38 [nfsd]
proc_reg_open+0xb8/0x198
do_dentry_open+0x1c4/0x418
vfs_open+0x38/0x48
path_openat+0x28c/0xf18
do_filp_open+0x70/0xe8
do_sys_open+0x154/0x248

Sometimes it crashes at exports_net_open() and sometimes cache_seq_next_rcu().

and same is happening on latest 6.14 kernel as well:

[    0.000000] Linux version 6.14.0-rc5-next-20250304-dirty
...
[  285.455918] Unable to handle kernel paging request at virtual address 00001f4800001f48
...
[  285.464902] pc : cache_seq_next_rcu+0x78/0xa4
...
[  285.469695] Call trace:
[  285.470083]  cache_seq_next_rcu+0x78/0xa4 (P)
[  285.470488]  seq_read+0xe0/0x11c
[  285.470675]  proc_reg_read+0x9c/0xf0
[  285.470874]  vfs_read+0xc4/0x2fc
[  285.471057]  ksys_read+0x6c/0xf4
[  285.471231]  __arm64_sys_read+0x1c/0x28
[  285.471428]  invoke_syscall+0x44/0x100
[  285.471633]  el0_svc_common.constprop.0+0x40/0xe0
[  285.471870]  do_el0_svc_compat+0x1c/0x34
[  285.472073]  el0_svc_compat+0x2c/0x80
[  285.472265]  el0t_32_sync_handler+0x90/0x140
[  285.472473]  el0t_32_sync+0x19c/0x1a0
[  285.472887] Code: f9400885 93407c23 937d7c27 11000421 (f86378a3)
[  285.473422] ---[ end trace 0000000000000000 ]---

It reproduced simply with below script:
while [ 1 ]
do
/exportfs -r
done &amp;

while [ 1 ]
do
insmod /nfsd.ko
mount -t nfsd none /proc/fs/nfsd
umount /proc/fs/nfsd
rmmod nfsd
done &amp;

So exporting interfaces to user space shall be done at last and
cleanup at first place.

With change there is no Kernel OOPs.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38232/">CVE-2025-38232 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38232">CVE-2025-38232 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246054">SUSE bug 1246054</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38233</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38233" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38233" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38233" ref_url="https://www.suse.com/security/cve/CVE-2025-38233" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc64/ftrace: fix clobbered r15 during livepatching

While r15 is clobbered always with PPC_FTRACE_OUT_OF_LINE, it is
not restored in livepatch sequence leading to not so obvious fails
like below:

  BUG: Unable to handle kernel data access on write at 0xc0000000000f9078
  Faulting instruction address: 0xc0000000018ff958
  Oops: Kernel access of bad area, sig: 11 [#1]
  ...
  NIP:  c0000000018ff958 LR: c0000000018ff930 CTR: c0000000009c0790
  REGS: c00000005f2e7790 TRAP: 0300   Tainted: G              K      (6.14.0+)
  MSR:  8000000000009033 &lt;SF,EE,ME,IR,DR,RI,LE&gt;  CR: 2822880b  XER: 20040000
  CFAR: c0000000008addc0 DAR: c0000000000f9078 DSISR: 0a000000 IRQMASK: 1
  GPR00: c0000000018f2584 c00000005f2e7a30 c00000000280a900 c000000017ffa488
  GPR04: 0000000000000008 0000000000000000 c0000000018f24fc 000000000000000d
  GPR08: fffffffffffe0000 000000000000000d 0000000000000000 0000000000008000
  GPR12: c0000000009c0790 c000000017ffa480 c00000005f2e7c78 c0000000000f9070
  GPR16: c00000005f2e7c90 0000000000000000 0000000000000000 0000000000000000
  GPR20: 0000000000000000 c00000005f3efa80 c00000005f2e7c60 c00000005f2e7c88
  GPR24: c00000005f2e7c60 0000000000000001 c0000000000f9078 0000000000000000
  GPR28: 00007fff97960000 c000000017ffa480 0000000000000000 c0000000000f9078
  ...
  Call Trace:
    check_heap_object+0x34/0x390 (unreliable)
  __mutex_unlock_slowpath.isra.0+0xe4/0x230
  seq_read_iter+0x430/0xa90
  proc_reg_read_iter+0xa4/0x200
  vfs_read+0x41c/0x510
  ksys_read+0xa4/0x190
  system_call_exception+0x1d0/0x440
  system_call_vectored_common+0x15c/0x2ec

Fix it by restoring r15 always.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38233/">CVE-2025-38233 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38233">CVE-2025-38233 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246053">SUSE bug 1246053</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538234" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38234</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38234" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38234" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38234" ref_url="https://www.suse.com/security/cve/CVE-2025-38234" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sched/rt: Fix race in push_rt_task

Overview
========
When a CPU chooses to call push_rt_task and picks a task to push to
another CPU's runqueue then it will call find_lock_lowest_rq method
which would take a double lock on both CPUs' runqueues. If one of the
locks aren't readily available, it may lead to dropping the current
runqueue lock and reacquiring both the locks at once. During this window
it is possible that the task is already migrated and is running on some
other CPU. These cases are already handled. However, if the task is
migrated and has already been executed and another CPU is now trying to
wake it up (ttwu) such that it is queued again on the runqeue
(on_rq is 1) and also if the task was run by the same CPU, then the
current checks will pass even though the task was migrated out and is no
longer in the pushable tasks list.

Crashes
=======
This bug resulted in quite a few flavors of crashes triggering kernel
panics with various crash signatures such as assert failures, page
faults, null pointer dereferences, and queue corruption errors all
coming from scheduler itself.

Some of the crashes:
-&gt; kernel BUG at kernel/sched/rt.c:1616! BUG_ON(idx &gt;= MAX_RT_PRIO)
   Call Trace:
   ? __die_body+0x1a/0x60
   ? die+0x2a/0x50
   ? do_trap+0x85/0x100
   ? pick_next_task_rt+0x6e/0x1d0
   ? do_error_trap+0x64/0xa0
   ? pick_next_task_rt+0x6e/0x1d0
   ? exc_invalid_op+0x4c/0x60
   ? pick_next_task_rt+0x6e/0x1d0
   ? asm_exc_invalid_op+0x12/0x20
   ? pick_next_task_rt+0x6e/0x1d0
   __schedule+0x5cb/0x790
   ? update_ts_time_stats+0x55/0x70
   schedule_idle+0x1e/0x40
   do_idle+0x15e/0x200
   cpu_startup_entry+0x19/0x20
   start_secondary+0x117/0x160
   secondary_startup_64_no_verify+0xb0/0xbb

-&gt; BUG: kernel NULL pointer dereference, address: 00000000000000c0
   Call Trace:
   ? __die_body+0x1a/0x60
   ? no_context+0x183/0x350
   ? __warn+0x8a/0xe0
   ? exc_page_fault+0x3d6/0x520
   ? asm_exc_page_fault+0x1e/0x30
   ? pick_next_task_rt+0xb5/0x1d0
   ? pick_next_task_rt+0x8c/0x1d0
   __schedule+0x583/0x7e0
   ? update_ts_time_stats+0x55/0x70
   schedule_idle+0x1e/0x40
   do_idle+0x15e/0x200
   cpu_startup_entry+0x19/0x20
   start_secondary+0x117/0x160
   secondary_startup_64_no_verify+0xb0/0xbb

-&gt; BUG: unable to handle page fault for address: ffff9464daea5900
   kernel BUG at kernel/sched/rt.c:1861! BUG_ON(rq-&gt;cpu != task_cpu(p))

-&gt; kernel BUG at kernel/sched/rt.c:1055! BUG_ON(!rq-&gt;nr_running)
   Call Trace:
   ? __die_body+0x1a/0x60
   ? die+0x2a/0x50
   ? do_trap+0x85/0x100
   ? dequeue_top_rt_rq+0xa2/0xb0
   ? do_error_trap+0x64/0xa0
   ? dequeue_top_rt_rq+0xa2/0xb0
   ? exc_invalid_op+0x4c/0x60
   ? dequeue_top_rt_rq+0xa2/0xb0
   ? asm_exc_invalid_op+0x12/0x20
   ? dequeue_top_rt_rq+0xa2/0xb0
   dequeue_rt_entity+0x1f/0x70
   dequeue_task_rt+0x2d/0x70
   __schedule+0x1a8/0x7e0
   ? blk_finish_plug+0x25/0x40
   schedule+0x3c/0xb0
   futex_wait_queue_me+0xb6/0x120
   futex_wait+0xd9/0x240
   do_futex+0x344/0xa90
   ? get_mm_exe_file+0x30/0x60
   ? audit_exe_compare+0x58/0x70
   ? audit_filter_rules.constprop.26+0x65e/0x1220
   __x64_sys_futex+0x148/0x1f0
   do_syscall_64+0x30/0x80
   entry_SYSCALL_64_after_hwframe+0x62/0xc7

-&gt; BUG: unable to handle page fault for address: ffff8cf3608bc2c0
   Call Trace:
   ? __die_body+0x1a/0x60
   ? no_context+0x183/0x350
   ? spurious_kernel_fault+0x171/0x1c0
   ? exc_page_fault+0x3b6/0x520
   ? plist_check_list+0x15/0x40
   ? plist_check_list+0x2e/0x40
   ? asm_exc_page_fault+0x1e/0x30
   ? _cond_resched+0x15/0x30
   ? futex_wait_queue_me+0xc8/0x120
   ? futex_wait+0xd9/0x240
   ? try_to_wake_up+0x1b8/0x490
   ? futex_wake+0x78/0x160
   ? do_futex+0xcd/0xa90
   ? plist_check_list+0x15/0x40
   ? plist_check_list+0x2e/0x40
   ? plist_del+0x6a/0xd0
   ? plist_check_list+0x15/0x40
   ? plist_check_list+0x2e/0x40
   ? dequeue_pushable_task+0x20/0x70
   ? __schedule+0x382/0x7e0
   ? asm_sysvec_reschedule_i
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38234/">CVE-2025-38234 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38234">CVE-2025-38234 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246057">SUSE bug 1246057</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38242</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38242" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38242" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38242" ref_url="https://www.suse.com/security/cve/CVE-2025-38242" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm: userfaultfd: fix race of userfaultfd_move and swap cache

This commit fixes two kinds of races, they may have different results:

Barry reported a BUG_ON in commit c50f8e6053b0, we may see the same
BUG_ON if the filemap lookup returned NULL and folio is added to swap
cache after that.

If another kind of race is triggered (folio changed after lookup) we
may see RSS counter is corrupted:

[  406.893936] BUG: Bad rss-counter state mm:ffff0000c5a9ddc0
type:MM_ANONPAGES val:-1
[  406.894071] BUG: Bad rss-counter state mm:ffff0000c5a9ddc0
type:MM_SHMEMPAGES val:1

Because the folio is being accounted to the wrong VMA.

I'm not sure if there will be any data corruption though, seems no. 
The issues above are critical already.


On seeing a swap entry PTE, userfaultfd_move does a lockless swap cache
lookup, and tries to move the found folio to the faulting vma.  Currently,
it relies on checking the PTE value to ensure that the moved folio still
belongs to the src swap entry and that no new folio has been added to the
swap cache, which turns out to be unreliable.

While working and reviewing the swap table series with Barry, following
existing races are observed and reproduced [1]:

In the example below, move_pages_pte is moving src_pte to dst_pte, where
src_pte is a swap entry PTE holding swap entry S1, and S1 is not in the
swap cache:

CPU1                               CPU2
userfaultfd_move
  move_pages_pte()
    entry = pte_to_swp_entry(orig_src_pte);
    // Here it got entry = S1
    ... &lt; interrupted&gt; ...
                                   &lt;swapin src_pte, alloc and use folio A&gt;
                                   // folio A is a new allocated folio
                                   // and get installed into src_pte
                                   &lt;frees swap entry S1&gt;
                                   // src_pte now points to folio A, S1
                                   // has swap count == 0, it can be freed
                                   // by folio_swap_swap or swap
                                   // allocator's reclaim.
                                   &lt;try to swap out another folio B&gt;
                                   // folio B is a folio in another VMA.
                                   &lt;put folio B to swap cache using S1 &gt;
                                   // S1 is freed, folio B can use it
                                   // for swap out with no problem.
                                   ...
    folio = filemap_get_folio(S1)
    // Got folio B here !!!
    ... &lt; interrupted again&gt; ...
                                   &lt;swapin folio B and free S1&gt;
                                   // Now S1 is free to be used again.
                                   &lt;swapout src_pte &amp; folio A using S1&gt;
                                   // Now src_pte is a swap entry PTE
                                   // holding S1 again.
    folio_trylock(folio)
    move_swap_pte
      double_pt_lock
      is_pte_pages_stable
      // Check passed because src_pte == S1
      folio_move_anon_rmap(...)
      // Moved invalid folio B here !!!

The race window is very short and requires multiple collisions of multiple
rare events, so it's very unlikely to happen, but with a deliberately
constructed reproducer and increased time window, it can be reproduced
easily.

This can be fixed by checking if the folio returned by filemap is the
valid swap cache folio after acquiring the folio lock.

Another similar race is possible: filemap_get_folio may return NULL, but
folio (A) could be swapped in and then swapped out again using the same
swap entry after the lookup.  In such a case, folio (A) may remain in the
swap cache, so it must be moved too:

CPU1                               CPU2
userfaultfd_move
  move_pages_pte()
    entry = pte_to_swp_entry(orig_src_pte);
    // Here it got entry = S1, and S1 is not in swap cache
    folio = filemap_get
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38242/">CVE-2025-38242 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38242">CVE-2025-38242 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246176">SUSE bug 1246176</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538243" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38243</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38243" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38243" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38243" ref_url="https://www.suse.com/security/cve/CVE-2025-38243" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix invalid inode pointer dereferences during log replay

In a few places where we call read_one_inode(), if we get a NULL pointer
we end up jumping into an error path, or fallthrough in case of
__add_inode_ref(), where we then do something like this:

   iput(&amp;inode-&gt;vfs_inode);

which results in an invalid inode pointer that triggers an invalid memory
access, resulting in a crash.

Fix this by making sure we don't do such dereferences.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38243/">CVE-2025-38243 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38243">CVE-2025-38243 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246184">SUSE bug 1246184</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38244</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38244" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38244" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38244" ref_url="https://www.suse.com/security/cve/CVE-2025-38244" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix potential deadlock when reconnecting channels

Fix cifs_signal_cifsd_for_reconnect() to take the correct lock order
and prevent the following deadlock from happening

======================================================
WARNING: possible circular locking dependency detected
6.16.0-rc3-build2+ #1301 Tainted: G S      W
------------------------------------------------------
cifsd/6055 is trying to acquire lock:
ffff88810ad56038 (&amp;tcp_ses-&gt;srv_lock){+.+.}-{3:3}, at: cifs_signal_cifsd_for_reconnect+0x134/0x200

but task is already holding lock:
ffff888119c64330 (&amp;ret_buf-&gt;chan_lock){+.+.}-{3:3}, at: cifs_signal_cifsd_for_reconnect+0xcf/0x200

which lock already depends on the new lock.

the existing dependency chain (in reverse order) is:

-&gt; #2 (&amp;ret_buf-&gt;chan_lock){+.+.}-{3:3}:
       validate_chain+0x1cf/0x270
       __lock_acquire+0x60e/0x780
       lock_acquire.part.0+0xb4/0x1f0
       _raw_spin_lock+0x2f/0x40
       cifs_setup_session+0x81/0x4b0
       cifs_get_smb_ses+0x771/0x900
       cifs_mount_get_session+0x7e/0x170
       cifs_mount+0x92/0x2d0
       cifs_smb3_do_mount+0x161/0x460
       smb3_get_tree+0x55/0x90
       vfs_get_tree+0x46/0x180
       do_new_mount+0x1b0/0x2e0
       path_mount+0x6ee/0x740
       do_mount+0x98/0xe0
       __do_sys_mount+0x148/0x180
       do_syscall_64+0xa4/0x260
       entry_SYSCALL_64_after_hwframe+0x76/0x7e

-&gt; #1 (&amp;ret_buf-&gt;ses_lock){+.+.}-{3:3}:
       validate_chain+0x1cf/0x270
       __lock_acquire+0x60e/0x780
       lock_acquire.part.0+0xb4/0x1f0
       _raw_spin_lock+0x2f/0x40
       cifs_match_super+0x101/0x320
       sget+0xab/0x270
       cifs_smb3_do_mount+0x1e0/0x460
       smb3_get_tree+0x55/0x90
       vfs_get_tree+0x46/0x180
       do_new_mount+0x1b0/0x2e0
       path_mount+0x6ee/0x740
       do_mount+0x98/0xe0
       __do_sys_mount+0x148/0x180
       do_syscall_64+0xa4/0x260
       entry_SYSCALL_64_after_hwframe+0x76/0x7e

-&gt; #0 (&amp;tcp_ses-&gt;srv_lock){+.+.}-{3:3}:
       check_noncircular+0x95/0xc0
       check_prev_add+0x115/0x2f0
       validate_chain+0x1cf/0x270
       __lock_acquire+0x60e/0x780
       lock_acquire.part.0+0xb4/0x1f0
       _raw_spin_lock+0x2f/0x40
       cifs_signal_cifsd_for_reconnect+0x134/0x200
       __cifs_reconnect+0x8f/0x500
       cifs_handle_standard+0x112/0x280
       cifs_demultiplex_thread+0x64d/0xbc0
       kthread+0x2f7/0x310
       ret_from_fork+0x2a/0x230
       ret_from_fork_asm+0x1a/0x30

other info that might help us debug this:

Chain exists of:
  &amp;tcp_ses-&gt;srv_lock --&gt; &amp;ret_buf-&gt;ses_lock --&gt; &amp;ret_buf-&gt;chan_lock

 Possible unsafe locking scenario:

       CPU0                    CPU1
       ----                    ----
  lock(&amp;ret_buf-&gt;chan_lock);
                               lock(&amp;ret_buf-&gt;ses_lock);
                               lock(&amp;ret_buf-&gt;chan_lock);
  lock(&amp;tcp_ses-&gt;srv_lock);

 *** DEADLOCK ***

3 locks held by cifsd/6055:
 #0: ffffffff857de398 (&amp;cifs_tcp_ses_lock){+.+.}-{3:3}, at: cifs_signal_cifsd_for_reconnect+0x7b/0x200
 #1: ffff888119c64060 (&amp;ret_buf-&gt;ses_lock){+.+.}-{3:3}, at: cifs_signal_cifsd_for_reconnect+0x9c/0x200
 #2: ffff888119c64330 (&amp;ret_buf-&gt;chan_lock){+.+.}-{3:3}, at: cifs_signal_cifsd_for_reconnect+0xcf/0x200
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38244/">CVE-2025-38244 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38244">CVE-2025-38244 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246183">SUSE bug 1246183</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538245" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38245</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38245" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38245" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38245" ref_url="https://www.suse.com/security/cve/CVE-2025-38245" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

atm: Release atm_dev_mutex after removing procfs in atm_dev_deregister().

syzbot reported a warning below during atm_dev_register(). [0]

Before creating a new device and procfs/sysfs for it, atm_dev_register()
looks up a duplicated device by __atm_dev_lookup().  These operations are
done under atm_dev_mutex.

However, when removing a device in atm_dev_deregister(), it releases the
mutex just after removing the device from the list that __atm_dev_lookup()
iterates over.

So, there will be a small race window where the device does not exist on
the device list but procfs/sysfs are still not removed, triggering the
splat.

Let's hold the mutex until procfs/sysfs are removed in
atm_dev_deregister().

[0]:
proc_dir_entry 'atm/atmtcp:0' already registered
WARNING: CPU: 0 PID: 5919 at fs/proc/generic.c:377 proc_register+0x455/0x5f0 fs/proc/generic.c:377
Modules linked in:
CPU: 0 UID: 0 PID: 5919 Comm: syz-executor284 Not tainted 6.16.0-rc2-syzkaller-00047-g52da431bf03b #0 PREEMPT(full)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
RIP: 0010:proc_register+0x455/0x5f0 fs/proc/generic.c:377
Code: 48 89 f9 48 c1 e9 03 80 3c 01 00 0f 85 a2 01 00 00 48 8b 44 24 10 48 c7 c7 20 c0 c2 8b 48 8b b0 d8 00 00 00 e8 0c 02 1c ff 90 &lt;0f&gt; 0b 90 90 48 c7 c7 80 f2 82 8e e8 0b de 23 09 48 8b 4c 24 28 48
RSP: 0018:ffffc9000466fa30 EFLAGS: 00010282
RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffffff817ae248
RDX: ffff888026280000 RSI: ffffffff817ae255 RDI: 0000000000000001
RBP: ffff8880232bed48 R08: 0000000000000001 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000001 R12: ffff888076ed2140
R13: dffffc0000000000 R14: ffff888078a61340 R15: ffffed100edda444
FS:  00007f38b3b0c6c0(0000) GS:ffff888124753000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f38b3bdf953 CR3: 0000000076d58000 CR4: 00000000003526f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
 proc_create_data+0xbe/0x110 fs/proc/generic.c:585
 atm_proc_dev_register+0x112/0x1e0 net/atm/proc.c:361
 atm_dev_register+0x46d/0x890 net/atm/resources.c:113
 atmtcp_create+0x77/0x210 drivers/atm/atmtcp.c:369
 atmtcp_attach drivers/atm/atmtcp.c:403 [inline]
 atmtcp_ioctl+0x2f9/0xd60 drivers/atm/atmtcp.c:464
 do_vcc_ioctl+0x12c/0x930 net/atm/ioctl.c:159
 sock_do_ioctl+0x115/0x280 net/socket.c:1190
 sock_ioctl+0x227/0x6b0 net/socket.c:1311
 vfs_ioctl fs/ioctl.c:51 [inline]
 __do_sys_ioctl fs/ioctl.c:907 [inline]
 __se_sys_ioctl fs/ioctl.c:893 [inline]
 __x64_sys_ioctl+0x18b/0x210 fs/ioctl.c:893
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xcd/0x4c0 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f38b3b74459
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f38b3b0c198 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 00007f38b3bfe318 RCX: 00007f38b3b74459
RDX: 0000000000000000 RSI: 0000000000006180 RDI: 0000000000000005
RBP: 00007f38b3bfe310 R08: 65732f636f72702f R09: 65732f636f72702f
R10: 65732f636f72702f R11: 0000000000000246 R12: 00007f38b3bcb0ac
R13: 00007f38b3b0c1a0 R14: 0000200000000200 R15: 00007f38b3bcb03b
 &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38245/">CVE-2025-38245 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38245">CVE-2025-38245 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246193">SUSE bug 1246193</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538246" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38246</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38246" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38246" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38246" ref_url="https://www.suse.com/security/cve/CVE-2025-38246" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bnxt: properly flush XDP redirect lists

We encountered following crash when testing a XDP_REDIRECT feature
in production:

[56251.579676] list_add corruption. next-&gt;prev should be prev (ffff93120dd40f30), but was ffffb301ef3a6740. (next=ffff93120dd
40f30).
[56251.601413] ------------[ cut here ]------------
[56251.611357] kernel BUG at lib/list_debug.c:29!
[56251.621082] Oops: invalid opcode: 0000 [#1] PREEMPT SMP NOPTI
[56251.632073] CPU: 111 UID: 0 PID: 0 Comm: swapper/111 Kdump: loaded Tainted: P           O       6.12.33-cloudflare-2025.6.
3 #1
[56251.653155] Tainted: [P]=PROPRIETARY_MODULE, [O]=OOT_MODULE
[56251.663877] Hardware name: MiTAC GC68B-B8032-G11P6-GPU/S8032GM-HE-CFR, BIOS V7.020.B10-sig 01/22/2025
[56251.682626] RIP: 0010:__list_add_valid_or_report+0x4b/0xa0
[56251.693203] Code: 0e 48 c7 c7 68 e7 d9 97 e8 42 16 fe ff 0f 0b 48 8b 52 08 48 39 c2 74 14 48 89 f1 48 c7 c7 90 e7 d9 97 48
 89 c6 e8 25 16 fe ff &lt;0f&gt; 0b 4c 8b 02 49 39 f0 74 14 48 89 d1 48 c7 c7 e8 e7 d9 97 4c 89
[56251.725811] RSP: 0018:ffff93120dd40b80 EFLAGS: 00010246
[56251.736094] RAX: 0000000000000075 RBX: ffffb301e6bba9d8 RCX: 0000000000000000
[56251.748260] RDX: 0000000000000000 RSI: ffff9149afda0b80 RDI: ffff9149afda0b80
[56251.760349] RBP: ffff9131e49c8000 R08: 0000000000000000 R09: ffff93120dd40a18
[56251.772382] R10: ffff9159cf2ce1a8 R11: 0000000000000003 R12: ffff911a80850000
[56251.784364] R13: ffff93120fbc7000 R14: 0000000000000010 R15: ffff9139e7510e40
[56251.796278] FS:  0000000000000000(0000) GS:ffff9149afd80000(0000) knlGS:0000000000000000
[56251.809133] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[56251.819561] CR2: 00007f5e85e6f300 CR3: 00000038b85e2006 CR4: 0000000000770ef0
[56251.831365] PKRU: 55555554
[56251.838653] Call Trace:
[56251.845560]  &lt;IRQ&gt;
[56251.851943]  cpu_map_enqueue.cold+0x5/0xa
[56251.860243]  xdp_do_redirect+0x2d9/0x480
[56251.868388]  bnxt_rx_xdp+0x1d8/0x4c0 [bnxt_en]
[56251.877028]  bnxt_rx_pkt+0x5f7/0x19b0 [bnxt_en]
[56251.885665]  ? cpu_max_write+0x1e/0x100
[56251.893510]  ? srso_alias_return_thunk+0x5/0xfbef5
[56251.902276]  __bnxt_poll_work+0x190/0x340 [bnxt_en]
[56251.911058]  bnxt_poll+0xab/0x1b0 [bnxt_en]
[56251.919041]  ? srso_alias_return_thunk+0x5/0xfbef5
[56251.927568]  ? srso_alias_return_thunk+0x5/0xfbef5
[56251.935958]  ? srso_alias_return_thunk+0x5/0xfbef5
[56251.944250]  __napi_poll+0x2b/0x160
[56251.951155]  bpf_trampoline_6442548651+0x79/0x123
[56251.959262]  __napi_poll+0x5/0x160
[56251.966037]  net_rx_action+0x3d2/0x880
[56251.973133]  ? srso_alias_return_thunk+0x5/0xfbef5
[56251.981265]  ? srso_alias_return_thunk+0x5/0xfbef5
[56251.989262]  ? __hrtimer_run_queues+0x162/0x2a0
[56251.996967]  ? srso_alias_return_thunk+0x5/0xfbef5
[56252.004875]  ? srso_alias_return_thunk+0x5/0xfbef5
[56252.012673]  ? bnxt_msix+0x62/0x70 [bnxt_en]
[56252.019903]  handle_softirqs+0xcf/0x270
[56252.026650]  irq_exit_rcu+0x67/0x90
[56252.032933]  common_interrupt+0x85/0xa0
[56252.039498]  &lt;/IRQ&gt;
[56252.044246]  &lt;TASK&gt;
[56252.048935]  asm_common_interrupt+0x26/0x40
[56252.055727] RIP: 0010:cpuidle_enter_state+0xb8/0x420
[56252.063305] Code: dc 01 00 00 e8 f9 79 3b ff e8 64 f7 ff ff 49 89 c5 0f 1f 44 00 00 31 ff e8 a5 32 3a ff 45 84 ff 0f 85 ae
 01 00 00 fb 45 85 f6 &lt;0f&gt; 88 88 01 00 00 48 8b 04 24 49 63 ce 4c 89 ea 48 6b f1 68 48 29
[56252.088911] RSP: 0018:ffff93120c97fe98 EFLAGS: 00000202
[56252.096912] RAX: ffff9149afd80000 RBX: ffff9141d3a72800 RCX: 0000000000000000
[56252.106844] RDX: 00003329176c6b98 RSI: ffffffe36db3fdc7 RDI: 0000000000000000
[56252.116733] RBP: 0000000000000002 R08: 0000000000000002 R09: 000000000000004e
[56252.126652] R10: ffff9149afdb30c4 R11: 071c71c71c71c71c R12: ffffffff985ff860
[56252.136637] R13: 00003329176c6b98 R14: 0000000000000002 R15: 0000000000000000
[56252.146667]  ? cpuidle_enter_state+0xab/0x420
[56252.153909]  cpuidle_enter+0x2d/0x40
[56252.160360]  do_idle+0x176/0x1c0
[56252.166456
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38246/">CVE-2025-38246 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38246">CVE-2025-38246 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246195">SUSE bug 1246195</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538249" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38249</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38249" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38249" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38249" ref_url="https://www.suse.com/security/cve/CVE-2025-38249" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: usb-audio: Fix out-of-bounds read in snd_usb_get_audioformat_uac3()

In snd_usb_get_audioformat_uac3(), the length value returned from
snd_usb_ctl_msg() is used directly for memory allocation without
validation. This length is controlled by the USB device.

The allocated buffer is cast to a uac3_cluster_header_descriptor
and its fields are accessed without verifying that the buffer
is large enough. If the device returns a smaller than expected
length, this leads to an out-of-bounds read.

Add a length check to ensure the buffer is large enough for
uac3_cluster_header_descriptor.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38249/">CVE-2025-38249 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38249">CVE-2025-38249 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246171">SUSE bug 1246171</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538251" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38251</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38251" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38251" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38251" ref_url="https://www.suse.com/security/cve/CVE-2025-38251" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

atm: clip: prevent NULL deref in clip_push()

Blamed commit missed that vcc_destroy_socket() calls
clip_push() with a NULL skb.

If clip_devs is NULL, clip_push() then crashes when reading
skb-&gt;truesize.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38251/">CVE-2025-38251 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38251">CVE-2025-38251 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246181">SUSE bug 1246181</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538253" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38253</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38253" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38253" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38253" ref_url="https://www.suse.com/security/cve/CVE-2025-38253" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: wacom: fix crash in wacom_aes_battery_handler()

Commit fd2a9b29dc9c ("HID: wacom: Remove AES power_supply after extended
inactivity") introduced wacom_aes_battery_handler() which is scheduled
as a delayed work (aes_battery_work).

In wacom_remove(), aes_battery_work is not canceled. Consequently, if
the device is removed while aes_battery_work is still pending, then hard
crashes or "Oops: general protection fault..." are experienced when
wacom_aes_battery_handler() is finally called. E.g., this happens with
built-in USB devices after resume from hibernate when aes_battery_work
was still pending at the time of hibernation.

So, take care to cancel aes_battery_work in wacom_remove().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38253/">CVE-2025-38253 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38253">CVE-2025-38253 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246192">SUSE bug 1246192</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538255" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38255</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38255" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38255" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38255" ref_url="https://www.suse.com/security/cve/CVE-2025-38255" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

lib/group_cpus: fix NULL pointer dereference from group_cpus_evenly()

While testing null_blk with configfs, echo 0 &gt; poll_queues will trigger
following panic:

BUG: kernel NULL pointer dereference, address: 0000000000000010
Oops: Oops: 0000 [#1] SMP NOPTI
CPU: 27 UID: 0 PID: 920 Comm: bash Not tainted 6.15.0-02023-gadbdb95c8696-dirty #1238 PREEMPT(undef)
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.1-2.fc37 04/01/2014
RIP: 0010:__bitmap_or+0x48/0x70
Call Trace:
 &lt;TASK&gt;
 __group_cpus_evenly+0x822/0x8c0
 group_cpus_evenly+0x2d9/0x490
 blk_mq_map_queues+0x1e/0x110
 null_map_queues+0xc9/0x170 [null_blk]
 blk_mq_update_queue_map+0xdb/0x160
 blk_mq_update_nr_hw_queues+0x22b/0x560
 nullb_update_nr_hw_queues+0x71/0xf0 [null_blk]
 nullb_device_poll_queues_store+0xa4/0x130 [null_blk]
 configfs_write_iter+0x109/0x1d0
 vfs_write+0x26e/0x6f0
 ksys_write+0x79/0x180
 __x64_sys_write+0x1d/0x30
 x64_sys_call+0x45c4/0x45f0
 do_syscall_64+0xa5/0x240
 entry_SYSCALL_64_after_hwframe+0x76/0x7e

Root cause is that numgrps is set to 0, and ZERO_SIZE_PTR is returned from
kcalloc(), and later ZERO_SIZE_PTR will be deferenced.

Fix the problem by checking numgrps first in group_cpus_evenly(), and
return NULL directly if numgrps is zero.

[yukuai3@huawei.com: also fix the non-SMP version]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38255/">CVE-2025-38255 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38255">CVE-2025-38255 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246190">SUSE bug 1246190</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538256" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38256</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38256" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38256" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38256" ref_url="https://www.suse.com/security/cve/CVE-2025-38256" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

io_uring/rsrc: fix folio unpinning

syzbot complains about an unmapping failure:

[  108.070381][   T14] kernel BUG at mm/gup.c:71!
[  108.070502][   T14] Internal error: Oops - BUG: 00000000f2000800 [#1]  SMP
[  108.123672][   T14] Hardware name: QEMU KVM Virtual Machine, BIOS edk2-20250221-8.fc42 02/21/2025
[  108.127458][   T14] Workqueue: iou_exit io_ring_exit_work
[  108.174205][   T14] Call trace:
[  108.175649][   T14]  sanity_check_pinned_pages+0x7cc/0x7d0 (P)
[  108.178138][   T14]  unpin_user_page+0x80/0x10c
[  108.180189][   T14]  io_release_ubuf+0x84/0xf8
[  108.182196][   T14]  io_free_rsrc_node+0x250/0x57c
[  108.184345][   T14]  io_rsrc_data_free+0x148/0x298
[  108.186493][   T14]  io_sqe_buffers_unregister+0x84/0xa0
[  108.188991][   T14]  io_ring_ctx_free+0x48/0x480
[  108.191057][   T14]  io_ring_exit_work+0x764/0x7d8
[  108.193207][   T14]  process_one_work+0x7e8/0x155c
[  108.195431][   T14]  worker_thread+0x958/0xed8
[  108.197561][   T14]  kthread+0x5fc/0x75c
[  108.199362][   T14]  ret_from_fork+0x10/0x20

We can pin a tail page of a folio, but then io_uring will try to unpin
the head page of the folio. While it should be fine in terms of keeping
the page actually alive, mm folks say it's wrong and triggers a debug
warning. Use unpin_user_folio() instead of unpin_user_page*.

[axboe: adapt to current tree, massage commit message]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38256/">CVE-2025-38256 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38256">CVE-2025-38256 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246188">SUSE bug 1246188</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538257" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38257</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38257" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38257" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38257" ref_url="https://www.suse.com/security/cve/CVE-2025-38257" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02588-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02848-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02849-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02850-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02851-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02852-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023732.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390/pkey: Prevent overflow in size calculation for memdup_user()

Number of apqn target list entries contained in 'nr_apqns' variable is
determined by userspace via an ioctl call so the result of the product in
calculation of size passed to memdup_user() may overflow.

In this case the actual size of the allocated area and the value
describing it won't be in sync leading to various types of unpredictable
behaviour later.

Use a proper memdup_array_user() helper which returns an error if an
overflow is detected. Note that it is different from when nr_apqns is
initially zero - that case is considered valid and should be handled in
subsequent pkey_handler implementations.

Found by Linux Verification Center (linuxtesting.org).
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38257/">CVE-2025-38257 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38257">CVE-2025-38257 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246186">SUSE bug 1246186</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246189">SUSE bug 1246189</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538258" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38258</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38258" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38258" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38258" ref_url="https://www.suse.com/security/cve/CVE-2025-38258" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/damon/sysfs-schemes: free old damon_sysfs_scheme_filter-&gt;memcg_path on write

memcg_path_store() assigns a newly allocated memory buffer to
filter-&gt;memcg_path, without deallocating the previously allocated and
assigned memory buffer.  As a result, users can leak kernel memory by
continuously writing a data to memcg_path DAMOS sysfs file.  Fix the leak
by deallocating the previously set memory buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38258/">CVE-2025-38258 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38258">CVE-2025-38258 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246185">SUSE bug 1246185</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538259" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38259</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38259" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38259" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38259" ref_url="https://www.suse.com/security/cve/CVE-2025-38259" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: codecs: wcd9335: Fix missing free of regulator supplies

Driver gets and enables all regulator supplies in probe path
(wcd9335_parse_dt() and wcd9335_power_on_reset()), but does not cleanup
in final error paths and in unbind (missing remove() callback).  This
leads to leaked memory and unbalanced regulator enable count during
probe errors or unbind.

Fix this by converting entire code into devm_regulator_bulk_get_enable()
which also greatly simplifies the code.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38259/">CVE-2025-38259 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38259">CVE-2025-38259 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246220">SUSE bug 1246220</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538262" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38262</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38262" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38262" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38262" ref_url="https://www.suse.com/security/cve/CVE-2025-38262" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tty: serial: uartlite: register uart driver in init

When two instances of uart devices are probing, a concurrency race can
occur. If one thread calls uart_register_driver function, which first
allocates and assigns memory to 'uart_state' member of uart_driver
structure, the other instance can bypass uart driver registration and
call ulite_assign. This calls uart_add_one_port, which expects the uart
driver to be fully initialized. This leads to a kernel panic due to a
null pointer dereference:

[    8.143581] BUG: kernel NULL pointer dereference, address: 00000000000002b8
[    8.156982] #PF: supervisor write access in kernel mode
[    8.156984] #PF: error_code(0x0002) - not-present page
[    8.156986] PGD 0 P4D 0
...
[    8.180668] RIP: 0010:mutex_lock+0x19/0x30
[    8.188624] Call Trace:
[    8.188629]  ? __die_body.cold+0x1a/0x1f
[    8.195260]  ? page_fault_oops+0x15c/0x290
[    8.209183]  ? __irq_resolve_mapping+0x47/0x80
[    8.209187]  ? exc_page_fault+0x64/0x140
[    8.209190]  ? asm_exc_page_fault+0x22/0x30
[    8.209196]  ? mutex_lock+0x19/0x30
[    8.223116]  uart_add_one_port+0x60/0x440
[    8.223122]  ? proc_tty_register_driver+0x43/0x50
[    8.223126]  ? tty_register_driver+0x1ca/0x1e0
[    8.246250]  ulite_probe+0x357/0x4b0 [uartlite]

To prevent it, move uart driver registration in to init function. This
will ensure that uart_driver is always registered when probe function
is called.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38262/">CVE-2025-38262 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38262">CVE-2025-38262 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246282">SUSE bug 1246282</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538263" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38263</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38263" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38263" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38263" ref_url="https://www.suse.com/security/cve/CVE-2025-38263" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bcache: fix NULL pointer in cache_set_flush()

1. LINE#1794 - LINE#1887 is some codes about function of
   bch_cache_set_alloc().
2. LINE#2078 - LINE#2142 is some codes about function of
   register_cache_set().
3. register_cache_set() will call bch_cache_set_alloc() in LINE#2098.

 1794 struct cache_set *bch_cache_set_alloc(struct cache_sb *sb)
 1795 {
 ...
 1860         if (!(c-&gt;devices = kcalloc(c-&gt;nr_uuids, sizeof(void *), GFP_KERNEL)) ||
 1861             mempool_init_slab_pool(&amp;c-&gt;search, 32, bch_search_cache) ||
 1862             mempool_init_kmalloc_pool(&amp;c-&gt;bio_meta, 2,
 1863                                 sizeof(struct bbio) + sizeof(struct bio_vec) *
 1864                                 bucket_pages(c)) ||
 1865             mempool_init_kmalloc_pool(&amp;c-&gt;fill_iter, 1, iter_size) ||
 1866             bioset_init(&amp;c-&gt;bio_split, 4, offsetof(struct bbio, bio),
 1867                         BIOSET_NEED_BVECS|BIOSET_NEED_RESCUER) ||
 1868             !(c-&gt;uuids = alloc_bucket_pages(GFP_KERNEL, c)) ||
 1869             !(c-&gt;moving_gc_wq = alloc_workqueue("bcache_gc",
 1870                                                 WQ_MEM_RECLAIM, 0)) ||
 1871             bch_journal_alloc(c) ||
 1872             bch_btree_cache_alloc(c) ||
 1873             bch_open_buckets_alloc(c) ||
 1874             bch_bset_sort_state_init(&amp;c-&gt;sort, ilog2(c-&gt;btree_pages)))
 1875                 goto err;
                      ^^^^^^^^
 1876
 ...
 1883         return c;
 1884 err:
 1885         bch_cache_set_unregister(c);
              ^^^^^^^^^^^^^^^^^^^^^^^^^^^
 1886         return NULL;
 1887 }
 ...
 2078 static const char *register_cache_set(struct cache *ca)
 2079 {
 ...
 2098         c = bch_cache_set_alloc(&amp;ca-&gt;sb);
 2099         if (!c)
 2100                 return err;
                      ^^^^^^^^^^
 ...
 2128         ca-&gt;set = c;
 2129         ca-&gt;set-&gt;cache[ca-&gt;sb.nr_this_dev] = ca;
              ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
 ...
 2138         return NULL;
 2139 err:
 2140         bch_cache_set_unregister(c);
 2141         return err;
 2142 }

(1) If LINE#1860 - LINE#1874 is true, then do 'goto err'(LINE#1875) and
    call bch_cache_set_unregister()(LINE#1885).
(2) As (1) return NULL(LINE#1886), LINE#2098 - LINE#2100 would return.
(3) As (2) has returned, LINE#2128 - LINE#2129 would do *not* give the
    value to c-&gt;cache[], it means that c-&gt;cache[] is NULL.

LINE#1624 - LINE#1665 is some codes about function of cache_set_flush().
As (1), in LINE#1885 call
bch_cache_set_unregister()
---&gt; bch_cache_set_stop()
     ---&gt; closure_queue()
          -.-&gt; cache_set_flush() (as below LINE#1624)

 1624 static void cache_set_flush(struct closure *cl)
 1625 {
 ...
 1654         for_each_cache(ca, c, i)
 1655                 if (ca-&gt;alloc_thread)
                          ^^
 1656                         kthread_stop(ca-&gt;alloc_thread);
 ...
 1665 }

(4) In LINE#1655 ca is NULL(see (3)) in cache_set_flush() then the
    kernel crash occurred as below:
[  846.712887] bcache: register_cache() error drbd6: cannot allocate memory
[  846.713242] bcache: register_bcache() error : failed to register device
[  846.713336] bcache: cache_set_free() Cache set 2f84bdc1-498a-4f2f-98a7-01946bf54287 unregistered
[  846.713768] BUG: unable to handle kernel NULL pointer dereference at 00000000000009f8
[  846.714790] PGD 0 P4D 0
[  846.715129] Oops: 0000 [#1] SMP PTI
[  846.715472] CPU: 19 PID: 5057 Comm: kworker/19:16 Kdump: loaded Tainted: G           OE    --------- -  - 4.18.0-147.5.1.el8_1.5es.3.x86_64 #1
[  846.716082] Hardware name: ESPAN GI-25212/X11DPL-i, BIOS 2.1 06/15/2018
[  846.716451] Workqueue: events cache_set_flush [bcache]
[  846.716808] RIP: 0010:cache_set_flush+0xc9/0x1b0 [bcache]
[  846.717155] Code: 00 4c 89 a5 b0 03 00 00 48 8b 85 68 f6 ff ff a8 08 0f 84 88 00 00 00 31 db 66 83 bd 3c f7 ff ff 00 48 8b 85 48 ff ff ff 74 28 &lt;48&gt; 8b b8 f8 09 00 0
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38263/">CVE-2025-38263 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38263">CVE-2025-38263 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246248">SUSE bug 1246248</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538264" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38264</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38264" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38264" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38264" ref_url="https://www.suse.com/security/cve/CVE-2025-38264" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvme-tcp: sanitize request list handling

Validate the request in nvme_tcp_handle_r2t() to ensure it's not part of
any list, otherwise a malicious R2T PDU might inject a loop in request
list processing.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-08"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38264/">CVE-2025-38264 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38264">CVE-2025-38264 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246387">SUSE bug 1246387</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538265" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38265</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38265" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38265" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38265" ref_url="https://www.suse.com/security/cve/CVE-2025-38265" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

serial: jsm: fix NPE during jsm_uart_port_init

No device was set which caused serial_base_ctrl_add to crash.

 BUG: kernel NULL pointer dereference, address: 0000000000000050
 Oops: Oops: 0000 [#1] PREEMPT SMP NOPTI
 CPU: 16 UID: 0 PID: 368 Comm: (udev-worker) Not tainted 6.12.25-amd64 #1  Debian 6.12.25-1
 RIP: 0010:serial_base_ctrl_add+0x96/0x120
 Call Trace:
  &lt;TASK&gt;
  serial_core_register_port+0x1a0/0x580
  ? __setup_irq+0x39c/0x660
  ? __kmalloc_cache_noprof+0x111/0x310
  jsm_uart_port_init+0xe8/0x180 [jsm]
  jsm_probe_one+0x1f4/0x410 [jsm]
  local_pci_probe+0x42/0x90
  pci_device_probe+0x22f/0x270
  really_probe+0xdb/0x340
  ? pm_runtime_barrier+0x54/0x90
  ? __pfx___driver_attach+0x10/0x10
  __driver_probe_device+0x78/0x110
  driver_probe_device+0x1f/0xa0
  __driver_attach+0xba/0x1c0
  bus_for_each_dev+0x8c/0xe0
  bus_add_driver+0x112/0x1f0
  driver_register+0x72/0xd0
  jsm_init_module+0x36/0xff0 [jsm]
  ? __pfx_jsm_init_module+0x10/0x10 [jsm]
  do_one_initcall+0x58/0x310
  do_init_module+0x60/0x230

Tested with Digi Neo PCIe 8 port card.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38265/">CVE-2025-38265 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38265">CVE-2025-38265 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246244">SUSE bug 1246244</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538267" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38267</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38267" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38267" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38267" ref_url="https://www.suse.com/security/cve/CVE-2025-38267" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ring-buffer: Do not trigger WARN_ON() due to a commit_overrun

When reading a memory mapped buffer the reader page is just swapped out
with the last page written in the write buffer. If the reader page is the
same as the commit buffer (the buffer that is currently being written to)
it was assumed that it should never have missed events. If it does, it
triggers a WARN_ON_ONCE().

But there just happens to be one scenario where this can legitimately
happen. That is on a commit_overrun. A commit overrun is when an interrupt
preempts an event being written to the buffer and then the interrupt adds
so many new events that it fills and wraps the buffer back to the commit.
Any new events would then be dropped and be reported as "missed_events".

In this case, the next page to read is the commit buffer and after the
swap of the reader page, the reader page will be the commit buffer, but
this time there will be missed events and this triggers the following
warning:

 ------------[ cut here ]------------
 WARNING: CPU: 2 PID: 1127 at kernel/trace/ring_buffer.c:7357 ring_buffer_map_get_reader+0x49a/0x780
 Modules linked in: kvm_intel kvm irqbypass
 CPU: 2 UID: 0 PID: 1127 Comm: trace-cmd Not tainted 6.15.0-rc7-test-00004-g478bc2824b45-dirty #564 PREEMPT
 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
 RIP: 0010:ring_buffer_map_get_reader+0x49a/0x780
 Code: 00 00 00 48 89 fe 48 c1 ee 03 80 3c 2e 00 0f 85 ec 01 00 00 4d 3b a6 a8 00 00 00 0f 85 8a fd ff ff 48 85 c0 0f 84 55 fe ff ff &lt;0f&gt; 0b e9 4e fe ff ff be 08 00 00 00 4c 89 54 24 58 48 89 54 24 50
 RSP: 0018:ffff888121787dc0 EFLAGS: 00010002
 RAX: 00000000000006a2 RBX: ffff888100062800 RCX: ffffffff8190cb49
 RDX: ffff888126934c00 RSI: 1ffff11020200a15 RDI: ffff8881010050a8
 RBP: dffffc0000000000 R08: 0000000000000000 R09: ffffed1024d26982
 R10: ffff888126934c17 R11: ffff8881010050a8 R12: ffff888126934c00
 R13: ffff8881010050b8 R14: ffff888101005000 R15: ffff888126930008
 FS:  00007f95c8cd7540(0000) GS:ffff8882b576e000(0000) knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: 00007f95c8de4dc0 CR3: 0000000128452002 CR4: 0000000000172ef0
 Call Trace:
  &lt;TASK&gt;
  ? __pfx_ring_buffer_map_get_reader+0x10/0x10
  tracing_buffers_ioctl+0x283/0x370
  __x64_sys_ioctl+0x134/0x190
  do_syscall_64+0x79/0x1c0
  entry_SYSCALL_64_after_hwframe+0x76/0x7e
 RIP: 0033:0x7f95c8de48db
 Code: 00 48 89 44 24 18 31 c0 48 8d 44 24 60 c7 04 24 10 00 00 00 48 89 44 24 08 48 8d 44 24 20 48 89 44 24 10 b8 10 00 00 00 0f 05 &lt;89&gt; c2 3d 00 f0 ff ff 77 1c 48 8b 44 24 18 64 48 2b 04 25 28 00 00
 RSP: 002b:00007ffe037ba110 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
 RAX: ffffffffffffffda RBX: 00007ffe037bb2b0 RCX: 00007f95c8de48db
 RDX: 0000000000000000 RSI: 0000000000005220 RDI: 0000000000000006
 RBP: 00007ffe037ba180 R08: 0000000000000000 R09: 0000000000000000
 R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
 R13: 00007ffe037bb6f8 R14: 00007f95c9065000 R15: 00005575c7492c90
  &lt;/TASK&gt;
 irq event stamp: 5080
 hardirqs last  enabled at (5079): [&lt;ffffffff83e0adb0&gt;] _raw_spin_unlock_irqrestore+0x50/0x70
 hardirqs last disabled at (5080): [&lt;ffffffff83e0aa83&gt;] _raw_spin_lock_irqsave+0x63/0x70
 softirqs last  enabled at (4182): [&lt;ffffffff81516122&gt;] handle_softirqs+0x552/0x710
 softirqs last disabled at (4159): [&lt;ffffffff815163f7&gt;] __irq_exit_rcu+0x107/0x210
 ---[ end trace 0000000000000000 ]---

The above was triggered by running on a kernel with both lockdep and KASAN
as well as kmemleak enabled and executing the following command:

 # perf record -o perf-test.dat -a -- trace-cmd record --nosplice  -e all -p function hackbench 50

With perf interjecting a lot of interrupts and trace-cmd enabling all
events as well as function tracing, with lockdep, KASAN and kmemleak
enabled, it could cause an interrupt preempting an event being written to
add enough event
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38267/">CVE-2025-38267 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38267">CVE-2025-38267 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246245">SUSE bug 1246245</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538268" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38268</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38268" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38268" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38268" ref_url="https://www.suse.com/security/cve/CVE-2025-38268" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: typec: tcpm: move tcpm_queue_vdm_unlocked to asynchronous work

A state check was previously added to tcpm_queue_vdm_unlocked to
prevent a deadlock where the DisplayPort Alt Mode driver would be
executing work and attempting to grab the tcpm_lock while the TCPM
was holding the lock and attempting to unregister the altmode, blocking
on the altmode driver's cancel_work_sync call.

Because the state check isn't protected, there is a small window
where the Alt Mode driver could determine that the TCPM is
in a ready state and attempt to grab the lock while the
TCPM grabs the lock and changes the TCPM state to one that
causes the deadlock. The callstack is provided below:

[110121.667392][    C7] Call trace:
[110121.667396][    C7]  __switch_to+0x174/0x338
[110121.667406][    C7]  __schedule+0x608/0x9f0
[110121.667414][    C7]  schedule+0x7c/0xe8
[110121.667423][    C7]  kernfs_drain+0xb0/0x114
[110121.667431][    C7]  __kernfs_remove+0x16c/0x20c
[110121.667436][    C7]  kernfs_remove_by_name_ns+0x74/0xe8
[110121.667442][    C7]  sysfs_remove_group+0x84/0xe8
[110121.667450][    C7]  sysfs_remove_groups+0x34/0x58
[110121.667458][    C7]  device_remove_groups+0x10/0x20
[110121.667464][    C7]  device_release_driver_internal+0x164/0x2e4
[110121.667475][    C7]  device_release_driver+0x18/0x28
[110121.667484][    C7]  bus_remove_device+0xec/0x118
[110121.667491][    C7]  device_del+0x1e8/0x4ac
[110121.667498][    C7]  device_unregister+0x18/0x38
[110121.667504][    C7]  typec_unregister_altmode+0x30/0x44
[110121.667515][    C7]  tcpm_reset_port+0xac/0x370
[110121.667523][    C7]  tcpm_snk_detach+0x84/0xb8
[110121.667529][    C7]  run_state_machine+0x4c0/0x1b68
[110121.667536][    C7]  tcpm_state_machine_work+0x94/0xe4
[110121.667544][    C7]  kthread_worker_fn+0x10c/0x244
[110121.667552][    C7]  kthread+0x104/0x1d4
[110121.667557][    C7]  ret_from_fork+0x10/0x20

[110121.667689][    C7] Workqueue: events dp_altmode_work
[110121.667697][    C7] Call trace:
[110121.667701][    C7]  __switch_to+0x174/0x338
[110121.667710][    C7]  __schedule+0x608/0x9f0
[110121.667717][    C7]  schedule+0x7c/0xe8
[110121.667725][    C7]  schedule_preempt_disabled+0x24/0x40
[110121.667733][    C7]  __mutex_lock+0x408/0xdac
[110121.667741][    C7]  __mutex_lock_slowpath+0x14/0x24
[110121.667748][    C7]  mutex_lock+0x40/0xec
[110121.667757][    C7]  tcpm_altmode_enter+0x78/0xb4
[110121.667764][    C7]  typec_altmode_enter+0xdc/0x10c
[110121.667769][    C7]  dp_altmode_work+0x68/0x164
[110121.667775][    C7]  process_one_work+0x1e4/0x43c
[110121.667783][    C7]  worker_thread+0x25c/0x430
[110121.667789][    C7]  kthread+0x104/0x1d4
[110121.667794][    C7]  ret_from_fork+0x10/0x20

Change tcpm_queue_vdm_unlocked to queue for tcpm_queue_vdm_work,
which can perform the state check while holding the TCPM lock
while the Alt Mode lock is no longer held. This requires a new
struct to hold the vdm data, altmode_vdm_event.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38268/">CVE-2025-38268 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38268">CVE-2025-38268 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246385">SUSE bug 1246385</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538270" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38270</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38270" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38270" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38270" ref_url="https://www.suse.com/security/cve/CVE-2025-38270" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: drv: netdevsim: don't napi_complete() from netpoll

netdevsim supports netpoll. Make sure we don't call napi_complete()
from it, since it may not be scheduled. Breno reports hitting a
warning in napi_complete_done():

WARNING: CPU: 14 PID: 104 at net/core/dev.c:6592 napi_complete_done+0x2cc/0x560
  __napi_poll+0x2d8/0x3a0
  handle_softirqs+0x1fe/0x710

This is presumably after netpoll stole the SCHED bit prematurely.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38270/">CVE-2025-38270 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38270">CVE-2025-38270 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246252">SUSE bug 1246252</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538272" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38272</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38272" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38272" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38272" ref_url="https://www.suse.com/security/cve/CVE-2025-38272" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: dsa: b53: do not enable EEE on bcm63xx

BCM63xx internal switches do not support EEE, but provide multiple RGMII
ports where external PHYs may be connected. If one of these PHYs are EEE
capable, we may try to enable EEE for the MACs, which then hangs the
system on access of the (non-existent) EEE registers.

Fix this by checking if the switch actually supports EEE before
attempting to configure it.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38272/">CVE-2025-38272 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38272">CVE-2025-38272 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246268">SUSE bug 1246268</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538273" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38273</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38273" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38273" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38273" ref_url="https://www.suse.com/security/cve/CVE-2025-38273" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: tipc: fix refcount warning in tipc_aead_encrypt

syzbot reported a refcount warning [1] caused by calling get_net() on
a network namespace that is being destroyed (refcount=0). This happens
when a TIPC discovery timer fires during network namespace cleanup.

The recently added get_net() call in commit e279024617134 ("net/tipc:
fix slab-use-after-free Read in tipc_aead_encrypt_done") attempts to
hold a reference to the network namespace. However, if the namespace
is already being destroyed, its refcount might be zero, leading to the
use-after-free warning.

Replace get_net() with maybe_get_net(), which safely checks if the
refcount is non-zero before incrementing it. If the namespace is being
destroyed, return -ENODEV early, after releasing the bearer reference.

[1]: https://lore.kernel.org/all/68342b55.a70a0220.253bc2.0091.GAE@google.com/T/#m12019cf9ae77e1954f666914640efa36d52704a2
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38273/">CVE-2025-38273 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38273">CVE-2025-38273 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246266">SUSE bug 1246266</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538274" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38274</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38274" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38274" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38274" ref_url="https://www.suse.com/security/cve/CVE-2025-38274" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fpga: fix potential null pointer deref in fpga_mgr_test_img_load_sgt()

fpga_mgr_test_img_load_sgt() allocates memory for sgt using
kunit_kzalloc() however it does not check if the allocation failed.
It then passes sgt to sg_alloc_table(), which passes it to
__sg_alloc_table(). This function calls memset() on sgt in an attempt to
zero it out. If the allocation fails then sgt will be NULL and the
memset will trigger a NULL pointer dereference.

Fix this by checking the allocation with KUNIT_ASSERT_NOT_ERR_OR_NULL().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38274/">CVE-2025-38274 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38274">CVE-2025-38274 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246234">SUSE bug 1246234</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538275" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38275</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38275" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38275" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38275" ref_url="https://www.suse.com/security/cve/CVE-2025-38275" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

phy: qcom-qmp-usb: Fix an NULL vs IS_ERR() bug

The qmp_usb_iomap() helper function currently returns the raw result of
devm_ioremap() for non-exclusive mappings. Since devm_ioremap() may return
a NULL pointer and the caller only checks error pointers with IS_ERR(),
NULL could bypass the check and lead to an invalid dereference.

Fix the issue by checking if devm_ioremap() returns NULL. When it does,
qmp_usb_iomap() now returns an error pointer via IOMEM_ERR_PTR(-ENOMEM),
ensuring safe and consistent error handling.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38275/">CVE-2025-38275 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38275">CVE-2025-38275 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246236">SUSE bug 1246236</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538277" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38277</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38277" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38277" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38277" ref_url="https://www.suse.com/security/cve/CVE-2025-38277" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mtd: nand: ecc-mxic: Fix use of uninitialized variable ret

If ctx-&gt;steps is zero, the loop processing ECC steps is skipped,
and the variable ret remains uninitialized. It is later checked
and returned, which leads to undefined behavior and may cause
unpredictable results in user space or kernel crashes.

This scenario can be triggered in edge cases such as misconfigured
geometry, ECC engine misuse, or if ctx-&gt;steps is not validated
after initialization.

Initialize ret to zero before the loop to ensure correct and safe
behavior regardless of the ctx-&gt;steps value.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38277/">CVE-2025-38277 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38277">CVE-2025-38277 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246246">SUSE bug 1246246</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538278" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38278</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38278" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38278" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38278" ref_url="https://www.suse.com/security/cve/CVE-2025-38278" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

octeontx2-pf: QOS: Refactor TC_HTB_LEAF_DEL_LAST callback

This patch addresses below issues,

1. Active traffic on the leaf node must be stopped before its send queue
   is reassigned to the parent. This patch resolves the issue by marking
   the node as 'Inner'.

2. During a system reboot, the interface receives TC_HTB_LEAF_DEL
   and TC_HTB_LEAF_DEL_LAST callbacks to delete its HTB queues.
   In the case of TC_HTB_LEAF_DEL_LAST, although the same send queue
   is reassigned to the parent, the current logic still attempts to update
   the real number of queues, leadning to below warnings

        New queues can't be registered after device unregistration.
        WARNING: CPU: 0 PID: 6475 at net/core/net-sysfs.c:1714
        netdev_queue_update_kobjects+0x1e4/0x200
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38278/">CVE-2025-38278 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38278">CVE-2025-38278 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246255">SUSE bug 1246255</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538286" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38286</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38286" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38286" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38286" ref_url="https://www.suse.com/security/cve/CVE-2025-38286" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pinctrl: at91: Fix possible out-of-boundary access

at91_gpio_probe() doesn't check that given OF alias is not available or
something went wrong when trying to get it. This might have consequences
when accessing gpio_chips array with that value as an index. Note, that
BUG() can be compiled out and hence won't actually perform the required
checks.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38286/">CVE-2025-38286 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38286">CVE-2025-38286 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246283">SUSE bug 1246283</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246284">SUSE bug 1246284</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538287" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38287</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38287" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38287" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38287" ref_url="https://www.suse.com/security/cve/CVE-2025-38287" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

IB/cm: Drop lockdep assert and WARN when freeing old msg

The send completion handler can run after cm_id has advanced to another
message.  The cm_id lock is not needed in this case, but a recent change
re-used cm_free_priv_msg(), which asserts that the lock is held and
WARNs if the cm_id's currently outstanding msg is different than the one
being freed.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38287/">CVE-2025-38287 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38287">CVE-2025-38287 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246285">SUSE bug 1246285</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538288" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38288</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38288" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38288" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38288" ref_url="https://www.suse.com/security/cve/CVE-2025-38288" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: smartpqi: Fix smp_processor_id() call trace for preemptible kernels

Correct kernel call trace when calling smp_processor_id() when called in
preemptible kernels by using raw_smp_processor_id().

smp_processor_id() checks to see if preemption is disabled and if not,
issue an error message followed by a call to dump_stack().

Brief example of call trace:
kernel:  check_preemption_disabled: 436 callbacks suppressed
kernel:  BUG: using smp_processor_id() in preemptible [00000000]
         code: kworker/u1025:0/2354
kernel:  caller is pqi_scsi_queue_command+0x183/0x310 [smartpqi]
kernel:  CPU: 129 PID: 2354 Comm: kworker/u1025:0
kernel:  ...
kernel:  Workqueue: writeback wb_workfn (flush-253:0)
kernel:  Call Trace:
kernel:   &lt;TASK&gt;
kernel:   dump_stack_lvl+0x34/0x48
kernel:   check_preemption_disabled+0xdd/0xe0
kernel:   pqi_scsi_queue_command+0x183/0x310 [smartpqi]
kernel:  ...
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38288/">CVE-2025-38288 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38288">CVE-2025-38288 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246286">SUSE bug 1246286</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538289" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38289</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38289" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38289" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38289" ref_url="https://www.suse.com/security/cve/CVE-2025-38289" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02588-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02852-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: lpfc: Avoid potential ndlp use-after-free in dev_loss_tmo_callbk

Smatch detected a potential use-after-free of an ndlp oject in
dev_loss_tmo_callbk during driver unload or fatal error handling.

Fix by reordering code to avoid potential use-after-free if initial
nodelist reference has been previously removed.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38289/">CVE-2025-38289 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38289">CVE-2025-38289 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246287">SUSE bug 1246287</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246288">SUSE bug 1246288</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538290" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38290</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38290" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38290" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38290" ref_url="https://www.suse.com/security/cve/CVE-2025-38290" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath12k: fix node corruption in ar-&gt;arvifs list

In current WLAN recovery code flow, ath12k_core_halt() only reinitializes
the "arvifs" list head. This will cause the list node immediately following
the list head to become an invalid list node. Because the prev of that node
still points to the list head "arvifs", but the next of the list head
"arvifs" no longer points to that list node.

When a WLAN recovery occurs during the execution of a vif removal, and it
happens before the spin_lock_bh(&amp;ar-&gt;data_lock) in
ath12k_mac_vdev_delete(), list_del() will detect the previously mentioned
situation, thereby triggering a kernel panic.

The fix is to remove and reinitialize all vif list nodes from the list head
"arvifs" during WLAN halt. The reinitialization is to make the list nodes
valid, ensuring that the list_del() in ath12k_mac_vdev_delete() can execute
normally.

Call trace:
__list_del_entry_valid_or_report+0xd4/0x100 (P)
ath12k_mac_remove_link_interface.isra.0+0xf8/0x2e4 [ath12k]
ath12k_scan_vdev_clean_work+0x40/0x164 [ath12k]
cfg80211_wiphy_work+0xfc/0x100
process_one_work+0x164/0x2d0
worker_thread+0x254/0x380
kthread+0xfc/0x100
ret_from_fork+0x10/0x20

The change is mostly copied from the ath11k patch:
https://lore.kernel.org/all/20250320053145.3445187-1-quic_stonez@quicinc.com/

Tested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.4.1-00199-QCAHKSWPL_SILICONZ-1
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38290/">CVE-2025-38290 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38290">CVE-2025-38290 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246293">SUSE bug 1246293</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538291" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38291</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38291" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38291" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38291" ref_url="https://www.suse.com/security/cve/CVE-2025-38291" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath12k: Prevent sending WMI commands to firmware during firmware crash

Currently, we encounter the following kernel call trace when a firmware
crash occurs. This happens because the host sends WMI commands to the
firmware while it is in recovery, causing the commands to fail and
resulting in the kernel call trace.

Set the ATH12K_FLAG_CRASH_FLUSH and ATH12K_FLAG_RECOVERY flags when the
host driver receives the firmware crash notification from MHI. This
prevents sending WMI commands to the firmware during recovery.

Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0x75/0xc0
 register_lock_class+0x6be/0x7a0
 ? __lock_acquire+0x644/0x19a0
 __lock_acquire+0x95/0x19a0
 lock_acquire+0x265/0x310
 ? ath12k_ce_send+0xa2/0x210 [ath12k]
 ? find_held_lock+0x34/0xa0
 ? ath12k_ce_send+0x56/0x210 [ath12k]
 _raw_spin_lock_bh+0x33/0x70
 ? ath12k_ce_send+0xa2/0x210 [ath12k]
 ath12k_ce_send+0xa2/0x210 [ath12k]
 ath12k_htc_send+0x178/0x390 [ath12k]
 ath12k_wmi_cmd_send_nowait+0x76/0xa0 [ath12k]
 ath12k_wmi_cmd_send+0x62/0x190 [ath12k]
 ath12k_wmi_pdev_bss_chan_info_request+0x62/0xc0 [ath1
 ath12k_mac_op_get_survey+0x2be/0x310 [ath12k]
 ieee80211_dump_survey+0x99/0x240 [mac80211]
 nl80211_dump_survey+0xe7/0x470 [cfg80211]
 ? kmalloc_reserve+0x59/0xf0
 genl_dumpit+0x24/0x70
 netlink_dump+0x177/0x360
 __netlink_dump_start+0x206/0x280
 genl_family_rcv_msg_dumpit.isra.22+0x8a/0xe0
 ? genl_family_rcv_msg_attrs_parse.isra.23+0xe0/0xe0
 ? genl_op_lock.part.12+0x10/0x10
 ? genl_dumpit+0x70/0x70
 genl_rcv_msg+0x1d0/0x290
 ? nl80211_del_station+0x330/0x330 [cfg80211]
 ? genl_get_cmd_both+0x50/0x50
 netlink_rcv_skb+0x4f/0x100
 genl_rcv+0x1f/0x30
 netlink_unicast+0x1b6/0x260
 netlink_sendmsg+0x31a/0x450
 __sock_sendmsg+0xa8/0xb0
 ____sys_sendmsg+0x1e4/0x260
 ___sys_sendmsg+0x89/0xe0
 ? local_clock_noinstr+0xb/0xc0
 ? rcu_is_watching+0xd/0x40
 ? kfree+0x1de/0x370
 ? __sys_sendmsg+0x7a/0xc0

Tested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.4.1-00199-QCAHKSWPL_SILICONZ-1
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38291/">CVE-2025-38291 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38291">CVE-2025-38291 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246297">SUSE bug 1246297</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538292" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38292</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38292" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38292" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38292" ref_url="https://www.suse.com/security/cve/CVE-2025-38292" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:13602" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath12k: fix invalid access to memory

In ath12k_dp_rx_msdu_coalesce(), rxcb is fetched from skb and boolean
is_continuation is part of rxcb.
Currently, after freeing the skb, the rxcb-&gt;is_continuation accessed
again which is wrong since the memory is already freed.
This might lead use-after-free error.

Hence, fix by locally defining bool is_continuation from rxcb,
so that after freeing skb, is_continuation can be used.

Compile tested only.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38292/">CVE-2025-38292 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38292">CVE-2025-38292 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246295">SUSE bug 1246295</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538293" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38293</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38293" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38293" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38293" ref_url="https://www.suse.com/security/cve/CVE-2025-38293" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath11k: fix node corruption in ar-&gt;arvifs list

In current WLAN recovery code flow, ath11k_core_halt() only
reinitializes the "arvifs" list head. This will cause the
list node immediately following the list head to become an
invalid list node. Because the prev of that node still points
to the list head "arvifs", but the next of the list head "arvifs"
no longer points to that list node.

When a WLAN recovery occurs during the execution of a vif
removal, and it happens before the spin_lock_bh(&amp;ar-&gt;data_lock)
in ath11k_mac_op_remove_interface(), list_del() will detect the
previously mentioned situation, thereby triggering a kernel panic.

The fix is to remove and reinitialize all vif list nodes from the
list head "arvifs" during WLAN halt. The reinitialization is to make
the list nodes valid, ensuring that the list_del() in
ath11k_mac_op_remove_interface() can execute normally.

Call trace:
__list_del_entry_valid_or_report+0xb8/0xd0
ath11k_mac_op_remove_interface+0xb0/0x27c [ath11k]
drv_remove_interface+0x48/0x194 [mac80211]
ieee80211_do_stop+0x6e0/0x844 [mac80211]
ieee80211_stop+0x44/0x17c [mac80211]
__dev_close_many+0xac/0x150
__dev_change_flags+0x194/0x234
dev_change_flags+0x24/0x6c
devinet_ioctl+0x3a0/0x670
inet_ioctl+0x200/0x248
sock_do_ioctl+0x60/0x118
sock_ioctl+0x274/0x35c
__arm64_sys_ioctl+0xac/0xf0
invoke_syscall+0x48/0x114
...

Tested-on: QCA6698AQ hw2.1 PCI WLAN.HSP.1.1-04591-QCAHSPSWPL_V1_V2_SILICONZ_IOE-1
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38293/">CVE-2025-38293 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38293">CVE-2025-38293 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246292">SUSE bug 1246292</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538297" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38297</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38297" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38297" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38297" ref_url="https://www.suse.com/security/cve/CVE-2025-38297" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

PM: EM: Fix potential division-by-zero error in em_compute_costs()

When the device is of a non-CPU type, table[i].performance won't be
initialized in the previous em_init_performance(), resulting in division
by zero when calculating costs in em_compute_costs().

Since the 'cost' algorithm is only used for EAS energy efficiency
calculations and is currently not utilized by other device drivers, we
should add the _is_cpu_device(dev) check to prevent this division-by-zero
issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-38297/">CVE-2025-38297 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38297">CVE-2025-38297 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253078">SUSE bug 1253078</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538298" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38298</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38298" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38298" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38298" ref_url="https://www.suse.com/security/cve/CVE-2025-38298" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

EDAC/skx_common: Fix general protection fault

After loading i10nm_edac (which automatically loads skx_edac_common), if
unload only i10nm_edac, then reload it and perform error injection testing,
a general protection fault may occur:

  mce: [Hardware Error]: Machine check events logged
  Oops: general protection fault ...
  ...
  Workqueue: events mce_gen_pool_process
  RIP: 0010:string+0x53/0xe0
  ...
  Call Trace:
  &lt;TASK&gt;
  ? die_addr+0x37/0x90
  ? exc_general_protection+0x1e7/0x3f0
  ? asm_exc_general_protection+0x26/0x30
  ? string+0x53/0xe0
  vsnprintf+0x23e/0x4c0
  snprintf+0x4d/0x70
  skx_adxl_decode+0x16a/0x330 [skx_edac_common]
  skx_mce_check_error.part.0+0xf8/0x220 [skx_edac_common]
  skx_mce_check_error+0x17/0x20 [skx_edac_common]
  ...

The issue arose was because the variable 'adxl_component_count' (inside
skx_edac_common), which counts the ADXL components, was not reset. During
the reloading of i10nm_edac, the count was incremented by the actual number
of ADXL components again, resulting in a count that was double the real
number of ADXL components. This led to an out-of-bounds reference to the
ADXL component array, causing the general protection fault above.

Fix this issue by resetting the 'adxl_component_count' in adxl_put(),
which is called during the unloading of {skx,i10nm}_edac.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-06"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-38298/">CVE-2025-38298 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38298">CVE-2025-38298 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253079">SUSE bug 1253079</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538299" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38299</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38299" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38299" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38299" ref_url="https://www.suse.com/security/cve/CVE-2025-38299" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: mediatek: mt8195: Set ETDM1/2 IN/OUT to COMP_DUMMY()

ETDM2_IN_BE and ETDM1_OUT_BE are defined as COMP_EMPTY(),
in the case the codec dai_name will be null.

Avoid a crash if the device tree is not assigning a codec
to these links.

[    1.179936] Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000
[    1.181065] Mem abort info:
[    1.181420]   ESR = 0x0000000096000004
[    1.181892]   EC = 0x25: DABT (current EL), IL = 32 bits
[    1.182576]   SET = 0, FnV = 0
[    1.182964]   EA = 0, S1PTW = 0
[    1.183367]   FSC = 0x04: level 0 translation fault
[    1.183983] Data abort info:
[    1.184406]   ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000
[    1.185097]   CM = 0, WnR = 0, TnD = 0, TagAccess = 0
[    1.185766]   GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0
[    1.186439] [0000000000000000] user address but active_mm is swapper
[    1.187239] Internal error: Oops: 0000000096000004 [#1] PREEMPT SMP
[    1.188029] Modules linked in:
[    1.188420] CPU: 7 UID: 0 PID: 70 Comm: kworker/u32:1 Not tainted 6.14.0-rc4-next-20250226+ #85
[    1.189515] Hardware name: Radxa NIO 12L (DT)
[    1.190065] Workqueue: events_unbound deferred_probe_work_func
[    1.190808] pstate: 40400009 (nZcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[    1.191683] pc : __pi_strcmp+0x24/0x140
[    1.192170] lr : mt8195_mt6359_soc_card_probe+0x224/0x7b0
[    1.192854] sp : ffff800083473970
[    1.193271] x29: ffff800083473a10 x28: 0000000000001008 x27: 0000000000000002
[    1.194168] x26: ffff800082408960 x25: ffff800082417db0 x24: ffff800082417d88
[    1.195065] x23: 000000000000001e x22: ffff800082dbf480 x21: ffff800082dc07b8
[    1.195961] x20: 0000000000000000 x19: 0000000000000013 x18: 00000000ffffffff
[    1.196858] x17: 000000040044ffff x16: 005000f2b5503510 x15: 0000000000000006
[    1.197755] x14: ffff800082407af0 x13: 6e6f69737265766e x12: 692d6b636f6c6374
[    1.198651] x11: 0000000000000002 x10: ffff80008240b920 x9 : 0000000000000018
[    1.199547] x8 : 0101010101010101 x7 : 0000000000000000 x6 : 0000000000000000
[    1.200443] x5 : 0000000000000000 x4 : 8080808080000000 x3 : 303933383978616d
[    1.201339] x2 : 0000000000000000 x1 : ffff80008240b920 x0 : 0000000000000000
[    1.202236] Call trace:
[    1.202545]  __pi_strcmp+0x24/0x140 (P)
[    1.203029]  mtk_soundcard_common_probe+0x3bc/0x5b8
[    1.203644]  platform_probe+0x70/0xe8
[    1.204106]  really_probe+0xc8/0x3a0
[    1.204556]  __driver_probe_device+0x84/0x160
[    1.205104]  driver_probe_device+0x44/0x130
[    1.205630]  __device_attach_driver+0xc4/0x170
[    1.206189]  bus_for_each_drv+0x8c/0xf8
[    1.206672]  __device_attach+0xa8/0x1c8
[    1.207155]  device_initial_probe+0x1c/0x30
[    1.207681]  bus_probe_device+0xb0/0xc0
[    1.208165]  deferred_probe_work_func+0xa4/0x100
[    1.208747]  process_one_work+0x158/0x3e0
[    1.209254]  worker_thread+0x2c4/0x3e8
[    1.209727]  kthread+0x134/0x1f0
[    1.210136]  ret_from_fork+0x10/0x20
[    1.210589] Code: 54000401 b50002c6 d503201f f86a6803 (f8408402)
[    1.211355] ---[ end trace 0000000000000000 ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38299/">CVE-2025-38299 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38299">CVE-2025-38299 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246290">SUSE bug 1246290</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538300" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38300</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38300" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38300" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38300" ref_url="https://www.suse.com/security/cve/CVE-2025-38300" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: sun8i-ce-cipher - fix error handling in sun8i_ce_cipher_prepare()

Fix two DMA cleanup issues on the error path in sun8i_ce_cipher_prepare():

1] If dma_map_sg() fails for areq-&gt;dst, the device driver would try to free
   DMA memory it has not allocated in the first place. To fix this, on the
   "theend_sgs" error path, call dma unmap only if the corresponding dma
   map was successful.

2] If the dma_map_single() call for the IV fails, the device driver would
   try to free an invalid DMA memory address on the "theend_iv" path:
   ------------[ cut here ]------------
   DMA-API: sun8i-ce 1904000.crypto: device driver tries to free an invalid DMA memory address
   WARNING: CPU: 2 PID: 69 at kernel/dma/debug.c:968 check_unmap+0x123c/0x1b90
   Modules linked in: skcipher_example(O+)
   CPU: 2 UID: 0 PID: 69 Comm: 1904000.crypto- Tainted: G           O        6.15.0-rc3+ #24 PREEMPT
   Tainted: [O]=OOT_MODULE
   Hardware name: OrangePi Zero2 (DT)
   pc : check_unmap+0x123c/0x1b90
   lr : check_unmap+0x123c/0x1b90
   ...
   Call trace:
    check_unmap+0x123c/0x1b90 (P)
    debug_dma_unmap_page+0xac/0xc0
    dma_unmap_page_attrs+0x1f4/0x5fc
    sun8i_ce_cipher_do_one+0x1bd4/0x1f40
    crypto_pump_work+0x334/0x6e0
    kthread_worker_fn+0x21c/0x438
    kthread+0x374/0x664
    ret_from_fork+0x10/0x20
   ---[ end trace 0000000000000000 ]---

To fix this, check for !dma_mapping_error() before calling
dma_unmap_single() on the "theend_iv" path.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38300/">CVE-2025-38300 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38300">CVE-2025-38300 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246349">SUSE bug 1246349</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538301" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38301</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38301" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38301" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38301" ref_url="https://www.suse.com/security/cve/CVE-2025-38301" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvmem: zynqmp_nvmem: unbreak driver after cleanup

Commit 29be47fcd6a0 ("nvmem: zynqmp_nvmem: zynqmp_nvmem_probe cleanup")
changed the driver to expect the device pointer to be passed as the
"context", but in nvmem the context parameter comes from nvmem_config.priv
which is never set - Leading to null pointer exceptions when the device is
accessed.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38301/">CVE-2025-38301 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38301">CVE-2025-38301 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246351">SUSE bug 1246351</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538302" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38302</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38302" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38302" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38302" ref_url="https://www.suse.com/security/cve/CVE-2025-38302" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

block: don't use submit_bio_noacct_nocheck in blk_zone_wplug_bio_work

Bios queued up in the zone write plug have already gone through all all
preparation in the submit_bio path, including the freeze protection.

Submitting them through submit_bio_noacct_nocheck duplicates the work
and can can cause deadlocks when freezing a queue with pending bio
write plugs.

Go straight to -&gt;submit_bio or blk_mq_submit_bio to bypass the
superfluous extra freeze protection and checks.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38302/">CVE-2025-38302 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38302">CVE-2025-38302 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246353">SUSE bug 1246353</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538303" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38303</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38303" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38303" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38303" ref_url="https://www.suse.com/security/cve/CVE-2025-38303" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: eir: Fix possible crashes on eir_create_adv_data

eir_create_adv_data may attempt to add EIR_FLAGS and EIR_TX_POWER
without checking if that would fit.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38303/">CVE-2025-38303 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38303">CVE-2025-38303 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246354">SUSE bug 1246354</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538304" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38304</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38304" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38304" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38304" ref_url="https://www.suse.com/security/cve/CVE-2025-38304" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: Fix NULL pointer deference on eir_get_service_data

The len parameter is considered optional so it can be NULL so it cannot
be used for skipping to next entry of EIR_SERVICE_DATA.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38304/">CVE-2025-38304 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38304">CVE-2025-38304 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246240">SUSE bug 1246240</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538305" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38305</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38305" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38305" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38305" ref_url="https://www.suse.com/security/cve/CVE-2025-38305" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ptp: remove ptp-&gt;n_vclocks check logic in ptp_vclock_in_use()

There is no disagreement that we should check both ptp-&gt;is_virtual_clock
and ptp-&gt;n_vclocks to check if the ptp virtual clock is in use.

However, when we acquire ptp-&gt;n_vclocks_mux to read ptp-&gt;n_vclocks in
ptp_vclock_in_use(), we observe a recursive lock in the call trace
starting from n_vclocks_store().

============================================
WARNING: possible recursive locking detected
6.15.0-rc6 #1 Not tainted
--------------------------------------------
syz.0.1540/13807 is trying to acquire lock:
ffff888035a24868 (&amp;ptp-&gt;n_vclocks_mux){+.+.}-{4:4}, at:
 ptp_vclock_in_use drivers/ptp/ptp_private.h:103 [inline]
ffff888035a24868 (&amp;ptp-&gt;n_vclocks_mux){+.+.}-{4:4}, at:
 ptp_clock_unregister+0x21/0x250 drivers/ptp/ptp_clock.c:415

but task is already holding lock:
ffff888030704868 (&amp;ptp-&gt;n_vclocks_mux){+.+.}-{4:4}, at:
 n_vclocks_store+0xf1/0x6d0 drivers/ptp/ptp_sysfs.c:215

other info that might help us debug this:
 Possible unsafe locking scenario:

       CPU0
       ----
  lock(&amp;ptp-&gt;n_vclocks_mux);
  lock(&amp;ptp-&gt;n_vclocks_mux);

 *** DEADLOCK ***
....
============================================

The best way to solve this is to remove the logic that checks
ptp-&gt;n_vclocks in ptp_vclock_in_use().

The reason why this is appropriate is that any path that uses
ptp-&gt;n_vclocks must unconditionally check if ptp-&gt;n_vclocks is greater
than 0 before unregistering vclocks, and all functions are already
written this way. And in the function that uses ptp-&gt;n_vclocks, we
already get ptp-&gt;n_vclocks_mux before unregistering vclocks.

Therefore, we need to remove the redundant check for ptp-&gt;n_vclocks in
ptp_vclock_in_use() to prevent recursive locking.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38305/">CVE-2025-38305 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38305">CVE-2025-38305 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246358">SUSE bug 1246358</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538306" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38306</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38306" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38306" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38306" ref_url="https://www.suse.com/security/cve/CVE-2025-38306" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs/fhandle.c: fix a race in call of has_locked_children()

may_decode_fh() is calling has_locked_children() while holding no locks.
That's an oopsable race...

The rest of the callers are safe since they are holding namespace_sem and
are guaranteed a positive refcount on the mount in question.

Rename the current has_locked_children() to __has_locked_children(), make
it static and switch the fs/namespace.c users to it.

Make has_locked_children() a wrapper for __has_locked_children(), calling
the latter under read_seqlock_excl(&amp;mount_lock).
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38306/">CVE-2025-38306 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38306">CVE-2025-38306 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246366">SUSE bug 1246366</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538307" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38307</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38307" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38307" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38307" ref_url="https://www.suse.com/security/cve/CVE-2025-38307" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: Intel: avs: Verify content returned by parse_int_array()

The first element of the returned array stores its length. If it is 0,
any manipulation beyond the element at index 0 ends with null-ptr-deref.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38307/">CVE-2025-38307 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38307">CVE-2025-38307 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246364">SUSE bug 1246364</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38311</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38311" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38311" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38311" ref_url="https://www.suse.com/security/cve/CVE-2025-38311" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iavf: get rid of the crit lock

Get rid of the crit lock.
That frees us from the error prone logic of try_locks.

Thanks to netdev_lock() by Jakub it is now easy, and in most cases we were
protected by it already - replace crit lock by netdev lock when it was not
the case.

Lockdep reports that we should cancel the work under crit_lock [splat1],
and that was the scheme we have mostly followed since [1] by Slawomir.
But when that is done we still got into deadlocks [splat2]. So instead
we should look at the bigger problem, namely "weird locking/scheduling"
of the iavf. The first step to fix that is to remove the crit lock.
I will followup with a -next series that simplifies scheduling/tasks.

Cancel the work without netdev lock (weird unlock+lock scheme),
to fix the [splat2] (which would be totally ugly if we would kept
the crit lock).

Extend protected part of iavf_watchdog_task() to include scheduling
more work.

Note that the removed comment in iavf_reset_task() was misplaced,
it belonged to inside of the removed if condition, so it's gone now.

[splat1] - w/o this patch - The deadlock during VF removal:
     WARNING: possible circular locking dependency detected
     sh/3825 is trying to acquire lock:
      ((work_completion)(&amp;(&amp;adapter-&gt;watchdog_task)-&gt;work)){+.+.}-{0:0}, at: start_flush_work+0x1a1/0x470
          but task is already holding lock:
      (&amp;adapter-&gt;crit_lock){+.+.}-{4:4}, at: iavf_remove+0xd1/0x690 [iavf]
          which lock already depends on the new lock.

[splat2] - when cancelling work under crit lock, w/o this series,
	   see [2] for the band aid attempt
    WARNING: possible circular locking dependency detected
    sh/3550 is trying to acquire lock:
    ((wq_completion)iavf){+.+.}-{0:0}, at: touch_wq_lockdep_map+0x26/0x90
        but task is already holding lock:
    (&amp;dev-&gt;lock){+.+.}-{4:4}, at: iavf_remove+0xa6/0x6e0 [iavf]
        which lock already depends on the new lock.

[1] fc2e6b3b132a ("iavf: Rework mutexes for better synchronisation")
[2] https://github.com/pkitszel/linux/commit/52dddbfc2bb60294083f5711a158a
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38311/">CVE-2025-38311 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38311">CVE-2025-38311 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246376">SUSE bug 1246376</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538312" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38312</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38312" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38312" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38312" ref_url="https://www.suse.com/security/cve/CVE-2025-38312" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fbdev: core: fbcvt: avoid division by 0 in fb_cvt_hperiod()

In fb_find_mode_cvt(), iff mode-&gt;refresh somehow happens to be 0x80000000,
cvt.f_refresh will become 0 when multiplying it by 2 due to overflow. It's
then passed to fb_cvt_hperiod(), where it's used as a divider -- division
by 0 will result in kernel oops. Add a sanity check for cvt.f_refresh to
avoid such overflow...

Found by Linux Verification Center (linuxtesting.org) with the Svace static
analysis tool.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38312/">CVE-2025-38312 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38312">CVE-2025-38312 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246386">SUSE bug 1246386</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538313" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38313</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38313" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38313" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38313" ref_url="https://www.suse.com/security/cve/CVE-2025-38313" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bus: fsl-mc: fix double-free on mc_dev

The blamed commit tried to simplify how the deallocations are done but,
in the process, introduced a double-free on the mc_dev variable.

In case the MC device is a DPRC, a new mc_bus is allocated and the
mc_dev variable is just a reference to one of its fields. In this
circumstance, on the error path only the mc_bus should be freed.

This commit introduces back the following checkpatch warning which is a
false-positive.

WARNING: kfree(NULL) is safe and this check is probably not required
+       if (mc_bus)
+               kfree(mc_bus);
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38313/">CVE-2025-38313 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38313">CVE-2025-38313 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246342">SUSE bug 1246342</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538315" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38315</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38315" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38315" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38315" ref_url="https://www.suse.com/security/cve/CVE-2025-38315" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: btintel: Check dsbr size from EFI variable

Since the size of struct btintel_dsbr is already known, we can just
start there instead of querying the EFI variable size. If the final
result doesn't match what we expect also fail. This fixes a stack buffer
overflow when the EFI variable is larger than struct btintel_dsbr.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38315/">CVE-2025-38315 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38315">CVE-2025-38315 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246333">SUSE bug 1246333</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538317" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38317</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38317" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38317" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38317" ref_url="https://www.suse.com/security/cve/CVE-2025-38317" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath12k: Fix buffer overflow in debugfs

If the user tries to write more than 32 bytes then it results in memory
corruption.  Fortunately, this is debugfs so it's limited to root users.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38317/">CVE-2025-38317 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38317">CVE-2025-38317 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246443">SUSE bug 1246443</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538318" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38318</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38318" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38318" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38318" ref_url="https://www.suse.com/security/cve/CVE-2025-38318" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

perf: arm-ni: Fix missing platform_set_drvdata()

Add missing platform_set_drvdata in arm_ni_probe(), otherwise
calling platform_get_drvdata() in remove returns NULL.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38318/">CVE-2025-38318 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38318">CVE-2025-38318 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246444">SUSE bug 1246444</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538319" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38319</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38319" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38319" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38319" ref_url="https://www.suse.com/security/cve/CVE-2025-38319" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/pp: Fix potential NULL pointer dereference in atomctrl_initialize_mc_reg_table

The function atomctrl_initialize_mc_reg_table() and
atomctrl_initialize_mc_reg_table_v2_2() does not check the return
value of smu_atom_get_data_table(). If smu_atom_get_data_table()
fails to retrieve vram_info, it returns NULL which is later
dereferenced.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38319/">CVE-2025-38319 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38319">CVE-2025-38319 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246243">SUSE bug 1246243</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538321" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38321</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38321" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38321" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38321" ref_url="https://www.suse.com/security/cve/CVE-2025-38321" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: Log an error when close_all_cached_dirs fails

Under low-memory conditions, close_all_cached_dirs() can't move the
dentries to a separate list to dput() them once the locks are dropped.
This will result in a "Dentry still in use" error, so add an error
message that makes it clear this is what happened:

[  495.281119] CIFS: VFS: \\otters.example.com\share Out of memory while dropping dentries
[  495.281595] ------------[ cut here ]------------
[  495.281887] BUG: Dentry ffff888115531138{i=78,n=/}  still in use (2) [unmount of cifs cifs]
[  495.282391] WARNING: CPU: 1 PID: 2329 at fs/dcache.c:1536 umount_check+0xc8/0xf0

Also, bail out of looping through all tcons as soon as a single
allocation fails, since we're already in trouble, and kmalloc() attempts
for subseqeuent tcons are likely to fail just like the first one did.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38321/">CVE-2025-38321 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38321">CVE-2025-38321 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246328">SUSE bug 1246328</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538322" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38322</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38322" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38322" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38322" ref_url="https://www.suse.com/security/cve/CVE-2025-38322" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

perf/x86/intel: Fix crash in icl_update_topdown_event()

The perf_fuzzer found a hard-lockup crash on a RaptorLake machine:

  Oops: general protection fault, maybe for address 0xffff89aeceab400: 0000
  CPU: 23 UID: 0 PID: 0 Comm: swapper/23
  Tainted: [W]=WARN
  Hardware name: Dell Inc. Precision 9660/0VJ762
  RIP: 0010:native_read_pmc+0x7/0x40
  Code: cc e8 8d a9 01 00 48 89 03 5b cd cc cc cc cc 0f 1f ...
  RSP: 000:fffb03100273de8 EFLAGS: 00010046
  ....
  Call Trace:
    &lt;TASK&gt;
    icl_update_topdown_event+0x165/0x190
    ? ktime_get+0x38/0xd0
    intel_pmu_read_event+0xf9/0x210
    __perf_event_read+0xf9/0x210

CPUs 16-23 are E-core CPUs that don't support the perf metrics feature.
The icl_update_topdown_event() should not be invoked on these CPUs.

It's a regression of commit:

  f9bdf1f95339 ("perf/x86/intel: Avoid disable PMU if !cpuc-&gt;enabled in sample read")

The bug introduced by that commit is that the is_topdown_event() function
is mistakenly used to replace the is_topdown_count() call to check if the
topdown functions for the perf metrics feature should be invoked.

Fix it.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38322/">CVE-2025-38322 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38322">CVE-2025-38322 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246447">SUSE bug 1246447</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538323" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38323</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38323" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38323" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38323" ref_url="https://www.suse.com/security/cve/CVE-2025-38323" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03283-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03310-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03314-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: atm: add lec_mutex

syzbot found its way in net/atm/lec.c, and found an error path
in lecd_attach() could leave a dangling pointer in dev_lec[].

Add a mutex to protect dev_lecp[] uses from lecd_attach(),
lec_vcc_attach() and lec_mcast_attach().

Following patch will use this mutex for /proc/net/atm/lec.

BUG: KASAN: slab-use-after-free in lecd_attach net/atm/lec.c:751 [inline]
BUG: KASAN: slab-use-after-free in lane_ioctl+0x2224/0x23e0 net/atm/lec.c:1008
Read of size 8 at addr ffff88807c7b8e68 by task syz.1.17/6142

CPU: 1 UID: 0 PID: 6142 Comm: syz.1.17 Not tainted 6.16.0-rc1-syzkaller-00239-g08215f5486ec #0 PREEMPT(full)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
Call Trace:
 &lt;TASK&gt;
  __dump_stack lib/dump_stack.c:94 [inline]
  dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:120
  print_address_description mm/kasan/report.c:408 [inline]
  print_report+0xcd/0x680 mm/kasan/report.c:521
  kasan_report+0xe0/0x110 mm/kasan/report.c:634
  lecd_attach net/atm/lec.c:751 [inline]
  lane_ioctl+0x2224/0x23e0 net/atm/lec.c:1008
  do_vcc_ioctl+0x12c/0x930 net/atm/ioctl.c:159
  sock_do_ioctl+0x118/0x280 net/socket.c:1190
  sock_ioctl+0x227/0x6b0 net/socket.c:1311
  vfs_ioctl fs/ioctl.c:51 [inline]
  __do_sys_ioctl fs/ioctl.c:907 [inline]
  __se_sys_ioctl fs/ioctl.c:893 [inline]
  __x64_sys_ioctl+0x18e/0x210 fs/ioctl.c:893
  do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
  do_syscall_64+0xcd/0x4c0 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
 &lt;/TASK&gt;

Allocated by task 6132:
  kasan_save_stack+0x33/0x60 mm/kasan/common.c:47
  kasan_save_track+0x14/0x30 mm/kasan/common.c:68
  poison_kmalloc_redzone mm/kasan/common.c:377 [inline]
  __kasan_kmalloc+0xaa/0xb0 mm/kasan/common.c:394
  kasan_kmalloc include/linux/kasan.h:260 [inline]
  __do_kmalloc_node mm/slub.c:4328 [inline]
  __kvmalloc_node_noprof+0x27b/0x620 mm/slub.c:5015
  alloc_netdev_mqs+0xd2/0x1570 net/core/dev.c:11711
  lecd_attach net/atm/lec.c:737 [inline]
  lane_ioctl+0x17db/0x23e0 net/atm/lec.c:1008
  do_vcc_ioctl+0x12c/0x930 net/atm/ioctl.c:159
  sock_do_ioctl+0x118/0x280 net/socket.c:1190
  sock_ioctl+0x227/0x6b0 net/socket.c:1311
  vfs_ioctl fs/ioctl.c:51 [inline]
  __do_sys_ioctl fs/ioctl.c:907 [inline]
  __se_sys_ioctl fs/ioctl.c:893 [inline]
  __x64_sys_ioctl+0x18e/0x210 fs/ioctl.c:893
  do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
  do_syscall_64+0xcd/0x4c0 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

Freed by task 6132:
  kasan_save_stack+0x33/0x60 mm/kasan/common.c:47
  kasan_save_track+0x14/0x30 mm/kasan/common.c:68
  kasan_save_free_info+0x3b/0x60 mm/kasan/generic.c:576
  poison_slab_object mm/kasan/common.c:247 [inline]
  __kasan_slab_free+0x51/0x70 mm/kasan/common.c:264
  kasan_slab_free include/linux/kasan.h:233 [inline]
  slab_free_hook mm/slub.c:2381 [inline]
  slab_free mm/slub.c:4643 [inline]
  kfree+0x2b4/0x4d0 mm/slub.c:4842
  free_netdev+0x6c5/0x910 net/core/dev.c:11892
  lecd_attach net/atm/lec.c:744 [inline]
  lane_ioctl+0x1ce8/0x23e0 net/atm/lec.c:1008
  do_vcc_ioctl+0x12c/0x930 net/atm/ioctl.c:159
  sock_do_ioctl+0x118/0x280 net/socket.c:1190
  sock_ioctl+0x227/0x6b0 net/socket.c:1311
  vfs_ioctl fs/ioctl.c:51 [inline]
  __do_sys_ioctl fs/ioctl.c:907 [inline]
  __se_sys_ioctl fs/ioctl.c:893 [inline]
  __x64_sys_ioctl+0x18e/0x210 fs/ioctl.c:893
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38323/">CVE-2025-38323 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38323">CVE-2025-38323 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246473">SUSE bug 1246473</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1246525">SUSE bug 1246525</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538326" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38326</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38326" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38326" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38326" ref_url="https://www.suse.com/security/cve/CVE-2025-38326" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

aoe: clean device rq_list in aoedev_downdev()

An aoe device's rq_list contains accepted block requests that are
waiting to be transmitted to the aoe target. This queue was added as
part of the conversion to blk_mq. However, the queue was not cleaned out
when an aoe device is downed which caused blk_mq_freeze_queue() to sleep
indefinitely waiting for those requests to complete, causing a hang. This
fix cleans out the queue before calling blk_mq_freeze_queue().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38326/">CVE-2025-38326 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38326">CVE-2025-38326 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246490">SUSE bug 1246490</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538332" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38332</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38332" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38332" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38332" ref_url="https://www.suse.com/security/cve/CVE-2025-38332" source="SUSE CVE"/>
		<reference ref_id="ESSA-2025:3453" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002049.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:15008" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001974.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:15648" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001998.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:15661" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: lpfc: Use memcpy() for BIOS version

The strlcat() with FORTIFY support is triggering a panic because it
thinks the target buffer will overflow although the correct target
buffer size is passed in.

Anyway, instead of memset() with 0 followed by a strlcat(), just use
memcpy() and ensure that the resulting buffer is NULL terminated.

BIOSVersion is only used for the lpfc_printf_log() which expects a
properly terminated string.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38332/">CVE-2025-38332 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38332">CVE-2025-38332 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246375">SUSE bug 1246375</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538335" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38335</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38335" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38335" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38335" ref_url="https://www.suse.com/security/cve/CVE-2025-38335" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Input: gpio-keys - fix a sleep while atomic with PREEMPT_RT

When enabling PREEMPT_RT, the gpio_keys_irq_timer() callback runs in
hard irq context, but the input_event() takes a spin_lock, which isn't
allowed there as it is converted to a rt_spin_lock().

[ 4054.289999] BUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:48
[ 4054.290028] in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 0, name: swapper/0
...
[ 4054.290195]  __might_resched+0x13c/0x1f4
[ 4054.290209]  rt_spin_lock+0x54/0x11c
[ 4054.290219]  input_event+0x48/0x80
[ 4054.290230]  gpio_keys_irq_timer+0x4c/0x78
[ 4054.290243]  __hrtimer_run_queues+0x1a4/0x438
[ 4054.290257]  hrtimer_interrupt+0xe4/0x240
[ 4054.290269]  arch_timer_handler_phys+0x2c/0x44
[ 4054.290283]  handle_percpu_devid_irq+0x8c/0x14c
[ 4054.290297]  handle_irq_desc+0x40/0x58
[ 4054.290307]  generic_handle_domain_irq+0x1c/0x28
[ 4054.290316]  gic_handle_irq+0x44/0xcc

Considering the gpio_keys_irq_isr() can run in any context, e.g. it can
be threaded, it seems there's no point in requesting the timer isr to
run in hard irq context.

Relax the hrtimer not to use the hard context.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38335/">CVE-2025-38335 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38335">CVE-2025-38335 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246250">SUSE bug 1246250</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538336" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38336</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38336" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38336" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38336" ref_url="https://www.suse.com/security/cve/CVE-2025-38336" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ata: pata_via: Force PIO for ATAPI devices on VT6415/VT6330

The controller has a hardware bug that can hard hang the system when
doing ATAPI DMAs without any trace of what happened. Depending on the
device attached, it can also prevent the system from booting.

In this case, the system hangs when reading the ATIP from optical media
with cdrecord -vvv -atip on an _NEC DVD_RW ND-4571A 1-01 and an
Optiarc DVD RW AD-7200A 1.06 attached to an ASRock 990FX Extreme 4,
running at UDMA/33.

The issue can be reproduced by running the same command with a cygwin
build of cdrecord on WinXP, although it requires more attempts to cause
it. The hang in that case is also resolved by forcing PIO. It doesn't
appear that VIA has produced any drivers for that OS, thus no known
workaround exists.

HDDs attached to the controller do not suffer from any DMA issues.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38336/">CVE-2025-38336 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38336">CVE-2025-38336 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246370">SUSE bug 1246370</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538337" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38337</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38337" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38337" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38337" ref_url="https://www.suse.com/security/cve/CVE-2025-38337" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

jbd2: fix data-race and null-ptr-deref in jbd2_journal_dirty_metadata()

Since handle-&gt;h_transaction may be a NULL pointer, so we should change it
to call is_handle_aborted(handle) first before dereferencing it.

And the following data-race was reported in my fuzzer:

==================================================================
BUG: KCSAN: data-race in jbd2_journal_dirty_metadata / jbd2_journal_dirty_metadata

write to 0xffff888011024104 of 4 bytes by task 10881 on cpu 1:
 jbd2_journal_dirty_metadata+0x2a5/0x770 fs/jbd2/transaction.c:1556
 __ext4_handle_dirty_metadata+0xe7/0x4b0 fs/ext4/ext4_jbd2.c:358
 ext4_do_update_inode fs/ext4/inode.c:5220 [inline]
 ext4_mark_iloc_dirty+0x32c/0xd50 fs/ext4/inode.c:5869
 __ext4_mark_inode_dirty+0xe1/0x450 fs/ext4/inode.c:6074
 ext4_dirty_inode+0x98/0xc0 fs/ext4/inode.c:6103
....

read to 0xffff888011024104 of 4 bytes by task 10880 on cpu 0:
 jbd2_journal_dirty_metadata+0xf2/0x770 fs/jbd2/transaction.c:1512
 __ext4_handle_dirty_metadata+0xe7/0x4b0 fs/ext4/ext4_jbd2.c:358
 ext4_do_update_inode fs/ext4/inode.c:5220 [inline]
 ext4_mark_iloc_dirty+0x32c/0xd50 fs/ext4/inode.c:5869
 __ext4_mark_inode_dirty+0xe1/0x450 fs/ext4/inode.c:6074
 ext4_dirty_inode+0x98/0xc0 fs/ext4/inode.c:6103
....

value changed: 0x00000000 -&gt; 0x00000001
==================================================================

This issue is caused by missing data-race annotation for jh-&gt;b_modified.
Therefore, the missing annotation needs to be added.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38337/">CVE-2025-38337 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38337">CVE-2025-38337 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246253">SUSE bug 1246253</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538338" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38338</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38338" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38338" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38338" ref_url="https://www.suse.com/security/cve/CVE-2025-38338" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs/nfs/read: fix double-unlock bug in nfs_return_empty_folio()

Sometimes, when a file was read while it was being truncated by
another NFS client, the kernel could deadlock because folio_unlock()
was called twice, and the second call would XOR back the `PG_locked`
flag.

Most of the time (depending on the timing of the truncation), nobody
notices the problem because folio_unlock() gets called three times,
which flips `PG_locked` back off:

 1. vfs_read, nfs_read_folio, ... nfs_read_add_folio,
    nfs_return_empty_folio
 2. vfs_read, nfs_read_folio, ... netfs_read_collection,
    netfs_unlock_abandoned_read_pages
 3. vfs_read, ... nfs_do_read_folio, nfs_read_add_folio,
    nfs_return_empty_folio

The problem is that nfs_read_add_folio() is not supposed to unlock the
folio if fscache is enabled, and a nfs_netfs_folio_unlock() check is
missing in nfs_return_empty_folio().

Rarely this leads to a warning in netfs_read_collection():

 ------------[ cut here ]------------
 R=0000031c: folio 10 is not locked
 WARNING: CPU: 0 PID: 29 at fs/netfs/read_collect.c:133 netfs_read_collection+0x7c0/0xf00
 [...]
 Workqueue: events_unbound netfs_read_collection_worker
 RIP: 0010:netfs_read_collection+0x7c0/0xf00
 [...]
 Call Trace:
  &lt;TASK&gt;
  netfs_read_collection_worker+0x67/0x80
  process_one_work+0x12e/0x2c0
  worker_thread+0x295/0x3a0

Most of the time, however, processes just get stuck forever in
folio_wait_bit_common(), waiting for `PG_locked` to disappear, which
never happens because nobody is really holding the folio lock.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38338/">CVE-2025-38338 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38338">CVE-2025-38338 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246258">SUSE bug 1246258</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538339" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38339</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38339" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38339" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38339" ref_url="https://www.suse.com/security/cve/CVE-2025-38339" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/bpf: fix JIT code size calculation of bpf trampoline

arch_bpf_trampoline_size() provides JIT size of the BPF trampoline
before the buffer for JIT'ing it is allocated. The total number of
instructions emitted for BPF trampoline JIT code depends on where
the final image is located. So, the size arrived at with the dummy
pass in arch_bpf_trampoline_size() can vary from the actual size
needed in  arch_prepare_bpf_trampoline().  When the instructions
accounted in  arch_bpf_trampoline_size() is less than the number of
instructions emitted during the actual JIT compile of the trampoline,
the below warning is produced:

  WARNING: CPU: 8 PID: 204190 at arch/powerpc/net/bpf_jit_comp.c:981 __arch_prepare_bpf_trampoline.isra.0+0xd2c/0xdcc

which is:

  /* Make sure the trampoline generation logic doesn't overflow */
  if (image &amp;&amp; WARN_ON_ONCE(&amp;image[ctx-&gt;idx] &gt;
  			(u32 *)rw_image_end - BPF_INSN_SAFETY)) {

So, during the dummy pass, instead of providing some arbitrary image
location, account for maximum possible instructions if and when there
is a dependency with image location for JIT'ing.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38339/">CVE-2025-38339 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38339">CVE-2025-38339 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246259">SUSE bug 1246259</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538341" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38341</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38341" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38341" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38341" ref_url="https://www.suse.com/security/cve/CVE-2025-38341" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

eth: fbnic: avoid double free when failing to DMA-map FW msg

The semantics are that caller of fbnic_mbx_map_msg() retains
the ownership of the message on error. All existing callers
dutifully free the page.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38341/">CVE-2025-38341 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38341">CVE-2025-38341 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246260">SUSE bug 1246260</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538342" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38342</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38342" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38342" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38342" ref_url="https://www.suse.com/security/cve/CVE-2025-38342" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

software node: Correct a OOB check in software_node_get_reference_args()

software_node_get_reference_args() wants to get @index-th element, so
the property value requires at least '(index + 1) * sizeof(*ref)' bytes
but that can not be guaranteed by current OOB check, and may cause OOB
for malformed property.

Fix by using as OOB check '((index + 1) * sizeof(*ref) &gt; prop-&gt;length)'.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38342/">CVE-2025-38342 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38342">CVE-2025-38342 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246453">SUSE bug 1246453</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538343" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38343</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38343" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38343" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38343" ref_url="https://www.suse.com/security/cve/CVE-2025-38343" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mt76: mt7996: drop fragments with multicast or broadcast RA

IEEE 802.11 fragmentation can only be applied to unicast frames.
Therefore, drop fragments with multicast or broadcast RA. This patch
addresses vulnerabilities such as CVE-2020-26145.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-38343/">CVE-2025-38343 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38343">CVE-2025-38343 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246438">SUSE bug 1246438</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538344" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38344</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38344" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38344" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38344" ref_url="https://www.suse.com/security/cve/CVE-2025-38344" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ACPICA: fix acpi parse and parseext cache leaks

ACPICA commit 8829e70e1360c81e7a5a901b5d4f48330e021ea5

I'm Seunghun Han, and I work for National Security Research Institute of
South Korea.

I have been doing a research on ACPI and found an ACPI cache leak in ACPI
early abort cases.

Boot log of ACPI cache leak is as follows:
[    0.352414] ACPI: Added _OSI(Module Device)
[    0.353182] ACPI: Added _OSI(Processor Device)
[    0.353182] ACPI: Added _OSI(3.0 _SCP Extensions)
[    0.353182] ACPI: Added _OSI(Processor Aggregator Device)
[    0.356028] ACPI: Unable to start the ACPI Interpreter
[    0.356799] ACPI Error: Could not remove SCI handler (20170303/evmisc-281)
[    0.360215] kmem_cache_destroy Acpi-State: Slab cache still has objects
[    0.360648] CPU: 0 PID: 1 Comm: swapper/0 Tainted: G        W
4.12.0-rc4-next-20170608+ #10
[    0.361273] Hardware name: innotek gmb_h virtual_box/virtual_box, BIOS
virtual_box 12/01/2006
[    0.361873] Call Trace:
[    0.362243]  ? dump_stack+0x5c/0x81
[    0.362591]  ? kmem_cache_destroy+0x1aa/0x1c0
[    0.362944]  ? acpi_sleep_proc_init+0x27/0x27
[    0.363296]  ? acpi_os_delete_cache+0xa/0x10
[    0.363646]  ? acpi_ut_delete_caches+0x6d/0x7b
[    0.364000]  ? acpi_terminate+0xa/0x14
[    0.364000]  ? acpi_init+0x2af/0x34f
[    0.364000]  ? __class_create+0x4c/0x80
[    0.364000]  ? video_setup+0x7f/0x7f
[    0.364000]  ? acpi_sleep_proc_init+0x27/0x27
[    0.364000]  ? do_one_initcall+0x4e/0x1a0
[    0.364000]  ? kernel_init_freeable+0x189/0x20a
[    0.364000]  ? rest_init+0xc0/0xc0
[    0.364000]  ? kernel_init+0xa/0x100
[    0.364000]  ? ret_from_fork+0x25/0x30

I analyzed this memory leak in detail. I found that “Acpi-State” cache and
“Acpi-Parse” cache were merged because the size of cache objects was same
slab cache size.

I finally found “Acpi-Parse” cache and “Acpi-parse_ext” cache were leaked
using SLAB_NEVER_MERGE flag in kmem_cache_create() function.

Real ACPI cache leak point is as follows:
[    0.360101] ACPI: Added _OSI(Module Device)
[    0.360101] ACPI: Added _OSI(Processor Device)
[    0.360101] ACPI: Added _OSI(3.0 _SCP Extensions)
[    0.361043] ACPI: Added _OSI(Processor Aggregator Device)
[    0.364016] ACPI: Unable to start the ACPI Interpreter
[    0.365061] ACPI Error: Could not remove SCI handler (20170303/evmisc-281)
[    0.368174] kmem_cache_destroy Acpi-Parse: Slab cache still has objects
[    0.369332] CPU: 1 PID: 1 Comm: swapper/0 Tainted: G        W
4.12.0-rc4-next-20170608+ #8
[    0.371256] Hardware name: innotek gmb_h virtual_box/virtual_box, BIOS
virtual_box 12/01/2006
[    0.372000] Call Trace:
[    0.372000]  ? dump_stack+0x5c/0x81
[    0.372000]  ? kmem_cache_destroy+0x1aa/0x1c0
[    0.372000]  ? acpi_sleep_proc_init+0x27/0x27
[    0.372000]  ? acpi_os_delete_cache+0xa/0x10
[    0.372000]  ? acpi_ut_delete_caches+0x56/0x7b
[    0.372000]  ? acpi_terminate+0xa/0x14
[    0.372000]  ? acpi_init+0x2af/0x34f
[    0.372000]  ? __class_create+0x4c/0x80
[    0.372000]  ? video_setup+0x7f/0x7f
[    0.372000]  ? acpi_sleep_proc_init+0x27/0x27
[    0.372000]  ? do_one_initcall+0x4e/0x1a0
[    0.372000]  ? kernel_init_freeable+0x189/0x20a
[    0.372000]  ? rest_init+0xc0/0xc0
[    0.372000]  ? kernel_init+0xa/0x100
[    0.372000]  ? ret_from_fork+0x25/0x30
[    0.388039] kmem_cache_destroy Acpi-parse_ext: Slab cache still has objects
[    0.389063] CPU: 1 PID: 1 Comm: swapper/0 Tainted: G        W
4.12.0-rc4-next-20170608+ #8
[    0.390557] Hardware name: innotek gmb_h virtual_box/virtual_box, BIOS
virtual_box 12/01/2006
[    0.392000] Call Trace:
[    0.392000]  ? dump_stack+0x5c/0x81
[    0.392000]  ? kmem_cache_destroy+0x1aa/0x1c0
[    0.392000]  ? acpi_sleep_proc_init+0x27/0x27
[    0.392000]  ? acpi_os_delete_cache+0xa/0x10
[    0.392000]  ? acpi_ut_delete_caches+0x6d/0x7b
[    0.392000]  ? acpi_terminate+0xa/0x14
[    0.392000]  ? acpi_init+0x2af/0x3
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38344/">CVE-2025-38344 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38344">CVE-2025-38344 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246334">SUSE bug 1246334</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38345</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38345" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38345" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38345" ref_url="https://www.suse.com/security/cve/CVE-2025-38345" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ACPICA: fix acpi operand cache leak in dswstate.c

ACPICA commit 987a3b5cf7175916e2a4b6ea5b8e70f830dfe732

I found an ACPI cache leak in ACPI early termination and boot continuing case.

When early termination occurs due to malicious ACPI table, Linux kernel
terminates ACPI function and continues to boot process. While kernel terminates
ACPI function, kmem_cache_destroy() reports Acpi-Operand cache leak.

Boot log of ACPI operand cache leak is as follows:
&gt;[    0.585957] ACPI: Added _OSI(Module Device)
&gt;[    0.587218] ACPI: Added _OSI(Processor Device)
&gt;[    0.588530] ACPI: Added _OSI(3.0 _SCP Extensions)
&gt;[    0.589790] ACPI: Added _OSI(Processor Aggregator Device)
&gt;[    0.591534] ACPI Error: Illegal I/O port address/length above 64K: C806E00000004002/0x2 (20170303/hwvalid-155)
&gt;[    0.594351] ACPI Exception: AE_LIMIT, Unable to initialize fixed events (20170303/evevent-88)
&gt;[    0.597858] ACPI: Unable to start the ACPI Interpreter
&gt;[    0.599162] ACPI Error: Could not remove SCI handler (20170303/evmisc-281)
&gt;[    0.601836] kmem_cache_destroy Acpi-Operand: Slab cache still has objects
&gt;[    0.603556] CPU: 0 PID: 1 Comm: swapper/0 Not tainted 4.12.0-rc5 #26
&gt;[    0.605159] Hardware name: innotek gmb_h virtual_box/virtual_box, BIOS virtual_box 12/01/2006
&gt;[    0.609177] Call Trace:
&gt;[    0.610063]  ? dump_stack+0x5c/0x81
&gt;[    0.611118]  ? kmem_cache_destroy+0x1aa/0x1c0
&gt;[    0.612632]  ? acpi_sleep_proc_init+0x27/0x27
&gt;[    0.613906]  ? acpi_os_delete_cache+0xa/0x10
&gt;[    0.617986]  ? acpi_ut_delete_caches+0x3f/0x7b
&gt;[    0.619293]  ? acpi_terminate+0xa/0x14
&gt;[    0.620394]  ? acpi_init+0x2af/0x34f
&gt;[    0.621616]  ? __class_create+0x4c/0x80
&gt;[    0.623412]  ? video_setup+0x7f/0x7f
&gt;[    0.624585]  ? acpi_sleep_proc_init+0x27/0x27
&gt;[    0.625861]  ? do_one_initcall+0x4e/0x1a0
&gt;[    0.627513]  ? kernel_init_freeable+0x19e/0x21f
&gt;[    0.628972]  ? rest_init+0x80/0x80
&gt;[    0.630043]  ? kernel_init+0xa/0x100
&gt;[    0.631084]  ? ret_from_fork+0x25/0x30
&gt;[    0.633343] vgaarb: loaded
&gt;[    0.635036] EDAC MC: Ver: 3.0.0
&gt;[    0.638601] PCI: Probing PCI hardware
&gt;[    0.639833] PCI host bridge to bus 0000:00
&gt;[    0.641031] pci_bus 0000:00: root bus resource [io  0x0000-0xffff]
&gt; ... Continue to boot and log is omitted ...

I analyzed this memory leak in detail and found acpi_ds_obj_stack_pop_and_
delete() function miscalculated the top of the stack. acpi_ds_obj_stack_push()
function uses walk_state-&gt;operand_index for start position of the top, but
acpi_ds_obj_stack_pop_and_delete() function considers index 0 for it.
Therefore, this causes acpi operand memory leak.

This cache leak causes a security threat because an old kernel (&lt;= 4.9) shows
memory locations of kernel functions in stack dump. Some malicious users
could use this information to neutralize kernel ASLR.

I made a patch to fix ACPI operand cache leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38345/">CVE-2025-38345 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38345">CVE-2025-38345 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246337">SUSE bug 1246337</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538348" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38348</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38348" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38348" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38348" ref_url="https://www.suse.com/security/cve/CVE-2025-38348" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: p54: prevent buffer-overflow in p54_rx_eeprom_readback()

Robert Morris reported:

|If a malicious USB device pretends to be an Intersil p54 wifi
|interface and generates an eeprom_readback message with a large
|eeprom-&gt;v1.len, p54_rx_eeprom_readback() will copy data from the
|message beyond the end of priv-&gt;eeprom.
|
|static void p54_rx_eeprom_readback(struct p54_common *priv,
|                                   struct sk_buff *skb)
|{
|        struct p54_hdr *hdr = (struct p54_hdr *) skb-&gt;data;
|        struct p54_eeprom_lm86 *eeprom = (struct p54_eeprom_lm86 *) hdr-&gt;data;
|
|        if (priv-&gt;fw_var &gt;= 0x509) {
|                memcpy(priv-&gt;eeprom, eeprom-&gt;v2.data,
|                       le16_to_cpu(eeprom-&gt;v2.len));
|        } else {
|                memcpy(priv-&gt;eeprom, eeprom-&gt;v1.data,
|                       le16_to_cpu(eeprom-&gt;v1.len));
|        }
| [...]

The eeprom-&gt;v{1,2}.len is set by the driver in p54_download_eeprom().
The device is supposed to provide the same length back to the driver.
But yes, it's possible (like shown in the report) to alter the value
to something that causes a crash/panic due to overrun.

This patch addresses the issue by adding the size to the common device
context, so p54_rx_eeprom_readback no longer relies on possibly tampered
values... That said, it also checks if the "firmware" altered the value
and no longer copies them.

The one, small saving grace is: Before the driver tries to read the eeprom,
it needs to upload &gt;a&lt; firmware. the vendor firmware has a proprietary
license and as a reason, it is not present on most distributions by
default.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38348/">CVE-2025-38348 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38348">CVE-2025-38348 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246262">SUSE bug 1246262</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538349" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38349</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38349" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38349" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38349" ref_url="https://www.suse.com/security/cve/CVE-2025-38349" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1143" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003191.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2759" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

eventpoll: don't decrement ep refcount while still holding the ep mutex

Jann Horn points out that epoll is decrementing the ep refcount and then
doing a

    mutex_unlock(&amp;ep-&gt;mtx);

afterwards. That's very wrong, because it can lead to a use-after-free.

That pattern is actually fine for the very last reference, because the
code in question will delay the actual call to "ep_free(ep)" until after
it has unlocked the mutex.

But it's wrong for the much subtler "next to last" case when somebody
*else* may also be dropping their reference and free the ep while we're
still using the mutex.

Note that this is true even if that other user is also using the same ep
mutex: mutexes, unlike spinlocks, can not be used for object ownership,
even if they guarantee mutual exclusion.

A mutex "unlock" operation is not atomic, and as one user is still
accessing the mutex as part of unlocking it, another user can come in
and get the now released mutex and free the data structure while the
first user is still cleaning up.

See our mutex documentation in Documentation/locking/mutex-design.rst,
in particular the section [1] about semantics:

	"mutex_unlock() may access the mutex structure even after it has
	 internally released the lock already - so it's not safe for
	 another context to acquire the mutex and assume that the
	 mutex_unlock() context is not using the structure anymore"

So if we drop our ep ref before the mutex unlock, but we weren't the
last one, we may then unlock the mutex, another user comes in, drops
_their_ reference and releases the 'ep' as it now has no users - all
while the mutex_unlock() is still accessing it.

Fix this by simply moving the ep refcount dropping to outside the mutex:
the refcount itself is atomic, and doesn't need mutex protection (that's
the whole _point_ of refcounts: unlike mutexes, they are inherently
about object lifetimes).
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38349/">CVE-2025-38349 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38349">CVE-2025-38349 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246777">SUSE bug 1246777</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538350" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38350</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38350" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38350" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38350" ref_url="https://www.suse.com/security/cve/CVE-2025-38350" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:14748" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001967.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:15011" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001976.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:15785" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02849-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02851-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02852-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03310-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: Always pass notifications when child class becomes empty

Certain classful qdiscs may invoke their classes' dequeue handler on an
enqueue operation. This may unexpectedly empty the child qdisc and thus
make an in-flight class passive via qlen_notify(). Most qdiscs do not
expect such behaviour at this point in time and may re-activate the
class eventually anyways which will lead to a use-after-free.

The referenced fix commit attempted to fix this behavior for the HFSC
case by moving the backlog accounting around, though this turned out to
be incomplete since the parent's parent may run into the issue too.
The following reproducer demonstrates this use-after-free:

    tc qdisc add dev lo root handle 1: drr
    tc filter add dev lo parent 1: basic classid 1:1
    tc class add dev lo parent 1: classid 1:1 drr
    tc qdisc add dev lo parent 1:1 handle 2: hfsc def 1
    tc class add dev lo parent 2: classid 2:1 hfsc rt m1 8 d 1 m2 0
    tc qdisc add dev lo parent 2:1 handle 3: netem
    tc qdisc add dev lo parent 3:1 handle 4: blackhole

    echo 1 | socat -u STDIN UDP4-DATAGRAM:127.0.0.1:8888
    tc class delete dev lo classid 1:1
    echo 1 | socat -u STDIN UDP4-DATAGRAM:127.0.0.1:8888

Since backlog accounting issues leading to a use-after-frees on stale
class pointers is a recurring pattern at this point, this patch takes
a different approach. Instead of trying to fix the accounting, the patch
ensures that qdisc_tree_reduce_backlog always calls qlen_notify when
the child qdisc is empty. This solves the problem because deletion of
qdiscs always involves a call to qdisc_reset() and / or
qdisc_purge_queue() which ultimately resets its qlen to 0 thus causing
the following qdisc_tree_reduce_backlog() to report to the parent. Note
that this may call qlen_notify on passive classes multiple times. This
is not a problem after the recent patch series that made all the
classful qdiscs qlen_notify() handlers idempotent.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H" cvss4="7/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38350/">CVE-2025-38350 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38350">CVE-2025-38350 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246781">SUSE bug 1246781</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247043">SUSE bug 1247043</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538351" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38351</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38351" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38351" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38351" ref_url="https://www.suse.com/security/cve/CVE-2025-38351" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:17377" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002061.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21469" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: x86/hyper-v: Skip non-canonical addresses during PV TLB flush

In KVM guests with Hyper-V hypercalls enabled, the hypercalls
HVCALL_FLUSH_VIRTUAL_ADDRESS_LIST and HVCALL_FLUSH_VIRTUAL_ADDRESS_LIST_EX
allow a guest to request invalidation of portions of a virtual TLB.
For this, the hypercall parameter includes a list of GVAs that are supposed
to be invalidated.

However, when non-canonical GVAs are passed, there is currently no
filtering in place and they are eventually passed to checked invocations of
INVVPID on Intel / INVLPGA on AMD.  While AMD's INVLPGA silently ignores
non-canonical addresses (effectively a no-op), Intel's INVVPID explicitly
signals VM-Fail and ultimately triggers the WARN_ONCE in invvpid_error():

  invvpid failed: ext=0x0 vpid=1 gva=0xaaaaaaaaaaaaa000
  WARNING: CPU: 6 PID: 326 at arch/x86/kvm/vmx/vmx.c:482
  invvpid_error+0x91/0xa0 [kvm_intel]
  Modules linked in: kvm_intel kvm 9pnet_virtio irqbypass fuse
  CPU: 6 UID: 0 PID: 326 Comm: kvm-vm Not tainted 6.15.0 #14 PREEMPT(voluntary)
  RIP: 0010:invvpid_error+0x91/0xa0 [kvm_intel]
  Call Trace:
    vmx_flush_tlb_gva+0x320/0x490 [kvm_intel]
    kvm_hv_vcpu_flush_tlb+0x24f/0x4f0 [kvm]
    kvm_arch_vcpu_ioctl_run+0x3013/0x5810 [kvm]

Hyper-V documents that invalid GVAs (those that are beyond a partition's
GVA space) are to be ignored.  While not completely clear whether this
ruling also applies to non-canonical GVAs, it is likely fine to make that
assumption, and manual testing on Azure confirms "real" Hyper-V interprets
the specification in the same way.

Skip non-canonical GVAs when processing the list of address to avoid
tripping the INVVPID failure.  Alternatively, KVM could filter out "bad"
GVAs before inserting into the FIFO, but practically speaking the only
downside of pushing validation to the final processing is that doing so
is suboptimal for the guest, and no well-behaved guest will request TLB
flushes for non-canonical addresses.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38351/">CVE-2025-38351 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38351">CVE-2025-38351 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246782">SUSE bug 1246782</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538352" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38352</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38352" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38352" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38352" ref_url="https://www.suse.com/security/cve/CVE-2025-38352" source="SUSE CVE"/>
		<reference ref_id="ESSA-2025:3453" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002049.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:15471" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001992.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:15648" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001998.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:15661" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03283-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03310-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03314-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20455-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20456-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20457-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20458-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20459-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20460-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20461-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20462-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20463-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20464-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20465-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20470-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20635-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024655.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

posix-cpu-timers: fix race between handle_posix_cpu_timers() and posix_cpu_timer_del()

If an exiting non-autoreaping task has already passed exit_notify() and
calls handle_posix_cpu_timers() from IRQ, it can be reaped by its parent
or debugger right after unlock_task_sighand().

If a concurrent posix_cpu_timer_del() runs at that moment, it won't be
able to detect timer-&gt;it.cpu.firing != 0: cpu_timer_task_rcu() and/or
lock_task_sighand() will fail.

Add the tsk-&gt;exit_state check into run_posix_cpu_timers() to fix this.

This fix is not needed if CONFIG_POSIX_CPU_TIMERS_TASK_WORK=y, because
exit_task_work() is called before exit_notify(). But the check still
makes sense, task_work_add(&amp;tsk-&gt;posix_cputimers_work.work) will fail
anyway in this case.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38352/">CVE-2025-38352 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-38352">CVE-2025-38352 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246911">SUSE bug 1246911</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249205">SUSE bug 1249205</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538353" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38353</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38353" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38353" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38353" ref_url="https://www.suse.com/security/cve/CVE-2025-38353" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/xe: Fix taking invalid lock on wedge

If device wedges on e.g. GuC upload, the submission is not yet enabled
and the state is not even initialized. Protect the wedge call so it does
nothing in this case. It fixes the following splat:

	[] xe 0000:bf:00.0: [drm] device wedged, needs recovery
	[] ------------[ cut here ]------------
	[] DEBUG_LOCKS_WARN_ON(lock-&gt;magic != lock)
	[] WARNING: CPU: 48 PID: 312 at kernel/locking/mutex.c:564 __mutex_lock+0x8a1/0xe60
	...
	[] RIP: 0010:__mutex_lock+0x8a1/0xe60
	[]  mutex_lock_nested+0x1b/0x30
	[]  xe_guc_submit_wedge+0x80/0x2b0 [xe]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38353/">CVE-2025-38353 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38353">CVE-2025-38353 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247265">SUSE bug 1247265</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538354" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38354</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38354" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38354" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38354" ref_url="https://www.suse.com/security/cve/CVE-2025-38354" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/msm/gpu: Fix crash when throttling GPU immediately during boot

There is a small chance that the GPU is already hot during boot. In that
case, the call to of_devfreq_cooling_register() will immediately try to
apply devfreq cooling, as seen in the following crash:

  Unable to handle kernel paging request at virtual address 0000000000014110
  pc : a6xx_gpu_busy+0x1c/0x58 [msm]
  lr : msm_devfreq_get_dev_status+0xbc/0x140 [msm]
  Call trace:
   a6xx_gpu_busy+0x1c/0x58 [msm] (P)
   devfreq_simple_ondemand_func+0x3c/0x150
   devfreq_update_target+0x44/0xd8
   qos_max_notifier_call+0x30/0x84
   blocking_notifier_call_chain+0x6c/0xa0
   pm_qos_update_target+0xd0/0x110
   freq_qos_apply+0x3c/0x74
   apply_constraint+0x88/0x148
   __dev_pm_qos_update_request+0x7c/0xcc
   dev_pm_qos_update_request+0x38/0x5c
   devfreq_cooling_set_cur_state+0x98/0xf0
   __thermal_cdev_update+0x64/0xb4
   thermal_cdev_update+0x4c/0x58
   step_wise_manage+0x1f0/0x318
   __thermal_zone_device_update+0x278/0x424
   __thermal_cooling_device_register+0x2bc/0x308
   thermal_of_cooling_device_register+0x10/0x1c
   of_devfreq_cooling_register_power+0x240/0x2bc
   of_devfreq_cooling_register+0x14/0x20
   msm_devfreq_init+0xc4/0x1a0 [msm]
   msm_gpu_init+0x304/0x574 [msm]
   adreno_gpu_init+0x1c4/0x2e0 [msm]
   a6xx_gpu_init+0x5c8/0x9c8 [msm]
   adreno_bind+0x2a8/0x33c [msm]
   ...

At this point we haven't initialized the GMU at all yet, so we cannot read
the GMU registers inside a6xx_gpu_busy(). A similar issue was fixed before
in commit 6694482a70e9 ("drm/msm: Avoid unclocked GMU register access in
6xx gpu_busy"): msm_devfreq_init() does call devfreq_suspend_device(), but
unlike msm_devfreq_suspend(), it doesn't set the df-&gt;suspended flag
accordingly. This means the df-&gt;suspended flag does not match the actual
devfreq state after initialization and msm_devfreq_get_dev_status() will
end up accessing GMU registers, causing the crash.

Fix this by setting df-&gt;suspended correctly during initialization.

Patchwork: https://patchwork.freedesktop.org/patch/650772/
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38354/">CVE-2025-38354 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38354">CVE-2025-38354 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247061">SUSE bug 1247061</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538355" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38355</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38355" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38355" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38355" ref_url="https://www.suse.com/security/cve/CVE-2025-38355" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/xe: Process deferred GGTT node removals on device unwind

While we are indirectly draining our dedicated workqueue ggtt-&gt;wq
that we use to complete asynchronous removal of some GGTT nodes,
this happends as part of the managed-drm unwinding (ggtt_fini_early),
which could be later then manage-device unwinding, where we could
already unmap our MMIO/GMS mapping (mmio_fini).

This was recently observed during unsuccessful VF initialization:

 [ ] xe 0000:00:02.1: probe with driver xe failed with error -62
 [ ] xe 0000:00:02.1: DEVRES REL ffff88811e747340 __xe_bo_unpin_map_no_vm (16 bytes)
 [ ] xe 0000:00:02.1: DEVRES REL ffff88811e747540 __xe_bo_unpin_map_no_vm (16 bytes)
 [ ] xe 0000:00:02.1: DEVRES REL ffff88811e747240 __xe_bo_unpin_map_no_vm (16 bytes)
 [ ] xe 0000:00:02.1: DEVRES REL ffff88811e747040 tiles_fini (16 bytes)
 [ ] xe 0000:00:02.1: DEVRES REL ffff88811e746840 mmio_fini (16 bytes)
 [ ] xe 0000:00:02.1: DEVRES REL ffff88811e747f40 xe_bo_pinned_fini (16 bytes)
 [ ] xe 0000:00:02.1: DEVRES REL ffff88811e746b40 devm_drm_dev_init_release (16 bytes)
 [ ] xe 0000:00:02.1: [drm:drm_managed_release] drmres release begin
 [ ] xe 0000:00:02.1: [drm:drm_managed_release] REL ffff88810ef81640 __fini_relay (8 bytes)
 [ ] xe 0000:00:02.1: [drm:drm_managed_release] REL ffff88810ef80d40 guc_ct_fini (8 bytes)
 [ ] xe 0000:00:02.1: [drm:drm_managed_release] REL ffff88810ef80040 __drmm_mutex_release (8 bytes)
 [ ] xe 0000:00:02.1: [drm:drm_managed_release] REL ffff88810ef80140 ggtt_fini_early (8 bytes)

and this was leading to:

 [ ] BUG: unable to handle page fault for address: ffffc900058162a0
 [ ] #PF: supervisor write access in kernel mode
 [ ] #PF: error_code(0x0002) - not-present page
 [ ] Oops: Oops: 0002 [#1] SMP NOPTI
 [ ] Tainted: [W]=WARN
 [ ] Workqueue: xe-ggtt-wq ggtt_node_remove_work_func [xe]
 [ ] RIP: 0010:xe_ggtt_set_pte+0x6d/0x350 [xe]
 [ ] Call Trace:
 [ ]  &lt;TASK&gt;
 [ ]  xe_ggtt_clear+0xb0/0x270 [xe]
 [ ]  ggtt_node_remove+0xbb/0x120 [xe]
 [ ]  ggtt_node_remove_work_func+0x30/0x50 [xe]
 [ ]  process_one_work+0x22b/0x6f0
 [ ]  worker_thread+0x1e8/0x3d

Add managed-device action that will explicitly drain the workqueue
with all pending node removals prior to releasing MMIO/GSM mapping.

(cherry picked from commit 89d2835c3680ab1938e22ad81b1c9f8c686bd391)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38355/">CVE-2025-38355 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38355">CVE-2025-38355 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247062">SUSE bug 1247062</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538356" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38356</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38356" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38356" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38356" ref_url="https://www.suse.com/security/cve/CVE-2025-38356" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/xe/guc: Explicitly exit CT safe mode on unwind

During driver probe we might be briefly using CT safe mode, which
is based on a delayed work, but usually we are able to stop this
once we have IRQ fully operational.  However, if we abort the probe
quite early then during unwind we might try to destroy the workqueue
while there is still a pending delayed work that attempts to restart
itself which triggers a WARN.

This was recently observed during unsuccessful VF initialization:

 [ ] xe 0000:00:02.1: probe with driver xe failed with error -62
 [ ] ------------[ cut here ]------------
 [ ] workqueue: cannot queue safe_mode_worker_func [xe] on wq xe-g2h-wq
 [ ] WARNING: CPU: 9 PID: 0 at kernel/workqueue.c:2257 __queue_work+0x287/0x710
 [ ] RIP: 0010:__queue_work+0x287/0x710
 [ ] Call Trace:
 [ ]  delayed_work_timer_fn+0x19/0x30
 [ ]  call_timer_fn+0xa1/0x2a0

Exit the CT safe mode on unwind to avoid that warning.

(cherry picked from commit 2ddbb73ec20b98e70a5200cb85deade22ccea2ec)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38356/">CVE-2025-38356 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38356">CVE-2025-38356 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247064">SUSE bug 1247064</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538359" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38359</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38359" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38359" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38359" ref_url="https://www.suse.com/security/cve/CVE-2025-38359" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390/mm: Fix in_atomic() handling in do_secure_storage_access()

Kernel user spaces accesses to not exported pages in atomic context
incorrectly try to resolve the page fault.
With debug options enabled call traces like this can be seen:

BUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1523
in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 419074, name: qemu-system-s39
preempt_count: 1, expected: 0
RCU nest depth: 0, expected: 0
INFO: lockdep is turned off.
Preemption disabled at:
[&lt;00000383ea47cfa2&gt;] copy_page_from_iter_atomic+0xa2/0x8a0
CPU: 12 UID: 0 PID: 419074 Comm: qemu-system-s39
Tainted: G        W           6.16.0-20250531.rc0.git0.69b3a602feac.63.fc42.s390x+debug #1 PREEMPT
Tainted: [W]=WARN
Hardware name: IBM 3931 A01 703 (LPAR)
Call Trace:
 [&lt;00000383e990d282&gt;] dump_stack_lvl+0xa2/0xe8
 [&lt;00000383e99bf152&gt;] __might_resched+0x292/0x2d0
 [&lt;00000383eaa7c374&gt;] down_read+0x34/0x2d0
 [&lt;00000383e99432f8&gt;] do_secure_storage_access+0x108/0x360
 [&lt;00000383eaa724b0&gt;] __do_pgm_check+0x130/0x220
 [&lt;00000383eaa842e4&gt;] pgm_check_handler+0x114/0x160
 [&lt;00000383ea47d028&gt;] copy_page_from_iter_atomic+0x128/0x8a0
([&lt;00000383ea47d016&gt;] copy_page_from_iter_atomic+0x116/0x8a0)
 [&lt;00000383e9c45eae&gt;] generic_perform_write+0x16e/0x310
 [&lt;00000383e9eb87f4&gt;] ext4_buffered_write_iter+0x84/0x160
 [&lt;00000383e9da0de4&gt;] vfs_write+0x1c4/0x460
 [&lt;00000383e9da123c&gt;] ksys_write+0x7c/0x100
 [&lt;00000383eaa7284e&gt;] __do_syscall+0x15e/0x280
 [&lt;00000383eaa8417e&gt;] system_call+0x6e/0x90
INFO: lockdep is turned off.

It is not allowed to take the mmap_lock while in atomic context. Therefore
handle such a secure storage access fault as if the accessed page is not
mapped: the uaccess function will return -EFAULT, and the caller has to
deal with this. Usually this means that the access is retried in process
context, which allows to resolve the page fault (or in this case export the
page).
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38359/">CVE-2025-38359 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38359">CVE-2025-38359 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247076">SUSE bug 1247076</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538360" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38360</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38360" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38360" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38360" ref_url="https://www.suse.com/security/cve/CVE-2025-38360" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Add more checks for DSC / HUBP ONO guarantees

[WHY]
For non-zero DSC instances it's possible that the HUBP domain required
to drive it for sequential ONO ASICs isn't met, potentially causing
the logic to the tile to enter an undefined state leading to a system
hang.

[HOW]
Add more checks to ensure that the HUBP domain matching the DSC instance
is appropriately powered.

(cherry picked from commit da63df07112e5a9857a8d2aaa04255c4206754ec)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38360/">CVE-2025-38360 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38360">CVE-2025-38360 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247078">SUSE bug 1247078</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538361" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38361</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38361" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38361" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38361" ref_url="https://www.suse.com/security/cve/CVE-2025-38361" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Check dce_hwseq before dereferencing it

[WHAT]

hws was checked for null earlier in dce110_blank_stream, indicating hws
can be null, and should be checked whenever it is used.

(cherry picked from commit 79db43611ff61280b6de58ce1305e0b2ecf675ad)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38361/">CVE-2025-38361 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38361">CVE-2025-38361 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247079">SUSE bug 1247079</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538362" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38362</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38362" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38362" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38362" ref_url="https://www.suse.com/security/cve/CVE-2025-38362" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Add null pointer check for get_first_active_display()

The function mod_hdcp_hdcp1_enable_encryption() calls the function
get_first_active_display(), but does not check its return value.
The return value is a null pointer if the display list is empty.
This will lead to a null pointer dereference in
mod_hdcp_hdcp2_enable_encryption().

Add a null pointer check for get_first_active_display() and return
MOD_HDCP_STATUS_DISPLAY_NOT_FOUND if the function return null.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38362/">CVE-2025-38362 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38362">CVE-2025-38362 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247089">SUSE bug 1247089</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538363" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38363</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38363" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38363" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38363" ref_url="https://www.suse.com/security/cve/CVE-2025-38363" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/tegra: Fix a possible null pointer dereference

In tegra_crtc_reset(), new memory is allocated with kzalloc(), but
no check is performed. Before calling __drm_atomic_helper_crtc_reset,
state should be checked to prevent possible null pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38363/">CVE-2025-38363 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38363">CVE-2025-38363 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247018">SUSE bug 1247018</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538364" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38364</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38364" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38364" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38364" ref_url="https://www.suse.com/security/cve/CVE-2025-38364" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

maple_tree: fix MA_STATE_PREALLOC flag in mas_preallocate()

Temporarily clear the preallocation flag when explicitly requesting
allocations.  Pre-existing allocations are already counted against the
request through mas_node_count_gfp(), but the allocations will not happen
if the MA_STATE_PREALLOC flag is set.  This flag is meant to avoid
re-allocating in bulk allocation mode, and to detect issues with
preallocation calculations.

The MA_STATE_PREALLOC flag should also always be set on zero allocations
so that detection of underflow allocations will print a WARN_ON() during
consumption.

User visible effect of this flaw is a WARN_ON() followed by a null pointer
dereference when subsequent requests for larger number of nodes is
ignored, such as the vma merge retry in mmap_region() caused by drivers
altering the vma flags (which happens in v6.6, at least)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38364/">CVE-2025-38364 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38364">CVE-2025-38364 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247091">SUSE bug 1247091</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538365" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38365</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38365" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38365" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38365" ref_url="https://www.suse.com/security/cve/CVE-2025-38365" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix a race between renames and directory logging

We have a race between a rename and directory inode logging that if it
happens and we crash/power fail before the rename completes, the next time
the filesystem is mounted, the log replay code will end up deleting the
file that was being renamed.

This is best explained following a step by step analysis of an interleaving
of steps that lead into this situation.

Consider the initial conditions:

1) We are at transaction N;

2) We have directories A and B created in a past transaction (&lt; N);

3) We have inode X corresponding to a file that has 2 hardlinks, one in
   directory A and the other in directory B, so we'll name them as
   "A/foo_link1" and "B/foo_link2". Both hard links were persisted in a
   past transaction (&lt; N);

4) We have inode Y corresponding to a file that as a single hard link and
   is located in directory A, we'll name it as "A/bar". This file was also
   persisted in a past transaction (&lt; N).

The steps leading to a file loss are the following and for all of them we
are under transaction N:

 1) Link "A/foo_link1" is removed, so inode's X last_unlink_trans field
    is updated to N, through btrfs_unlink() -&gt; btrfs_record_unlink_dir();

 2) Task A starts a rename for inode Y, with the goal of renaming from
    "A/bar" to "A/baz", so we enter btrfs_rename();

 3) Task A inserts the new BTRFS_INODE_REF_KEY for inode Y by calling
    btrfs_insert_inode_ref();

 4) Because the rename happens in the same directory, we don't set the
    last_unlink_trans field of directoty A's inode to the current
    transaction id, that is, we don't cal btrfs_record_unlink_dir();

 5) Task A then removes the entries from directory A (BTRFS_DIR_ITEM_KEY
    and BTRFS_DIR_INDEX_KEY items) when calling __btrfs_unlink_inode()
    (actually the dir index item is added as a delayed item, but the
    effect is the same);

 6) Now before task A adds the new entry "A/baz" to directory A by
    calling btrfs_add_link(), another task, task B is logging inode X;

 7) Task B starts a fsync of inode X and after logging inode X, at
    btrfs_log_inode_parent() it calls btrfs_log_all_parents(), since
    inode X has a last_unlink_trans value of N, set at in step 1;

 8) At btrfs_log_all_parents() we search for all parent directories of
    inode X using the commit root, so we find directories A and B and log
    them. Bu when logging direct A, we don't have a dir index item for
    inode Y anymore, neither the old name "A/bar" nor for the new name
    "A/baz" since the rename has deleted the old name but has not yet
    inserted the new name - task A hasn't called yet btrfs_add_link() to
    do that.

    Note that logging directory A doesn't fallback to a transaction
    commit because its last_unlink_trans has a lower value than the
    current transaction's id (see step 4);

 9) Task B finishes logging directories A and B and gets back to
    btrfs_sync_file() where it calls btrfs_sync_log() to persist the log
    tree;

10) Task B successfully persisted the log tree, btrfs_sync_log() completed
    with success, and a power failure happened.

    We have a log tree without any directory entry for inode Y, so the
    log replay code deletes the entry for inode Y, name "A/bar", from the
    subvolume tree since it doesn't exist in the log tree and the log
    tree is authorative for its index (we logged a BTRFS_DIR_LOG_INDEX_KEY
    item that covers the index range for the dentry that corresponds to
    "A/bar").

    Since there's no other hard link for inode Y and the log replay code
    deletes the name "A/bar", the file is lost.

The issue wouldn't happen if task B synced the log only after task A
called btrfs_log_new_name(), which would update the log with the new name
for inode Y ("A/bar").

Fix this by pinning the log root during renames before removing the old
directory entry, and unpinning af
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38365/">CVE-2025-38365 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38365">CVE-2025-38365 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247023">SUSE bug 1247023</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538368" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38368</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38368" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38368" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38368" ref_url="https://www.suse.com/security/cve/CVE-2025-38368" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

misc: tps6594-pfsm: Add NULL pointer check in tps6594_pfsm_probe()

The returned value, pfsm-&gt;miscdev.name, from devm_kasprintf()
could be NULL.
A pointer check is added to prevent potential NULL pointer dereference.
This is similar to the fix in commit 3027e7b15b02
("ice: Fix some null pointer dereference issues in ice_ptp.c").

This issue is found by our static analysis tool.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38368/">CVE-2025-38368 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38368">CVE-2025-38368 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247022">SUSE bug 1247022</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538369" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38369</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38369" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38369" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38369" ref_url="https://www.suse.com/security/cve/CVE-2025-38369" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dmaengine: idxd: Check availability of workqueue allocated by idxd wq driver before using

Running IDXD workloads in a container with the /dev directory mounted can
trigger a call trace or even a kernel panic when the parent process of the
container is terminated.

This issue occurs because, under certain configurations, Docker does not
properly propagate the mount replica back to the original mount point.

In this case, when the user driver detaches, the WQ is destroyed but it
still calls destroy_workqueue() attempting to completes all pending work.
It's necessary to check wq-&gt;wq and skip the drain if it no longer exists.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38369/">CVE-2025-38369 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38369">CVE-2025-38369 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247209">SUSE bug 1247209</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538371" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38371</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38371" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38371" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38371" ref_url="https://www.suse.com/security/cve/CVE-2025-38371" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/v3d: Disable interrupts before resetting the GPU

Currently, an interrupt can be triggered during a GPU reset, which can
lead to GPU hangs and NULL pointer dereference in an interrupt context
as shown in the following trace:

 [  314.035040] Unable to handle kernel NULL pointer dereference at virtual address 00000000000000c0
 [  314.043822] Mem abort info:
 [  314.046606]   ESR = 0x0000000096000005
 [  314.050347]   EC = 0x25: DABT (current EL), IL = 32 bits
 [  314.055651]   SET = 0, FnV = 0
 [  314.058695]   EA = 0, S1PTW = 0
 [  314.061826]   FSC = 0x05: level 1 translation fault
 [  314.066694] Data abort info:
 [  314.069564]   ISV = 0, ISS = 0x00000005, ISS2 = 0x00000000
 [  314.075039]   CM = 0, WnR = 0, TnD = 0, TagAccess = 0
 [  314.080080]   GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0
 [  314.085382] user pgtable: 4k pages, 39-bit VAs, pgdp=0000000102728000
 [  314.091814] [00000000000000c0] pgd=0000000000000000, p4d=0000000000000000, pud=0000000000000000
 [  314.100511] Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP
 [  314.106770] Modules linked in: v3d i2c_brcmstb vc4 snd_soc_hdmi_codec gpu_sched drm_shmem_helper drm_display_helper cec drm_dma_helper drm_kms_helper drm drm_panel_orientation_quirks snd_soc_core snd_compress snd_pcm_dmaengine snd_pcm snd_timer snd backlight
 [  314.129654] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Not tainted 6.12.25+rpt-rpi-v8 #1  Debian 1:6.12.25-1+rpt1
 [  314.139388] Hardware name: Raspberry Pi 4 Model B Rev 1.4 (DT)
 [  314.145211] pstate: 600000c5 (nZCv daIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
 [  314.152165] pc : v3d_irq+0xec/0x2e0 [v3d]
 [  314.156187] lr : v3d_irq+0xe0/0x2e0 [v3d]
 [  314.160198] sp : ffffffc080003ea0
 [  314.163502] x29: ffffffc080003ea0 x28: ffffffec1f184980 x27: 021202b000000000
 [  314.170633] x26: ffffffec1f17f630 x25: ffffff8101372000 x24: ffffffec1f17d9f0
 [  314.177764] x23: 000000000000002a x22: 000000000000002a x21: ffffff8103252000
 [  314.184895] x20: 0000000000000001 x19: 00000000deadbeef x18: 0000000000000000
 [  314.192026] x17: ffffff94e51d2000 x16: ffffffec1dac3cb0 x15: c306000000000000
 [  314.199156] x14: 0000000000000000 x13: b2fc982e03cc5168 x12: 0000000000000001
 [  314.206286] x11: ffffff8103f8bcc0 x10: ffffffec1f196868 x9 : ffffffec1dac3874
 [  314.213416] x8 : 0000000000000000 x7 : 0000000000042a3a x6 : ffffff810017a180
 [  314.220547] x5 : ffffffec1ebad400 x4 : ffffffec1ebad320 x3 : 00000000000bebeb
 [  314.227677] x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000000
 [  314.234807] Call trace:
 [  314.237243]  v3d_irq+0xec/0x2e0 [v3d]
 [  314.240906]  __handle_irq_event_percpu+0x58/0x218
 [  314.245609]  handle_irq_event+0x54/0xb8
 [  314.249439]  handle_fasteoi_irq+0xac/0x240
 [  314.253527]  handle_irq_desc+0x48/0x68
 [  314.257269]  generic_handle_domain_irq+0x24/0x38
 [  314.261879]  gic_handle_irq+0x48/0xd8
 [  314.265533]  call_on_irq_stack+0x24/0x58
 [  314.269448]  do_interrupt_handler+0x88/0x98
 [  314.273624]  el1_interrupt+0x34/0x68
 [  314.277193]  el1h_64_irq_handler+0x18/0x28
 [  314.281281]  el1h_64_irq+0x64/0x68
 [  314.284673]  default_idle_call+0x3c/0x168
 [  314.288675]  do_idle+0x1fc/0x230
 [  314.291895]  cpu_startup_entry+0x3c/0x50
 [  314.295810]  rest_init+0xe4/0xf0
 [  314.299030]  start_kernel+0x5e8/0x790
 [  314.302684]  __primary_switched+0x80/0x90
 [  314.306691] Code: 940029eb 360ffc13 f9442ea0 52800001 (f9406017)
 [  314.312775] ---[ end trace 0000000000000000 ]---
 [  314.317384] Kernel panic - not syncing: Oops: Fatal exception in interrupt
 [  314.324249] SMP: stopping secondary CPUs
 [  314.328167] Kernel Offset: 0x2b9da00000 from 0xffffffc080000000
 [  314.334076] PHYS_OFFSET: 0x0
 [  314.336946] CPU features: 0x08,00002013,c0200000,0200421b
 [  314.342337] Memory Limit: none
 [  314.345382] ---[ end Kernel panic - not syncing: Oops: Fatal exception in interrupt ]---

Before resetting the G
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38371/">CVE-2025-38371 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38371">CVE-2025-38371 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247178">SUSE bug 1247178</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538372" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38372</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38372" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38372" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38372" ref_url="https://www.suse.com/security/cve/CVE-2025-38372" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/mlx5: Fix unsafe xarray access in implicit ODP handling

__xa_store() and __xa_erase() were used without holding the proper lock,
which led to a lockdep warning due to unsafe RCU usage.  This patch
replaces them with xa_store() and xa_erase(), which perform the necessary
locking internally.

  =============================
  WARNING: suspicious RCPU usage
  6.14.0-rc7_for_upstream_debug_2025_03_18_15_01 #1 Not tainted
  -----------------------------
  ./include/linux/xarray.h:1211 suspicious rcu_dereference_protected() usage!

  other info that might help us debug this:

  rcu_scheduler_active = 2, debug_locks = 1
  3 locks held by kworker/u136:0/219:
      at: process_one_work+0xbe4/0x15f0
      process_one_work+0x75c/0x15f0
      pagefault_mr+0x9a5/0x1390 [mlx5_ib]

  stack backtrace:
  CPU: 14 UID: 0 PID: 219 Comm: kworker/u136:0 Not tainted
  6.14.0-rc7_for_upstream_debug_2025_03_18_15_01 #1
  Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS
  rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014
  Workqueue: mlx5_ib_page_fault mlx5_ib_eqe_pf_action [mlx5_ib]
  Call Trace:
   dump_stack_lvl+0xa8/0xc0
   lockdep_rcu_suspicious+0x1e6/0x260
   xas_create+0xb8a/0xee0
   xas_store+0x73/0x14c0
   __xa_store+0x13c/0x220
   ? xa_store_range+0x390/0x390
   ? spin_bug+0x1d0/0x1d0
   pagefault_mr+0xcb5/0x1390 [mlx5_ib]
   ? _raw_spin_unlock+0x1f/0x30
   mlx5_ib_eqe_pf_action+0x3be/0x2620 [mlx5_ib]
   ? lockdep_hardirqs_on_prepare+0x400/0x400
   ? mlx5_ib_invalidate_range+0xcb0/0xcb0 [mlx5_ib]
   process_one_work+0x7db/0x15f0
   ? pwq_dec_nr_in_flight+0xda0/0xda0
   ? assign_work+0x168/0x240
   worker_thread+0x57d/0xcd0
   ? rescuer_thread+0xc40/0xc40
   kthread+0x3b3/0x800
   ? kthread_is_per_cpu+0xb0/0xb0
   ? lock_downgrade+0x680/0x680
   ? do_raw_spin_lock+0x12d/0x270
   ? spin_bug+0x1d0/0x1d0
   ? finish_task_switch.isra.0+0x284/0x9e0
   ? lockdep_hardirqs_on_prepare+0x284/0x400
   ? kthread_is_per_cpu+0xb0/0xb0
   ret_from_fork+0x2d/0x70
   ? kthread_is_per_cpu+0xb0/0xb0
   ret_from_fork_asm+0x11/0x20
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38372/">CVE-2025-38372 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38372">CVE-2025-38372 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247020">SUSE bug 1247020</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538373" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38373</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38373" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38373" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38373" ref_url="https://www.suse.com/security/cve/CVE-2025-38373" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

IB/mlx5: Fix potential deadlock in MR deregistration

The issue arises when kzalloc() is invoked while holding umem_mutex or
any other lock acquired under umem_mutex. This is problematic because
kzalloc() can trigger fs_reclaim_aqcuire(), which may, in turn, invoke
mmu_notifier_invalidate_range_start(). This function can lead to
mlx5_ib_invalidate_range(), which attempts to acquire umem_mutex again,
resulting in a deadlock.

The problematic flow:
             CPU0                      |              CPU1
---------------------------------------|------------------------------------------------
mlx5_ib_dereg_mr()                     |
 -&gt; revoke_mr()                         |
   -&gt; mutex_lock(&amp;umem_odp-&gt;umem_mutex) |
                                       | mlx5_mkey_cache_init()
                                       |  -&gt; mutex_lock(&amp;dev-&gt;cache.rb_lock)
                                       |  -&gt; mlx5r_cache_create_ent_locked()
                                       |    -&gt; kzalloc(GFP_KERNEL)
                                       |      -&gt; fs_reclaim()
                                       |        -&gt; mmu_notifier_invalidate_range_start()
                                       |          -&gt; mlx5_ib_invalidate_range()
                                       |            -&gt; mutex_lock(&amp;umem_odp-&gt;umem_mutex)
   -&gt; cache_ent_find_and_store()        |
     -&gt; mutex_lock(&amp;dev-&gt;cache.rb_lock) |

Additionally, when kzalloc() is called from within
cache_ent_find_and_store(), we encounter the same deadlock due to
re-acquisition of umem_mutex.

Solve by releasing umem_mutex in dereg_mr() after umr_revoke_mr()
and before acquiring rb_lock. This ensures that we don't hold
umem_mutex while performing memory allocations that could trigger
the reclaim path.

This change prevents the deadlock by ensuring proper lock ordering and
avoiding holding locks during memory allocation operations that could
trigger the reclaim path.

The following lockdep warning demonstrates the deadlock:

 python3/20557 is trying to acquire lock:
 ffff888387542128 (&amp;umem_odp-&gt;umem_mutex){+.+.}-{4:4}, at:
 mlx5_ib_invalidate_range+0x5b/0x550 [mlx5_ib]

 but task is already holding lock:
 ffffffff82f6b840 (mmu_notifier_invalidate_range_start){+.+.}-{0:0}, at:
 unmap_vmas+0x7b/0x1a0

 which lock already depends on the new lock.

 the existing dependency chain (in reverse order) is:

 -&gt; #3 (mmu_notifier_invalidate_range_start){+.+.}-{0:0}:
       fs_reclaim_acquire+0x60/0xd0
       mem_cgroup_css_alloc+0x6f/0x9b0
       cgroup_init_subsys+0xa4/0x240
       cgroup_init+0x1c8/0x510
       start_kernel+0x747/0x760
       x86_64_start_reservations+0x25/0x30
       x86_64_start_kernel+0x73/0x80
       common_startup_64+0x129/0x138

 -&gt; #2 (fs_reclaim){+.+.}-{0:0}:
       fs_reclaim_acquire+0x91/0xd0
       __kmalloc_cache_noprof+0x4d/0x4c0
       mlx5r_cache_create_ent_locked+0x75/0x620 [mlx5_ib]
       mlx5_mkey_cache_init+0x186/0x360 [mlx5_ib]
       mlx5_ib_stage_post_ib_reg_umr_init+0x3c/0x60 [mlx5_ib]
       __mlx5_ib_add+0x4b/0x190 [mlx5_ib]
       mlx5r_probe+0xd9/0x320 [mlx5_ib]
       auxiliary_bus_probe+0x42/0x70
       really_probe+0xdb/0x360
       __driver_probe_device+0x8f/0x130
       driver_probe_device+0x1f/0xb0
       __driver_attach+0xd4/0x1f0
       bus_for_each_dev+0x79/0xd0
       bus_add_driver+0xf0/0x200
       driver_register+0x6e/0xc0
       __auxiliary_driver_register+0x6a/0xc0
       do_one_initcall+0x5e/0x390
       do_init_module+0x88/0x240
       init_module_from_file+0x85/0xc0
       idempotent_init_module+0x104/0x300
       __x64_sys_finit_module+0x68/0xc0
       do_syscall_64+0x6d/0x140
       entry_SYSCALL_64_after_hwframe+0x4b/0x53

 -&gt; #1 (&amp;dev-&gt;cache.rb_lock){+.+.}-{4:4}:
       __mutex_lock+0x98/0xf10
       __mlx5_ib_dereg_mr+0x6f2/0x890 [mlx5_ib]
       mlx5_ib_dereg_mr+0x21/0x110 [mlx5_ib]
       ib_dereg_mr_user+0x85/0x1f0 [ib_core]
  
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38373/">CVE-2025-38373 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38373">CVE-2025-38373 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247033">SUSE bug 1247033</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538374" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38374</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38374" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38374" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38374" ref_url="https://www.suse.com/security/cve/CVE-2025-38374" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

optee: ffa: fix sleep in atomic context

The OP-TEE driver registers the function notif_callback() for FF-A
notifications. However, this function is called in an atomic context
leading to errors like this when processing asynchronous notifications:

 | BUG: sleeping function called from invalid context at kernel/locking/mutex.c:258
 | in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 9, name: kworker/0:0
 | preempt_count: 1, expected: 0
 | RCU nest depth: 0, expected: 0
 | CPU: 0 UID: 0 PID: 9 Comm: kworker/0:0 Not tainted 6.14.0-00019-g657536ebe0aa #13
 | Hardware name: linux,dummy-virt (DT)
 | Workqueue: ffa_pcpu_irq_notification notif_pcpu_irq_work_fn
 | Call trace:
 |  show_stack+0x18/0x24 (C)
 |  dump_stack_lvl+0x78/0x90
 |  dump_stack+0x18/0x24
 |  __might_resched+0x114/0x170
 |  __might_sleep+0x48/0x98
 |  mutex_lock+0x24/0x80
 |  optee_get_msg_arg+0x7c/0x21c
 |  simple_call_with_arg+0x50/0xc0
 |  optee_do_bottom_half+0x14/0x20
 |  notif_callback+0x3c/0x48
 |  handle_notif_callbacks+0x9c/0xe0
 |  notif_get_and_handle+0x40/0x88
 |  generic_exec_single+0x80/0xc0
 |  smp_call_function_single+0xfc/0x1a0
 |  notif_pcpu_irq_work_fn+0x2c/0x38
 |  process_one_work+0x14c/0x2b4
 |  worker_thread+0x2e4/0x3e0
 |  kthread+0x13c/0x210
 |  ret_from_fork+0x10/0x20

Fix this by adding work queue to process the notification in a
non-atomic context.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38374/">CVE-2025-38374 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38374">CVE-2025-38374 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247024">SUSE bug 1247024</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538375" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38375</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38375" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38375" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38375" ref_url="https://www.suse.com/security/cve/CVE-2025-38375" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

virtio-net: ensure the received length does not exceed allocated size

In xdp_linearize_page, when reading the following buffers from the ring,
we forget to check the received length with the true allocate size. This
can lead to an out-of-bound read. This commit adds that missing check.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-24"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38375/">CVE-2025-38375 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38375">CVE-2025-38375 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247177">SUSE bug 1247177</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258073">SUSE bug 1258073</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538376" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38376</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38376" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38376" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38376" ref_url="https://www.suse.com/security/cve/CVE-2025-38376" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: chipidea: udc: disconnect/reconnect from host when do suspend/resume

Shawn and John reported a hang issue during system suspend as below:

 - USB gadget is enabled as Ethernet
 - There is data transfer over USB Ethernet (scp a big file between host
                                             and device)
 - Device is going in/out suspend (echo mem &gt; /sys/power/state)

The root cause is the USB device controller is suspended but the USB bus
is still active which caused the USB host continues to transfer data with
device and the device continues to queue USB requests (in this case, a
delayed TCP ACK packet trigger the issue) after controller is suspended,
however the USB controller clock is already gated off. Then if udc driver
access registers after that point, the system will hang.

The correct way to avoid such issue is to disconnect device from host when
the USB bus is not at suspend state. Then the host will receive disconnect
event and stop data transfer in time. To continue make USB gadget device
work after system resume, this will reconnect device automatically.

To make usb wakeup work if USB bus is already at suspend state, this will
keep connection for it only when USB device controller has enabled wakeup
capability.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38376/">CVE-2025-38376 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38376">CVE-2025-38376 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247176">SUSE bug 1247176</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538377" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38377</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38377" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38377" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38377" ref_url="https://www.suse.com/security/cve/CVE-2025-38377" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

rose: fix dangling neighbour pointers in rose_rt_device_down()

There are two bugs in rose_rt_device_down() that can cause
use-after-free:

1. The loop bound `t-&gt;count` is modified within the loop, which can
   cause the loop to terminate early and miss some entries.

2. When removing an entry from the neighbour array, the subsequent entries
   are moved up to fill the gap, but the loop index `i` is still
   incremented, causing the next entry to be skipped.

For example, if a node has three neighbours (A, A, B) with count=3 and A
is being removed, the second A is not checked.

    i=0: (A, A, B) -&gt; (A, B) with count=2
          ^ checked
    i=1: (A, B)    -&gt; (A, B) with count=2
             ^ checked (B, not A!)
    i=2: (doesn't occur because i &lt; count is false)

This leaves the second A in the array with count=2, but the rose_neigh
structure has been freed. Code that accesses these entries assumes that
the first `count` entries are valid pointers, causing a use-after-free
when it accesses the dangling pointer.

Fix both issues by iterating over the array in reverse order with a fixed
loop bound. This ensures that all entries are examined and that the removal
of an entry doesn't affect subsequent iterations.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38377/">CVE-2025-38377 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38377">CVE-2025-38377 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247174">SUSE bug 1247174</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247175">SUSE bug 1247175</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538379" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38379</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38379" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38379" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38379" ref_url="https://www.suse.com/security/cve/CVE-2025-38379" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix warning when reconnecting channel

When reconnecting a channel in smb2_reconnect_server(), a dummy tcon
is passed down to smb2_reconnect() with -&gt;query_interface
uninitialized, so we can't call queue_delayed_work() on it.

Fix the following warning by ensuring that we're queueing the delayed
worker from correct tcon.

WARNING: CPU: 4 PID: 1126 at kernel/workqueue.c:2498 __queue_delayed_work+0x1d2/0x200
Modules linked in: cifs cifs_arc4 nls_ucs2_utils cifs_md4 [last unloaded: cifs]
CPU: 4 UID: 0 PID: 1126 Comm: kworker/4:0 Not tainted 6.16.0-rc3 #5 PREEMPT(voluntary)
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-4.fc42 04/01/2014
Workqueue: cifsiod smb2_reconnect_server [cifs]
RIP: 0010:__queue_delayed_work+0x1d2/0x200
Code: 41 5e 41 5f e9 7f ee ff ff 90 0f 0b 90 e9 5d ff ff ff bf 02 00
00 00 e8 6c f3 07 00 89 c3 eb bd 90 0f 0b 90 e9 57 f&gt; 0b 90 e9 65 fe
ff ff 90 0f 0b 90 e9 72 fe ff ff 90 0f 0b 90 e9
RSP: 0018:ffffc900014afad8 EFLAGS: 00010003
RAX: 0000000000000000 RBX: ffff888124d99988 RCX: ffffffff81399cc1
RDX: dffffc0000000000 RSI: ffff888114326e00 RDI: ffff888124d999f0
RBP: 000000000000ea60 R08: 0000000000000001 R09: ffffed10249b3331
R10: ffff888124d9998f R11: 0000000000000004 R12: 0000000000000040
R13: ffff888114326e00 R14: ffff888124d999d8 R15: ffff888114939020
FS:  0000000000000000(0000) GS:ffff88829f7fe000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007ffe7a2b4038 CR3: 0000000120a6f000 CR4: 0000000000750ef0
PKRU: 55555554
Call Trace:
 &lt;TASK&gt;
 queue_delayed_work_on+0xb4/0xc0
 smb2_reconnect+0xb22/0xf50 [cifs]
 smb2_reconnect_server+0x413/0xd40 [cifs]
 ? __pfx_smb2_reconnect_server+0x10/0x10 [cifs]
 ? local_clock_noinstr+0xd/0xd0
 ? local_clock+0x15/0x30
 ? lock_release+0x29b/0x390
 process_one_work+0x4c5/0xa10
 ? __pfx_process_one_work+0x10/0x10
 ? __list_add_valid_or_report+0x37/0x120
 worker_thread+0x2f1/0x5a0
 ? __kthread_parkme+0xde/0x100
 ? __pfx_worker_thread+0x10/0x10
 kthread+0x1fe/0x380
 ? kthread+0x10f/0x380
 ? __pfx_kthread+0x10/0x10
 ? local_clock_noinstr+0xd/0xd0
 ? ret_from_fork+0x1b/0x1f0
 ? local_clock+0x15/0x30
 ? lock_release+0x29b/0x390
 ? rcu_is_watching+0x20/0x50
 ? __pfx_kthread+0x10/0x10
 ret_from_fork+0x15b/0x1f0
 ? __pfx_kthread+0x10/0x10
 ret_from_fork_asm+0x1a/0x30
 &lt;/TASK&gt;
irq event stamp: 1116206
hardirqs last  enabled at (1116205): [&lt;ffffffff8143af42&gt;] __up_console_sem+0x52/0x60
hardirqs last disabled at (1116206): [&lt;ffffffff81399f0e&gt;] queue_delayed_work_on+0x6e/0xc0
softirqs last  enabled at (1116138): [&lt;ffffffffc04562fd&gt;] __smb_send_rqst+0x42d/0x950 [cifs]
softirqs last disabled at (1116136): [&lt;ffffffff823d35e1&gt;] release_sock+0x21/0xf0
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38379/">CVE-2025-38379 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38379">CVE-2025-38379 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247030">SUSE bug 1247030</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538380" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38380</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38380" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38380" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38380" ref_url="https://www.suse.com/security/cve/CVE-2025-38380" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:13960" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001923.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:13962" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38380/">CVE-2025-38380 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-38380">CVE-2025-38380 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247028">SUSE bug 1247028</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247029">SUSE bug 1247029</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538381" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38381</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38381" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38381" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38381" ref_url="https://www.suse.com/security/cve/CVE-2025-38381" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Input: cs40l50-vibra - fix potential NULL dereference in cs40l50_upload_owt()

The cs40l50_upload_owt() function allocates memory via kmalloc()
without checking for allocation failure, which could lead to a
NULL pointer dereference.

Return -ENOMEM in case allocation fails.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38381/">CVE-2025-38381 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38381">CVE-2025-38381 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247027">SUSE bug 1247027</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538382" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38382</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38382" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38382" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38382" ref_url="https://www.suse.com/security/cve/CVE-2025-38382" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix iteration of extrefs during log replay

At __inode_add_ref() when processing extrefs, if we jump into the next
label we have an undefined value of victim_name.len, since we haven't
initialized it before we did the goto. This results in an invalid memory
access in the next iteration of the loop since victim_name.len was not
initialized to the length of the name of the current extref.

Fix this by initializing victim_name.len with the current extref's name
length.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38382/">CVE-2025-38382 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38382">CVE-2025-38382 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247031">SUSE bug 1247031</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247032">SUSE bug 1247032</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538383" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38383</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38383" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38383" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38383" ref_url="https://www.suse.com/security/cve/CVE-2025-38383" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/vmalloc: fix data race in show_numa_info()

The following data-race was found in show_numa_info():

==================================================================
BUG: KCSAN: data-race in vmalloc_info_show / vmalloc_info_show

read to 0xffff88800971fe30 of 4 bytes by task 8289 on cpu 0:
 show_numa_info mm/vmalloc.c:4936 [inline]
 vmalloc_info_show+0x5a8/0x7e0 mm/vmalloc.c:5016
 seq_read_iter+0x373/0xb40 fs/seq_file.c:230
 proc_reg_read_iter+0x11e/0x170 fs/proc/inode.c:299
....

write to 0xffff88800971fe30 of 4 bytes by task 8287 on cpu 1:
 show_numa_info mm/vmalloc.c:4934 [inline]
 vmalloc_info_show+0x38f/0x7e0 mm/vmalloc.c:5016
 seq_read_iter+0x373/0xb40 fs/seq_file.c:230
 proc_reg_read_iter+0x11e/0x170 fs/proc/inode.c:299
....

value changed: 0x0000008f -&gt; 0x00000000
==================================================================

According to this report,there is a read/write data-race because
m-&gt;private is accessible to multiple CPUs.  To fix this, instead of
allocating the heap in proc_vmalloc_init() and passing the heap address to
m-&gt;private, vmalloc_info_show() should allocate the heap.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38383/">CVE-2025-38383 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38383">CVE-2025-38383 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247250">SUSE bug 1247250</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538384" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38384</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38384" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38384" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38384" ref_url="https://www.suse.com/security/cve/CVE-2025-38384" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mtd: spinand: fix memory leak of ECC engine conf

Memory allocated for the ECC engine conf is not released during spinand
cleanup. Below kmemleak trace is seen for this memory leak:

unreferenced object 0xffffff80064f00e0 (size 8):
  comm "swapper/0", pid 1, jiffies 4294937458
  hex dump (first 8 bytes):
    00 00 00 00 00 00 00 00                          ........
  backtrace (crc 0):
    kmemleak_alloc+0x30/0x40
    __kmalloc_cache_noprof+0x208/0x3c0
    spinand_ondie_ecc_init_ctx+0x114/0x200
    nand_ecc_init_ctx+0x70/0xa8
    nanddev_ecc_engine_init+0xec/0x27c
    spinand_probe+0xa2c/0x1620
    spi_mem_probe+0x130/0x21c
    spi_probe+0xf0/0x170
    really_probe+0x17c/0x6e8
    __driver_probe_device+0x17c/0x21c
    driver_probe_device+0x58/0x180
    __device_attach_driver+0x15c/0x1f8
    bus_for_each_drv+0xec/0x150
    __device_attach+0x188/0x24c
    device_initial_probe+0x10/0x20
    bus_probe_device+0x11c/0x160

Fix the leak by calling nanddev_ecc_engine_cleanup() inside
spinand_cleanup().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38384/">CVE-2025-38384 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38384">CVE-2025-38384 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247035">SUSE bug 1247035</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538385" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38385</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38385" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38385" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38385" ref_url="https://www.suse.com/security/cve/CVE-2025-38385" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: usb: lan78xx: fix WARN in __netif_napi_del_locked on disconnect

Remove redundant netif_napi_del() call from disconnect path.

A WARN may be triggered in __netif_napi_del_locked() during USB device
disconnect:

  WARNING: CPU: 0 PID: 11 at net/core/dev.c:7417 __netif_napi_del_locked+0x2b4/0x350

This happens because netif_napi_del() is called in the disconnect path while
NAPI is still enabled. However, it is not necessary to call netif_napi_del()
explicitly, since unregister_netdev() will handle NAPI teardown automatically
and safely. Removing the redundant call avoids triggering the warning.

Full trace:
 lan78xx 1-1:1.0 enu1: Failed to read register index 0x000000c4. ret = -ENODEV
 lan78xx 1-1:1.0 enu1: Failed to set MAC down with error -ENODEV
 lan78xx 1-1:1.0 enu1: Link is Down
 lan78xx 1-1:1.0 enu1: Failed to read register index 0x00000120. ret = -ENODEV
 ------------[ cut here ]------------
 WARNING: CPU: 0 PID: 11 at net/core/dev.c:7417 __netif_napi_del_locked+0x2b4/0x350
 Modules linked in: flexcan can_dev fuse
 CPU: 0 UID: 0 PID: 11 Comm: kworker/0:1 Not tainted 6.16.0-rc2-00624-ge926949dab03 #9 PREEMPT
 Hardware name: SKOV IMX8MP CPU revC - bd500 (DT)
 Workqueue: usb_hub_wq hub_event
 pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
 pc : __netif_napi_del_locked+0x2b4/0x350
 lr : __netif_napi_del_locked+0x7c/0x350
 sp : ffffffc085b673c0
 x29: ffffffc085b673c0 x28: ffffff800b7f2000 x27: ffffff800b7f20d8
 x26: ffffff80110bcf58 x25: ffffff80110bd978 x24: 1ffffff0022179eb
 x23: ffffff80110bc000 x22: ffffff800b7f5000 x21: ffffff80110bc000
 x20: ffffff80110bcf38 x19: ffffff80110bcf28 x18: dfffffc000000000
 x17: ffffffc081578940 x16: ffffffc08284cee0 x15: 0000000000000028
 x14: 0000000000000006 x13: 0000000000040000 x12: ffffffb0022179e8
 x11: 1ffffff0022179e7 x10: ffffffb0022179e7 x9 : dfffffc000000000
 x8 : 0000004ffdde8619 x7 : ffffff80110bcf3f x6 : 0000000000000001
 x5 : ffffff80110bcf38 x4 : ffffff80110bcf38 x3 : 0000000000000000
 x2 : 0000000000000000 x1 : 1ffffff0022179e7 x0 : 0000000000000000
 Call trace:
  __netif_napi_del_locked+0x2b4/0x350 (P)
  lan78xx_disconnect+0xf4/0x360
  usb_unbind_interface+0x158/0x718
  device_remove+0x100/0x150
  device_release_driver_internal+0x308/0x478
  device_release_driver+0x1c/0x30
  bus_remove_device+0x1a8/0x368
  device_del+0x2e0/0x7b0
  usb_disable_device+0x244/0x540
  usb_disconnect+0x220/0x758
  hub_event+0x105c/0x35e0
  process_one_work+0x760/0x17b0
  worker_thread+0x768/0xce8
  kthread+0x3bc/0x690
  ret_from_fork+0x10/0x20
 irq event stamp: 211604
 hardirqs last  enabled at (211603): [&lt;ffffffc0828cc9ec&gt;] _raw_spin_unlock_irqrestore+0x84/0x98
 hardirqs last disabled at (211604): [&lt;ffffffc0828a9a84&gt;] el1_dbg+0x24/0x80
 softirqs last  enabled at (211296): [&lt;ffffffc080095f10&gt;] handle_softirqs+0x820/0xbc8
 softirqs last disabled at (210993): [&lt;ffffffc080010288&gt;] __do_softirq+0x18/0x20
 ---[ end trace 0000000000000000 ]---
 lan78xx 1-1:1.0 enu1: failed to kill vid 0081/0
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38385/">CVE-2025-38385 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38385">CVE-2025-38385 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247149">SUSE bug 1247149</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38386</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38386" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38386" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38386" ref_url="https://www.suse.com/security/cve/CVE-2025-38386" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ACPICA: Refuse to evaluate a method if arguments are missing

As reported in [1], a platform firmware update that increased the number
of method parameters and forgot to update a least one of its callers,
caused ACPICA to crash due to use-after-free.

Since this a result of a clear AML issue that arguably cannot be fixed
up by the interpreter (it cannot produce missing data out of thin air),
address it by making ACPICA refuse to evaluate a method if the caller
attempts to pass fewer arguments than expected to it.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38386/">CVE-2025-38386 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38386">CVE-2025-38386 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247138">SUSE bug 1247138</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538387" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38387</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38387" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38387" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38387" ref_url="https://www.suse.com/security/cve/CVE-2025-38387" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/mlx5: Initialize obj_event-&gt;obj_sub_list before xa_insert

The obj_event may be loaded immediately after inserted, then if the
list_head is not initialized then we may get a poisonous pointer.  This
fixes the crash below:

 mlx5_core 0000:03:00.0: MLX5E: StrdRq(1) RqSz(8) StrdSz(2048) RxCqeCmprss(0 enhanced)
 mlx5_core.sf mlx5_core.sf.4: firmware version: 32.38.3056
 mlx5_core 0000:03:00.0 en3f0pf0sf2002: renamed from eth0
 mlx5_core.sf mlx5_core.sf.4: Rate limit: 127 rates are supported, range: 0Mbps to 195312Mbps
 IPv6: ADDRCONF(NETDEV_CHANGE): en3f0pf0sf2002: link becomes ready
 Unable to handle kernel NULL pointer dereference at virtual address 0000000000000060
 Mem abort info:
   ESR = 0x96000006
   EC = 0x25: DABT (current EL), IL = 32 bits
   SET = 0, FnV = 0
   EA = 0, S1PTW = 0
 Data abort info:
   ISV = 0, ISS = 0x00000006
   CM = 0, WnR = 0
 user pgtable: 4k pages, 48-bit VAs, pgdp=00000007760fb000
 [0000000000000060] pgd=000000076f6d7003, p4d=000000076f6d7003, pud=0000000777841003, pmd=0000000000000000
 Internal error: Oops: 96000006 [#1] SMP
 Modules linked in: ipmb_host(OE) act_mirred(E) cls_flower(E) sch_ingress(E) mptcp_diag(E) udp_diag(E) raw_diag(E) unix_diag(E) tcp_diag(E) inet_diag(E) binfmt_misc(E) bonding(OE) rdma_ucm(OE) rdma_cm(OE) iw_cm(OE) ib_ipoib(OE) ib_cm(OE) isofs(E) cdrom(E) mst_pciconf(OE) ib_umad(OE) mlx5_ib(OE) ipmb_dev_int(OE) mlx5_core(OE) kpatch_15237886(OEK) mlxdevm(OE) auxiliary(OE) ib_uverbs(OE) ib_core(OE) psample(E) mlxfw(OE) tls(E) sunrpc(E) vfat(E) fat(E) crct10dif_ce(E) ghash_ce(E) sha1_ce(E) sbsa_gwdt(E) virtio_console(E) ext4(E) mbcache(E) jbd2(E) xfs(E) libcrc32c(E) mmc_block(E) virtio_net(E) net_failover(E) failover(E) sha2_ce(E) sha256_arm64(E) nvme(OE) nvme_core(OE) gpio_mlxbf3(OE) mlx_compat(OE) mlxbf_pmc(OE) i2c_mlxbf(OE) sdhci_of_dwcmshc(OE) pinctrl_mlxbf3(OE) mlxbf_pka(OE) gpio_generic(E) i2c_core(E) mmc_core(E) mlxbf_gige(OE) vitesse(E) pwr_mlxbf(OE) mlxbf_tmfifo(OE) micrel(E) mlxbf_bootctl(OE) virtio_ring(E) virtio(E) ipmi_devintf(E) ipmi_msghandler(E)
  [last unloaded: mst_pci]
 CPU: 11 PID: 20913 Comm: rte-worker-11 Kdump: loaded Tainted: G           OE K   5.10.134-13.1.an8.aarch64 #1
 Hardware name: https://www.mellanox.com BlueField-3 SmartNIC Main Card/BlueField-3 SmartNIC Main Card, BIOS 4.2.2.12968 Oct 26 2023
 pstate: a0400089 (NzCv daIf +PAN -UAO -TCO BTYPE=--)
 pc : dispatch_event_fd+0x68/0x300 [mlx5_ib]
 lr : devx_event_notifier+0xcc/0x228 [mlx5_ib]
 sp : ffff80001005bcf0
 x29: ffff80001005bcf0 x28: 0000000000000001
 x27: ffff244e0740a1d8 x26: ffff244e0740a1d0
 x25: ffffda56beff5ae0 x24: ffffda56bf911618
 x23: ffff244e0596a480 x22: ffff244e0596a480
 x21: ffff244d8312ad90 x20: ffff244e0596a480
 x19: fffffffffffffff0 x18: 0000000000000000
 x17: 0000000000000000 x16: ffffda56be66d620
 x15: 0000000000000000 x14: 0000000000000000
 x13: 0000000000000000 x12: 0000000000000000
 x11: 0000000000000040 x10: ffffda56bfcafb50
 x9 : ffffda5655c25f2c x8 : 0000000000000010
 x7 : 0000000000000000 x6 : ffff24545a2e24b8
 x5 : 0000000000000003 x4 : ffff80001005bd28
 x3 : 0000000000000000 x2 : 0000000000000000
 x1 : ffff244e0596a480 x0 : ffff244d8312ad90
 Call trace:
  dispatch_event_fd+0x68/0x300 [mlx5_ib]
  devx_event_notifier+0xcc/0x228 [mlx5_ib]
  atomic_notifier_call_chain+0x58/0x80
  mlx5_eq_async_int+0x148/0x2b0 [mlx5_core]
  atomic_notifier_call_chain+0x58/0x80
  irq_int_handler+0x20/0x30 [mlx5_core]
  __handle_irq_event_percpu+0x60/0x220
  handle_irq_event_percpu+0x3c/0x90
  handle_irq_event+0x58/0x158
  handle_fasteoi_irq+0xfc/0x188
  generic_handle_irq+0x34/0x48
  ...
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38387/">CVE-2025-38387 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38387">CVE-2025-38387 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247154">SUSE bug 1247154</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538389" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38389</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38389" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38389" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38389" ref_url="https://www.suse.com/security/cve/CVE-2025-38389" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/i915/gt: Fix timeline left held on VMA alloc error

The following error has been reported sporadically by CI when a test
unbinds the i915 driver on a ring submission platform:

&lt;4&gt; [239.330153] ------------[ cut here ]------------
&lt;4&gt; [239.330166] i915 0000:00:02.0: [drm] drm_WARN_ON(dev_priv-&gt;mm.shrink_count)
&lt;4&gt; [239.330196] WARNING: CPU: 1 PID: 18570 at drivers/gpu/drm/i915/i915_gem.c:1309 i915_gem_cleanup_early+0x13e/0x150 [i915]
...
&lt;4&gt; [239.330640] RIP: 0010:i915_gem_cleanup_early+0x13e/0x150 [i915]
...
&lt;4&gt; [239.330942] Call Trace:
&lt;4&gt; [239.330944]  &lt;TASK&gt;
&lt;4&gt; [239.330949]  i915_driver_late_release+0x2b/0xa0 [i915]
&lt;4&gt; [239.331202]  i915_driver_release+0x86/0xa0 [i915]
&lt;4&gt; [239.331482]  devm_drm_dev_init_release+0x61/0x90
&lt;4&gt; [239.331494]  devm_action_release+0x15/0x30
&lt;4&gt; [239.331504]  release_nodes+0x3d/0x120
&lt;4&gt; [239.331517]  devres_release_all+0x96/0xd0
&lt;4&gt; [239.331533]  device_unbind_cleanup+0x12/0x80
&lt;4&gt; [239.331543]  device_release_driver_internal+0x23a/0x280
&lt;4&gt; [239.331550]  ? bus_find_device+0xa5/0xe0
&lt;4&gt; [239.331563]  device_driver_detach+0x14/0x20
...
&lt;4&gt; [357.719679] ---[ end trace 0000000000000000 ]---

If the test also unloads the i915 module then that's followed with:

&lt;3&gt; [357.787478] =============================================================================
&lt;3&gt; [357.788006] BUG i915_vma (Tainted: G     U  W        N ): Objects remaining on __kmem_cache_shutdown()
&lt;3&gt; [357.788031] -----------------------------------------------------------------------------
&lt;3&gt; [357.788204] Object 0xffff888109e7f480 @offset=29824
&lt;3&gt; [357.788670] Allocated in i915_vma_instance+0xee/0xc10 [i915] age=292729 cpu=4 pid=2244
&lt;4&gt; [357.788994]  i915_vma_instance+0xee/0xc10 [i915]
&lt;4&gt; [357.789290]  init_status_page+0x7b/0x420 [i915]
&lt;4&gt; [357.789532]  intel_engines_init+0x1d8/0x980 [i915]
&lt;4&gt; [357.789772]  intel_gt_init+0x175/0x450 [i915]
&lt;4&gt; [357.790014]  i915_gem_init+0x113/0x340 [i915]
&lt;4&gt; [357.790281]  i915_driver_probe+0x847/0xed0 [i915]
&lt;4&gt; [357.790504]  i915_pci_probe+0xe6/0x220 [i915]
...

Closer analysis of CI results history has revealed a dependency of the
error on a few IGT tests, namely:
- igt@api_intel_allocator@fork-simple-stress-signal,
- igt@api_intel_allocator@two-level-inception-interruptible,
- igt@gem_linear_blits@interruptible,
- igt@prime_mmap_coherency@ioctl-errors,
which invisibly trigger the issue, then exhibited with first driver unbind
attempt.

All of the above tests perform actions which are actively interrupted with
signals.  Further debugging has allowed to narrow that scope down to
DRM_IOCTL_I915_GEM_EXECBUFFER2, and ring_context_alloc(), specific to ring
submission, in particular.

If successful then that function, or its execlists or GuC submission
equivalent, is supposed to be called only once per GEM context engine,
followed by raise of a flag that prevents the function from being called
again.  The function is expected to unwind its internal errors itself, so
it may be safely called once more after it returns an error.

In case of ring submission, the function first gets a reference to the
engine's legacy timeline and then allocates a VMA.  If the VMA allocation
fails, e.g. when i915_vma_instance() called from inside is interrupted
with a signal, then ring_context_alloc() fails, leaving the timeline held
referenced.  On next I915_GEM_EXECBUFFER2 IOCTL, another reference to the
timeline is got, and only that last one is put on successful completion.
As a consequence, the legacy timeline, with its underlying engine status
page's VMA object, is still held and not released on driver unbind.

Get the legacy timeline only after successful allocation of the context
engine's VMA.

v2: Add a note on other submission methods (Krzysztof Karas):
    Both execlists and GuC submission use lrc_alloc() which seems free
    from a similar issue.

(cherry picked from commit cc43422b3cc79eacff4c5a8ba0d224688ca9dd4f)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38389/">CVE-2025-38389 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38389">CVE-2025-38389 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247153">SUSE bug 1247153</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538390" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38390</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38390" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38390" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38390" ref_url="https://www.suse.com/security/cve/CVE-2025-38390" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

firmware: arm_ffa: Fix memory leak by freeing notifier callback node

Commit e0573444edbf ("firmware: arm_ffa: Add interfaces to request
notification callbacks") adds support for notifier callbacks by allocating
and inserting a callback node into a hashtable during registration of
notifiers. However, during unregistration, the code only removes the
node from the hashtable without freeing the associated memory, resulting
in a memory leak.

Resolve the memory leak issue by ensuring the allocated notifier callback
node is properly freed after it is removed from the hashtable entry.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38390/">CVE-2025-38390 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38390">CVE-2025-38390 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247088">SUSE bug 1247088</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538391" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38391</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38391" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38391" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38391" ref_url="https://www.suse.com/security/cve/CVE-2025-38391" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: typec: altmodes/displayport: do not index invalid pin_assignments

A poorly implemented DisplayPort Alt Mode port partner can indicate
that its pin assignment capabilities are greater than the maximum
value, DP_PIN_ASSIGN_F. In this case, calls to pin_assignment_show
will cause a BRK exception due to an out of bounds array access.

Prevent for loop in pin_assignment_show from accessing
invalid values in pin_assignments by adding DP_PIN_ASSIGN_MAX
value in typec_dp.h and using i &lt; DP_PIN_ASSIGN_MAX as a loop
condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="5.2/CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38391/">CVE-2025-38391 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38391">CVE-2025-38391 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247181">SUSE bug 1247181</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538392" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38392</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38392" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38392" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38392" ref_url="https://www.suse.com/security/cve/CVE-2025-38392" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:15429" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001984.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:15785" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

idpf: convert control queue mutex to a spinlock

With VIRTCHNL2_CAP_MACFILTER enabled, the following warning is generated
on module load:

[  324.701677] BUG: sleeping function called from invalid context at kernel/locking/mutex.c:578
[  324.701684] in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 1582, name: NetworkManager
[  324.701689] preempt_count: 201, expected: 0
[  324.701693] RCU nest depth: 0, expected: 0
[  324.701697] 2 locks held by NetworkManager/1582:
[  324.701702]  #0: ffffffff9f7be770 (rtnl_mutex){....}-{3:3}, at: rtnl_newlink+0x791/0x21e0
[  324.701730]  #1: ff1100216c380368 (_xmit_ETHER){....}-{2:2}, at: __dev_open+0x3f0/0x870
[  324.701749] Preemption disabled at:
[  324.701752] [&lt;ffffffff9cd23b9d&gt;] __dev_open+0x3dd/0x870
[  324.701765] CPU: 30 UID: 0 PID: 1582 Comm: NetworkManager Not tainted 6.15.0-rc5+ #2 PREEMPT(voluntary)
[  324.701771] Hardware name: Intel Corporation M50FCP2SBSTD/M50FCP2SBSTD, BIOS SE5C741.86B.01.01.0001.2211140926 11/14/2022
[  324.701774] Call Trace:
[  324.701777]  &lt;TASK&gt;
[  324.701779]  dump_stack_lvl+0x5d/0x80
[  324.701788]  ? __dev_open+0x3dd/0x870
[  324.701793]  __might_resched.cold+0x1ef/0x23d
&lt;..&gt;
[  324.701818]  __mutex_lock+0x113/0x1b80
&lt;..&gt;
[  324.701917]  idpf_ctlq_clean_sq+0xad/0x4b0 [idpf]
[  324.701935]  ? kasan_save_track+0x14/0x30
[  324.701941]  idpf_mb_clean+0x143/0x380 [idpf]
&lt;..&gt;
[  324.701991]  idpf_send_mb_msg+0x111/0x720 [idpf]
[  324.702009]  idpf_vc_xn_exec+0x4cc/0x990 [idpf]
[  324.702021]  ? rcu_is_watching+0x12/0xc0
[  324.702035]  idpf_add_del_mac_filters+0x3ed/0xb50 [idpf]
&lt;..&gt;
[  324.702122]  __hw_addr_sync_dev+0x1cf/0x300
[  324.702126]  ? find_held_lock+0x32/0x90
[  324.702134]  idpf_set_rx_mode+0x317/0x390 [idpf]
[  324.702152]  __dev_open+0x3f8/0x870
[  324.702159]  ? __pfx___dev_open+0x10/0x10
[  324.702174]  __dev_change_flags+0x443/0x650
&lt;..&gt;
[  324.702208]  netif_change_flags+0x80/0x160
[  324.702218]  do_setlink.isra.0+0x16a0/0x3960
&lt;..&gt;
[  324.702349]  rtnl_newlink+0x12fd/0x21e0

The sequence is as follows:
	rtnl_newlink()-&gt;
	__dev_change_flags()-&gt;
	__dev_open()-&gt;
	dev_set_rx_mode() - &gt;  # disables BH and grabs "dev-&gt;addr_list_lock"
	idpf_set_rx_mode() -&gt;  # proceed only if VIRTCHNL2_CAP_MACFILTER is ON
	__dev_uc_sync() -&gt;
	idpf_add_mac_filter -&gt;
	idpf_add_del_mac_filters -&gt;
	idpf_send_mb_msg() -&gt;
	idpf_mb_clean() -&gt;
	idpf_ctlq_clean_sq()   # mutex_lock(cq_lock)

Fix by converting cq_lock to a spinlock. All operations under the new
lock are safe except freeing the DMA memory, which may use vunmap(). Fix
by requesting a contiguous physical memory for the DMA mapping.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38392/">CVE-2025-38392 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38392">CVE-2025-38392 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247169">SUSE bug 1247169</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538393" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38393</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38393" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38393" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38393" ref_url="https://www.suse.com/security/cve/CVE-2025-38393" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFSv4/pNFS: Fix a race to wake on NFS_LAYOUT_DRAIN

We found a few different systems hung up in writeback waiting on the same
page lock, and one task waiting on the NFS_LAYOUT_DRAIN bit in
pnfs_update_layout(), however the pnfs_layout_hdr's plh_outstanding count
was zero.

It seems most likely that this is another race between the waiter and waker
similar to commit ed0172af5d6f ("SUNRPC: Fix a race to wake a sync task").
Fix it up by applying the advised barrier.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38393/">CVE-2025-38393 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38393">CVE-2025-38393 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247170">SUSE bug 1247170</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538395" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38395</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38395" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38395" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38395" ref_url="https://www.suse.com/security/cve/CVE-2025-38395" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

regulator: gpio: Fix the out-of-bounds access to drvdata::gpiods

drvdata::gpiods is supposed to hold an array of 'gpio_desc' pointers. But
the memory is allocated for only one pointer. This will lead to
out-of-bounds access later in the code if 'config::ngpios' is &gt; 1. So
fix the code to allocate enough memory to hold 'config::ngpios' of GPIO
descriptors.

While at it, also move the check for memory allocation failure to be below
the allocation to make it more readable.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38395/">CVE-2025-38395 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38395">CVE-2025-38395 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247171">SUSE bug 1247171</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538396" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38396</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38396" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38396" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38396" ref_url="https://www.suse.com/security/cve/CVE-2025-38396" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023108.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3742-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3748-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3755-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3762-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3764-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3765-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3768-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3771-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3772-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs: export anon_inode_make_secure_inode() and fix secretmem LSM bypass

Export anon_inode_make_secure_inode() to allow KVM guest_memfd to create
anonymous inodes with proper security context. This replaces the current
pattern of calling alloc_anon_inode() followed by
inode_init_security_anon() for creating security context manually.

This change also fixes a security regression in secretmem where the
S_PRIVATE flag was not cleared after alloc_anon_inode(), causing
LSM/SELinux checks to be bypassed for secretmem file descriptors.

As guest_memfd currently resides in the KVM module, we need to export this
symbol for use outside the core kernel. In the future, guest_memfd might be
moved to core-mm, at which point the symbols no longer would have to be
exported. When/if that happens is still unclear.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38396/">CVE-2025-38396 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38396">CVE-2025-38396 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247156">SUSE bug 1247156</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247158">SUSE bug 1247158</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538397" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38397</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38397" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38397" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38397" ref_url="https://www.suse.com/security/cve/CVE-2025-38397" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvme-multipath: fix suspicious RCU usage warning

When I run the NVME over TCP test in virtme-ng, I get the following
"suspicious RCU usage" warning in nvme_mpath_add_sysfs_link():

'''
[    5.024557][   T44] nvmet: Created nvm controller 1 for subsystem nqn.2025-06.org.nvmexpress.mptcp for NQN nqn.2014-08.org.nvmexpress:uuid:f7f6b5e0-ff97-4894-98ac-c85309e0bc77.
[    5.027401][  T183] nvme nvme0: creating 2 I/O queues.
[    5.029017][  T183] nvme nvme0: mapped 2/0/0 default/read/poll queues.
[    5.032587][  T183] nvme nvme0: new ctrl: NQN "nqn.2025-06.org.nvmexpress.mptcp", addr 127.0.0.1:4420, hostnqn: nqn.2014-08.org.nvmexpress:uuid:f7f6b5e0-ff97-4894-98ac-c85309e0bc77
[    5.042214][   T25]
[    5.042440][   T25] =============================
[    5.042579][   T25] WARNING: suspicious RCU usage
[    5.042705][   T25] 6.16.0-rc3+ #23 Not tainted
[    5.042812][   T25] -----------------------------
[    5.042934][   T25] drivers/nvme/host/multipath.c:1203 RCU-list traversed in non-reader section!!
[    5.043111][   T25]
[    5.043111][   T25] other info that might help us debug this:
[    5.043111][   T25]
[    5.043341][   T25]
[    5.043341][   T25] rcu_scheduler_active = 2, debug_locks = 1
[    5.043502][   T25] 3 locks held by kworker/u9:0/25:
[    5.043615][   T25]  #0: ffff888008730948 ((wq_completion)async){+.+.}-{0:0}, at: process_one_work+0x7ed/0x1350
[    5.043830][   T25]  #1: ffffc900001afd40 ((work_completion)(&amp;entry-&gt;work)){+.+.}-{0:0}, at: process_one_work+0xcf3/0x1350
[    5.044084][   T25]  #2: ffff888013ee0020 (&amp;head-&gt;srcu){.+.+}-{0:0}, at: nvme_mpath_add_sysfs_link.part.0+0xb4/0x3a0
[    5.044300][   T25]
[    5.044300][   T25] stack backtrace:
[    5.044439][   T25] CPU: 0 UID: 0 PID: 25 Comm: kworker/u9:0 Not tainted 6.16.0-rc3+ #23 PREEMPT(full)
[    5.044441][   T25] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011
[    5.044442][   T25] Workqueue: async async_run_entry_fn
[    5.044445][   T25] Call Trace:
[    5.044446][   T25]  &lt;TASK&gt;
[    5.044449][   T25]  dump_stack_lvl+0x6f/0xb0
[    5.044453][   T25]  lockdep_rcu_suspicious.cold+0x4f/0xb1
[    5.044457][   T25]  nvme_mpath_add_sysfs_link.part.0+0x2fb/0x3a0
[    5.044459][   T25]  ? queue_work_on+0x90/0xf0
[    5.044461][   T25]  ? lockdep_hardirqs_on+0x78/0x110
[    5.044466][   T25]  nvme_mpath_set_live+0x1e9/0x4f0
[    5.044470][   T25]  nvme_mpath_add_disk+0x240/0x2f0
[    5.044472][   T25]  ? __pfx_nvme_mpath_add_disk+0x10/0x10
[    5.044475][   T25]  ? add_disk_fwnode+0x361/0x580
[    5.044480][   T25]  nvme_alloc_ns+0x81c/0x17c0
[    5.044483][   T25]  ? kasan_quarantine_put+0x104/0x240
[    5.044487][   T25]  ? __pfx_nvme_alloc_ns+0x10/0x10
[    5.044495][   T25]  ? __pfx_nvme_find_get_ns+0x10/0x10
[    5.044496][   T25]  ? rcu_read_lock_any_held+0x45/0xa0
[    5.044498][   T25]  ? validate_chain+0x232/0x4f0
[    5.044503][   T25]  nvme_scan_ns+0x4c8/0x810
[    5.044506][   T25]  ? __pfx_nvme_scan_ns+0x10/0x10
[    5.044508][   T25]  ? find_held_lock+0x2b/0x80
[    5.044512][   T25]  ? ktime_get+0x16d/0x220
[    5.044517][   T25]  ? kvm_clock_get_cycles+0x18/0x30
[    5.044520][   T25]  ? __pfx_nvme_scan_ns_async+0x10/0x10
[    5.044522][   T25]  async_run_entry_fn+0x97/0x560
[    5.044523][   T25]  ? rcu_is_watching+0x12/0xc0
[    5.044526][   T25]  process_one_work+0xd3c/0x1350
[    5.044532][   T25]  ? __pfx_process_one_work+0x10/0x10
[    5.044536][   T25]  ? assign_work+0x16c/0x240
[    5.044539][   T25]  worker_thread+0x4da/0xd50
[    5.044545][   T25]  ? __pfx_worker_thread+0x10/0x10
[    5.044546][   T25]  kthread+0x356/0x5c0
[    5.044548][   T25]  ? __pfx_kthread+0x10/0x10
[    5.044549][   T25]  ? ret_from_fork+0x1b/0x2e0
[    5.044552][   T25]  ? __lock_release.isra.0+0x5d/0x180
[    5.044553][   T25]  ? ret_from_fork+0x1b/0x2e0
[    5.044555][   T25]  ? rcu_is_watching+0x12/0xc0
[    5.044557][   T25]  ? __pfx_kthread+0x10/0x10
[    5.04
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38397/">CVE-2025-38397 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38397">CVE-2025-38397 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247163">SUSE bug 1247163</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538399" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38399</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38399" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38399" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38399" ref_url="https://www.suse.com/security/cve/CVE-2025-38399" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: target: Fix NULL pointer dereference in core_scsi3_decode_spec_i_port()

The function core_scsi3_decode_spec_i_port(), in its error code path,
unconditionally calls core_scsi3_lunacl_undepend_item() passing the
dest_se_deve pointer, which may be NULL.

This can lead to a NULL pointer dereference if dest_se_deve remains
unset.

SPC-3 PR SPEC_I_PT: Unable to locate dest_tpg
Unable to handle kernel paging request at virtual address dfff800000000012
Call trace:
  core_scsi3_lunacl_undepend_item+0x2c/0xf0 [target_core_mod] (P)
  core_scsi3_decode_spec_i_port+0x120c/0x1c30 [target_core_mod]
  core_scsi3_emulate_pro_register+0x6b8/0xcd8 [target_core_mod]
  target_scsi3_emulate_pr_out+0x56c/0x840 [target_core_mod]

Fix this by adding a NULL check before calling
core_scsi3_lunacl_undepend_item()
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38399/">CVE-2025-38399 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38399">CVE-2025-38399 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247097">SUSE bug 1247097</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538400" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38400</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38400" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38400" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38400" ref_url="https://www.suse.com/security/cve/CVE-2025-38400" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfs: Clean up /proc/net/rpc/nfs when nfs_fs_proc_net_init() fails.

syzbot reported a warning below [1] following a fault injection in
nfs_fs_proc_net_init(). [0]

When nfs_fs_proc_net_init() fails, /proc/net/rpc/nfs is not removed.

Later, rpc_proc_exit() tries to remove /proc/net/rpc, and the warning
is logged as the directory is not empty.

Let's handle the error of nfs_fs_proc_net_init() properly.

[0]:
FAULT_INJECTION: forcing a failure.
name failslab, interval 1, probability 0, space 0, times 0
CPU: 1 UID: 0 PID: 6120 Comm: syz.2.27 Not tainted 6.16.0-rc1-syzkaller-00010-g2c4a1f3fe03e #0 PREEMPT(full)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
Call Trace:
 &lt;TASK&gt;
  dump_stack_lvl (lib/dump_stack.c:123)
 should_fail_ex (lib/fault-inject.c:73 lib/fault-inject.c:174)
 should_failslab (mm/failslab.c:46)
 kmem_cache_alloc_noprof (mm/slub.c:4178 mm/slub.c:4204)
 __proc_create (fs/proc/generic.c:427)
 proc_create_reg (fs/proc/generic.c:554)
 proc_create_net_data (fs/proc/proc_net.c:120)
 nfs_fs_proc_net_init (fs/nfs/client.c:1409)
 nfs_net_init (fs/nfs/inode.c:2600)
 ops_init (net/core/net_namespace.c:138)
 setup_net (net/core/net_namespace.c:443)
 copy_net_ns (net/core/net_namespace.c:576)
 create_new_namespaces (kernel/nsproxy.c:110)
 unshare_nsproxy_namespaces (kernel/nsproxy.c:218 (discriminator 4))
 ksys_unshare (kernel/fork.c:3123)
 __x64_sys_unshare (kernel/fork.c:3190)
 do_syscall_64 (arch/x86/entry/syscall_64.c:63 arch/x86/entry/syscall_64.c:94)
 entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130)
 &lt;/TASK&gt;

[1]:
remove_proc_entry: removing non-empty directory 'net/rpc', leaking at least 'nfs'
 WARNING: CPU: 1 PID: 6120 at fs/proc/generic.c:727 remove_proc_entry+0x45e/0x530 fs/proc/generic.c:727
Modules linked in:
CPU: 1 UID: 0 PID: 6120 Comm: syz.2.27 Not tainted 6.16.0-rc1-syzkaller-00010-g2c4a1f3fe03e #0 PREEMPT(full)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
 RIP: 0010:remove_proc_entry+0x45e/0x530 fs/proc/generic.c:727
Code: 3c 02 00 0f 85 85 00 00 00 48 8b 93 d8 00 00 00 4d 89 f0 4c 89 e9 48 c7 c6 40 ba a2 8b 48 c7 c7 60 b9 a2 8b e8 33 81 1d ff 90 &lt;0f&gt; 0b 90 90 e9 5f fe ff ff e8 04 69 5e ff 90 48 b8 00 00 00 00 00
RSP: 0018:ffffc90003637b08 EFLAGS: 00010282
RAX: 0000000000000000 RBX: ffff88805f534140 RCX: ffffffff817a92c8
RDX: ffff88807da99e00 RSI: ffffffff817a92d5 RDI: 0000000000000001
RBP: ffff888033431ac0 R08: 0000000000000001 R09: 0000000000000000
R10: 0000000000000001 R11: 0000000000000001 R12: ffff888033431a00
R13: ffff888033431ae4 R14: ffff888033184724 R15: dffffc0000000000
FS:  0000555580328500(0000) GS:ffff888124a62000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f71733743e0 CR3: 000000007f618000 CR4: 00000000003526f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
  sunrpc_exit_net+0x46/0x90 net/sunrpc/sunrpc_syms.c:76
  ops_exit_list net/core/net_namespace.c:200 [inline]
  ops_undo_list+0x2eb/0xab0 net/core/net_namespace.c:253
  setup_net+0x2e1/0x510 net/core/net_namespace.c:457
  copy_net_ns+0x2a6/0x5f0 net/core/net_namespace.c:574
  create_new_namespaces+0x3ea/0xa90 kernel/nsproxy.c:110
  unshare_nsproxy_namespaces+0xc0/0x1f0 kernel/nsproxy.c:218
  ksys_unshare+0x45b/0xa40 kernel/fork.c:3121
  __do_sys_unshare kernel/fork.c:3192 [inline]
  __se_sys_unshare kernel/fork.c:3190 [inline]
  __x64_sys_unshare+0x31/0x40 kernel/fork.c:3190
  do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
  do_syscall_64+0xcd/0x490 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7fa1a6b8e929
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38400/">CVE-2025-38400 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38400">CVE-2025-38400 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247123">SUSE bug 1247123</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538401" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38401</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38401" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38401" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38401" ref_url="https://www.suse.com/security/cve/CVE-2025-38401" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mtk-sd: Prevent memory corruption from DMA map failure

If msdc_prepare_data() fails to map the DMA region, the request is
not prepared for data receiving, but msdc_start_data() proceeds
the DMA with previous setting.
Since this will lead a memory corruption, we have to stop the
request operation soon after the msdc_prepare_data() fails to
prepare it.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38401/">CVE-2025-38401 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38401">CVE-2025-38401 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247125">SUSE bug 1247125</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538402" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38402</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38402" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38402" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38402" ref_url="https://www.suse.com/security/cve/CVE-2025-38402" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

idpf: return 0 size for RSS key if not supported

Returning -EOPNOTSUPP from function returning u32 is leading to
cast and invalid size value as a result.

-EOPNOTSUPP as a size probably will lead to allocation fail.

Command: ethtool -x eth0
It is visible on all devices that don't have RSS caps set.

[  136.615917] Call Trace:
[  136.615921]  &lt;TASK&gt;
[  136.615927]  ? __warn+0x89/0x130
[  136.615942]  ? __alloc_frozen_pages_noprof+0x322/0x330
[  136.615953]  ? report_bug+0x164/0x190
[  136.615968]  ? handle_bug+0x58/0x90
[  136.615979]  ? exc_invalid_op+0x17/0x70
[  136.615987]  ? asm_exc_invalid_op+0x1a/0x20
[  136.616001]  ? rss_prepare_get.constprop.0+0xb9/0x170
[  136.616016]  ? __alloc_frozen_pages_noprof+0x322/0x330
[  136.616028]  __alloc_pages_noprof+0xe/0x20
[  136.616038]  ___kmalloc_large_node+0x80/0x110
[  136.616072]  __kmalloc_large_node_noprof+0x1d/0xa0
[  136.616081]  __kmalloc_noprof+0x32c/0x4c0
[  136.616098]  ? rss_prepare_get.constprop.0+0xb9/0x170
[  136.616105]  rss_prepare_get.constprop.0+0xb9/0x170
[  136.616114]  ethnl_default_doit+0x107/0x3d0
[  136.616131]  genl_family_rcv_msg_doit+0x100/0x160
[  136.616147]  genl_rcv_msg+0x1b8/0x2c0
[  136.616156]  ? __pfx_ethnl_default_doit+0x10/0x10
[  136.616168]  ? __pfx_genl_rcv_msg+0x10/0x10
[  136.616176]  netlink_rcv_skb+0x58/0x110
[  136.616186]  genl_rcv+0x28/0x40
[  136.616195]  netlink_unicast+0x19b/0x290
[  136.616206]  netlink_sendmsg+0x222/0x490
[  136.616215]  __sys_sendto+0x1fd/0x210
[  136.616233]  __x64_sys_sendto+0x24/0x30
[  136.616242]  do_syscall_64+0x82/0x160
[  136.616252]  ? __sys_recvmsg+0x83/0xe0
[  136.616265]  ? syscall_exit_to_user_mode+0x10/0x210
[  136.616275]  ? do_syscall_64+0x8e/0x160
[  136.616282]  ? __count_memcg_events+0xa1/0x130
[  136.616295]  ? count_memcg_events.constprop.0+0x1a/0x30
[  136.616306]  ? handle_mm_fault+0xae/0x2d0
[  136.616319]  ? do_user_addr_fault+0x379/0x670
[  136.616328]  ? clear_bhb_loop+0x45/0xa0
[  136.616340]  ? clear_bhb_loop+0x45/0xa0
[  136.616349]  ? clear_bhb_loop+0x45/0xa0
[  136.616359]  entry_SYSCALL_64_after_hwframe+0x76/0x7e
[  136.616369] RIP: 0033:0x7fd30ba7b047
[  136.616376] Code: 0c 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b8 0f 1f 00 f3 0f 1e fa 80 3d bd d5 0c 00 00 41 89 ca 74 10 b8 2c 00 00 00 0f 05 &lt;48&gt; 3d 00 f0 ff ff 77 71 c3 55 48 83 ec 30 44 89 4c 24 2c 4c 89 44
[  136.616381] RSP: 002b:00007ffde1796d68 EFLAGS: 00000202 ORIG_RAX: 000000000000002c
[  136.616388] RAX: ffffffffffffffda RBX: 000055d7bd89f2a0 RCX: 00007fd30ba7b047
[  136.616392] RDX: 0000000000000028 RSI: 000055d7bd89f3b0 RDI: 0000000000000003
[  136.616396] RBP: 00007ffde1796e10 R08: 00007fd30bb4e200 R09: 000000000000000c
[  136.616399] R10: 0000000000000000 R11: 0000000000000202 R12: 000055d7bd89f340
[  136.616403] R13: 000055d7bd89f3b0 R14: 000055d78943f200 R15: 0000000000000000
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38402/">CVE-2025-38402 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38402">CVE-2025-38402 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247262">SUSE bug 1247262</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538403" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38403</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38403" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38403" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38403" ref_url="https://www.suse.com/security/cve/CVE-2025-38403" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2212" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003185.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2264" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vsock/vmci: Clear the vmci transport packet properly when initializing it

In vmci_transport_packet_init memset the vmci_transport_packet before
populating the fields to avoid any uninitialised data being left in the
structure.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38403/">CVE-2025-38403 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38403">CVE-2025-38403 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247141">SUSE bug 1247141</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538404" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38404</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38404" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38404" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38404" ref_url="https://www.suse.com/security/cve/CVE-2025-38404" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: typec: displayport: Fix potential deadlock

The deadlock can occur due to a recursive lock acquisition of
`cros_typec_altmode_data::mutex`.
The call chain is as follows:
1. cros_typec_altmode_work() acquires the mutex
2. typec_altmode_vdm() -&gt; dp_altmode_vdm() -&gt;
3. typec_altmode_exit() -&gt; cros_typec_altmode_exit()
4. cros_typec_altmode_exit() attempts to acquire the mutex again

To prevent this, defer the `typec_altmode_exit()` call by scheduling
it rather than calling it directly from within the mutex-protected
context.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38404/">CVE-2025-38404 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38404">CVE-2025-38404 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247271">SUSE bug 1247271</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538405" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38405</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38405" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38405" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38405" ref_url="https://www.suse.com/security/cve/CVE-2025-38405" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvmet: fix memory leak of bio integrity

If nvmet receives commands with metadata there is a continuous memory
leak of kmalloc-128 slab or more precisely bio-&gt;bi_integrity.

Since commit bf4c89fc8797 ("block: don't call bio_uninit from bio_endio")
each user of bio_init has to use bio_uninit as well. Otherwise the bio
integrity is not getting free. Nvmet uses bio_init for inline bios.

Uninit the inline bio to complete deallocation of integrity in bio.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38405/">CVE-2025-38405 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38405">CVE-2025-38405 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247270">SUSE bug 1247270</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538406" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38406</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38406" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38406" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38406" ref_url="https://www.suse.com/security/cve/CVE-2025-38406" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath6kl: remove WARN on bad firmware input

If the firmware gives bad input, that's nothing to do with
the driver's stack at this point etc., so the WARN_ON()
doesn't add any value. Additionally, this is one of the
top syzbot reports now. Just print a message, and as an
added bonus, print the sizes too.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38406/">CVE-2025-38406 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38406">CVE-2025-38406 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247210">SUSE bug 1247210</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538408" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38408</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38408" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38408" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38408" ref_url="https://www.suse.com/security/cve/CVE-2025-38408" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

genirq/irq_sim: Initialize work context pointers properly

Initialize `ops` member's pointers properly by using kzalloc() instead of
kmalloc() when allocating the simulation work context. Otherwise the
pointers contain random content leading to invalid dereferencing.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38408/">CVE-2025-38408 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38408">CVE-2025-38408 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247126">SUSE bug 1247126</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538409" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38409</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38409" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38409" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38409" ref_url="https://www.suse.com/security/cve/CVE-2025-38409" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/msm: Fix another leak in the submit error path

put_unused_fd() doesn't free the installed file, if we've already done
fd_install().  So we need to also free the sync_file.

Patchwork: https://patchwork.freedesktop.org/patch/653583/
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38409/">CVE-2025-38409 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38409">CVE-2025-38409 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247285">SUSE bug 1247285</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538410" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38410</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38410" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38410" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38410" ref_url="https://www.suse.com/security/cve/CVE-2025-38410" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/msm: Fix a fence leak in submit error path

In error paths, we could unref the submit without calling
drm_sched_entity_push_job(), so msm_job_free() will never get
called.  Since drm_sched_job_cleanup() will NULL out the
s_fence, we can use that to detect this case.

Patchwork: https://patchwork.freedesktop.org/patch/653584/
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38410/">CVE-2025-38410 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38410">CVE-2025-38410 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247128">SUSE bug 1247128</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538412" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38412</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38412" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38412" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38412" ref_url="https://www.suse.com/security/cve/CVE-2025-38412" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

platform/x86: dell-wmi-sysman: Fix WMI data block retrieval in sysfs callbacks

After retrieving WMI data blocks in sysfs callbacks, check for the
validity of them before dereferencing their content.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38412/">CVE-2025-38412 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38412">CVE-2025-38412 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247132">SUSE bug 1247132</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538413" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38413</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38413" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38413" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38413" ref_url="https://www.suse.com/security/cve/CVE-2025-38413" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

virtio-net: xsk: rx: fix the frame's length check

When calling buf_to_xdp, the len argument is the frame data's length
without virtio header's length (vi-&gt;hdr_len). We check that len with

	xsk_pool_get_rx_frame_size() + vi-&gt;hdr_len

to ensure the provided len does not larger than the allocated chunk
size. The additional vi-&gt;hdr_len is because in virtnet_add_recvbuf_xsk,
we use part of XDP_PACKET_HEADROOM for virtio header and ask the vhost
to start placing data from

	hard_start + XDP_PACKET_HEADROOM - vi-&gt;hdr_len
not
	hard_start + XDP_PACKET_HEADROOM

But the first buffer has virtio_header, so the maximum frame's length in
the first buffer can only be

	xsk_pool_get_rx_frame_size()
not
	xsk_pool_get_rx_frame_size() + vi-&gt;hdr_len

like in the current check.

This commit adds an additional argument to buf_to_xdp differentiate
between the first buffer and other ones to correctly calculate the maximum
frame's length.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38413/">CVE-2025-38413 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38413">CVE-2025-38413 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247131">SUSE bug 1247131</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538414" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38414</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38414" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38414" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38414" ref_url="https://www.suse.com/security/cve/CVE-2025-38414" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath12k: fix GCC_GCC_PCIE_HOT_RST definition for WCN7850

GCC_GCC_PCIE_HOT_RST is wrongly defined for WCN7850, causing kernel crash
on some specific platforms.

Since this register is divergent for WCN7850 and QCN9274, move it to
register table to allow different definitions. Then correct the register
address for WCN7850 to fix this issue.

Note IPQ5332 is not affected as it is not PCIe based device.

Tested-on: WCN7850 hw2.0 PCI WLAN.HMT.1.0.c5-00481-QCAHMTSWPL_V1.0_V2.0_SILICONZ-3
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38414/">CVE-2025-38414 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38414">CVE-2025-38414 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247145">SUSE bug 1247145</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538415" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38415</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38415" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38415" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38415" ref_url="https://www.suse.com/security/cve/CVE-2025-38415" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1662" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002457.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2212" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003185.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3088" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002621.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3685" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Squashfs: check return result of sb_min_blocksize

Syzkaller reports an "UBSAN: shift-out-of-bounds in squashfs_bio_read" bug.

Syzkaller forks multiple processes which after mounting the Squashfs
filesystem, issues an ioctl("/dev/loop0", LOOP_SET_BLOCK_SIZE, 0x8000). 
Now if this ioctl occurs at the same time another process is in the
process of mounting a Squashfs filesystem on /dev/loop0, the failure
occurs.  When this happens the following code in squashfs_fill_super()
fails.

----
msblk-&gt;devblksize = sb_min_blocksize(sb, SQUASHFS_DEVBLK_SIZE);
msblk-&gt;devblksize_log2 = ffz(~msblk-&gt;devblksize);
----

sb_min_blocksize() returns 0, which means msblk-&gt;devblksize is set to 0.

As a result, ffz(~msblk-&gt;devblksize) returns 64, and msblk-&gt;devblksize_log2
is set to 64.

This subsequently causes the

UBSAN: shift-out-of-bounds in fs/squashfs/block.c:195:36
shift exponent 64 is too large for 64-bit type 'u64' (aka
'unsigned long long')

This commit adds a check for a 0 return by sb_min_blocksize().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38415/">CVE-2025-38415 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38415">CVE-2025-38415 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247147">SUSE bug 1247147</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538416" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38416</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38416" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38416" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38416" ref_url="https://www.suse.com/security/cve/CVE-2025-38416" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFC: nci: uart: Set tty-&gt;disc_data only in success path

Setting tty-&gt;disc_data before opening the NCI device means we need to
clean it up on error paths.  This also opens some short window if device
starts sending data, even before NCIUARTSETDRIVER IOCTL succeeded
(broken hardware?).  Close the window by exposing tty-&gt;disc_data only on
the success path, when opening of the NCI device and try_module_get()
succeeds.

The code differs in error path in one aspect: tty-&gt;disc_data won't be
ever assigned thus NULL-ified.  This however should not be relevant
difference, because of "tty-&gt;disc_data=NULL" in nci_uart_tty_open().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38416/">CVE-2025-38416 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38416">CVE-2025-38416 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247151">SUSE bug 1247151</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538417" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38417</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38417" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38417" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38417" ref_url="https://www.suse.com/security/cve/CVE-2025-38417" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:14420" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: fix eswitch code memory leak in reset scenario

Add simple eswitch mode checker in attaching VF procedure and allocate
required port representor memory structures only in switchdev mode.
The reset flows triggers VF (if present) detach/attach procedure.
It might involve VF port representor(s) re-creation if the device is
configured is switchdev mode (not legacy one).
The memory was blindly allocated in current implementation,
regardless of the mode and not freed if in legacy mode.

Kmemeleak trace:
unreferenced object (percpu) 0x7e3bce5b888458 (size 40):
  comm "bash", pid 1784, jiffies 4295743894
  hex dump (first 32 bytes on cpu 45):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace (crc 0):
    pcpu_alloc_noprof+0x4c4/0x7c0
    ice_repr_create+0x66/0x130 [ice]
    ice_repr_create_vf+0x22/0x70 [ice]
    ice_eswitch_attach_vf+0x1b/0xa0 [ice]
    ice_reset_all_vfs+0x1dd/0x2f0 [ice]
    ice_pci_err_resume+0x3b/0xb0 [ice]
    pci_reset_function+0x8f/0x120
    reset_store+0x56/0xa0
    kernfs_fop_write_iter+0x120/0x1b0
    vfs_write+0x31c/0x430
    ksys_write+0x61/0xd0
    do_syscall_64+0x5b/0x180
    entry_SYSCALL_64_after_hwframe+0x76/0x7e

Testing hints (ethX is PF netdev):
- create at least one VF
    echo 1 &gt; /sys/class/net/ethX/device/sriov_numvfs
- trigger the reset
    echo 1 &gt; /sys/class/net/ethX/device/reset
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38417/">CVE-2025-38417 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38417">CVE-2025-38417 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247282">SUSE bug 1247282</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38418</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38418" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38418" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38418" ref_url="https://www.suse.com/security/cve/CVE-2025-38418" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

remoteproc: core: Release rproc-&gt;clean_table after rproc_attach() fails

When rproc-&gt;state = RPROC_DETACHED is attached to remote processor
through rproc_attach(), if rproc_handle_resources() returns failure,
then the clean table should be released, otherwise the following
memory leak will occur.

unreferenced object 0xffff000086a99800 (size 1024):
comm "kworker/u12:3", pid 59, jiffies 4294893670 (age 121.140s)
hex dump (first 32 bytes):
00 00 00 00 00 80 00 00 00 00 00 00 00 00 10 00 ............
00 00 00 00 00 00 08 00 00 00 00 00 00 00 00 00 ............
backtrace:
 [&lt;000000008bbe4ca8&gt;] slab_post_alloc_hook+0x98/0x3fc
 [&lt;000000003b8a272b&gt;] __kmem_cache_alloc_node+0x13c/0x230
 [&lt;000000007a507c51&gt;] __kmalloc_node_track_caller+0x5c/0x260
 [&lt;0000000037818dae&gt;] kmemdup+0x34/0x60
 [&lt;00000000610f7f57&gt;] rproc_boot+0x35c/0x56c
 [&lt;0000000065f8871a&gt;] rproc_add+0x124/0x17c
 [&lt;00000000497416ee&gt;] imx_rproc_probe+0x4ec/0x5d4
 [&lt;000000003bcaa37d&gt;] platform_probe+0x68/0xd8
 [&lt;00000000771577f9&gt;] really_probe+0x110/0x27c
 [&lt;00000000531fea59&gt;] __driver_probe_device+0x78/0x12c
 [&lt;0000000080036a04&gt;] driver_probe_device+0x3c/0x118
 [&lt;000000007e0bddcb&gt;] __device_attach_driver+0xb8/0xf8
 [&lt;000000000cf1fa33&gt;] bus_for_each_drv+0x84/0xe4
 [&lt;000000001a53b53e&gt;] __device_attach+0xfc/0x18c
 [&lt;00000000d1a2a32c&gt;] device_initial_probe+0x14/0x20
 [&lt;00000000d8f8b7ae&gt;] bus_probe_device+0xb0/0xb4
 unreferenced object 0xffff0000864c9690 (size 16):
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38418/">CVE-2025-38418 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38418">CVE-2025-38418 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247137">SUSE bug 1247137</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38419</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38419" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38419" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38419" ref_url="https://www.suse.com/security/cve/CVE-2025-38419" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

remoteproc: core: Cleanup acquired resources when rproc_handle_resources() fails in rproc_attach()

When rproc-&gt;state = RPROC_DETACHED and rproc_attach() is used
to attach to the remote processor, if rproc_handle_resources()
returns a failure, the resources allocated by imx_rproc_prepare()
should be released, otherwise the following memory leak will occur.

Since almost the same thing is done in imx_rproc_prepare() and
rproc_resource_cleanup(), Function rproc_resource_cleanup() is able
to deal with empty lists so it is better to fix the "goto" statements
in rproc_attach(). replace the "unprepare_device" goto statement with
"clean_up_resources" and get rid of the "unprepare_device" label.

unreferenced object 0xffff0000861c5d00 (size 128):
comm "kworker/u12:3", pid 59, jiffies 4294893509 (age 149.220s)
hex dump (first 32 bytes):
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
00 00 02 88 00 00 00 00 00 00 10 00 00 00 00 00 ............
backtrace:
 [&lt;00000000f949fe18&gt;] slab_post_alloc_hook+0x98/0x37c
 [&lt;00000000adbfb3e7&gt;] __kmem_cache_alloc_node+0x138/0x2e0
 [&lt;00000000521c0345&gt;] kmalloc_trace+0x40/0x158
 [&lt;000000004e330a49&gt;] rproc_mem_entry_init+0x60/0xf8
 [&lt;000000002815755e&gt;] imx_rproc_prepare+0xe0/0x180
 [&lt;0000000003f61b4e&gt;] rproc_boot+0x2ec/0x528
 [&lt;00000000e7e994ac&gt;] rproc_add+0x124/0x17c
 [&lt;0000000048594076&gt;] imx_rproc_probe+0x4ec/0x5d4
 [&lt;00000000efc298a1&gt;] platform_probe+0x68/0xd8
 [&lt;00000000110be6fe&gt;] really_probe+0x110/0x27c
 [&lt;00000000e245c0ae&gt;] __driver_probe_device+0x78/0x12c
 [&lt;00000000f61f6f5e&gt;] driver_probe_device+0x3c/0x118
 [&lt;00000000a7874938&gt;] __device_attach_driver+0xb8/0xf8
 [&lt;0000000065319e69&gt;] bus_for_each_drv+0x84/0xe4
 [&lt;00000000db3eb243&gt;] __device_attach+0xfc/0x18c
 [&lt;0000000072e4e1a4&gt;] device_initial_probe+0x14/0x20
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38419/">CVE-2025-38419 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38419">CVE-2025-38419 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247136">SUSE bug 1247136</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38420</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38420" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38420" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38420" ref_url="https://www.suse.com/security/cve/CVE-2025-38420" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: carl9170: do not ping device which has failed to load firmware

Syzkaller reports [1, 2] crashes caused by an attempts to ping
the device which has failed to load firmware. Since such a device
doesn't pass 'ieee80211_register_hw()', an internal workqueue
managed by 'ieee80211_queue_work()' is not yet created and an
attempt to queue work on it causes null-ptr-deref.

[1] https://syzkaller.appspot.com/bug?extid=9a4aec827829942045ff
[2] https://syzkaller.appspot.com/bug?extid=0d8afba53e8fb2633217
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38420/">CVE-2025-38420 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38420">CVE-2025-38420 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247279">SUSE bug 1247279</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38421</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38421" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38421" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38421" ref_url="https://www.suse.com/security/cve/CVE-2025-38421" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

platform/x86/amd: pmf: Use device managed allocations

If setting up smart PC fails for any reason then this can lead to
a double free when unloading amd-pmf.  This is because dev-&gt;buf was
freed but never set to NULL and is again freed in amd_pmf_remove().

To avoid subtle allocation bugs in failures leading to a double free
change all allocations into device managed allocations.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-04-08"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38421/">CVE-2025-38421 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38421">CVE-2025-38421 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247130">SUSE bug 1247130</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247133">SUSE bug 1247133</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538423" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38423</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38423" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38423" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38423" ref_url="https://www.suse.com/security/cve/CVE-2025-38423" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: codecs: wcd9375: Fix double free of regulator supplies

Driver gets regulator supplies in probe path with
devm_regulator_bulk_get(), so should not call regulator_bulk_free() in
error and remove paths to avoid double free.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38423/">CVE-2025-38423 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38423">CVE-2025-38423 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247292">SUSE bug 1247292</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538424" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38424</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38424" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38424" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38424" ref_url="https://www.suse.com/security/cve/CVE-2025-38424" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

perf: Fix sample vs do_exit()

Baisheng Gao reported an ARM64 crash, which Mark decoded as being a
synchronous external abort -- most likely due to trying to access
MMIO in bad ways.

The crash further shows perf trying to do a user stack sample while in
exit_mmap()'s tlb_finish_mmu() -- i.e. while tearing down the address
space it is trying to access.

It turns out that we stop perf after we tear down the userspace mm; a
receipie for disaster, since perf likes to access userspace for
various reasons.

Flip this order by moving up where we stop perf in do_exit().

Additionally, harden PERF_SAMPLE_CALLCHAIN and PERF_SAMPLE_STACK_USER
to abort when the current task does not have an mm (exit_mm() makes
sure to set current-&gt;mm = NULL; before commencing with the actual
teardown). Such that CPU wide events don't trip on this same problem.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38424/">CVE-2025-38424 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38424">CVE-2025-38424 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247293">SUSE bug 1247293</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538425" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38425</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38425" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38425" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38425" ref_url="https://www.suse.com/security/cve/CVE-2025-38425" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i2c: tegra: check msg length in SMBUS block read

For SMBUS block read, do not continue to read if the message length
passed from the device is '0' or greater than the maximum allowed bytes.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38425/">CVE-2025-38425 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38425">CVE-2025-38425 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247251">SUSE bug 1247251</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538426" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38426</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38426" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38426" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38426" ref_url="https://www.suse.com/security/cve/CVE-2025-38426" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: Add basic validation for RAS header

If RAS header read from EEPROM is corrupted, it could result in trying
to allocate huge memory for reading the records. Add some validation to
header fields.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38426/">CVE-2025-38426 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38426">CVE-2025-38426 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247252">SUSE bug 1247252</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38427</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38427" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38427" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38427" ref_url="https://www.suse.com/security/cve/CVE-2025-38427" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

video: screen_info: Relocate framebuffers behind PCI bridges

Apply PCI host-bridge window offsets to screen_info framebuffers. Fixes
invalid access to I/O memory.

Resources behind a PCI host bridge can be relocated by a certain offset
in the kernel's CPU address range used for I/O. The framebuffer memory
range stored in screen_info refers to the CPU addresses as seen during
boot (where the offset is 0). During boot up, firmware may assign a
different memory offset to the PCI host bridge and thereby relocating
the framebuffer address of the PCI graphics device as seen by the kernel.
The information in screen_info must be updated as well.

The helper pcibios_bus_to_resource() performs the relocation of the
screen_info's framebuffer resource (given in PCI bus addresses). The
result matches the I/O-memory resource of the PCI graphics device (given
in CPU addresses). As before, we store away the information necessary to
later update the information in screen_info itself.

Commit 78aa89d1dfba ("firmware/sysfb: Update screen_info for relocated
EFI framebuffers") added the code for updating screen_info. It is based
on similar functionality that pre-existed in efifb. Efifb uses a pointer
to the PCI resource, while the newer code does a memcpy of the region.
Hence efifb sees any updates to the PCI resource and avoids the issue.

v3:
- Only use struct pci_bus_region for PCI bus addresses (Bjorn)
- Clarify address semantics in commit messages and comments (Bjorn)
v2:
- Fixed tags (Takashi, Ivan)
- Updated information on efifb
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38427/">CVE-2025-38427 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38427">CVE-2025-38427 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247152">SUSE bug 1247152</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538428" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38428</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38428" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38428" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38428" ref_url="https://www.suse.com/security/cve/CVE-2025-38428" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Input: ims-pcu - check record size in ims_pcu_flash_firmware()

The "len" variable comes from the firmware and we generally do
trust firmware, but it's always better to double check.  If the "len"
is too large it could result in memory corruption when we do
"memcpy(fragment-&gt;data, rec-&gt;data, len);"
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38428/">CVE-2025-38428 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38428">CVE-2025-38428 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247150">SUSE bug 1247150</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538429" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38429</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38429" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38429" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38429" ref_url="https://www.suse.com/security/cve/CVE-2025-38429" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bus: mhi: ep: Update read pointer only after buffer is written

Inside mhi_ep_ring_add_element, the read pointer (rd_offset) is updated
before the buffer is written, potentially causing race conditions where
the host sees an updated read pointer before the buffer is actually
written. Updating rd_offset prematurely can lead to the host accessing
an uninitialized or incomplete element, resulting in data corruption.

Invoke the buffer write before updating rd_offset to ensure the element
is fully written before signaling its availability.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38429/">CVE-2025-38429 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38429">CVE-2025-38429 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247253">SUSE bug 1247253</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538430" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38430</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38430" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38430" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38430" ref_url="https://www.suse.com/security/cve/CVE-2025-38430" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfsd: nfsd4_spo_must_allow() must check this is a v4 compound request

If the request being processed is not a v4 compound request, then
examining the cstate can have undefined results.

This patch adds a check that the rpc procedure being executed
(rq_procinfo) is the NFSPROC4_COMPOUND procedure.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38430/">CVE-2025-38430 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38430">CVE-2025-38430 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247160">SUSE bug 1247160</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538436" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38436</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38436" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38436" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38436" ref_url="https://www.suse.com/security/cve/CVE-2025-38436" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/scheduler: signal scheduled fence when kill job

When an entity from application B is killed, drm_sched_entity_kill()
removes all jobs belonging to that entity through
drm_sched_entity_kill_jobs_work(). If application A's job depends on a
scheduled fence from application B's job, and that fence is not properly
signaled during the killing process, application A's dependency cannot be
cleared.

This leads to application A hanging indefinitely while waiting for a
dependency that will never be resolved. Fix this issue by ensuring that
scheduled fences are properly signaled when an entity is killed, allowing
dependent applications to continue execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38436/">CVE-2025-38436 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38436">CVE-2025-38436 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247227">SUSE bug 1247227</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538438" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38438</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38438" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38438" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38438" ref_url="https://www.suse.com/security/cve/CVE-2025-38438" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:20518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: SOF: Intel: hda: Use devm_kstrdup() to avoid memleak.

sof_pdata-&gt;tplg_filename can have address allocated by kstrdup()
and can be overwritten. Memory leak was detected with kmemleak:

unreferenced object 0xffff88812391ff60 (size 16):
  comm "kworker/4:1", pid 161, jiffies 4294802931
  hex dump (first 16 bytes):
    73 6f 66 2d 68 64 61 2d 67 65 6e 65 72 69 63 00  sof-hda-generic.
  backtrace (crc 4bf1675c):
    __kmalloc_node_track_caller_noprof+0x49c/0x6b0
    kstrdup+0x46/0xc0
    hda_machine_select.cold+0x1de/0x12cf [snd_sof_intel_hda_generic]
    sof_init_environment+0x16f/0xb50 [snd_sof]
    sof_probe_continue+0x45/0x7c0 [snd_sof]
    sof_probe_work+0x1e/0x40 [snd_sof]
    process_one_work+0x894/0x14b0
    worker_thread+0x5e5/0xfb0
    kthread+0x39d/0x760
    ret_from_fork+0x31/0x70
    ret_from_fork_asm+0x1a/0x30
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38438/">CVE-2025-38438 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38438">CVE-2025-38438 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247157">SUSE bug 1247157</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538439" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38439</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38439" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38439" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38439" ref_url="https://www.suse.com/security/cve/CVE-2025-38439" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bnxt_en: Set DMA unmap len correctly for XDP_REDIRECT

When transmitting an XDP_REDIRECT packet, call dma_unmap_len_set()
with the proper length instead of 0.  This bug triggers this warning
on a system with IOMMU enabled:

WARNING: CPU: 36 PID: 0 at drivers/iommu/dma-iommu.c:842 __iommu_dma_unmap+0x159/0x170
RIP: 0010:__iommu_dma_unmap+0x159/0x170
Code: a8 00 00 00 00 48 c7 45 b0 00 00 00 00 48 c7 45 c8 00 00 00 00 48 c7 45 a0 ff ff ff ff 4c 89 45
b8 4c 89 45 c0 e9 77 ff ff ff &lt;0f&gt; 0b e9 60 ff ff ff e8 8b bf 6a 00 66 66 2e 0f 1f 84 00 00 00 00
RSP: 0018:ff22d31181150c88 EFLAGS: 00010206
RAX: 0000000000002000 RBX: 00000000e13a0000 RCX: 0000000000000000
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
RBP: ff22d31181150cf0 R08: ff22d31181150ca8 R09: 0000000000000000
R10: 0000000000000000 R11: ff22d311d36c9d80 R12: 0000000000001000
R13: ff13544d10645010 R14: ff22d31181150c90 R15: ff13544d0b2bac00
FS: 0000000000000000(0000) GS:ff13550908a00000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00005be909dacff8 CR3: 0008000173408003 CR4: 0000000000f71ef0
PKRU: 55555554
Call Trace:
&lt;IRQ&gt;
? show_regs+0x6d/0x80
? __warn+0x89/0x160
? __iommu_dma_unmap+0x159/0x170
? report_bug+0x17e/0x1b0
? handle_bug+0x46/0x90
? exc_invalid_op+0x18/0x80
? asm_exc_invalid_op+0x1b/0x20
? __iommu_dma_unmap+0x159/0x170
? __iommu_dma_unmap+0xb3/0x170
iommu_dma_unmap_page+0x4f/0x100
dma_unmap_page_attrs+0x52/0x220
? srso_alias_return_thunk+0x5/0xfbef5
? xdp_return_frame+0x2e/0xd0
bnxt_tx_int_xdp+0xdf/0x440 [bnxt_en]
__bnxt_poll_work_done+0x81/0x1e0 [bnxt_en]
bnxt_poll+0xd3/0x1e0 [bnxt_en]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38439/">CVE-2025-38439 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38439">CVE-2025-38439 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247155">SUSE bug 1247155</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538440" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38440</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38440" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38440" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38440" ref_url="https://www.suse.com/security/cve/CVE-2025-38440" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: Fix race between DIM disable and net_dim()

There's a race between disabling DIM and NAPI callbacks using the dim
pointer on the RQ or SQ.

If NAPI checks the DIM state bit and sees it still set, it assumes
`rq-&gt;dim` or `sq-&gt;dim` is valid. But if DIM gets disabled right after
that check, the pointer might already be set to NULL, leading to a NULL
pointer dereference in net_dim().

Fix this by calling `synchronize_net()` before freeing the DIM context.
This ensures all in-progress NAPI callbacks are finished before the
pointer is cleared.

Kernel log:

BUG: kernel NULL pointer dereference, address: 0000000000000000
...
RIP: 0010:net_dim+0x23/0x190
...
Call Trace:
 &lt;TASK&gt;
 ? __die+0x20/0x60
 ? page_fault_oops+0x150/0x3e0
 ? common_interrupt+0xf/0xa0
 ? sysvec_call_function_single+0xb/0x90
 ? exc_page_fault+0x74/0x130
 ? asm_exc_page_fault+0x22/0x30
 ? net_dim+0x23/0x190
 ? mlx5e_poll_ico_cq+0x41/0x6f0 [mlx5_core]
 ? sysvec_apic_timer_interrupt+0xb/0x90
 mlx5e_handle_rx_dim+0x92/0xd0 [mlx5_core]
 mlx5e_napi_poll+0x2cd/0xac0 [mlx5_core]
 ? mlx5e_poll_ico_cq+0xe5/0x6f0 [mlx5_core]
 busy_poll_stop+0xa2/0x200
 ? mlx5e_napi_poll+0x1d9/0xac0 [mlx5_core]
 ? mlx5e_trigger_irq+0x130/0x130 [mlx5_core]
 __napi_busy_loop+0x345/0x3b0
 ? sysvec_call_function_single+0xb/0x90
 ? asm_sysvec_call_function_single+0x16/0x20
 ? sysvec_apic_timer_interrupt+0xb/0x90
 ? pcpu_free_area+0x1e4/0x2e0
 napi_busy_loop+0x11/0x20
 xsk_recvmsg+0x10c/0x130
 sock_recvmsg+0x44/0x70
 __sys_recvfrom+0xbc/0x130
 ? __schedule+0x398/0x890
 __x64_sys_recvfrom+0x20/0x30
 do_syscall_64+0x4c/0x100
 entry_SYSCALL_64_after_hwframe+0x4b/0x53
...
---[ end trace 0000000000000000 ]---
...
---[ end Kernel panic - not syncing: Fatal exception in interrupt ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38440/">CVE-2025-38440 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38440">CVE-2025-38440 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247290">SUSE bug 1247290</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538441" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38441</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38441" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38441" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38441" ref_url="https://www.suse.com/security/cve/CVE-2025-38441" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: flowtable: account for Ethernet header in nf_flow_pppoe_proto()

syzbot found a potential access to uninit-value in nf_flow_pppoe_proto()

Blamed commit forgot the Ethernet header.

BUG: KMSAN: uninit-value in nf_flow_offload_inet_hook+0x7e4/0x940 net/netfilter/nf_flow_table_inet.c:27
  nf_flow_offload_inet_hook+0x7e4/0x940 net/netfilter/nf_flow_table_inet.c:27
  nf_hook_entry_hookfn include/linux/netfilter.h:157 [inline]
  nf_hook_slow+0xe1/0x3d0 net/netfilter/core.c:623
  nf_hook_ingress include/linux/netfilter_netdev.h:34 [inline]
  nf_ingress net/core/dev.c:5742 [inline]
  __netif_receive_skb_core+0x4aff/0x70c0 net/core/dev.c:5837
  __netif_receive_skb_one_core net/core/dev.c:5975 [inline]
  __netif_receive_skb+0xcc/0xac0 net/core/dev.c:6090
  netif_receive_skb_internal net/core/dev.c:6176 [inline]
  netif_receive_skb+0x57/0x630 net/core/dev.c:6235
  tun_rx_batched+0x1df/0x980 drivers/net/tun.c:1485
  tun_get_user+0x4ee0/0x6b40 drivers/net/tun.c:1938
  tun_chr_write_iter+0x3e9/0x5c0 drivers/net/tun.c:1984
  new_sync_write fs/read_write.c:593 [inline]
  vfs_write+0xb4b/0x1580 fs/read_write.c:686
  ksys_write fs/read_write.c:738 [inline]
  __do_sys_write fs/read_write.c:749 [inline]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38441/">CVE-2025-38441 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38441">CVE-2025-38441 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247167">SUSE bug 1247167</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38443</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38443" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38443" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38443" ref_url="https://www.suse.com/security/cve/CVE-2025-38443" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nbd: fix uaf in nbd_genl_connect() error path

There is a use-after-free issue in nbd:

block nbd6: Receive control failed (result -104)
block nbd6: shutting down sockets
==================================================================
BUG: KASAN: slab-use-after-free in recv_work+0x694/0xa80 drivers/block/nbd.c:1022
Write of size 4 at addr ffff8880295de478 by task kworker/u33:0/67

CPU: 2 UID: 0 PID: 67 Comm: kworker/u33:0 Not tainted 6.15.0-rc5-syzkaller-00123-g2c89c1b655c0 #0 PREEMPT(full)
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
Workqueue: nbd6-recv recv_work
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:94 [inline]
 dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:120
 print_address_description mm/kasan/report.c:408 [inline]
 print_report+0xc3/0x670 mm/kasan/report.c:521
 kasan_report+0xe0/0x110 mm/kasan/report.c:634
 check_region_inline mm/kasan/generic.c:183 [inline]
 kasan_check_range+0xef/0x1a0 mm/kasan/generic.c:189
 instrument_atomic_read_write include/linux/instrumented.h:96 [inline]
 atomic_dec include/linux/atomic/atomic-instrumented.h:592 [inline]
 recv_work+0x694/0xa80 drivers/block/nbd.c:1022
 process_one_work+0x9cc/0x1b70 kernel/workqueue.c:3238
 process_scheduled_works kernel/workqueue.c:3319 [inline]
 worker_thread+0x6c8/0xf10 kernel/workqueue.c:3400
 kthread+0x3c2/0x780 kernel/kthread.c:464
 ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:153
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
 &lt;/TASK&gt;

nbd_genl_connect() does not properly stop the device on certain
error paths after nbd_start_device() has been called. This causes
the error path to put nbd-&gt;config while recv_work continue to use
the config after putting it, leading to use-after-free in recv_work.

This patch moves nbd_start_device() after the backend file creation.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38443/">CVE-2025-38443 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38443">CVE-2025-38443 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247164">SUSE bug 1247164</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538444" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38444</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38444" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38444" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38444" ref_url="https://www.suse.com/security/cve/CVE-2025-38444" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

raid10: cleanup memleak at raid10_make_request

If raid10_read_request or raid10_write_request registers a new
request and the REQ_NOWAIT flag is set, the code does not
free the malloc from the mempool.

unreferenced object 0xffff8884802c3200 (size 192):
   comm "fio", pid 9197, jiffies 4298078271
   hex dump (first 32 bytes):
     00 00 00 00 00 00 00 00 88 41 02 00 00 00 00 00  .........A......
     08 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
   backtrace (crc c1a049a2):
     __kmalloc+0x2bb/0x450
     mempool_alloc+0x11b/0x320
     raid10_make_request+0x19e/0x650 [raid10]
     md_handle_request+0x3b3/0x9e0
     __submit_bio+0x394/0x560
     __submit_bio_noacct+0x145/0x530
     submit_bio_noacct_nocheck+0x682/0x830
     __blkdev_direct_IO_async+0x4dc/0x6b0
     blkdev_read_iter+0x1e5/0x3b0
     __io_read+0x230/0x1110
     io_read+0x13/0x30
     io_issue_sqe+0x134/0x1180
     io_submit_sqes+0x48c/0xe90
     __do_sys_io_uring_enter+0x574/0x8b0
     do_syscall_64+0x5c/0xe0
     entry_SYSCALL_64_after_hwframe+0x76/0x7e

V4: changing backing tree to see if CKI tests will pass.
The patch code has not changed between any versions.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38444/">CVE-2025-38444 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38444">CVE-2025-38444 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247162">SUSE bug 1247162</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538445" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38445</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38445" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38445" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38445" ref_url="https://www.suse.com/security/cve/CVE-2025-38445" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

md/raid1: Fix stack memory use after return in raid1_reshape

In the raid1_reshape function, newpool is
allocated on the stack and assigned to conf-&gt;r1bio_pool.
This results in conf-&gt;r1bio_pool.wait.head pointing
to a stack address.
Accessing this address later can lead to a kernel panic.

Example access path:

raid1_reshape()
{
	// newpool is on the stack
	mempool_t newpool, oldpool;
	// initialize newpool.wait.head to stack address
	mempool_init(&amp;newpool, ...);
	conf-&gt;r1bio_pool = newpool;
}

raid1_read_request() or raid1_write_request()
{
	alloc_r1bio()
	{
		mempool_alloc()
		{
			// if pool-&gt;alloc fails
			remove_element()
			{
				--pool-&gt;curr_nr;
			}
		}
	}
}

mempool_free()
{
	if (pool-&gt;curr_nr &lt; pool-&gt;min_nr) {
		// pool-&gt;wait.head is a stack address
		// wake_up() will try to access this invalid address
		// which leads to a kernel panic
		return;
		wake_up(&amp;pool-&gt;wait);
	}
}

Fix:
reinit conf-&gt;r1bio_pool.wait after assigning newpool.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38445/">CVE-2025-38445 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38445">CVE-2025-38445 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247229">SUSE bug 1247229</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538446" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38446</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38446" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38446" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38446" ref_url="https://www.suse.com/security/cve/CVE-2025-38446" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

clk: imx: Fix an out-of-bounds access in dispmix_csr_clk_dev_data

When num_parents is 4, __clk_register() occurs an out-of-bounds
when accessing parent_names member. Use ARRAY_SIZE() instead of
hardcode number here.

 BUG: KASAN: global-out-of-bounds in __clk_register+0x1844/0x20d8
 Read of size 8 at addr ffff800086988e78 by task kworker/u24:3/59
  Hardware name: NXP i.MX95 19X19 board (DT)
  Workqueue: events_unbound deferred_probe_work_func
  Call trace:
    dump_backtrace+0x94/0xec
    show_stack+0x18/0x24
    dump_stack_lvl+0x8c/0xcc
    print_report+0x398/0x5fc
    kasan_report+0xd4/0x114
    __asan_report_load8_noabort+0x20/0x2c
    __clk_register+0x1844/0x20d8
    clk_hw_register+0x44/0x110
    __clk_hw_register_mux+0x284/0x3a8
    imx95_bc_probe+0x4f4/0xa70
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38446/">CVE-2025-38446 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38446">CVE-2025-38446 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247231">SUSE bug 1247231</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538448" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38448</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38448" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38448" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38448" ref_url="https://www.suse.com/security/cve/CVE-2025-38448" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: gadget: u_serial: Fix race condition in TTY wakeup

A race condition occurs when gs_start_io() calls either gs_start_rx() or
gs_start_tx(), as those functions briefly drop the port_lock for
usb_ep_queue(). This allows gs_close() and gserial_disconnect() to clear
port.tty and port_usb, respectively.

Use the null-safe TTY Port helper function to wake up TTY.

Example
  CPU1:			      CPU2:
  gserial_connect() // lock
  			      gs_close() // await lock
  gs_start_rx()     // unlock
  usb_ep_queue()
  			      gs_close() // lock, reset port.tty and unlock
  gs_start_rx()     // lock
  tty_wakeup()      // NPE
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="4.1/CVSS:4.0/AV:P/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38448/">CVE-2025-38448 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38448">CVE-2025-38448 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247233">SUSE bug 1247233</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538449" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38449</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38449" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38449" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38449" ref_url="https://www.suse.com/security/cve/CVE-2025-38449" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:15661" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001995.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:15785" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/gem: Acquire references on GEM handles for framebuffers

A GEM handle can be released while the GEM buffer object is attached
to a DRM framebuffer. This leads to the release of the dma-buf backing
the buffer object, if any. [1] Trying to use the framebuffer in further
mode-setting operations leads to a segmentation fault. Most easily
happens with driver that use shadow planes for vmap-ing the dma-buf
during a page flip. An example is shown below.

[  156.791968] ------------[ cut here ]------------
[  156.796830] WARNING: CPU: 2 PID: 2255 at drivers/dma-buf/dma-buf.c:1527 dma_buf_vmap+0x224/0x430
[...]
[  156.942028] RIP: 0010:dma_buf_vmap+0x224/0x430
[  157.043420] Call Trace:
[  157.045898]  &lt;TASK&gt;
[  157.048030]  ? show_trace_log_lvl+0x1af/0x2c0
[  157.052436]  ? show_trace_log_lvl+0x1af/0x2c0
[  157.056836]  ? show_trace_log_lvl+0x1af/0x2c0
[  157.061253]  ? drm_gem_shmem_vmap+0x74/0x710
[  157.065567]  ? dma_buf_vmap+0x224/0x430
[  157.069446]  ? __warn.cold+0x58/0xe4
[  157.073061]  ? dma_buf_vmap+0x224/0x430
[  157.077111]  ? report_bug+0x1dd/0x390
[  157.080842]  ? handle_bug+0x5e/0xa0
[  157.084389]  ? exc_invalid_op+0x14/0x50
[  157.088291]  ? asm_exc_invalid_op+0x16/0x20
[  157.092548]  ? dma_buf_vmap+0x224/0x430
[  157.096663]  ? dma_resv_get_singleton+0x6d/0x230
[  157.101341]  ? __pfx_dma_buf_vmap+0x10/0x10
[  157.105588]  ? __pfx_dma_resv_get_singleton+0x10/0x10
[  157.110697]  drm_gem_shmem_vmap+0x74/0x710
[  157.114866]  drm_gem_vmap+0xa9/0x1b0
[  157.118763]  drm_gem_vmap_unlocked+0x46/0xa0
[  157.123086]  drm_gem_fb_vmap+0xab/0x300
[  157.126979]  drm_atomic_helper_prepare_planes.part.0+0x487/0xb10
[  157.133032]  ? lockdep_init_map_type+0x19d/0x880
[  157.137701]  drm_atomic_helper_commit+0x13d/0x2e0
[  157.142671]  ? drm_atomic_nonblocking_commit+0xa0/0x180
[  157.147988]  drm_mode_atomic_ioctl+0x766/0xe40
[...]
[  157.346424] ---[ end trace 0000000000000000 ]---

Acquiring GEM handles for the framebuffer's GEM buffer objects prevents
this from happening. The framebuffer's cleanup later puts the handle
references.

Commit 1a148af06000 ("drm/gem-shmem: Use dma_buf from GEM object
instance") triggers the segmentation fault easily by using the dma-buf
field more widely. The underlying issue with reference counting has
been present before.

v2:
- acquire the handle instead of the BO (Christian)
- fix comment style (Christian)
- drop the Fixes tag (Christian)
- rename err_ gotos
- add missing Link tag
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38449/">CVE-2025-38449 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38449">CVE-2025-38449 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247255">SUSE bug 1247255</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247258">SUSE bug 1247258</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38450</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38450" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38450" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38450" ref_url="https://www.suse.com/security/cve/CVE-2025-38450" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mt76: mt7925: prevent NULL pointer dereference in mt7925_sta_set_decap_offload()

Add a NULL check for msta-&gt;vif before accessing its members to prevent
a kernel panic in AP mode deployment. This also fix the issue reported
in [1].

The crash occurs when this function is triggered before the station is
fully initialized. The call trace shows a page fault at
mt7925_sta_set_decap_offload() due to accessing resources when msta-&gt;vif
is NULL.

Fix this by adding an early return if msta-&gt;vif is NULL and also check
wcid.sta is ready. This ensures we only proceed with decap offload
configuration when the station's state is properly initialized.

[14739.655703] Unable to handle kernel paging request at virtual address ffffffffffffffa0
[14739.811820] CPU: 0 UID: 0 PID: 895854 Comm: hostapd Tainted: G
[14739.821394] Tainted: [C]=CRAP, [O]=OOT_MODULE
[14739.825746] Hardware name: Raspberry Pi 4 Model B Rev 1.1 (DT)
[14739.831577] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[14739.838538] pc : mt7925_sta_set_decap_offload+0xc0/0x1b8 [mt7925_common]
[14739.845271] lr : mt7925_sta_set_decap_offload+0x58/0x1b8 [mt7925_common]
[14739.851985] sp : ffffffc085efb500
[14739.855295] x29: ffffffc085efb500 x28: 0000000000000000 x27: ffffff807803a158
[14739.862436] x26: ffffff8041ececb8 x25: 0000000000000001 x24: 0000000000000001
[14739.869577] x23: 0000000000000001 x22: 0000000000000008 x21: ffffff8041ecea88
[14739.876715] x20: ffffff8041c19ca0 x19: ffffff8078031fe0 x18: 0000000000000000
[14739.883853] x17: 0000000000000000 x16: ffffffe2aeac1110 x15: 000000559da48080
[14739.890991] x14: 0000000000000001 x13: 0000000000000000 x12: 0000000000000000
[14739.898130] x11: 0a10020001008e88 x10: 0000000000001a50 x9 : ffffffe26457bfa0
[14739.905269] x8 : ffffff8042013bb0 x7 : ffffff807fb6cbf8 x6 : dead000000000100
[14739.912407] x5 : dead000000000122 x4 : ffffff80780326c8 x3 : 0000000000000000
[14739.919546] x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffffff8041ececb8
[14739.926686] Call trace:
[14739.929130]  mt7925_sta_set_decap_offload+0xc0/0x1b8 [mt7925_common]
[14739.935505]  ieee80211_check_fast_rx+0x19c/0x510 [mac80211]
[14739.941344]  _sta_info_move_state+0xe4/0x510 [mac80211]
[14739.946860]  sta_info_move_state+0x1c/0x30 [mac80211]
[14739.952116]  sta_apply_auth_flags.constprop.0+0x90/0x1b0 [mac80211]
[14739.958708]  sta_apply_parameters+0x234/0x5e0 [mac80211]
[14739.964332]  ieee80211_add_station+0xdc/0x190 [mac80211]
[14739.969950]  nl80211_new_station+0x46c/0x670 [cfg80211]
[14739.975516]  genl_family_rcv_msg_doit+0xdc/0x150
[14739.980158]  genl_rcv_msg+0x218/0x298
[14739.983830]  netlink_rcv_skb+0x64/0x138
[14739.987670]  genl_rcv+0x40/0x60
[14739.990816]  netlink_unicast+0x314/0x380
[14739.994742]  netlink_sendmsg+0x198/0x3f0
[14739.998664]  __sock_sendmsg+0x64/0xc0
[14740.002324]  ____sys_sendmsg+0x260/0x298
[14740.006242]  ___sys_sendmsg+0xb4/0x110
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38450/">CVE-2025-38450 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38450">CVE-2025-38450 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247376">SUSE bug 1247376</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538451" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38451</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38451" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38451" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38451" ref_url="https://www.suse.com/security/cve/CVE-2025-38451" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

md/md-bitmap: fix GPF in bitmap_get_stats()

The commit message of commit 6ec1f0239485 ("md/md-bitmap: fix stats
collection for external bitmaps") states:

    Remove the external bitmap check as the statistics should be
    available regardless of bitmap storage location.

    Return -EINVAL only for invalid bitmap with no storage (neither in
    superblock nor in external file).

But, the code does not adhere to the above, as it does only check for
a valid super-block for "internal" bitmaps. Hence, we observe:

Oops: GPF, probably for non-canonical address 0x1cd66f1f40000028
RIP: 0010:bitmap_get_stats+0x45/0xd0
Call Trace:

 seq_read_iter+0x2b9/0x46a
 seq_read+0x12f/0x180
 proc_reg_read+0x57/0xb0
 vfs_read+0xf6/0x380
 ksys_read+0x6d/0xf0
 do_syscall_64+0x8c/0x1b0
 entry_SYSCALL_64_after_hwframe+0x76/0x7e

We fix this by checking the existence of a super-block for both the
internal and external case.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38451/">CVE-2025-38451 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38451">CVE-2025-38451 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247102">SUSE bug 1247102</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538453" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38453</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38453" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38453" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38453" ref_url="https://www.suse.com/security/cve/CVE-2025-38453" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

io_uring/msg_ring: ensure io_kiocb freeing is deferred for RCU

syzbot reports that defer/local task_work adding via msg_ring can hit
a request that has been freed:

CPU: 1 UID: 0 PID: 19356 Comm: iou-wrk-19354 Not tainted 6.16.0-rc4-syzkaller-00108-g17bbde2e1716 #0 PREEMPT(full)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120
 print_address_description mm/kasan/report.c:408 [inline]
 print_report+0xd2/0x2b0 mm/kasan/report.c:521
 kasan_report+0x118/0x150 mm/kasan/report.c:634
 io_req_local_work_add io_uring/io_uring.c:1184 [inline]
 __io_req_task_work_add+0x589/0x950 io_uring/io_uring.c:1252
 io_msg_remote_post io_uring/msg_ring.c:103 [inline]
 io_msg_data_remote io_uring/msg_ring.c:133 [inline]
 __io_msg_ring_data+0x820/0xaa0 io_uring/msg_ring.c:151
 io_msg_ring_data io_uring/msg_ring.c:173 [inline]
 io_msg_ring+0x134/0xa00 io_uring/msg_ring.c:314
 __io_issue_sqe+0x17e/0x4b0 io_uring/io_uring.c:1739
 io_issue_sqe+0x165/0xfd0 io_uring/io_uring.c:1762
 io_wq_submit_work+0x6e9/0xb90 io_uring/io_uring.c:1874
 io_worker_handle_work+0x7cd/0x1180 io_uring/io-wq.c:642
 io_wq_worker+0x42f/0xeb0 io_uring/io-wq.c:696
 ret_from_fork+0x3fc/0x770 arch/x86/kernel/process.c:148
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
 &lt;/TASK&gt;

which is supposed to be safe with how requests are allocated. But msg
ring requests alloc and free on their own, and hence must defer freeing
to a sane time.

Add an rcu_head and use kfree_rcu() in both spots where requests are
freed. Only the one in io_msg_tw_complete() is strictly required as it
has been visible on the other ring, but use it consistently in the other
spot as well.

This should not cause any other issues outside of KASAN rightfully
complaining about it.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38453/">CVE-2025-38453 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38453">CVE-2025-38453 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247234">SUSE bug 1247234</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247737">SUSE bug 1247737</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538454" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38454</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38454" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38454" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38454" ref_url="https://www.suse.com/security/cve/CVE-2025-38454" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: ad1816a: Fix potential NULL pointer deref in snd_card_ad1816a_pnp()

Use pr_warn() instead of dev_warn() when 'pdev' is NULL to avoid a
potential NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38454/">CVE-2025-38454 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38454">CVE-2025-38454 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247426">SUSE bug 1247426</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538455" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38455</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38455" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38455" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38455" ref_url="https://www.suse.com/security/cve/CVE-2025-38455" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: SVM: Reject SEV{-ES} intra host migration if vCPU creation is in-flight

Reject migration of SEV{-ES} state if either the source or destination VM
is actively creating a vCPU, i.e. if kvm_vm_ioctl_create_vcpu() is in the
section between incrementing created_vcpus and online_vcpus.  The bulk of
vCPU creation runs _outside_ of kvm-&gt;lock to allow creating multiple vCPUs
in parallel, and so sev_info.es_active can get toggled from false=&gt;true in
the destination VM after (or during) svm_vcpu_create(), resulting in an
SEV{-ES} VM effectively having a non-SEV{-ES} vCPU.

The issue manifests most visibly as a crash when trying to free a vCPU's
NULL VMSA page in an SEV-ES VM, but any number of things can go wrong.

  BUG: unable to handle page fault for address: ffffebde00000000
  #PF: supervisor read access in kernel mode
  #PF: error_code(0x0000) - not-present page
  PGD 0 P4D 0
  Oops: Oops: 0000 [#1] SMP KASAN NOPTI
  CPU: 227 UID: 0 PID: 64063 Comm: syz.5.60023 Tainted: G     U     O        6.15.0-smp-DEV #2 NONE
  Tainted: [U]=USER, [O]=OOT_MODULE
  Hardware name: Google, Inc. Arcadia_IT_80/Arcadia_IT_80, BIOS 12.52.0-0 10/28/2024
  RIP: 0010:constant_test_bit arch/x86/include/asm/bitops.h:206 [inline]
  RIP: 0010:arch_test_bit arch/x86/include/asm/bitops.h:238 [inline]
  RIP: 0010:_test_bit include/asm-generic/bitops/instrumented-non-atomic.h:142 [inline]
  RIP: 0010:PageHead include/linux/page-flags.h:866 [inline]
  RIP: 0010:___free_pages+0x3e/0x120 mm/page_alloc.c:5067
  Code: &lt;49&gt; f7 06 40 00 00 00 75 05 45 31 ff eb 0c 66 90 4c 89 f0 4c 39 f0
  RSP: 0018:ffff8984551978d0 EFLAGS: 00010246
  RAX: 0000777f80000001 RBX: 0000000000000000 RCX: ffffffff918aeb98
  RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffffebde00000000
  RBP: 0000000000000000 R08: ffffebde00000007 R09: 1ffffd7bc0000000
  R10: dffffc0000000000 R11: fffff97bc0000001 R12: dffffc0000000000
  R13: ffff8983e19751a8 R14: ffffebde00000000 R15: 1ffffd7bc0000000
  FS:  0000000000000000(0000) GS:ffff89ee661d3000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: ffffebde00000000 CR3: 000000793ceaa000 CR4: 0000000000350ef0
  DR0: 0000000000000000 DR1: 0000000000000b5f DR2: 0000000000000000
  DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000400
  Call Trace:
   &lt;TASK&gt;
   sev_free_vcpu+0x413/0x630 arch/x86/kvm/svm/sev.c:3169
   svm_vcpu_free+0x13a/0x2a0 arch/x86/kvm/svm/svm.c:1515
   kvm_arch_vcpu_destroy+0x6a/0x1d0 arch/x86/kvm/x86.c:12396
   kvm_vcpu_destroy virt/kvm/kvm_main.c:470 [inline]
   kvm_destroy_vcpus+0xd1/0x300 virt/kvm/kvm_main.c:490
   kvm_arch_destroy_vm+0x636/0x820 arch/x86/kvm/x86.c:12895
   kvm_put_kvm+0xb8e/0xfb0 virt/kvm/kvm_main.c:1310
   kvm_vm_release+0x48/0x60 virt/kvm/kvm_main.c:1369
   __fput+0x3e4/0x9e0 fs/file_table.c:465
   task_work_run+0x1a9/0x220 kernel/task_work.c:227
   exit_task_work include/linux/task_work.h:40 [inline]
   do_exit+0x7f0/0x25b0 kernel/exit.c:953
   do_group_exit+0x203/0x2d0 kernel/exit.c:1102
   get_signal+0x1357/0x1480 kernel/signal.c:3034
   arch_do_signal_or_restart+0x40/0x690 arch/x86/kernel/signal.c:337
   exit_to_user_mode_loop kernel/entry/common.c:111 [inline]
   exit_to_user_mode_prepare include/linux/entry-common.h:329 [inline]
   __syscall_exit_to_user_mode_work kernel/entry/common.c:207 [inline]
   syscall_exit_to_user_mode+0x67/0xb0 kernel/entry/common.c:218
   do_syscall_64+0x7c/0x150 arch/x86/entry/syscall_64.c:100
   entry_SYSCALL_64_after_hwframe+0x76/0x7e
  RIP: 0033:0x7f87a898e969
   &lt;/TASK&gt;
  Modules linked in: gq(O)
  gsmi: Log Shutdown Reason 0x03
  CR2: ffffebde00000000
  ---[ end trace 0000000000000000 ]---

Deliberately don't check for a NULL VMSA when freeing the vCPU, as crashing
the host is likely desirable due to the VMSA being consumed by hardware.
E.g. if KVM manages to allow VMRUN on the vCPU, hardware may read/write a
bogus VMSA page.  Accessing P
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38455/">CVE-2025-38455 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38455">CVE-2025-38455 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247101">SUSE bug 1247101</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38456</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38456" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38456" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38456" ref_url="https://www.suse.com/security/cve/CVE-2025-38456" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipmi:msghandler: Fix potential memory corruption in ipmi_create_user()

The "intf" list iterator is an invalid pointer if the correct
"intf-&gt;intf_num" is not found.  Calling atomic_dec(&amp;intf-&gt;nr_users) on
and invalid pointer will lead to memory corruption.

We don't really need to call atomic_dec() if we haven't called
atomic_add_return() so update the if (intf-&gt;in_shutdown) path as well.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38456/">CVE-2025-38456 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38456">CVE-2025-38456 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247099">SUSE bug 1247099</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538457" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38457</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38457" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38457" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38457" ref_url="https://www.suse.com/security/cve/CVE-2025-38457" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: Abort __tc_modify_qdisc if parent class does not exist

Lion's patch [1] revealed an ancient bug in the qdisc API.
Whenever a user creates/modifies a qdisc specifying as a parent another
qdisc, the qdisc API will, during grafting, detect that the user is
not trying to attach to a class and reject. However grafting is
performed after qdisc_create (and thus the qdiscs' init callback) is
executed. In qdiscs that eventually call qdisc_tree_reduce_backlog
during init or change (such as fq, hhf, choke, etc), an issue
arises. For example, executing the following commands:

sudo tc qdisc add dev lo root handle a: htb default 2
sudo tc qdisc add dev lo parent a: handle beef fq

Qdiscs such as fq, hhf, choke, etc unconditionally invoke
qdisc_tree_reduce_backlog() in their control path init() or change() which
then causes a failure to find the child class; however, that does not stop
the unconditional invocation of the assumed child qdisc's qlen_notify with
a null class. All these qdiscs make the assumption that class is non-null.

The solution is ensure that qdisc_leaf() which looks up the parent
class, and is invoked prior to qdisc_create(), should return failure on
not finding the class.
In this patch, we leverage qdisc_leaf to return ERR_PTRs whenever the
parentid doesn't correspond to a class, so that we can detect it
earlier on and abort before qdisc_create is called.

[1] https://lore.kernel.org/netdev/d912cbd7-193b-4269-9857-525bee8bbb6a@gmail.com/
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38457/">CVE-2025-38457 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38457">CVE-2025-38457 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247098">SUSE bug 1247098</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38458</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38458" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38458" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38458" ref_url="https://www.suse.com/security/cve/CVE-2025-38458" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

atm: clip: Fix NULL pointer dereference in vcc_sendmsg()

atmarpd_dev_ops does not implement the send method, which may cause crash
as bellow.

BUG: kernel NULL pointer dereference, address: 0000000000000000
PGD 0 P4D 0
Oops: Oops: 0010 [#1] SMP KASAN NOPTI
CPU: 0 UID: 0 PID: 5324 Comm: syz.0.0 Not tainted 6.15.0-rc6-syzkaller-00346-g5723cc3450bc #0 PREEMPT(full)
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
RIP: 0010:0x0
Code: Unable to access opcode bytes at 0xffffffffffffffd6.
RSP: 0018:ffffc9000d3cf778 EFLAGS: 00010246
RAX: 1ffffffff1910dd1 RBX: 00000000000000c0 RCX: dffffc0000000000
RDX: ffffc9000dc82000 RSI: ffff88803e4c4640 RDI: ffff888052cd0000
RBP: ffffc9000d3cf8d0 R08: ffff888052c9143f R09: 1ffff1100a592287
R10: dffffc0000000000 R11: 0000000000000000 R12: 1ffff92001a79f00
R13: ffff888052cd0000 R14: ffff88803e4c4640 R15: ffffffff8c886e88
FS:  00007fbc762566c0(0000) GS:ffff88808d6c2000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffffffffffffd6 CR3: 0000000041f1b000 CR4: 0000000000352ef0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
 vcc_sendmsg+0xa10/0xc50 net/atm/common.c:644
 sock_sendmsg_nosec net/socket.c:712 [inline]
 __sock_sendmsg+0x219/0x270 net/socket.c:727
 ____sys_sendmsg+0x52d/0x830 net/socket.c:2566
 ___sys_sendmsg+0x21f/0x2a0 net/socket.c:2620
 __sys_sendmmsg+0x227/0x430 net/socket.c:2709
 __do_sys_sendmmsg net/socket.c:2736 [inline]
 __se_sys_sendmmsg net/socket.c:2733 [inline]
 __x64_sys_sendmmsg+0xa0/0xc0 net/socket.c:2733
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xf6/0x210 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38458/">CVE-2025-38458 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38458">CVE-2025-38458 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247116">SUSE bug 1247116</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38459</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38459" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38459" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38459" ref_url="https://www.suse.com/security/cve/CVE-2025-38459" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1662" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002457.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2212" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003185.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3685" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

atm: clip: Fix infinite recursive call of clip_push().

syzbot reported the splat below. [0]

This happens if we call ioctl(ATMARP_MKIP) more than once.

During the first call, clip_mkip() sets clip_push() to vcc-&gt;push(),
and the second call copies it to clip_vcc-&gt;old_push().

Later, when the socket is close()d, vcc_destroy_socket() passes
NULL skb to clip_push(), which calls clip_vcc-&gt;old_push(),
triggering the infinite recursion.

Let's prevent the second ioctl(ATMARP_MKIP) by checking
vcc-&gt;user_back, which is allocated by the first call as clip_vcc.

Note also that we use lock_sock() to prevent racy calls.

[0]:
BUG: TASK stack guard page was hit at ffffc9000d66fff8 (stack is ffffc9000d670000..ffffc9000d678000)
Oops: stack guard page: 0000 [#1] SMP KASAN NOPTI
CPU: 0 UID: 0 PID: 5322 Comm: syz.0.0 Not tainted 6.16.0-rc4-syzkaller #0 PREEMPT(full)
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
RIP: 0010:clip_push+0x5/0x720 net/atm/clip.c:191
Code: e0 8f aa 8c e8 1c ad 5b fa eb ae 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 55 &lt;41&gt; 57 41 56 41 55 41 54 53 48 83 ec 20 48 89 f3 49 89 fd 48 bd 00
RSP: 0018:ffffc9000d670000 EFLAGS: 00010246
RAX: 1ffff1100235a4a5 RBX: ffff888011ad2508 RCX: ffff8880003c0000
RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff888037f01000
RBP: dffffc0000000000 R08: ffffffff8fa104f7 R09: 1ffffffff1f4209e
R10: dffffc0000000000 R11: ffffffff8a99b300 R12: ffffffff8a99b300
R13: ffff888037f01000 R14: ffff888011ad2500 R15: ffff888037f01578
FS:  000055557ab6d500(0000) GS:ffff88808d250000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffc9000d66fff8 CR3: 0000000043172000 CR4: 0000000000352ef0
Call Trace:
 &lt;TASK&gt;
 clip_push+0x6dc/0x720 net/atm/clip.c:200
 clip_push+0x6dc/0x720 net/atm/clip.c:200
 clip_push+0x6dc/0x720 net/atm/clip.c:200
...
 clip_push+0x6dc/0x720 net/atm/clip.c:200
 clip_push+0x6dc/0x720 net/atm/clip.c:200
 clip_push+0x6dc/0x720 net/atm/clip.c:200
 vcc_destroy_socket net/atm/common.c:183 [inline]
 vcc_release+0x157/0x460 net/atm/common.c:205
 __sock_release net/socket.c:647 [inline]
 sock_close+0xc0/0x240 net/socket.c:1391
 __fput+0x449/0xa70 fs/file_table.c:465
 task_work_run+0x1d1/0x260 kernel/task_work.c:227
 resume_user_mode_work include/linux/resume_user_mode.h:50 [inline]
 exit_to_user_mode_loop+0xec/0x110 kernel/entry/common.c:114
 exit_to_user_mode_prepare include/linux/entry-common.h:330 [inline]
 syscall_exit_to_user_mode_work include/linux/entry-common.h:414 [inline]
 syscall_exit_to_user_mode include/linux/entry-common.h:449 [inline]
 do_syscall_64+0x2bd/0x3b0 arch/x86/entry/syscall_64.c:100
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7ff31c98e929
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007fffb5aa1f78 EFLAGS: 00000246 ORIG_RAX: 00000000000001b4
RAX: 0000000000000000 RBX: 0000000000012747 RCX: 00007ff31c98e929
RDX: 0000000000000000 RSI: 000000000000001e RDI: 0000000000000003
RBP: 00007ff31cbb7ba0 R08: 0000000000000001 R09: 0000000db5aa226f
R10: 00007ff31c7ff030 R11: 0000000000000246 R12: 00007ff31cbb608c
R13: 00007ff31cbb6080 R14: ffffffffffffffff R15: 00007fffb5aa2090
 &lt;/TASK&gt;
Modules linked in:
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38459/">CVE-2025-38459 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38459">CVE-2025-38459 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247119">SUSE bug 1247119</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538460" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38460</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38460" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38460" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38460" ref_url="https://www.suse.com/security/cve/CVE-2025-38460" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03283-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03310-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03314-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

atm: clip: Fix potential null-ptr-deref in to_atmarpd().

atmarpd is protected by RTNL since commit f3a0592b37b8 ("[ATM]: clip
causes unregister hang").

However, it is not enough because to_atmarpd() is called without RTNL,
especially clip_neigh_solicit() / neigh_ops-&gt;solicit() is unsleepable.

Also, there is no RTNL dependency around atmarpd.

Let's use a private mutex and RCU to protect access to atmarpd in
to_atmarpd().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38460/">CVE-2025-38460 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38460">CVE-2025-38460 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247143">SUSE bug 1247143</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538461" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38461</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38461" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38461" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38461" ref_url="https://www.suse.com/security/cve/CVE-2025-38461" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:15011" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001976.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16372" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vsock: Fix transport_* TOCTOU

Transport assignment may race with module unload. Protect new_transport
from becoming a stale pointer.

This also takes care of an insecure call in vsock_use_local_transport();
add a lockdep assert.

BUG: unable to handle page fault for address: fffffbfff8056000
Oops: Oops: 0000 [#1] SMP KASAN
RIP: 0010:vsock_assign_transport+0x366/0x600
Call Trace:
 vsock_connect+0x59c/0xc40
 __sys_connect+0xe8/0x100
 __x64_sys_connect+0x6e/0xc0
 do_syscall_64+0x92/0x1c0
 entry_SYSCALL_64_after_hwframe+0x4b/0x53
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38461/">CVE-2025-38461 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38461">CVE-2025-38461 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247103">SUSE bug 1247103</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538462" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38462</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38462" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38462" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38462" ref_url="https://www.suse.com/security/cve/CVE-2025-38462" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vsock: Fix transport_{g2h,h2g} TOCTOU

vsock_find_cid() and vsock_dev_do_ioctl() may race with module unload.
transport_{g2h,h2g} may become NULL after the NULL check.

Introduce vsock_transport_local_cid() to protect from a potential
null-ptr-deref.

KASAN: null-ptr-deref in range [0x0000000000000118-0x000000000000011f]
RIP: 0010:vsock_find_cid+0x47/0x90
Call Trace:
 __vsock_bind+0x4b2/0x720
 vsock_bind+0x90/0xe0
 __sys_bind+0x14d/0x1e0
 __x64_sys_bind+0x6e/0xc0
 do_syscall_64+0x92/0x1c0
 entry_SYSCALL_64_after_hwframe+0x4b/0x53

KASAN: null-ptr-deref in range [0x0000000000000118-0x000000000000011f]
RIP: 0010:vsock_dev_do_ioctl.isra.0+0x58/0xf0
Call Trace:
 __x64_sys_ioctl+0x12d/0x190
 do_syscall_64+0x92/0x1c0
 entry_SYSCALL_64_after_hwframe+0x4b/0x53
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38462/">CVE-2025-38462 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38462">CVE-2025-38462 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247104">SUSE bug 1247104</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538463" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38463</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38463" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38463" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38463" ref_url="https://www.suse.com/security/cve/CVE-2025-38463" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tcp: Correct signedness in skb remaining space calculation

Syzkaller reported a bug [1] where sk-&gt;sk_forward_alloc can overflow.

When we send data, if an skb exists at the tail of the write queue, the
kernel will attempt to append the new data to that skb. However, the code
that checks for available space in the skb is flawed:
'''
copy = size_goal - skb-&gt;len
'''

The types of the variables involved are:
'''
copy: ssize_t (s64 on 64-bit systems)
size_goal: int
skb-&gt;len: unsigned int
'''

Due to C's type promotion rules, the signed size_goal is converted to an
unsigned int to match skb-&gt;len before the subtraction. The result is an
unsigned int.

When this unsigned int result is then assigned to the s64 copy variable,
it is zero-extended, preserving its non-negative value. Consequently, copy
is always &gt;= 0.

Assume we are sending 2GB of data and size_goal has been adjusted to a
value smaller than skb-&gt;len. The subtraction will result in copy holding a
very large positive integer. In the subsequent logic, this large value is
used to update sk-&gt;sk_forward_alloc, which can easily cause it to overflow.

The syzkaller reproducer uses TCP_REPAIR to reliably create this
condition. However, this can also occur in real-world scenarios. The
tcp_bound_to_half_wnd() function can also reduce size_goal to a small
value. This would cause the subsequent tcp_wmem_schedule() to set
sk-&gt;sk_forward_alloc to a value close to INT_MAX. Further memory
allocation requests would then cause sk_forward_alloc to wrap around and
become negative.

[1]: https://syzkaller.appspot.com/bug?extid=de6565462ab540f50e47
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38463/">CVE-2025-38463 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38463">CVE-2025-38463 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247113">SUSE bug 1247113</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538464" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38464</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38464" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38464" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38464" ref_url="https://www.suse.com/security/cve/CVE-2025-38464" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:15008" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001974.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:15011" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tipc: Fix use-after-free in tipc_conn_close().

syzbot reported a null-ptr-deref in tipc_conn_close() during netns
dismantle. [0]

tipc_topsrv_stop() iterates tipc_net(net)-&gt;topsrv-&gt;conn_idr and calls
tipc_conn_close() for each tipc_conn.

The problem is that tipc_conn_close() is called after releasing the
IDR lock.

At the same time, there might be tipc_conn_recv_work() running and it
could call tipc_conn_close() for the same tipc_conn and release its
last -&gt;kref.

Once we release the IDR lock in tipc_topsrv_stop(), there is no
guarantee that the tipc_conn is alive.

Let's hold the ref before releasing the lock and put the ref after
tipc_conn_close() in tipc_topsrv_stop().

[0]:
BUG: KASAN: use-after-free in tipc_conn_close+0x122/0x140 net/tipc/topsrv.c:165
Read of size 8 at addr ffff888099305a08 by task kworker/u4:3/435

CPU: 0 PID: 435 Comm: kworker/u4:3 Not tainted 4.19.204-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
Workqueue: netns cleanup_net
Call Trace:
 __dump_stack lib/dump_stack.c:77 [inline]
 dump_stack+0x1fc/0x2ef lib/dump_stack.c:118
 print_address_description.cold+0x54/0x219 mm/kasan/report.c:256
 kasan_report_error.cold+0x8a/0x1b9 mm/kasan/report.c:354
 kasan_report mm/kasan/report.c:412 [inline]
 __asan_report_load8_noabort+0x88/0x90 mm/kasan/report.c:433
 tipc_conn_close+0x122/0x140 net/tipc/topsrv.c:165
 tipc_topsrv_stop net/tipc/topsrv.c:701 [inline]
 tipc_topsrv_exit_net+0x27b/0x5c0 net/tipc/topsrv.c:722
 ops_exit_list+0xa5/0x150 net/core/net_namespace.c:153
 cleanup_net+0x3b4/0x8b0 net/core/net_namespace.c:553
 process_one_work+0x864/0x1570 kernel/workqueue.c:2153
 worker_thread+0x64c/0x1130 kernel/workqueue.c:2296
 kthread+0x33f/0x460 kernel/kthread.c:259
 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415

Allocated by task 23:
 kmem_cache_alloc_trace+0x12f/0x380 mm/slab.c:3625
 kmalloc include/linux/slab.h:515 [inline]
 kzalloc include/linux/slab.h:709 [inline]
 tipc_conn_alloc+0x43/0x4f0 net/tipc/topsrv.c:192
 tipc_topsrv_accept+0x1b5/0x280 net/tipc/topsrv.c:470
 process_one_work+0x864/0x1570 kernel/workqueue.c:2153
 worker_thread+0x64c/0x1130 kernel/workqueue.c:2296
 kthread+0x33f/0x460 kernel/kthread.c:259
 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415

Freed by task 23:
 __cache_free mm/slab.c:3503 [inline]
 kfree+0xcc/0x210 mm/slab.c:3822
 tipc_conn_kref_release net/tipc/topsrv.c:150 [inline]
 kref_put include/linux/kref.h:70 [inline]
 conn_put+0x2cd/0x3a0 net/tipc/topsrv.c:155
 process_one_work+0x864/0x1570 kernel/workqueue.c:2153
 worker_thread+0x64c/0x1130 kernel/workqueue.c:2296
 kthread+0x33f/0x460 kernel/kthread.c:259
 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:415

The buggy address belongs to the object at ffff888099305a00
 which belongs to the cache kmalloc-512 of size 512
The buggy address is located 8 bytes inside of
 512-byte region [ffff888099305a00, ffff888099305c00)
The buggy address belongs to the page:
page:ffffea000264c140 count:1 mapcount:0 mapping:ffff88813bff0940 index:0x0
flags: 0xfff00000000100(slab)
raw: 00fff00000000100 ffffea00028b6b88 ffffea0002cd2b08 ffff88813bff0940
raw: 0000000000000000 ffff888099305000 0000000100000006 0000000000000000
page dumped because: kasan: bad access detected

Memory state around the buggy address:
 ffff888099305900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
 ffff888099305980: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
&gt;ffff888099305a00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
                      ^
 ffff888099305a80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
 ffff888099305b00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38464/">CVE-2025-38464 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38464">CVE-2025-38464 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247112">SUSE bug 1247112</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538465" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38465</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38465" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38465" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38465" ref_url="https://www.suse.com/security/cve/CVE-2025-38465" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netlink: Fix wraparounds of sk-&gt;sk_rmem_alloc.

Netlink has this pattern in some places

  if (atomic_read(&amp;sk-&gt;sk_rmem_alloc) &gt; sk-&gt;sk_rcvbuf)
  	atomic_add(skb-&gt;truesize, &amp;sk-&gt;sk_rmem_alloc);

, which has the same problem fixed by commit 5a465a0da13e ("udp:
Fix multiple wraparounds of sk-&gt;sk_rmem_alloc.").

For example, if we set INT_MAX to SO_RCVBUFFORCE, the condition
is always false as the two operands are of int.

Then, a single socket can eat as many skb as possible until OOM
happens, and we can see multiple wraparounds of sk-&gt;sk_rmem_alloc.

Let's fix it by using atomic_add_return() and comparing the two
variables as unsigned int.

Before:
  [root@fedora ~]# ss -f netlink
  Recv-Q      Send-Q Local Address:Port                Peer Address:Port
  -1668710080 0               rtnl:nl_wraparound/293               *

After:
  [root@fedora ~]# ss -f netlink
  Recv-Q     Send-Q Local Address:Port                Peer Address:Port
  2147483072 0               rtnl:nl_wraparound/290               *
  ^
  `--- INT_MAX - 576
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38465/">CVE-2025-38465 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38465">CVE-2025-38465 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247118">SUSE bug 1247118</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538466" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38466</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38466" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38466" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38466" ref_url="https://www.suse.com/security/cve/CVE-2025-38466" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

perf: Revert to requiring CAP_SYS_ADMIN for uprobes

Jann reports that uprobes can be used destructively when used in the
middle of an instruction. The kernel only verifies there is a valid
instruction at the requested offset, but due to variable instruction
length cannot determine if this is an instruction as seen by the
intended execution stream.

Additionally, Mark Rutland notes that on architectures that mix data
in the text segment (like arm64), a similar things can be done if the
data word is 'mistaken' for an instruction.

As such, require CAP_SYS_ADMIN for uprobes.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2025-38466/">CVE-2025-38466 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38466">CVE-2025-38466 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247442">SUSE bug 1247442</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538467" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38467</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38467" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38467" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38467" ref_url="https://www.suse.com/security/cve/CVE-2025-38467" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/exynos: exynos7_drm_decon: add vblank check in IRQ handling

If there's support for another console device (such as a TTY serial),
the kernel occasionally panics during boot. The panic message and a
relevant snippet of the call stack is as follows:

  Unable to handle kernel NULL pointer dereference at virtual address 000000000000000
  Call trace:
    drm_crtc_handle_vblank+0x10/0x30 (P)
    decon_irq_handler+0x88/0xb4
    [...]

Otherwise, the panics don't happen. This indicates that it's some sort
of race condition.

Add a check to validate if the drm device can handle vblanks before
calling drm_crtc_handle_vblank() to avoid this.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38467/">CVE-2025-38467 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38467">CVE-2025-38467 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247146">SUSE bug 1247146</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538468" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38468</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38468" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38468" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38468" ref_url="https://www.suse.com/security/cve/CVE-2025-38468" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02849-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02851-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02852-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03310-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: Return NULL when htb_lookup_leaf encounters an empty rbtree

htb_lookup_leaf has a BUG_ON that can trigger with the following:

tc qdisc del dev lo root
tc qdisc add dev lo root handle 1: htb default 1
tc class add dev lo parent 1: classid 1:1 htb rate 64bit
tc qdisc add dev lo parent 1:1 handle 2: netem
tc qdisc add dev lo parent 2:1 handle 3: blackhole
ping -I lo -c1 -W0.001 127.0.0.1

The root cause is the following:

1. htb_dequeue calls htb_dequeue_tree which calls the dequeue handler on
   the selected leaf qdisc
2. netem_dequeue calls enqueue on the child qdisc
3. blackhole_enqueue drops the packet and returns a value that is not
   just NET_XMIT_SUCCESS
4. Because of this, netem_dequeue calls qdisc_tree_reduce_backlog, and
   since qlen is now 0, it calls htb_qlen_notify -&gt; htb_deactivate -&gt;
   htb_deactiviate_prios -&gt; htb_remove_class_from_row -&gt; htb_safe_rb_erase
5. As this is the only class in the selected hprio rbtree,
   __rb_change_child in __rb_erase_augmented sets the rb_root pointer to
   NULL
6. Because blackhole_dequeue returns NULL, netem_dequeue returns NULL,
   which causes htb_dequeue_tree to call htb_lookup_leaf with the same
   hprio rbtree, and fail the BUG_ON

The function graph for this scenario is shown here:
 0)               |  htb_enqueue() {
 0) + 13.635 us   |    netem_enqueue();
 0)   4.719 us    |    htb_activate_prios();
 0) # 2249.199 us |  }
 0)               |  htb_dequeue() {
 0)   2.355 us    |    htb_lookup_leaf();
 0)               |    netem_dequeue() {
 0) + 11.061 us   |      blackhole_enqueue();
 0)               |      qdisc_tree_reduce_backlog() {
 0)               |        qdisc_lookup_rcu() {
 0)   1.873 us    |          qdisc_match_from_root();
 0)   6.292 us    |        }
 0)   1.894 us    |        htb_search();
 0)               |        htb_qlen_notify() {
 0)   2.655 us    |          htb_deactivate_prios();
 0)   6.933 us    |        }
 0) + 25.227 us   |      }
 0)   1.983 us    |      blackhole_dequeue();
 0) + 86.553 us   |    }
 0) # 2932.761 us |    qdisc_warn_nonwc();
 0)               |    htb_lookup_leaf() {
 0)               |      BUG_ON();
 ------------------------------------------

The full original bug report can be seen here [1].

We can fix this just by returning NULL instead of the BUG_ON,
as htb_dequeue_tree returns NULL when htb_lookup_leaf returns
NULL.

[1] https://lore.kernel.org/netdev/pF5XOOIim0IuEfhI-SOxTgRvNoDwuux7UHKnE_Y5-zVd4wmGvNk2ceHjKb8ORnzw0cGwfmVu42g9dL7XyJLf1NEzaztboTWcm0Ogxuojoeo=@willsroot.io/
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38468/">CVE-2025-38468 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38468">CVE-2025-38468 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247437">SUSE bug 1247437</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538470" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38470</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38470" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38470" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38470" ref_url="https://www.suse.com/security/cve/CVE-2025-38470" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: vlan: fix VLAN 0 refcount imbalance of toggling filtering during runtime

Assuming the "rx-vlan-filter" feature is enabled on a net device, the
8021q module will automatically add or remove VLAN 0 when the net device
is put administratively up or down, respectively. There are a couple of
problems with the above scheme.

The first problem is a memory leak that can happen if the "rx-vlan-filter"
feature is disabled while the device is running:

 # ip link add bond1 up type bond mode 0
 # ethtool -K bond1 rx-vlan-filter off
 # ip link del dev bond1

When the device is put administratively down the "rx-vlan-filter"
feature is disabled, so the 8021q module will not remove VLAN 0 and the
memory will be leaked [1].

Another problem that can happen is that the kernel can automatically
delete VLAN 0 when the device is put administratively down despite not
adding it when the device was put administratively up since during that
time the "rx-vlan-filter" feature was disabled. null-ptr-unref or
bug_on[2] will be triggered by unregister_vlan_dev() for refcount
imbalance if toggling filtering during runtime:

$ ip link add bond0 type bond mode 0
$ ip link add link bond0 name vlan0 type vlan id 0 protocol 802.1q
$ ethtool -K bond0 rx-vlan-filter off
$ ifconfig bond0 up
$ ethtool -K bond0 rx-vlan-filter on
$ ifconfig bond0 down
$ ip link del vlan0

Root cause is as below:
step1: add vlan0 for real_dev, such as bond, team.
register_vlan_dev
    vlan_vid_add(real_dev,htons(ETH_P_8021Q),0) //refcnt=1
step2: disable vlan filter feature and enable real_dev
step3: change filter from 0 to 1
vlan_device_event
    vlan_filter_push_vids
        ndo_vlan_rx_add_vid //No refcnt added to real_dev vlan0
step4: real_dev down
vlan_device_event
    vlan_vid_del(dev, htons(ETH_P_8021Q), 0); //refcnt=0
        vlan_info_rcu_free //free vlan0
step5: delete vlan0
unregister_vlan_dev
    BUG_ON(!vlan_info); //vlan_info is null

Fix both problems by noting in the VLAN info whether VLAN 0 was
automatically added upon NETDEV_UP and based on that decide whether it
should be deleted upon NETDEV_DOWN, regardless of the state of the
"rx-vlan-filter" feature.

[1]
unreferenced object 0xffff8880068e3100 (size 256):
  comm "ip", pid 384, jiffies 4296130254
  hex dump (first 32 bytes):
    00 20 30 0d 80 88 ff ff 00 00 00 00 00 00 00 00  . 0.............
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace (crc 81ce31fa):
    __kmalloc_cache_noprof+0x2b5/0x340
    vlan_vid_add+0x434/0x940
    vlan_device_event.cold+0x75/0xa8
    notifier_call_chain+0xca/0x150
    __dev_notify_flags+0xe3/0x250
    rtnl_configure_link+0x193/0x260
    rtnl_newlink_create+0x383/0x8e0
    __rtnl_newlink+0x22c/0xa40
    rtnl_newlink+0x627/0xb00
    rtnetlink_rcv_msg+0x6fb/0xb70
    netlink_rcv_skb+0x11f/0x350
    netlink_unicast+0x426/0x710
    netlink_sendmsg+0x75a/0xc20
    __sock_sendmsg+0xc1/0x150
    ____sys_sendmsg+0x5aa/0x7b0
    ___sys_sendmsg+0xfc/0x180

[2]
kernel BUG at net/8021q/vlan.c:99!
Oops: invalid opcode: 0000 [#1] SMP KASAN PTI
CPU: 0 UID: 0 PID: 382 Comm: ip Not tainted 6.16.0-rc3 #61 PREEMPT(voluntary)
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996),
BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
RIP: 0010:unregister_vlan_dev (net/8021q/vlan.c:99 (discriminator 1))
RSP: 0018:ffff88810badf310 EFLAGS: 00010246
RAX: 0000000000000000 RBX: ffff88810da84000 RCX: ffffffffb47ceb9a
RDX: dffffc0000000000 RSI: 0000000000000008 RDI: ffff88810e8b43c8
RBP: 0000000000000000 R08: 0000000000000000 R09: fffffbfff6cefe80
R10: ffffffffb677f407 R11: ffff88810badf3c0 R12: ffff88810e8b4000
R13: 0000000000000000 R14: ffff88810642a5c0 R15: 000000000000017e
FS:  00007f1ff68c20c0(0000) GS:ffff888163a24000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f1ff5dad240 CR3: 0000000107e56000 CR4: 00000000000006f0
Call Trace:
 &lt;TASK
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38470/">CVE-2025-38470 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38470">CVE-2025-38470 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247288">SUSE bug 1247288</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538472" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38472</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38472" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38472" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38472" ref_url="https://www.suse.com/security/cve/CVE-2025-38472" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16880" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_conntrack: fix crash due to removal of uninitialised entry

A crash in conntrack was reported while trying to unlink the conntrack
entry from the hash bucket list:
    [exception RIP: __nf_ct_delete_from_lists+172]
    [..]
 #7 [ff539b5a2b043aa0] nf_ct_delete at ffffffffc124d421 [nf_conntrack]
 #8 [ff539b5a2b043ad0] nf_ct_gc_expired at ffffffffc124d999 [nf_conntrack]
 #9 [ff539b5a2b043ae0] __nf_conntrack_find_get at ffffffffc124efbc [nf_conntrack]
    [..]

The nf_conn struct is marked as allocated from slab but appears to be in
a partially initialised state:

 ct hlist pointer is garbage; looks like the ct hash value
 (hence crash).
 ct-&gt;status is equal to IPS_CONFIRMED|IPS_DYING, which is expected
 ct-&gt;timeout is 30000 (=30s), which is unexpected.

Everything else looks like normal udp conntrack entry.  If we ignore
ct-&gt;status and pretend its 0, the entry matches those that are newly
allocated but not yet inserted into the hash:
  - ct hlist pointers are overloaded and store/cache the raw tuple hash
  - ct-&gt;timeout matches the relative time expected for a new udp flow
    rather than the absolute 'jiffies' value.

If it were not for the presence of IPS_CONFIRMED,
__nf_conntrack_find_get() would have skipped the entry.

Theory is that we did hit following race:

cpu x 			cpu y			cpu z
 found entry E		found entry E
 E is expired		&lt;preemption&gt;
 nf_ct_delete()
 return E to rcu slab
					init_conntrack
					E is re-inited,
					ct-&gt;status set to 0
					reply tuplehash hnnode.pprev
					stores hash value.

cpu y found E right before it was deleted on cpu x.
E is now re-inited on cpu z.  cpu y was preempted before
checking for expiry and/or confirm bit.

					-&gt;refcnt set to 1
					E now owned by skb
					-&gt;timeout set to 30000

If cpu y were to resume now, it would observe E as
expired but would skip E due to missing CONFIRMED bit.

					nf_conntrack_confirm gets called
					sets: ct-&gt;status |= CONFIRMED
					This is wrong: E is not yet added
					to hashtable.

cpu y resumes, it observes E as expired but CONFIRMED:
			&lt;resumes&gt;
			nf_ct_expired()
			 -&gt; yes (ct-&gt;timeout is 30s)
			confirmed bit set.

cpu y will try to delete E from the hashtable:
			nf_ct_delete() -&gt; set DYING bit
			__nf_ct_delete_from_lists

Even this scenario doesn't guarantee a crash:
cpu z still holds the table bucket lock(s) so y blocks:

			wait for spinlock held by z

					CONFIRMED is set but there is no
					guarantee ct will be added to hash:
					"chaintoolong" or "clash resolution"
					logic both skip the insert step.
					reply hnnode.pprev still stores the
					hash value.

					unlocks spinlock
					return NF_DROP
			&lt;unblocks, then
			 crashes on hlist_nulls_del_rcu pprev&gt;

In case CPU z does insert the entry into the hashtable, cpu y will unlink
E again right away but no crash occurs.

Without 'cpu y' race, 'garbage' hlist is of no consequence:
ct refcnt remains at 1, eventually skb will be free'd and E gets
destroyed via: nf_conntrack_put -&gt; nf_conntrack_destroy -&gt; nf_ct_destroy.

To resolve this, move the IPS_CONFIRMED assignment after the table
insertion but before the unlock.

Pablo points out that the confirm-bit-store could be reordered to happen
before hlist add resp. the timeout fixup, so switch to set_bit and
before_atomic memory barrier to prevent this.

It doesn't matter if other CPUs can observe a newly inserted entry right
before the CONFIRMED bit was set:

Such event cannot be distinguished from above "E is the old incarnation"
case: the entry will be skipped.

Also change nf_ct_should_gc() to first check the confirmed bit.

The gc sequence is:
 1. Check if entry has expired, if not skip to next entry
 2. Obtain a reference to the expired entry.
 3. Call nf_ct_should_gc() to double-check step 1.

nf_ct_should_gc() is thus called only for entries that already failed an
expiry check. After this patch, once the confirmed bit check pas
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38472/">CVE-2025-38472 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38472">CVE-2025-38472 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247313">SUSE bug 1247313</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538473" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38473</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38473" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38473" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38473" ref_url="https://www.suse.com/security/cve/CVE-2025-38473" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: Fix null-ptr-deref in l2cap_sock_resume_cb()

syzbot reported null-ptr-deref in l2cap_sock_resume_cb(). [0]

l2cap_sock_resume_cb() has a similar problem that was fixed by commit
1bff51ea59a9 ("Bluetooth: fix use-after-free error in lock_sock_nested()").

Since both l2cap_sock_kill() and l2cap_sock_resume_cb() are executed
under l2cap_sock_resume_cb(), we can avoid the issue simply by checking
if chan-&gt;data is NULL.

Let's not access to the killed socket in l2cap_sock_resume_cb().

[0]:
BUG: KASAN: null-ptr-deref in instrument_atomic_write include/linux/instrumented.h:82 [inline]
BUG: KASAN: null-ptr-deref in clear_bit include/asm-generic/bitops/instrumented-atomic.h:41 [inline]
BUG: KASAN: null-ptr-deref in l2cap_sock_resume_cb+0xb4/0x17c net/bluetooth/l2cap_sock.c:1711
Write of size 8 at addr 0000000000000570 by task kworker/u9:0/52

CPU: 1 UID: 0 PID: 52 Comm: kworker/u9:0 Not tainted 6.16.0-rc4-syzkaller-g7482bb149b9f #0 PREEMPT
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
Workqueue: hci0 hci_rx_work
Call trace:
 show_stack+0x2c/0x3c arch/arm64/kernel/stacktrace.c:501 (C)
 __dump_stack+0x30/0x40 lib/dump_stack.c:94
 dump_stack_lvl+0xd8/0x12c lib/dump_stack.c:120
 print_report+0x58/0x84 mm/kasan/report.c:524
 kasan_report+0xb0/0x110 mm/kasan/report.c:634
 check_region_inline mm/kasan/generic.c:-1 [inline]
 kasan_check_range+0x264/0x2a4 mm/kasan/generic.c:189
 __kasan_check_write+0x20/0x30 mm/kasan/shadow.c:37
 instrument_atomic_write include/linux/instrumented.h:82 [inline]
 clear_bit include/asm-generic/bitops/instrumented-atomic.h:41 [inline]
 l2cap_sock_resume_cb+0xb4/0x17c net/bluetooth/l2cap_sock.c:1711
 l2cap_security_cfm+0x524/0xea0 net/bluetooth/l2cap_core.c:7357
 hci_auth_cfm include/net/bluetooth/hci_core.h:2092 [inline]
 hci_auth_complete_evt+0x2e8/0xa4c net/bluetooth/hci_event.c:3514
 hci_event_func net/bluetooth/hci_event.c:7511 [inline]
 hci_event_packet+0x650/0xe9c net/bluetooth/hci_event.c:7565
 hci_rx_work+0x320/0xb18 net/bluetooth/hci_core.c:4070
 process_one_work+0x7e8/0x155c kernel/workqueue.c:3238
 process_scheduled_works kernel/workqueue.c:3321 [inline]
 worker_thread+0x958/0xed8 kernel/workqueue.c:3402
 kthread+0x5fc/0x75c kernel/kthread.c:464
 ret_from_fork+0x10/0x20 arch/arm64/kernel/entry.S:847
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38473/">CVE-2025-38473 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38473">CVE-2025-38473 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247289">SUSE bug 1247289</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538474" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38474</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38474" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38474" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38474" ref_url="https://www.suse.com/security/cve/CVE-2025-38474" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: net: sierra: check for no status endpoint

The driver checks for having three endpoints and
having bulk in and out endpoints, but not that
the third endpoint is interrupt input.
Rectify the omission.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38474/">CVE-2025-38474 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38474">CVE-2025-38474 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247311">SUSE bug 1247311</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538475" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38475</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38475" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38475" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38475" ref_url="https://www.suse.com/security/cve/CVE-2025-38475" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smc: Fix various oops due to inet_sock type confusion.

syzbot reported weird splats [0][1] in cipso_v4_sock_setattr() while
freeing inet_sk(sk)-&gt;inet_opt.

The address was freed multiple times even though it was read-only memory.

cipso_v4_sock_setattr() did nothing wrong, and the root cause was type
confusion.

The cited commit made it possible to create smc_sock as an INET socket.

The issue is that struct smc_sock does not have struct inet_sock as the
first member but hijacks AF_INET and AF_INET6 sk_family, which confuses
various places.

In this case, inet_sock.inet_opt was actually smc_sock.clcsk_data_ready(),
which is an address of a function in the text segment.

  $ pahole -C inet_sock vmlinux
  struct inet_sock {
  ...
          struct ip_options_rcu *    inet_opt;             /*   784     8 */

  $ pahole -C smc_sock vmlinux
  struct smc_sock {
  ...
          void                       (*clcsk_data_ready)(struct sock *); /*   784     8 */

The same issue for another field was reported before. [2][3]

At that time, an ugly hack was suggested [4], but it makes both INET
and SMC code error-prone and hard to change.

Also, yet another variant was fixed by a hacky commit 98d4435efcbf3
("net/smc: prevent NULL pointer dereference in txopt_get").

Instead of papering over the root cause by such hacks, we should not
allow non-INET socket to reuse the INET infra.

Let's add inet_sock as the first member of smc_sock.

[0]:
kvfree_call_rcu(): Double-freed call. rcu_head 000000006921da73
WARNING: CPU: 0 PID: 6718 at mm/slab_common.c:1956 kvfree_call_rcu+0x94/0x3f0 mm/slab_common.c:1955
Modules linked in:
CPU: 0 UID: 0 PID: 6718 Comm: syz.0.17 Tainted: G        W           6.16.0-rc4-syzkaller-g7482bb149b9f #0 PREEMPT
Tainted: [W]=WARN
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : kvfree_call_rcu+0x94/0x3f0 mm/slab_common.c:1955
lr : kvfree_call_rcu+0x94/0x3f0 mm/slab_common.c:1955
sp : ffff8000a03a7730
x29: ffff8000a03a7730 x28: 00000000fffffff5 x27: 1fffe000184823d3
x26: dfff800000000000 x25: ffff0000c2411e9e x24: ffff0000dd88da00
x23: ffff8000891ac9a0 x22: 00000000ffffffea x21: ffff8000891ac9a0
x20: ffff8000891ac9a0 x19: ffff80008afc2480 x18: 00000000ffffffff
x17: 0000000000000000 x16: ffff80008ae642c8 x15: ffff700011ede14c
x14: 1ffff00011ede14c x13: 0000000000000004 x12: ffffffffffffffff
x11: ffff700011ede14c x10: 0000000000ff0100 x9 : 5fa3c1ffaf0ff000
x8 : 5fa3c1ffaf0ff000 x7 : 0000000000000001 x6 : 0000000000000001
x5 : ffff8000a03a7078 x4 : ffff80008f766c20 x3 : ffff80008054d360
x2 : 0000000000000000 x1 : 0000000000000201 x0 : 0000000000000000
Call trace:
 kvfree_call_rcu+0x94/0x3f0 mm/slab_common.c:1955 (P)
 cipso_v4_sock_setattr+0x2f0/0x3f4 net/ipv4/cipso_ipv4.c:1914
 netlbl_sock_setattr+0x240/0x334 net/netlabel/netlabel_kapi.c:1000
 smack_netlbl_add+0xa8/0x158 security/smack/smack_lsm.c:2581
 smack_inode_setsecurity+0x378/0x430 security/smack/smack_lsm.c:2912
 security_inode_setsecurity+0x118/0x3c0 security/security.c:2706
 __vfs_setxattr_noperm+0x174/0x5c4 fs/xattr.c:251
 __vfs_setxattr_locked+0x1ec/0x218 fs/xattr.c:295
 vfs_setxattr+0x158/0x2ac fs/xattr.c:321
 do_setxattr fs/xattr.c:636 [inline]
 file_setxattr+0x1b8/0x294 fs/xattr.c:646
 path_setxattrat+0x2ac/0x320 fs/xattr.c:711
 __do_sys_fsetxattr fs/xattr.c:761 [inline]
 __se_sys_fsetxattr fs/xattr.c:758 [inline]
 __arm64_sys_fsetxattr+0xc0/0xdc fs/xattr.c:758
 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline]
 invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49
 el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132
 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151
 el0_svc+0x58/0x180 arch/arm64/kernel/entry-common.c:879
 el0t_64_sync_handler+0x84/0x12c arch/arm64/kernel/entry-common.c:898
 el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:600

[
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38475/">CVE-2025-38475 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38475">CVE-2025-38475 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247308">SUSE bug 1247308</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247309">SUSE bug 1247309</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538476" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38476</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38476" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38476" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38476" ref_url="https://www.suse.com/security/cve/CVE-2025-38476" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023801.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024228.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

rpl: Fix use-after-free in rpl_do_srh_inline().

Running lwt_dst_cache_ref_loop.sh in selftest with KASAN triggers
the splat below [0].

rpl_do_srh_inline() fetches ipv6_hdr(skb) and accesses it after
skb_cow_head(), which is illegal as the header could be freed then.

Let's fix it by making oldhdr to a local struct instead of a pointer.

[0]:
[root@fedora net]# ./lwt_dst_cache_ref_loop.sh
...
TEST: rpl (input)
[   57.631529] ==================================================================
BUG: KASAN: slab-use-after-free in rpl_do_srh_inline.isra.0 (net/ipv6/rpl_iptunnel.c:174)
Read of size 40 at addr ffff888122bf96d8 by task ping6/1543

CPU: 50 UID: 0 PID: 1543 Comm: ping6 Not tainted 6.16.0-rc5-01302-gfadd1e6231b1 #23 PREEMPT(voluntary)
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
Call Trace:
 &lt;IRQ&gt;
 dump_stack_lvl (lib/dump_stack.c:122)
 print_report (mm/kasan/report.c:409 mm/kasan/report.c:521)
 kasan_report (mm/kasan/report.c:221 mm/kasan/report.c:636)
 kasan_check_range (mm/kasan/generic.c:175 (discriminator 1) mm/kasan/generic.c:189 (discriminator 1))
 __asan_memmove (mm/kasan/shadow.c:94 (discriminator 2))
 rpl_do_srh_inline.isra.0 (net/ipv6/rpl_iptunnel.c:174)
 rpl_input (net/ipv6/rpl_iptunnel.c:201 net/ipv6/rpl_iptunnel.c:282)
 lwtunnel_input (net/core/lwtunnel.c:459)
 ipv6_rcv (./include/net/dst.h:471 (discriminator 1) ./include/net/dst.h:469 (discriminator 1) net/ipv6/ip6_input.c:79 (discriminator 1) ./include/linux/netfilter.h:317 (discriminator 1) ./include/linux/netfilter.h:311 (discriminator 1) net/ipv6/ip6_input.c:311 (discriminator 1))
 __netif_receive_skb_one_core (net/core/dev.c:5967)
 process_backlog (./include/linux/rcupdate.h:869 net/core/dev.c:6440)
 __napi_poll.constprop.0 (net/core/dev.c:7452)
 net_rx_action (net/core/dev.c:7518 net/core/dev.c:7643)
 handle_softirqs (kernel/softirq.c:579)
 do_softirq (kernel/softirq.c:480 (discriminator 20))
 &lt;/IRQ&gt;
 &lt;TASK&gt;
 __local_bh_enable_ip (kernel/softirq.c:407)
 __dev_queue_xmit (net/core/dev.c:4740)
 ip6_finish_output2 (./include/linux/netdevice.h:3358 ./include/net/neighbour.h:526 ./include/net/neighbour.h:540 net/ipv6/ip6_output.c:141)
 ip6_finish_output (net/ipv6/ip6_output.c:215 net/ipv6/ip6_output.c:226)
 ip6_output (./include/linux/netfilter.h:306 net/ipv6/ip6_output.c:248)
 ip6_send_skb (net/ipv6/ip6_output.c:1983)
 rawv6_sendmsg (net/ipv6/raw.c:588 net/ipv6/raw.c:918)
 __sys_sendto (net/socket.c:714 (discriminator 1) net/socket.c:729 (discriminator 1) net/socket.c:2228 (discriminator 1))
 __x64_sys_sendto (net/socket.c:2231)
 do_syscall_64 (arch/x86/entry/syscall_64.c:63 (discriminator 1) arch/x86/entry/syscall_64.c:94 (discriminator 1))
 entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130)
RIP: 0033:0x7f68cffb2a06
Code: 5d e8 41 8b 93 08 03 00 00 59 5e 48 83 f8 fc 75 19 83 e2 39 83 fa 08 75 11 e8 26 ff ff ff 66 0f 1f 44 00 00 48 8b 45 10 0f 05 &lt;48&gt; 8b 5d f8 c9 c3 0f 1f 40 00 f3 0f 1e fa 55 48 89 e5 48 83 ec 08
RSP: 002b:00007ffefb7c53d0 EFLAGS: 00000202 ORIG_RAX: 000000000000002c
RAX: ffffffffffffffda RBX: 0000564cd69f10a0 RCX: 00007f68cffb2a06
RDX: 0000000000000040 RSI: 0000564cd69f10a4 RDI: 0000000000000003
RBP: 00007ffefb7c53f0 R08: 0000564cd6a032ac R09: 000000000000001c
R10: 0000000000000000 R11: 0000000000000202 R12: 0000564cd69f10a4
R13: 0000000000000040 R14: 00007ffefb7c66e0 R15: 0000564cd69f10a0
 &lt;/TASK&gt;

Allocated by task 1543:
 kasan_save_stack (mm/kasan/common.c:48)
 kasan_save_track (mm/kasan/common.c:60 (discriminator 1) mm/kasan/common.c:69 (discriminator 1))
 __kasan_slab_alloc (mm/kasan/common.c:319 mm/kasan/common.c:345)
 kmem_cache_alloc_node_noprof (./include/linux/kasan.h:250 mm/slub.c:4148 mm/slub.c:4197 mm/slub.c:4249)
 kmalloc_reserve (net/core/skbuff.c:581 (discriminator 88))
 __alloc_skb (net/core/skbuff.c:669)
 __ip6_append_data (net/ipv6/ip6_output.c:1672 (discriminator 1))
 ip6_
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38476/">CVE-2025-38476 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38476">CVE-2025-38476 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247317">SUSE bug 1247317</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251203">SUSE bug 1251203</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538477" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38477</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38477" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38477" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38477" ref_url="https://www.suse.com/security/cve/CVE-2025-38477" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:15008" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001974.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:17161" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02849-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02851-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02852-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03310-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03465-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03468-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03469-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03470-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03472-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042016.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03475-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03476-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03479-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03480-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03482-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03483-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03485-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03494-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03495-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042034.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03496-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042036.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03497-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03498-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042032.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03503-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03504-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03514-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03515-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03528-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03529-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03538-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03539-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03541-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042108.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03543-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03548-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03550-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03552-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042104.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03553-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03554-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03557-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03559-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03561-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03562-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03563-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03566-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03567-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03568-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03569-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03571-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03572-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03575-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03576-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03577-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03578-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03580-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03583-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20806-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20807-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20808-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042132.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20810-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20811-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20812-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20813-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20814-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20815-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20816-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20817-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20818-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20819-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20820-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20826-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20827-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20828-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20829-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20830-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20831-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20832-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20833-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20834-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20835-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20836-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20837-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20838-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20839-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20840-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20841-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20842-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: sch_qfq: Fix race condition on qfq_aggregate

A race condition can occur when 'agg' is modified in qfq_change_agg
(called during qfq_enqueue) while other threads access it
concurrently. For example, qfq_dump_class may trigger a NULL
dereference, and qfq_delete_class may cause a use-after-free.

This patch addresses the issue by:

1. Moved qfq_destroy_class into the critical section.

2. Added sch_tree_lock protection to qfq_dump_class and
qfq_dump_class_stats.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38477/">CVE-2025-38477 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38477">CVE-2025-38477 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247314">SUSE bug 1247314</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247315">SUSE bug 1247315</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38478</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38478" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38478" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38478" ref_url="https://www.suse.com/security/cve/CVE-2025-38478" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

comedi: Fix initialization of data for instructions that write to subdevice

Some Comedi subdevice instruction handlers are known to access
instruction data elements beyond the first `insn-&gt;n` elements in some
cases.  The `do_insn_ioctl()` and `do_insnlist_ioctl()` functions
allocate at least `MIN_SAMPLES` (16) data elements to deal with this,
but they do not initialize all of that.  For Comedi instruction codes
that write to the subdevice, the first `insn-&gt;n` data elements are
copied from user-space, but the remaining elements are left
uninitialized.  That could be a problem if the subdevice instruction
handler reads the uninitialized data.  Ensure that the first
`MIN_SAMPLES` elements are initialized before calling these instruction
handlers, filling the uncopied elements with 0.  For
`do_insnlist_ioctl()`, the same data buffer elements are used for
handling a list of instructions, so ensure the first `MIN_SAMPLES`
elements are initialized for each instruction that writes to the
subdevice.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38478/">CVE-2025-38478 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38478">CVE-2025-38478 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247273">SUSE bug 1247273</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538480" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38480</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38480" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38480" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38480" ref_url="https://www.suse.com/security/cve/CVE-2025-38480" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

comedi: Fix use of uninitialized data in insn_rw_emulate_bits()

For Comedi `INSN_READ` and `INSN_WRITE` instructions on "digital"
subdevices (subdevice types `COMEDI_SUBD_DI`, `COMEDI_SUBD_DO`, and
`COMEDI_SUBD_DIO`), it is common for the subdevice driver not to have
`insn_read` and `insn_write` handler functions, but to have an
`insn_bits` handler function for handling Comedi `INSN_BITS`
instructions.  In that case, the subdevice's `insn_read` and/or
`insn_write` function handler pointers are set to point to the
`insn_rw_emulate_bits()` function by `__comedi_device_postconfig()`.

For `INSN_WRITE`, `insn_rw_emulate_bits()` currently assumes that the
supplied `data[0]` value is a valid copy from user memory.  It will at
least exist because `do_insnlist_ioctl()` and `do_insn_ioctl()` in
"comedi_fops.c" ensure at lease `MIN_SAMPLES` (16) elements are
allocated.  However, if `insn-&gt;n` is 0 (which is allowable for
`INSN_READ` and `INSN_WRITE` instructions, then `data[0]` may contain
uninitialized data, and certainly contains invalid data, possibly from a
different instruction in the array of instructions handled by
`do_insnlist_ioctl()`.  This will result in an incorrect value being
written to the digital output channel (or to the digital input/output
channel if configured as an output), and may be reflected in the
internal saved state of the channel.

Fix it by returning 0 early if `insn-&gt;n` is 0, before reaching the code
that accesses `data[0]`.  Previously, the function always returned 1 on
success, but it is supposed to be the number of data samples actually
read or written up to `insn-&gt;n`, which is 0 in this case.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38480/">CVE-2025-38480 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38480">CVE-2025-38480 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247274">SUSE bug 1247274</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538481" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38481</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38481" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38481" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38481" ref_url="https://www.suse.com/security/cve/CVE-2025-38481" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

comedi: Fail COMEDI_INSNLIST ioctl if n_insns is too large

The handling of the `COMEDI_INSNLIST` ioctl allocates a kernel buffer to
hold the array of `struct comedi_insn`, getting the length from the
`n_insns` member of the `struct comedi_insnlist` supplied by the user.
The allocation will fail with a WARNING and a stack dump if it is too
large.

Avoid that by failing with an `-EINVAL` error if the supplied `n_insns`
value is unreasonable.

Define the limit on the `n_insns` value in the `MAX_INSNS` macro.  Set
this to the same value as `MAX_SAMPLES` (65536), which is the maximum
allowed sum of the values of the member `n` in the array of `struct
comedi_insn`, and sensible comedi instructions will have an `n` of at
least 1.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38481/">CVE-2025-38481 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38481">CVE-2025-38481 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247276">SUSE bug 1247276</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538482" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38482</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38482" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38482" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38482" ref_url="https://www.suse.com/security/cve/CVE-2025-38482" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

comedi: das6402: Fix bit shift out of bounds

When checking for a supported IRQ number, the following test is used:

	/* IRQs 2,3,5,6,7, 10,11,15 are valid for "enhanced" mode */
	if ((1 &lt;&lt; it-&gt;options[1]) &amp; 0x8cec) {

However, `it-&gt;options[i]` is an unchecked `int` value from userspace, so
the shift amount could be negative or out of bounds.  Fix the test by
requiring `it-&gt;options[1]` to be within bounds before proceeding with
the original test.  Valid `it-&gt;options[1]` values that select the IRQ
will be in the range [1,15]. The value 0 explicitly disables the use of
interrupts.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38482/">CVE-2025-38482 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38482">CVE-2025-38482 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247277">SUSE bug 1247277</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538483" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38483</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38483" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38483" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38483" ref_url="https://www.suse.com/security/cve/CVE-2025-38483" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

comedi: das16m1: Fix bit shift out of bounds

When checking for a supported IRQ number, the following test is used:

	/* only irqs 2, 3, 4, 5, 6, 7, 10, 11, 12, 14, and 15 are valid */
	if ((1 &lt;&lt; it-&gt;options[1]) &amp; 0xdcfc) {

However, `it-&gt;options[i]` is an unchecked `int` value from userspace, so
the shift amount could be negative or out of bounds.  Fix the test by
requiring `it-&gt;options[1]` to be within bounds before proceeding with
the original test.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38483/">CVE-2025-38483 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38483">CVE-2025-38483 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247278">SUSE bug 1247278</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38484</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38484" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38484" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38484" ref_url="https://www.suse.com/security/cve/CVE-2025-38484" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iio: backend: fix out-of-bound write

The buffer is set to 80 character. If a caller write more characters,
count is truncated to the max available space in "simple_write_to_buffer".
But afterwards a string terminator is written to the buffer at offset count
without boundary check. The zero termination is written OUT-OF-BOUND.

Add a check that the given buffer is smaller then the buffer to prevent.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38484/">CVE-2025-38484 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38484">CVE-2025-38484 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247235">SUSE bug 1247235</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38485</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38485" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38485" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38485" ref_url="https://www.suse.com/security/cve/CVE-2025-38485" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iio: accel: fxls8962af: Fix use after free in fxls8962af_fifo_flush

fxls8962af_fifo_flush() uses indio_dev-&gt;active_scan_mask (with
iio_for_each_active_channel()) without making sure the indio_dev
stays in buffer mode.
There is a race if indio_dev exits buffer mode in the middle of the
interrupt that flushes the fifo. Fix this by calling
synchronize_irq() to ensure that no interrupt is currently running when
disabling buffer mode.

Unable to handle kernel NULL pointer dereference at virtual address 00000000 when read
[...]
_find_first_bit_le from fxls8962af_fifo_flush+0x17c/0x290
fxls8962af_fifo_flush from fxls8962af_interrupt+0x80/0x178
fxls8962af_interrupt from irq_thread_fn+0x1c/0x7c
irq_thread_fn from irq_thread+0x110/0x1f4
irq_thread from kthread+0xe0/0xfc
kthread from ret_from_fork+0x14/0x2c
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38485/">CVE-2025-38485 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38485">CVE-2025-38485 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247236">SUSE bug 1247236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247237">SUSE bug 1247237</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538487" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38487</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38487" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38487" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38487" ref_url="https://www.suse.com/security/cve/CVE-2025-38487" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

soc: aspeed: lpc-snoop: Don't disable channels that aren't enabled

Mitigate e.g. the following:

    # echo 1e789080.lpc-snoop &gt; /sys/bus/platform/drivers/aspeed-lpc-snoop/unbind
    ...
    [  120.363594] Unable to handle kernel NULL pointer dereference at virtual address 00000004 when write
    [  120.373866] [00000004] *pgd=00000000
    [  120.377910] Internal error: Oops: 805 [#1] SMP ARM
    [  120.383306] CPU: 1 UID: 0 PID: 315 Comm: sh Not tainted 6.15.0-rc1-00009-g926217bc7d7d-dirty #20 NONE
    ...
    [  120.679543] Call trace:
    [  120.679559]  misc_deregister from aspeed_lpc_snoop_remove+0x84/0xac
    [  120.692462]  aspeed_lpc_snoop_remove from platform_remove+0x28/0x38
    [  120.700996]  platform_remove from device_release_driver_internal+0x188/0x200
    ...
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38487/">CVE-2025-38487 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38487">CVE-2025-38487 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247238">SUSE bug 1247238</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538488" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38488</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38488" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38488" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38488" ref_url="https://www.suse.com/security/cve/CVE-2025-38488" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03626-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0992-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1132-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024847.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20891-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20892-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20893-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20895-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20896-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20897-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20898-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20946-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045206.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix use-after-free in crypt_message when using async crypto

The CVE-2024-50047 fix removed asynchronous crypto handling from
crypt_message(), assuming all crypto operations are synchronous.
However, when hardware crypto accelerators are used, this can cause
use-after-free crashes:

  crypt_message()
    // Allocate the creq buffer containing the req
    creq = smb2_get_aead_req(..., &amp;req);

    // Async encryption returns -EINPROGRESS immediately
    rc = enc ? crypto_aead_encrypt(req) : crypto_aead_decrypt(req);

    // Free creq while async operation is still in progress
    kvfree_sensitive(creq, ...);

Hardware crypto modules often implement async AEAD operations for
performance. When crypto_aead_encrypt/decrypt() returns -EINPROGRESS,
the operation completes asynchronously. Without crypto_wait_req(),
the function immediately frees the request buffer, leading to crashes
when the driver later accesses the freed memory.

This results in a use-after-free condition when the hardware crypto
driver later accesses the freed request structure, leading to kernel
crashes with NULL pointer dereferences.

The issue occurs because crypto_alloc_aead() with mask=0 doesn't
guarantee synchronous operation. Even without CRYPTO_ALG_ASYNC in
the mask, async implementations can be selected.

Fix by restoring the async crypto handling:
- DECLARE_CRYPTO_WAIT(wait) for completion tracking
- aead_request_set_callback() for async completion notification
- crypto_wait_req() to wait for operation completion

This ensures the request buffer isn't freed until the crypto operation
completes, whether synchronous or asynchronous, while preserving the
CVE-2024-50047 fix.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-04-02"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38488/">CVE-2025-38488 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38488">CVE-2025-38488 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247239">SUSE bug 1247239</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247240">SUSE bug 1247240</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538489" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38489</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38489" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38489" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38489" ref_url="https://www.suse.com/security/cve/CVE-2025-38489" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390/bpf: Fix bpf_arch_text_poke() with new_addr == NULL again

Commit 7ded842b356d ("s390/bpf: Fix bpf_plt pointer arithmetic") has
accidentally removed the critical piece of commit c730fce7c70c
("s390/bpf: Fix bpf_arch_text_poke() with new_addr == NULL"), causing
intermittent kernel panics in e.g. perf's on_switch() prog to reappear.

Restore the fix and add a comment.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38489/">CVE-2025-38489 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38489">CVE-2025-38489 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247241">SUSE bug 1247241</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538490" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38490</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38490" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38490" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38490" ref_url="https://www.suse.com/security/cve/CVE-2025-38490" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: libwx: remove duplicate page_pool_put_full_page()

page_pool_put_full_page() should only be invoked when freeing Rx buffers
or building a skb if the size is too short. At other times, the pages
need to be reused. So remove the redundant page put. In the original
code, double free pages cause kernel panic:

[  876.949834]  __irq_exit_rcu+0xc7/0x130
[  876.949836]  common_interrupt+0xb8/0xd0
[  876.949838]  &lt;/IRQ&gt;
[  876.949838]  &lt;TASK&gt;
[  876.949840]  asm_common_interrupt+0x22/0x40
[  876.949841] RIP: 0010:cpuidle_enter_state+0xc2/0x420
[  876.949843] Code: 00 00 e8 d1 1d 5e ff e8 ac f0 ff ff 49 89 c5 0f 1f 44 00 00 31 ff e8 cd fc 5c ff 45 84 ff 0f 85 40 02 00 00 fb 0f 1f 44 00 00 &lt;45&gt; 85 f6 0f 88 84 01 00 00 49 63 d6 48 8d 04 52 48 8d 04 82 49 8d
[  876.949844] RSP: 0018:ffffaa7340267e78 EFLAGS: 00000246
[  876.949845] RAX: ffff9e3f135be000 RBX: 0000000000000002 RCX: 0000000000000000
[  876.949846] RDX: 000000cc2dc4cb7c RSI: ffffffff89ee49ae RDI: ffffffff89ef9f9e
[  876.949847] RBP: ffff9e378f940800 R08: 0000000000000002 R09: 00000000000000ed
[  876.949848] R10: 000000000000afc8 R11: ffff9e3e9e5a9b6c R12: ffffffff8a6d8580
[  876.949849] R13: 000000cc2dc4cb7c R14: 0000000000000002 R15: 0000000000000000
[  876.949852]  ? cpuidle_enter_state+0xb3/0x420
[  876.949855]  cpuidle_enter+0x29/0x40
[  876.949857]  cpuidle_idle_call+0xfd/0x170
[  876.949859]  do_idle+0x7a/0xc0
[  876.949861]  cpu_startup_entry+0x25/0x30
[  876.949862]  start_secondary+0x117/0x140
[  876.949864]  common_startup_64+0x13e/0x148
[  876.949867]  &lt;/TASK&gt;
[  876.949868] ---[ end trace 0000000000000000 ]---
[  876.949869] ------------[ cut here ]------------
[  876.949870] list_del corruption, ffffead40445a348-&gt;next is NULL
[  876.949873] WARNING: CPU: 14 PID: 0 at lib/list_debug.c:52 __list_del_entry_valid_or_report+0x67/0x120
[  876.949875] Modules linked in: snd_hrtimer(E) bnep(E) binfmt_misc(E) amdgpu(E) squashfs(E) vfat(E) loop(E) fat(E) amd_atl(E) snd_hda_codec_realtek(E) intel_rapl_msr(E) snd_hda_codec_generic(E) intel_rapl_common(E) snd_hda_scodec_component(E) snd_hda_codec_hdmi(E) snd_hda_intel(E) edac_mce_amd(E) snd_intel_dspcfg(E) snd_hda_codec(E) snd_hda_core(E) amdxcp(E) kvm_amd(E) snd_hwdep(E) gpu_sched(E) drm_panel_backlight_quirks(E) cec(E) snd_pcm(E) drm_buddy(E) snd_seq_dummy(E) drm_ttm_helper(E) btusb(E) kvm(E) snd_seq_oss(E) btrtl(E) ttm(E) btintel(E) snd_seq_midi(E) btbcm(E) drm_exec(E) snd_seq_midi_event(E) i2c_algo_bit(E) snd_rawmidi(E) bluetooth(E) drm_suballoc_helper(E) irqbypass(E) snd_seq(E) ghash_clmulni_intel(E) sha512_ssse3(E) drm_display_helper(E) aesni_intel(E) snd_seq_device(E) rfkill(E) snd_timer(E) gf128mul(E) drm_client_lib(E) drm_kms_helper(E) snd(E) i2c_piix4(E) joydev(E) soundcore(E) wmi_bmof(E) ccp(E) k10temp(E) i2c_smbus(E) gpio_amdpt(E) i2c_designware_platform(E) gpio_generic(E) sg(E)
[  876.949914]  i2c_designware_core(E) sch_fq_codel(E) parport_pc(E) drm(E) ppdev(E) lp(E) parport(E) fuse(E) nfnetlink(E) ip_tables(E) ext4 crc16 mbcache jbd2 sd_mod sfp mdio_i2c i2c_core txgbe ahci ngbe pcs_xpcs libahci libwx r8169 phylink libata realtek ptp pps_core video wmi
[  876.949933] CPU: 14 UID: 0 PID: 0 Comm: swapper/14 Kdump: loaded Tainted: G        W   E       6.16.0-rc2+ #20 PREEMPT(voluntary)
[  876.949935] Tainted: [W]=WARN, [E]=UNSIGNED_MODULE
[  876.949936] Hardware name: Micro-Star International Co., Ltd. MS-7E16/X670E GAMING PLUS WIFI (MS-7E16), BIOS 1.90 12/31/2024
[  876.949936] RIP: 0010:__list_del_entry_valid_or_report+0x67/0x120
[  876.949938] Code: 00 00 00 48 39 7d 08 0f 85 a6 00 00 00 5b b8 01 00 00 00 5d 41 5c e9 73 0d 93 ff 48 89 fe 48 c7 c7 a0 31 e8 89 e8 59 7c b3 ff &lt;0f&gt; 0b 31 c0 5b 5d 41 5c e9 57 0d 93 ff 48 89 fe 48 c7 c7 c8 31 e8
[  876.949940] RSP: 0018:ffffaa73405d0c60 EFLAGS: 00010282
[  876.949941] RAX: 0000000000000000 RBX: ffffead40445a348 RCX: 0000000000000000
[  876.949942] RDX: 0000000000000105 RSI: 00000
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38490/">CVE-2025-38490 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38490">CVE-2025-38490 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247243">SUSE bug 1247243</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247384">SUSE bug 1247384</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538491" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38491</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38491" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38491" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38491" ref_url="https://www.suse.com/security/cve/CVE-2025-38491" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mptcp: make fallback action and fallback decision atomic

Syzkaller reported the following splat:

  WARNING: CPU: 1 PID: 7704 at net/mptcp/protocol.h:1223 __mptcp_do_fallback net/mptcp/protocol.h:1223 [inline]
  WARNING: CPU: 1 PID: 7704 at net/mptcp/protocol.h:1223 mptcp_do_fallback net/mptcp/protocol.h:1244 [inline]
  WARNING: CPU: 1 PID: 7704 at net/mptcp/protocol.h:1223 check_fully_established net/mptcp/options.c:982 [inline]
  WARNING: CPU: 1 PID: 7704 at net/mptcp/protocol.h:1223 mptcp_incoming_options+0x21a8/0x2510 net/mptcp/options.c:1153
  Modules linked in:
  CPU: 1 UID: 0 PID: 7704 Comm: syz.3.1419 Not tainted 6.16.0-rc3-gbd5ce2324dba #20 PREEMPT(voluntary)
  Hardware name: QEMU Ubuntu 24.04 PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
  RIP: 0010:__mptcp_do_fallback net/mptcp/protocol.h:1223 [inline]
  RIP: 0010:mptcp_do_fallback net/mptcp/protocol.h:1244 [inline]
  RIP: 0010:check_fully_established net/mptcp/options.c:982 [inline]
  RIP: 0010:mptcp_incoming_options+0x21a8/0x2510 net/mptcp/options.c:1153
  Code: 24 18 e8 bb 2a 00 fd e9 1b df ff ff e8 b1 21 0f 00 e8 ec 5f c4 fc 44 0f b7 ac 24 b0 00 00 00 e9 54 f1 ff ff e8 d9 5f c4 fc 90 &lt;0f&gt; 0b 90 e9 b8 f4 ff ff e8 8b 2a 00 fd e9 8d e6 ff ff e8 81 2a 00
  RSP: 0018:ffff8880a3f08448 EFLAGS: 00010246
  RAX: 0000000000000000 RBX: ffff8880180a8000 RCX: ffffffff84afcf45
  RDX: ffff888090223700 RSI: ffffffff84afdaa7 RDI: 0000000000000001
  RBP: ffff888017955780 R08: 0000000000000001 R09: 0000000000000000
  R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
  R13: ffff8880180a8910 R14: ffff8880a3e9d058 R15: 0000000000000000
  FS:  00005555791b8500(0000) GS:ffff88811c495000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: 000000110c2800b7 CR3: 0000000058e44000 CR4: 0000000000350ef0
  Call Trace:
   &lt;IRQ&gt;
   tcp_reset+0x26f/0x2b0 net/ipv4/tcp_input.c:4432
   tcp_validate_incoming+0x1057/0x1b60 net/ipv4/tcp_input.c:5975
   tcp_rcv_established+0x5b5/0x21f0 net/ipv4/tcp_input.c:6166
   tcp_v4_do_rcv+0x5dc/0xa70 net/ipv4/tcp_ipv4.c:1925
   tcp_v4_rcv+0x3473/0x44a0 net/ipv4/tcp_ipv4.c:2363
   ip_protocol_deliver_rcu+0xba/0x480 net/ipv4/ip_input.c:205
   ip_local_deliver_finish+0x2f1/0x500 net/ipv4/ip_input.c:233
   NF_HOOK include/linux/netfilter.h:317 [inline]
   NF_HOOK include/linux/netfilter.h:311 [inline]
   ip_local_deliver+0x1be/0x560 net/ipv4/ip_input.c:254
   dst_input include/net/dst.h:469 [inline]
   ip_rcv_finish net/ipv4/ip_input.c:447 [inline]
   NF_HOOK include/linux/netfilter.h:317 [inline]
   NF_HOOK include/linux/netfilter.h:311 [inline]
   ip_rcv+0x514/0x810 net/ipv4/ip_input.c:567
   __netif_receive_skb_one_core+0x197/0x1e0 net/core/dev.c:5975
   __netif_receive_skb+0x1f/0x120 net/core/dev.c:6088
   process_backlog+0x301/0x1360 net/core/dev.c:6440
   __napi_poll.constprop.0+0xba/0x550 net/core/dev.c:7453
   napi_poll net/core/dev.c:7517 [inline]
   net_rx_action+0xb44/0x1010 net/core/dev.c:7644
   handle_softirqs+0x1d0/0x770 kernel/softirq.c:579
   do_softirq+0x3f/0x90 kernel/softirq.c:480
   &lt;/IRQ&gt;
   &lt;TASK&gt;
   __local_bh_enable_ip+0xed/0x110 kernel/softirq.c:407
   local_bh_enable include/linux/bottom_half.h:33 [inline]
   inet_csk_listen_stop+0x2c5/0x1070 net/ipv4/inet_connection_sock.c:1524
   mptcp_check_listen_stop.part.0+0x1cc/0x220 net/mptcp/protocol.c:2985
   mptcp_check_listen_stop net/mptcp/mib.h:118 [inline]
   __mptcp_close+0x9b9/0xbd0 net/mptcp/protocol.c:3000
   mptcp_close+0x2f/0x140 net/mptcp/protocol.c:3066
   inet_release+0xed/0x200 net/ipv4/af_inet.c:435
   inet6_release+0x4f/0x70 net/ipv6/af_inet6.c:487
   __sock_release+0xb3/0x270 net/socket.c:649
   sock_close+0x1c/0x30 net/socket.c:1439
   __fput+0x402/0xb70 fs/file_table.c:465
   task_work_run+0x150/0x240 kernel/task_work.c:227
   resume_user_mode_work include/linux/resume_user_mode.h:50 [inline]
   exit_to_user_mode_loop+0xd4
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="2.3/CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38491/">CVE-2025-38491 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38491">CVE-2025-38491 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247280">SUSE bug 1247280</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538493" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38493</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38493" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38493" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38493" ref_url="https://www.suse.com/security/cve/CVE-2025-38493" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tracing/osnoise: Fix crash in timerlat_dump_stack()

We have observed kernel panics when using timerlat with stack saving,
with the following dmesg output:

memcpy: detected buffer overflow: 88 byte write of buffer size 0
WARNING: CPU: 2 PID: 8153 at lib/string_helpers.c:1032 __fortify_report+0x55/0xa0
CPU: 2 UID: 0 PID: 8153 Comm: timerlatu/2 Kdump: loaded Not tainted 6.15.3-200.fc42.x86_64 #1 PREEMPT(lazy)
Call Trace:
 &lt;TASK&gt;
 ? trace_buffer_lock_reserve+0x2a/0x60
 __fortify_panic+0xd/0xf
 __timerlat_dump_stack.cold+0xd/0xd
 timerlat_dump_stack.part.0+0x47/0x80
 timerlat_fd_read+0x36d/0x390
 vfs_read+0xe2/0x390
 ? syscall_exit_to_user_mode+0x1d5/0x210
 ksys_read+0x73/0xe0
 do_syscall_64+0x7b/0x160
 ? exc_page_fault+0x7e/0x1a0
 entry_SYSCALL_64_after_hwframe+0x76/0x7e

__timerlat_dump_stack() constructs the ftrace stack entry like this:

struct stack_entry *entry;
...
memcpy(&amp;entry-&gt;caller, fstack-&gt;calls, size);
entry-&gt;size = fstack-&gt;nr_entries;

Since commit e7186af7fb26 ("tracing: Add back FORTIFY_SOURCE logic to
kernel_stack event structure"), struct stack_entry marks its caller
field with __counted_by(size). At the time of the memcpy, entry-&gt;size
contains garbage from the ringbuffer, which under some circumstances is
zero, triggering a kernel panic by buffer overflow.

Populate the size field before the memcpy so that the out-of-bounds
check knows the correct size. This is analogous to
__ftrace_trace_stack().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38493/">CVE-2025-38493 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38493">CVE-2025-38493 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247283">SUSE bug 1247283</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38494</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38494" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38494" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38494" ref_url="https://www.suse.com/security/cve/CVE-2025-38494" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02820-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041241.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02821-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02823-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02827-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02830-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02832-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02833-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02834-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02848-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02849-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02850-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02851-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02852-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02854-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02857-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02858-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02859-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02860-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02873-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02875-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02876-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02878-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02883-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02884-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02897-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02908-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02909-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02911-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02917-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02918-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02922-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02926-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02930-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02932-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02933-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02934-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02936-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02937-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02938-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02942-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02943-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02944-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02945-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02955-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20634-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20635-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20676-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20677-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20678-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20680-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20681-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20684-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20685-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20686-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20687-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041613.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20688-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20689-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20690-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20713-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20781-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: core: do not bypass hid_hw_raw_request

hid_hw_raw_request() is actually useful to ensure the provided buffer
and length are valid. Directly calling in the low level transport driver
function bypassed those checks and allowed invalid paramto be used.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38494/">CVE-2025-38494 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38494">CVE-2025-38494 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247349">SUSE bug 1247349</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247350">SUSE bug 1247350</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538495" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38495</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38495" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38495" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38495" ref_url="https://www.suse.com/security/cve/CVE-2025-38495" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02820-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041241.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02821-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02823-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02827-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02830-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02832-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02833-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02834-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02846-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02848-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02849-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02850-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02851-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02852-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02854-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02857-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02858-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02859-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02860-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02871-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02873-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02875-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02876-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02878-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02883-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02884-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02897-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02902-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02908-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02909-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02911-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02917-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02918-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02922-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02926-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02930-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02932-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02933-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02934-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02936-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02937-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02938-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02942-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02943-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02944-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02945-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02955-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20634-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20635-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20639-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20640-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20642-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20645-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20676-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20677-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20678-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20680-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20681-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20684-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20685-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20686-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20687-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041613.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20688-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20689-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20690-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20713-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20781-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: core: ensure the allocated report buffer can contain the reserved report ID

When the report ID is not used, the low level transport drivers expect
the first byte to be 0. However, currently the allocated buffer not
account for that extra byte, meaning that instead of having 8 guaranteed
bytes for implement to be working, we only have 7.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38495/">CVE-2025-38495 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38495">CVE-2025-38495 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247348">SUSE bug 1247348</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1247351">SUSE bug 1247351</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538496" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38496</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38496" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38496" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38496" ref_url="https://www.suse.com/security/cve/CVE-2025-38496" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dm-bufio: fix sched in atomic context

If "try_verify_in_tasklet" is set for dm-verity, DM_BUFIO_CLIENT_NO_SLEEP
is enabled for dm-bufio. However, when bufio tries to evict buffers, there
is a chance to trigger scheduling in spin_lock_bh, the following warning
is hit:

BUG: sleeping function called from invalid context at drivers/md/dm-bufio.c:2745
in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 123, name: kworker/2:2
preempt_count: 201, expected: 0
RCU nest depth: 0, expected: 0
4 locks held by kworker/2:2/123:
 #0: ffff88800a2d1548 ((wq_completion)dm_bufio_cache){....}-{0:0}, at: process_one_work+0xe46/0x1970
 #1: ffffc90000d97d20 ((work_completion)(&amp;dm_bufio_replacement_work)){....}-{0:0}, at: process_one_work+0x763/0x1970
 #2: ffffffff8555b528 (dm_bufio_clients_lock){....}-{3:3}, at: do_global_cleanup+0x1ce/0x710
 #3: ffff88801d5820b8 (&amp;c-&gt;spinlock){....}-{2:2}, at: do_global_cleanup+0x2a5/0x710
Preemption disabled at:
[&lt;0000000000000000&gt;] 0x0
CPU: 2 UID: 0 PID: 123 Comm: kworker/2:2 Not tainted 6.16.0-rc3-g90548c634bd0 #305 PREEMPT(voluntary)
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014
Workqueue: dm_bufio_cache do_global_cleanup
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0x53/0x70
 __might_resched+0x360/0x4e0
 do_global_cleanup+0x2f5/0x710
 process_one_work+0x7db/0x1970
 worker_thread+0x518/0xea0
 kthread+0x359/0x690
 ret_from_fork+0xf3/0x1b0
 ret_from_fork_asm+0x1a/0x30
 &lt;/TASK&gt;

That can be reproduced by:

  veritysetup format --data-block-size=4096 --hash-block-size=4096 /dev/vda /dev/vdb
  SIZE=$(blockdev --getsz /dev/vda)
  dmsetup create myverity -r --table "0 $SIZE verity 1 /dev/vda /dev/vdb 4096 4096 &lt;data_blocks&gt; 1 sha256 &lt;root_hash&gt; &lt;salt&gt; 1 try_verify_in_tasklet"
  mount /dev/dm-0 /mnt -o ro
  echo 102400 &gt; /sys/module/dm_bufio/parameters/max_cache_size_bytes
  [read files in /mnt]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38496/">CVE-2025-38496 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38496">CVE-2025-38496 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247284">SUSE bug 1247284</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538497" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38497</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38497" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38497" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38497" ref_url="https://www.suse.com/security/cve/CVE-2025-38497" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02848-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02849-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02850-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02851-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02852-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03011-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20601-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: gadget: configfs: Fix OOB read on empty string write

When writing an empty string to either 'qw_sign' or 'landingPage'
sysfs attributes, the store functions attempt to access page[l - 1]
before validating that the length 'l' is greater than zero.

This patch fixes the vulnerability by adding a check at the beginning
of os_desc_qw_sign_store() and webusb_landingPage_store() to handle
the zero-length input case gracefully by returning immediately.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38497/">CVE-2025-38497 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38497">CVE-2025-38497 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247347">SUSE bug 1247347</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538499" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38499</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38499" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38499" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38499" ref_url="https://www.suse.com/security/cve/CVE-2025-38499" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23241" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03283-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03310-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03314-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03652-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03656-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03662-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03663-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03664-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03666-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03671-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03672-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023108.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3675-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3683-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3703-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3704-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3705-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042243.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3712-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3717-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3720-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3721-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3731-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3733-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3734-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3736-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3740-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3742-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3748-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3755-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3762-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3764-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3765-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3768-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3770-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3771-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3772-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

clone_private_mnt(): make sure that caller has CAP_SYS_ADMIN in the right userns

What we want is to verify there is that clone won't expose something
hidden by a mount we wouldn't be able to undo.  "Wouldn't be able to undo"
may be a result of MNT_LOCKED on a child, but it may also come from
lacking admin rights in the userns of the namespace mount belongs to.

clone_private_mnt() checks the former, but not the latter.

There's a number of rather confusing CAP_SYS_ADMIN checks in various
userns during the mount, especially with the new mount API; they serve
different purposes and in case of clone_private_mnt() they usually,
but not always end up covering the missing check mentioned above.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H" cvss4="6.2/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-38499/">CVE-2025-38499 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38499">CVE-2025-38499 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247976">SUSE bug 1247976</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248673">SUSE bug 1248673</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538500" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38500</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38500" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38500" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38500" ref_url="https://www.suse.com/security/cve/CVE-2025-38500" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:15011" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023348.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xfrm: interface: fix use-after-free after changing collect_md xfrm interface

collect_md property on xfrm interfaces can only be set on device creation,
thus xfrmi_changelink() should fail when called on such interfaces.

The check to enforce this was done only in the case where the xi was
returned from xfrmi_locate() which doesn't look for the collect_md
interface, and thus the validation was never reached.

Calling changelink would thus errornously place the special interface xi
in the xfrmi_net-&gt;xfrmi hash, but since it also exists in the
xfrmi_net-&gt;collect_md_xfrmi pointer it would lead to a double free when
the net namespace was taken down [1].

Change the check to use the xi from netdev_priv which is available earlier
in the function to prevent changes in xfrm collect_md interfaces.

[1] resulting oops:
[    8.516540] kernel BUG at net/core/dev.c:12029!
[    8.516552] Oops: invalid opcode: 0000 [#1] SMP NOPTI
[    8.516559] CPU: 0 UID: 0 PID: 12 Comm: kworker/u80:0 Not tainted 6.15.0-virtme #5 PREEMPT(voluntary)
[    8.516565] Hardware name: QEMU Ubuntu 24.04 PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[    8.516569] Workqueue: netns cleanup_net
[    8.516579] RIP: 0010:unregister_netdevice_many_notify+0x101/0xab0
[    8.516590] Code: 90 0f 0b 90 48 8b b0 78 01 00 00 48 8b 90 80 01 00 00 48 89 56 08 48 89 32 4c 89 80 78 01 00 00 48 89 b8 80 01 00 00 eb ac 90 &lt;0f&gt; 0b 48 8b 45 00 4c 8d a0 88 fe ff ff 48 39 c5 74 5c 41 80 bc 24
[    8.516593] RSP: 0018:ffffa93b8006bd30 EFLAGS: 00010206
[    8.516598] RAX: ffff98fe4226e000 RBX: ffffa93b8006bd58 RCX: ffffa93b8006bc60
[    8.516601] RDX: 0000000000000004 RSI: 0000000000000000 RDI: dead000000000122
[    8.516603] RBP: ffffa93b8006bdd8 R08: dead000000000100 R09: ffff98fe4133c100
[    8.516605] R10: 0000000000000000 R11: 00000000000003d2 R12: ffffa93b8006be00
[    8.516608] R13: ffffffff96c1a510 R14: ffffffff96c1a510 R15: ffffa93b8006be00
[    8.516615] FS:  0000000000000000(0000) GS:ffff98fee73b7000(0000) knlGS:0000000000000000
[    8.516619] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[    8.516622] CR2: 00007fcd2abd0700 CR3: 000000003aa40000 CR4: 0000000000752ef0
[    8.516625] PKRU: 55555554
[    8.516627] Call Trace:
[    8.516632]  &lt;TASK&gt;
[    8.516635]  ? rtnl_is_locked+0x15/0x20
[    8.516641]  ? unregister_netdevice_queue+0x29/0xf0
[    8.516650]  ops_undo_list+0x1f2/0x220
[    8.516659]  cleanup_net+0x1ad/0x2e0
[    8.516664]  process_one_work+0x160/0x380
[    8.516673]  worker_thread+0x2aa/0x3c0
[    8.516679]  ? __pfx_worker_thread+0x10/0x10
[    8.516686]  kthread+0xfb/0x200
[    8.516690]  ? __pfx_kthread+0x10/0x10
[    8.516693]  ? __pfx_kthread+0x10/0x10
[    8.516697]  ret_from_fork+0x82/0xf0
[    8.516705]  ? __pfx_kthread+0x10/0x10
[    8.516709]  ret_from_fork_asm+0x1a/0x30
[    8.516718]  &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38500/">CVE-2025-38500 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38500">CVE-2025-38500 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248088">SUSE bug 1248088</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248672">SUSE bug 1248672</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538503" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38503</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38503" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38503" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38503" ref_url="https://www.suse.com/security/cve/CVE-2025-38503" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix assertion when building free space tree

When building the free space tree with the block group tree feature
enabled, we can hit an assertion failure like this:

  BTRFS info (device loop0 state M): rebuilding free space tree
  assertion failed: ret == 0, in fs/btrfs/free-space-tree.c:1102
  ------------[ cut here ]------------
  kernel BUG at fs/btrfs/free-space-tree.c:1102!
  Internal error: Oops - BUG: 00000000f2000800 [#1]  SMP
  Modules linked in:
  CPU: 1 UID: 0 PID: 6592 Comm: syz-executor322 Not tainted 6.15.0-rc7-syzkaller-gd7fa1af5b33e #0 PREEMPT
  Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
  pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
  pc : populate_free_space_tree+0x514/0x518 fs/btrfs/free-space-tree.c:1102
  lr : populate_free_space_tree+0x514/0x518 fs/btrfs/free-space-tree.c:1102
  sp : ffff8000a4ce7600
  x29: ffff8000a4ce76e0 x28: ffff0000c9bc6000 x27: ffff0000ddfff3d8
  x26: ffff0000ddfff378 x25: dfff800000000000 x24: 0000000000000001
  x23: ffff8000a4ce7660 x22: ffff70001499cecc x21: ffff0000e1d8c160
  x20: ffff0000e1cb7800 x19: ffff0000e1d8c0b0 x18: 00000000ffffffff
  x17: ffff800092f39000 x16: ffff80008ad27e48 x15: ffff700011e740c0
  x14: 1ffff00011e740c0 x13: 0000000000000004 x12: ffffffffffffffff
  x11: ffff700011e740c0 x10: 0000000000ff0100 x9 : 94ef24f55d2dbc00
  x8 : 94ef24f55d2dbc00 x7 : 0000000000000001 x6 : 0000000000000001
  x5 : ffff8000a4ce6f98 x4 : ffff80008f415ba0 x3 : ffff800080548ef0
  x2 : 0000000000000000 x1 : 0000000100000000 x0 : 000000000000003e
  Call trace:
   populate_free_space_tree+0x514/0x518 fs/btrfs/free-space-tree.c:1102 (P)
   btrfs_rebuild_free_space_tree+0x14c/0x54c fs/btrfs/free-space-tree.c:1337
   btrfs_start_pre_rw_mount+0xa78/0xe10 fs/btrfs/disk-io.c:3074
   btrfs_remount_rw fs/btrfs/super.c:1319 [inline]
   btrfs_reconfigure+0x828/0x2418 fs/btrfs/super.c:1543
   reconfigure_super+0x1d4/0x6f0 fs/super.c:1083
   do_remount fs/namespace.c:3365 [inline]
   path_mount+0xb34/0xde0 fs/namespace.c:4200
   do_mount fs/namespace.c:4221 [inline]
   __do_sys_mount fs/namespace.c:4432 [inline]
   __se_sys_mount fs/namespace.c:4409 [inline]
   __arm64_sys_mount+0x3e8/0x468 fs/namespace.c:4409
   __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline]
   invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49
   el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132
   do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151
   el0_svc+0x58/0x17c arch/arm64/kernel/entry-common.c:767
   el0t_64_sync_handler+0x78/0x108 arch/arm64/kernel/entry-common.c:786
   el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:600
  Code: f0047182 91178042 528089c3 9771d47b (d4210000)
  ---[ end trace 0000000000000000 ]---

This happens because we are processing an empty block group, which has
no extents allocated from it, there are no items for this block group,
including the block group item since block group items are stored in a
dedicated tree when using the block group tree feature. It also means
this is the block group with the highest start offset, so there are no
higher keys in the extent root, hence btrfs_search_slot_for_read()
returns 1 (no higher key found).

Fix this by asserting 'ret' is 0 only if the block group tree feature
is not enabled, in which case we should find a block group item for
the block group since it's stored in the extent root and block group
item keys are greater than extent item keys (the value for
BTRFS_BLOCK_GROUP_ITEM_KEY is 192 and for BTRFS_EXTENT_ITEM_KEY and
BTRFS_METADATA_ITEM_KEY the values are 168 and 169 respectively).
In case 'ret' is 1, we just need to add a record to the free space
tree which spans the whole block group, and we can achieve this by
making 'ret == 0' as the while loop's condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38503/">CVE-2025-38503 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38503">CVE-2025-38503 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248183">SUSE bug 1248183</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38505</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38505" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38505" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38505" ref_url="https://www.suse.com/security/cve/CVE-2025-38505" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mwifiex: discard erroneous disassoc frames on STA interface

When operating in concurrent STA/AP mode with host MLME enabled,
the firmware incorrectly sends disassociation frames to the STA
interface when clients disconnect from the AP interface.
This causes kernel warnings as the STA interface processes
disconnect events that don't apply to it:

[ 1303.240540] WARNING: CPU: 0 PID: 513 at net/wireless/mlme.c:141 cfg80211_process_disassoc+0x78/0xec [cfg80211]
[ 1303.250861] Modules linked in: 8021q garp stp mrp llc rfcomm bnep btnxpuart nls_iso8859_1 nls_cp437 onboard_us
[ 1303.327651] CPU: 0 UID: 0 PID: 513 Comm: kworker/u9:2 Not tainted 6.16.0-rc1+ #3 PREEMPT
[ 1303.335937] Hardware name: Toradex Verdin AM62 WB on Verdin Development Board (DT)
[ 1303.343588] Workqueue: MWIFIEX_RX_WORK_QUEUE mwifiex_rx_work_queue [mwifiex]
[ 1303.350856] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[ 1303.357904] pc : cfg80211_process_disassoc+0x78/0xec [cfg80211]
[ 1303.364065] lr : cfg80211_process_disassoc+0x70/0xec [cfg80211]
[ 1303.370221] sp : ffff800083053be0
[ 1303.373590] x29: ffff800083053be0 x28: 0000000000000000 x27: 0000000000000000
[ 1303.380855] x26: 0000000000000000 x25: 00000000ffffffff x24: ffff000002c5b8ae
[ 1303.388120] x23: ffff000002c5b884 x22: 0000000000000001 x21: 0000000000000008
[ 1303.395382] x20: ffff000002c5b8ae x19: ffff0000064dd408 x18: 0000000000000006
[ 1303.402646] x17: 3a36333a61623a30 x16: 32206d6f72662063 x15: ffff800080bfe048
[ 1303.409910] x14: ffff000003625300 x13: 0000000000000001 x12: 0000000000000000
[ 1303.417173] x11: 0000000000000002 x10: ffff000003958600 x9 : ffff000003625300
[ 1303.424434] x8 : ffff00003fd9ef40 x7 : ffff0000039fc280 x6 : 0000000000000002
[ 1303.431695] x5 : ffff0000038976d4 x4 : 0000000000000000 x3 : 0000000000003186
[ 1303.438956] x2 : 000000004836ba20 x1 : 0000000000006986 x0 : 00000000d00479de
[ 1303.446221] Call trace:
[ 1303.448722]  cfg80211_process_disassoc+0x78/0xec [cfg80211] (P)
[ 1303.454894]  cfg80211_rx_mlme_mgmt+0x64/0xf8 [cfg80211]
[ 1303.460362]  mwifiex_process_mgmt_packet+0x1ec/0x460 [mwifiex]
[ 1303.466380]  mwifiex_process_sta_rx_packet+0x1bc/0x2a0 [mwifiex]
[ 1303.472573]  mwifiex_handle_rx_packet+0xb4/0x13c [mwifiex]
[ 1303.478243]  mwifiex_rx_work_queue+0x158/0x198 [mwifiex]
[ 1303.483734]  process_one_work+0x14c/0x28c
[ 1303.487845]  worker_thread+0x2cc/0x3d4
[ 1303.491680]  kthread+0x12c/0x208
[ 1303.495014]  ret_from_fork+0x10/0x20

Add validation in the STA receive path to verify that disassoc/deauth
frames originate from the connected AP. Frames that fail this check
are discarded early, preventing them from reaching the MLME layer and
triggering WARN_ON().

This filtering logic is similar with that used in the
ieee80211_rx_mgmt_disassoc() function in mac80211, which drops
disassoc frames that don't match the current BSSID
(!ether_addr_equal(mgmt-&gt;bssid, sdata-&gt;vif.cfg.ap_addr)), ensuring
only relevant frames are processed.

Tested on:
- 8997 with FW 16.68.1.p197
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-06"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38505/">CVE-2025-38505 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38505">CVE-2025-38505 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248185">SUSE bug 1248185</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38506</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38506" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38506" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38506" ref_url="https://www.suse.com/security/cve/CVE-2025-38506" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: Allow CPU to reschedule while setting per-page memory attributes

When running an SEV-SNP guest with a sufficiently large amount of memory (1TB+),
the host can experience CPU soft lockups when running an operation in
kvm_vm_set_mem_attributes() to set memory attributes on the whole
range of guest memory.

watchdog: BUG: soft lockup - CPU#8 stuck for 26s! [qemu-kvm:6372]
CPU: 8 UID: 0 PID: 6372 Comm: qemu-kvm Kdump: loaded Not tainted 6.15.0-rc7.20250520.el9uek.rc1.x86_64 #1 PREEMPT(voluntary)
Hardware name: Oracle Corporation ORACLE SERVER E4-2c/Asm,MB Tray,2U,E4-2c, BIOS 78016600 11/13/2024
RIP: 0010:xas_create+0x78/0x1f0
Code: 00 00 00 41 80 fc 01 0f 84 82 00 00 00 ba 06 00 00 00 bd 06 00 00 00 49 8b 45 08 4d 8d 65 08 41 39 d6 73 20 83 ed 06 48 85 c0 &lt;74&gt; 67 48 89 c2 83 e2 03 48 83 fa 02 75 0c 48 3d 00 10 00 00 0f 87
RSP: 0018:ffffad890a34b940 EFLAGS: 00000286
RAX: ffff96f30b261daa RBX: ffffad890a34b9c8 RCX: 0000000000000000
RDX: 000000000000001e RSI: 0000000000000000 RDI: 0000000000000000
RBP: 0000000000000018 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: ffffad890a356868
R13: ffffad890a356860 R14: 0000000000000000 R15: ffffad890a356868
FS:  00007f5578a2a400(0000) GS:ffff97ed317e1000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f015c70fb18 CR3: 00000001109fd006 CR4: 0000000000f70ef0
PKRU: 55555554
Call Trace:
 &lt;TASK&gt;
 xas_store+0x58/0x630
 __xa_store+0xa5/0x130
 xa_store+0x2c/0x50
 kvm_vm_set_mem_attributes+0x343/0x710 [kvm]
 kvm_vm_ioctl+0x796/0xab0 [kvm]
 __x64_sys_ioctl+0xa3/0xd0
 do_syscall_64+0x8c/0x7a0
 entry_SYSCALL_64_after_hwframe+0x76/0x7e
RIP: 0033:0x7f5578d031bb
Code: ff ff ff 85 c0 79 9b 49 c7 c4 ff ff ff ff 5b 5d 4c 89 e0 41 5c c3 66 0f 1f 84 00 00 00 00 00 f3 0f 1e fa b8 10 00 00 00 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 8b 0d 2d 4c 0f 00 f7 d8 64 89 01 48
RSP: 002b:00007ffe0a742b88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 000000004020aed2 RCX: 00007f5578d031bb
RDX: 00007ffe0a742c80 RSI: 000000004020aed2 RDI: 000000000000000b
RBP: 0000010000000000 R08: 0000010000000000 R09: 0000017680000000
R10: 0000000000000080 R11: 0000000000000246 R12: 00005575e5f95120
R13: 00007ffe0a742c80 R14: 0000000000000008 R15: 00005575e5f961e0

While looping through the range of memory setting the attributes,
call cond_resched() to give the scheduler a chance to run a higher
priority task on the runqueue if necessary and avoid staying in
kernel mode long enough to trigger the lockup.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38506/">CVE-2025-38506 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38506">CVE-2025-38506 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248186">SUSE bug 1248186</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538507" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38507</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38507" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38507" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38507" ref_url="https://www.suse.com/security/cve/CVE-2025-38507" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: nintendo: avoid bluetooth suspend/resume stalls

Ensure we don't stall or panic the kernel when using bluetooth-connected
controllers. This was reported as an issue on android devices using
kernel 6.6 due to the resume hook which had been added for usb joycons.

First, set a new state value to JOYCON_CTLR_STATE_SUSPENDED in a
newly-added nintendo_hid_suspend. This makes sure we will not stall out
the kernel waiting for input reports during led classdev suspend. The
stalls could happen if connectivity is unreliable or lost to the
controller prior to suspend.

Second, since we lose connectivity during suspend, do not try
joycon_init() for bluetooth controllers in the nintendo_hid_resume path.

Tested via multiple suspend/resume flows when using the controller both
in USB and bluetooth modes.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38507/">CVE-2025-38507 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38507">CVE-2025-38507 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248188">SUSE bug 1248188</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538508" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38508</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38508" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38508" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38508" ref_url="https://www.suse.com/security/cve/CVE-2025-38508" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/sev: Use TSC_FACTOR for Secure TSC frequency calculation

When using Secure TSC, the GUEST_TSC_FREQ MSR reports a frequency based on
the nominal P0 frequency, which deviates slightly (typically ~0.2%) from
the actual mean TSC frequency due to clocking parameters.

Over extended VM uptime, this discrepancy accumulates, causing clock skew
between the hypervisor and a SEV-SNP VM, leading to early timer interrupts as
perceived by the guest.

The guest kernel relies on the reported nominal frequency for TSC-based
timekeeping, while the actual frequency set during SNP_LAUNCH_START may
differ. This mismatch results in inaccurate time calculations, causing the
guest to perceive hrtimers as firing earlier than expected.

Utilize the TSC_FACTOR from the SEV firmware's secrets page (see "Secrets
Page Format" in the SNP Firmware ABI Specification) to calculate the mean
TSC frequency, ensuring accurate timekeeping and mitigating clock skew in
SEV-SNP VMs.

Use early_ioremap_encrypted() to map the secrets page as
ioremap_encrypted() uses kmalloc() which is not available during early TSC
initialization and causes a panic.

  [ bp: Drop the silly dummy var:
    https://lore.kernel.org/r/20250630192726.GBaGLlHl84xIopx4Pt@fat_crate.local ]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38508/">CVE-2025-38508 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38508">CVE-2025-38508 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248190">SUSE bug 1248190</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538510" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38510</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38510" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38510" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38510" ref_url="https://www.suse.com/security/cve/CVE-2025-38510" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

kasan: remove kasan_find_vm_area() to prevent possible deadlock

find_vm_area() couldn't be called in atomic_context.  If find_vm_area() is
called to reports vm area information, kasan can trigger deadlock like:

CPU0                                CPU1
vmalloc();
 alloc_vmap_area();
  spin_lock(&amp;vn-&gt;busy.lock)
                                    spin_lock_bh(&amp;some_lock);
   &lt;interrupt occurs&gt;
   &lt;in softirq&gt;
   spin_lock(&amp;some_lock);
                                    &lt;access invalid address&gt;
                                    kasan_report();
                                     print_report();
                                      print_address_description();
                                       kasan_find_vm_area();
                                        find_vm_area();
                                         spin_lock(&amp;vn-&gt;busy.lock) // deadlock!

To prevent possible deadlock while kasan reports, remove kasan_find_vm_area().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38510/">CVE-2025-38510 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38510">CVE-2025-38510 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248166">SUSE bug 1248166</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538511" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38511</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38511" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38511" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38511" ref_url="https://www.suse.com/security/cve/CVE-2025-38511" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/xe/pf: Clear all LMTT pages on alloc

Our LMEM buffer objects are not cleared by default on alloc
and during VF provisioning we only setup LMTT PTEs for the
actually provisioned LMEM range. But beyond that valid range
we might leave some stale data that could either point to some
other VFs allocations or even to the PF pages.

Explicitly clear all new LMTT page to avoid the risk that a
malicious VF would try to exploit that gap.

While around add asserts to catch any undesired PTE overwrites
and low-level debug traces to track LMTT PT life-cycle.

(cherry picked from commit 3fae6918a3e27cce20ded2551f863fb05d4bef8d)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-06"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38511/">CVE-2025-38511 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38511">CVE-2025-38511 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248175">SUSE bug 1248175</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248176">SUSE bug 1248176</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538512" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38512</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38512" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38512" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38512" ref_url="https://www.suse.com/security/cve/CVE-2025-38512" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: prevent A-MSDU attacks in mesh networks

This patch is a mitigation to prevent the A-MSDU spoofing vulnerability
for mesh networks. The initial update to the IEEE 802.11 standard, in
response to the FragAttacks, missed this case (CVE-2025-27558). It can
be considered a variant of CVE-2020-24588 but for mesh networks.

This patch tries to detect if a standard MSDU was turned into an A-MSDU
by an adversary. This is done by parsing a received A-MSDU as a standard
MSDU, calculating the length of the Mesh Control header, and seeing if
the 6 bytes after this header equal the start of an rfc1042 header. If
equal, this is a strong indication of an ongoing attack attempt.

This defense was tested with mac80211_hwsim against a mesh network that
uses an empty Mesh Address Extension field, i.e., when four addresses
are used, and when using a 12-byte Mesh Address Extension field, i.e.,
when six addresses are used. Functionality of normal MSDUs and A-MSDUs
was also tested, and confirmed working, when using both an empty and
12-byte Mesh Address Extension field.

It was also tested with mac80211_hwsim that A-MSDU attacks in non-mesh
networks keep being detected and prevented.

Note that the vulnerability being patched, and the defense being
implemented, was also discussed in the following paper and in the
following IEEE 802.11 presentation:

https://papers.mathyvanhoef.com/wisec2025.pdf
https://mentor.ieee.org/802.11/dcn/25/11-25-0949-00-000m-a-msdu-mesh-spoof-protection.docx
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="6.9/CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38512/">CVE-2025-38512 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38512">CVE-2025-38512 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248178">SUSE bug 1248178</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538513" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38513</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38513" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38513" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38513" ref_url="https://www.suse.com/security/cve/CVE-2025-38513" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: zd1211rw: Fix potential NULL pointer dereference in zd_mac_tx_to_dev()

There is a potential NULL pointer dereference in zd_mac_tx_to_dev(). For
example, the following is possible:

    	T0			    		T1
zd_mac_tx_to_dev()
  /* len == skb_queue_len(q) */
  while (len &gt; ZD_MAC_MAX_ACK_WAITERS) {

					  filter_ack()
					    spin_lock_irqsave(&amp;q-&gt;lock, flags);
					    /* position == skb_queue_len(q) */
					    for (i=1; i&lt;position; i++)
				    	      skb = __skb_dequeue(q)

					    if (mac-&gt;type == NL80211_IFTYPE_AP)
					      skb = __skb_dequeue(q);
					    spin_unlock_irqrestore(&amp;q-&gt;lock, flags);

    skb_dequeue() -&gt; NULL

Since there is a small gap between checking skb queue length and skb being
unconditionally dequeued in zd_mac_tx_to_dev(), skb_dequeue() can return NULL.
Then the pointer is passed to zd_mac_tx_status() where it is dereferenced.

In order to avoid potential NULL pointer dereference due to situations like
above, check if skb is not NULL before passing it to zd_mac_tx_status().

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38513/">CVE-2025-38513 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38513">CVE-2025-38513 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248179">SUSE bug 1248179</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538514" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38514</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38514" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38514" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38514" ref_url="https://www.suse.com/security/cve/CVE-2025-38514" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

rxrpc: Fix oops due to non-existence of prealloc backlog struct

If an AF_RXRPC service socket is opened and bound, but calls are
preallocated, then rxrpc_alloc_incoming_call() will oops because the
rxrpc_backlog struct doesn't get allocated until the first preallocation is
made.

Fix this by returning NULL from rxrpc_alloc_incoming_call() if there is no
backlog struct.  This will cause the incoming call to be aborted.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38514/">CVE-2025-38514 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38514">CVE-2025-38514 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248202">SUSE bug 1248202</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538515" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38515</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38515" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38515" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38515" ref_url="https://www.suse.com/security/cve/CVE-2025-38515" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/sched: Increment job count before swapping tail spsc queue

A small race exists between spsc_queue_push and the run-job worker, in
which spsc_queue_push may return not-first while the run-job worker has
already idled due to the job count being zero. If this race occurs, job
scheduling stops, leading to hangs while waiting on the job's DMA
fences.

Seal this race by incrementing the job count before appending to the
SPSC queue.

This race was observed on a drm-tip 6.16-rc1 build with the Xe driver in
an SVM test case.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38515/">CVE-2025-38515 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38515">CVE-2025-38515 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248212">SUSE bug 1248212</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538516" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38516</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38516" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38516" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38516" ref_url="https://www.suse.com/security/cve/CVE-2025-38516" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pinctrl: qcom: msm: mark certain pins as invalid for interrupts

On some platforms, the UFS-reset pin has no interrupt logic in TLMM but
is nevertheless registered as a GPIO in the kernel. This enables the
user-space to trigger a BUG() in the pinctrl-msm driver by running, for
example: `gpiomon -c 0 113` on RB2.

The exact culprit is requesting pins whose intr_detection_width setting
is not 1 or 2 for interrupts. This hits a BUG() in
msm_gpio_irq_set_type(). Potentially crashing the kernel due to an
invalid request from user-space is not optimal, so let's go through the
pins and mark those that would fail the check as invalid for the irq chip
as we should not even register them as available irqs.

This function can be extended if we determine that there are more
corner-cases like this.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38516/">CVE-2025-38516 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38516">CVE-2025-38516 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248209">SUSE bug 1248209</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538520" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38520</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38520" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38520" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38520" ref_url="https://www.suse.com/security/cve/CVE-2025-38520" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdkfd: Don't call mmput from MMU notifier callback

If the process is exiting, the mmput inside mmu notifier callback from
compactd or fork or numa balancing could release the last reference
of mm struct to call exit_mmap and free_pgtable, this triggers deadlock
with below backtrace.

The deadlock will leak kfd process as mmu notifier release is not called
and cause VRAM leaking.

The fix is to take mm reference mmget_non_zero when adding prange to the
deferred list to pair with mmput in deferred list work.

If prange split and add into pchild list, the pchild work_item.mm is not
used, so remove the mm parameter from svm_range_unmap_split and
svm_range_add_child.

The backtrace of hung task:

 INFO: task python:348105 blocked for more than 64512 seconds.
 Call Trace:
  __schedule+0x1c3/0x550
  schedule+0x46/0xb0
  rwsem_down_write_slowpath+0x24b/0x4c0
  unlink_anon_vmas+0xb1/0x1c0
  free_pgtables+0xa9/0x130
  exit_mmap+0xbc/0x1a0
  mmput+0x5a/0x140
  svm_range_cpu_invalidate_pagetables+0x2b/0x40 [amdgpu]
  mn_itree_invalidate+0x72/0xc0
  __mmu_notifier_invalidate_range_start+0x48/0x60
  try_to_unmap_one+0x10fa/0x1400
  rmap_walk_anon+0x196/0x460
  try_to_unmap+0xbb/0x210
  migrate_page_unmap+0x54d/0x7e0
  migrate_pages_batch+0x1c3/0xae0
  migrate_pages_sync+0x98/0x240
  migrate_pages+0x25c/0x520
  compact_zone+0x29d/0x590
  compact_zone_order+0xb6/0xf0
  try_to_compact_pages+0xbe/0x220
  __alloc_pages_direct_compact+0x96/0x1a0
  __alloc_pages_slowpath+0x410/0x930
  __alloc_pages_nodemask+0x3a9/0x3e0
  do_huge_pmd_anonymous_page+0xd7/0x3e0
  __handle_mm_fault+0x5e3/0x5f0
  handle_mm_fault+0xf7/0x2e0
  hmm_vma_fault.isra.0+0x4d/0xa0
  walk_pmd_range.isra.0+0xa8/0x310
  walk_pud_range+0x167/0x240
  walk_pgd_range+0x55/0x100
  __walk_page_range+0x87/0x90
  walk_page_range+0xf6/0x160
  hmm_range_fault+0x4f/0x90
  amdgpu_hmm_range_get_pages+0x123/0x230 [amdgpu]
  amdgpu_ttm_tt_get_user_pages+0xb1/0x150 [amdgpu]
  init_user_pages+0xb1/0x2a0 [amdgpu]
  amdgpu_amdkfd_gpuvm_alloc_memory_of_gpu+0x543/0x7d0 [amdgpu]
  kfd_ioctl_alloc_memory_of_gpu+0x24c/0x4e0 [amdgpu]
  kfd_ioctl+0x29d/0x500 [amdgpu]

(cherry picked from commit a29e067bd38946f752b0ef855f3dfff87e77bec7)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38520/">CVE-2025-38520 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38520">CVE-2025-38520 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248217">SUSE bug 1248217</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538521" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38521</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38521" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38521" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38521" ref_url="https://www.suse.com/security/cve/CVE-2025-38521" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/imagination: Fix kernel crash when hard resetting the GPU

The GPU hard reset sequence calls pm_runtime_force_suspend() and
pm_runtime_force_resume(), which according to their documentation should
only be used during system-wide PM transitions to sleep states.

The main issue though is that depending on some internal runtime PM
state as seen by pm_runtime_force_suspend() (whether the usage count is
&lt;= 1), pm_runtime_force_resume() might not resume the device unless
needed. If that happens, the runtime PM resume callback
pvr_power_device_resume() is not called, the GPU clocks are not
re-enabled, and the kernel crashes on the next attempt to access GPU
registers as part of the power-on sequence.

Replace calls to pm_runtime_force_suspend() and
pm_runtime_force_resume() with direct calls to the driver's runtime PM
callbacks, pvr_power_device_suspend() and pvr_power_device_resume(),
to ensure clocks are re-enabled and avoid the kernel crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38521/">CVE-2025-38521 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38521">CVE-2025-38521 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248232">SUSE bug 1248232</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538524" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38524</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38524" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38524" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38524" ref_url="https://www.suse.com/security/cve/CVE-2025-38524" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

rxrpc: Fix recv-recv race of completed call

If a call receives an event (such as incoming data), the call gets placed
on the socket's queue and a thread in recvmsg can be awakened to go and
process it.  Once the thread has picked up the call off of the queue,
further events will cause it to be requeued, and once the socket lock is
dropped (recvmsg uses call-&gt;user_mutex to allow the socket to be used in
parallel), a second thread can come in and its recvmsg can pop the call off
the socket queue again.

In such a case, the first thread will be receiving stuff from the call and
the second thread will be blocked on call-&gt;user_mutex.  The first thread
can, at this point, process both the event that it picked call for and the
event that the second thread picked the call for and may see the call
terminate - in which case the call will be "released", decoupling the call
from the user call ID assigned to it (RXRPC_USER_CALL_ID in the control
message).

The first thread will return okay, but then the second thread will wake up
holding the user_mutex and, if it sees that the call has been released by
the first thread, it will BUG thusly:

	kernel BUG at net/rxrpc/recvmsg.c:474!

Fix this by just dequeuing the call and ignoring it if it is seen to be
already released.  We can't tell userspace about it anyway as the user call
ID has become stale.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38524/">CVE-2025-38524 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38524">CVE-2025-38524 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248194">SUSE bug 1248194</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538526" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38526</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38526" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38526" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38526" ref_url="https://www.suse.com/security/cve/CVE-2025-38526" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: add NULL check in eswitch lag check

The function ice_lag_is_switchdev_running() is being called from outside of
the LAG event handler code.  This results in the lag-&gt;upper_netdev being
NULL sometimes.  To avoid a NULL-pointer dereference, there needs to be a
check before it is dereferenced.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38526/">CVE-2025-38526 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38526">CVE-2025-38526 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248192">SUSE bug 1248192</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538527" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38527</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38527" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38527" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38527" ref_url="https://www.suse.com/security/cve/CVE-2025-38527" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16880" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002048.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:17397" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix use-after-free in cifs_oplock_break

A race condition can occur in cifs_oplock_break() leading to a
use-after-free of the cinode structure when unmounting:

  cifs_oplock_break()
    _cifsFileInfo_put(cfile)
      cifsFileInfo_put_final()
        cifs_sb_deactive()
          [last ref, start releasing sb]
            kill_sb()
              kill_anon_super()
                generic_shutdown_super()
                  evict_inodes()
                    dispose_list()
                      evict()
                        destroy_inode()
                          call_rcu(&amp;inode-&gt;i_rcu, i_callback)
    spin_lock(&amp;cinode-&gt;open_file_lock)  &lt;- OK
                            [later] i_callback()
                              cifs_free_inode()
                                kmem_cache_free(cinode)
    spin_unlock(&amp;cinode-&gt;open_file_lock)  &lt;- UAF
    cifs_done_oplock_break(cinode)       &lt;- UAF

The issue occurs when umount has already released its reference to the
superblock. When _cifsFileInfo_put() calls cifs_sb_deactive(), this
releases the last reference, triggering the immediate cleanup of all
inodes under RCU. However, cifs_oplock_break() continues to access the
cinode after this point, resulting in use-after-free.

Fix this by holding an extra reference to the superblock during the
entire oplock break operation. This ensures that the superblock and
its inodes remain valid until the oplock break completes.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38527/">CVE-2025-38527 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38527">CVE-2025-38527 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248199">SUSE bug 1248199</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538528" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38528</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38528" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38528" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38528" ref_url="https://www.suse.com/security/cve/CVE-2025-38528" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Reject %p% format string in bprintf-like helpers

static const char fmt[] = "%p%";
    bpf_trace_printk(fmt, sizeof(fmt));

The above BPF program isn't rejected and causes a kernel warning at
runtime:

    Please remove unsupported %\x00 in format string
    WARNING: CPU: 1 PID: 7244 at lib/vsprintf.c:2680 format_decode+0x49c/0x5d0

This happens because bpf_bprintf_prepare skips over the second %,
detected as punctuation, while processing %p. This patch fixes it by
not skipping over punctuation. %\x00 is then processed in the next
iteration and rejected.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38528/">CVE-2025-38528 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38528">CVE-2025-38528 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248198">SUSE bug 1248198</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538529" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38529</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38529" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38529" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38529" ref_url="https://www.suse.com/security/cve/CVE-2025-38529" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

comedi: aio_iiro_16: Fix bit shift out of bounds

When checking for a supported IRQ number, the following test is used:

	if ((1 &lt;&lt; it-&gt;options[1]) &amp; 0xdcfc) {

However, `it-&gt;options[i]` is an unchecked `int` value from userspace, so
the shift amount could be negative or out of bounds.  Fix the test by
requiring `it-&gt;options[1]` to be within bounds before proceeding with
the original test.  Valid `it-&gt;options[1]` values that select the IRQ
will be in the range [1,15]. The value 0 explicitly disables the use of
interrupts.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38529/">CVE-2025-38529 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38529">CVE-2025-38529 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248196">SUSE bug 1248196</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538530" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38530</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38530" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38530" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38530" ref_url="https://www.suse.com/security/cve/CVE-2025-38530" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

comedi: pcl812: Fix bit shift out of bounds

When checking for a supported IRQ number, the following test is used:

	if ((1 &lt;&lt; it-&gt;options[1]) &amp; board-&gt;irq_bits) {

However, `it-&gt;options[i]` is an unchecked `int` value from userspace, so
the shift amount could be negative or out of bounds.  Fix the test by
requiring `it-&gt;options[1]` to be within bounds before proceeding with
the original test.  Valid `it-&gt;options[1]` values that select the IRQ
will be in the range [1,15]. The value 0 explicitly disables the use of
interrupts.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38530/">CVE-2025-38530 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38530">CVE-2025-38530 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248206">SUSE bug 1248206</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538531" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38531</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38531" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38531" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38531" ref_url="https://www.suse.com/security/cve/CVE-2025-38531" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iio: common: st_sensors: Fix use of uninitialize device structs

Throughout the various probe functions &amp;indio_dev-&gt;dev is used before it
is initialized. This caused a kernel panic in st_sensors_power_enable()
when the call to devm_regulator_bulk_get_enable() fails and then calls
dev_err_probe() with the uninitialized device.

This seems to only cause a panic with dev_err_probe(), dev_err(),
dev_warn() and dev_info() don't seem to cause a panic, but are fixed
as well.

The issue is reported and traced here: [1]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38531/">CVE-2025-38531 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38531">CVE-2025-38531 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248205">SUSE bug 1248205</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538533" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38533</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38533" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38533" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38533" ref_url="https://www.suse.com/security/cve/CVE-2025-38533" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: libwx: fix the using of Rx buffer DMA

The wx_rx_buffer structure contained two DMA address fields: 'dma' and
'page_dma'. However, only 'page_dma' was actually initialized and used
to program the Rx descriptor. But 'dma' was uninitialized and used in
some paths.

This could lead to undefined behavior, including DMA errors or
use-after-free, if the uninitialized 'dma' was used. Althrough such
error has not yet occurred, it is worth fixing in the code.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38533/">CVE-2025-38533 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38533">CVE-2025-38533 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248200">SUSE bug 1248200</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538535" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38535</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38535" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38535" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38535" ref_url="https://www.suse.com/security/cve/CVE-2025-38535" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

phy: tegra: xusb: Fix unbalanced regulator disable in UTMI PHY mode

When transitioning from USB_ROLE_DEVICE to USB_ROLE_NONE, the code
assumed that the regulator should be disabled. However, if the regulator
is marked as always-on, regulator_is_enabled() continues to return true,
leading to an incorrect attempt to disable a regulator which is not
enabled.

This can result in warnings such as:

[  250.155624] WARNING: CPU: 1 PID: 7326 at drivers/regulator/core.c:3004
_regulator_disable+0xe4/0x1a0
[  250.155652] unbalanced disables for VIN_SYS_5V0

To fix this, we move the regulator control logic into
tegra186_xusb_padctl_id_override() function since it's directly related
to the ID override state. The regulator is now only disabled when the role
transitions from USB_ROLE_HOST to USB_ROLE_NONE, by checking the VBUS_ID
register. This ensures that regulator enable/disable operations are
properly balanced and only occur when actually transitioning to/from host
mode.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38535/">CVE-2025-38535 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38535">CVE-2025-38535 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248240">SUSE bug 1248240</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38537</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38537" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38537" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38537" ref_url="https://www.suse.com/security/cve/CVE-2025-38537" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: phy: Don't register LEDs for genphy

If a PHY has no driver, the genphy driver is probed/removed directly in
phy_attach/detach. If the PHY's ofnode has an "leds" subnode, then the
LEDs will be (un)registered when probing/removing the genphy driver.
This could occur if the leds are for a non-generic driver that isn't
loaded for whatever reason. Synchronously removing the PHY device in
phy_detach leads to the following deadlock:

rtnl_lock()
ndo_close()
    ...
    phy_detach()
        phy_remove()
            phy_leds_unregister()
                led_classdev_unregister()
                    led_trigger_set()
                        netdev_trigger_deactivate()
                            unregister_netdevice_notifier()
                                rtnl_lock()

There is a corresponding deadlock on the open/register side of things
(and that one is reported by lockdep), but it requires a race while this
one is deterministic.

Generic PHYs do not support LEDs anyway, so don't bother registering
them.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38537/">CVE-2025-38537 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38537">CVE-2025-38537 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248229">SUSE bug 1248229</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38538</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38538" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38538" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38538" ref_url="https://www.suse.com/security/cve/CVE-2025-38538" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dmaengine: nbpfaxi: Fix memory corruption in probe()

The nbpf-&gt;chan[] array is allocated earlier in the nbpf_probe() function
and it has "num_channels" elements.  These three loops iterate one
element farther than they should and corrupt memory.

The changes to the second loop are more involved.  In this case, we're
copying data from the irqbuf[] array into the nbpf-&gt;chan[] array.  If
the data in irqbuf[i] is the error IRQ then we skip it, so the iterators
are not in sync.  I added a check to ensure that we don't go beyond the
end of the irqbuf[] array.  I'm pretty sure this can't happen, but it
seemed harmless to add a check.

On the other hand, after the loop has ended there is a check to ensure
that the "chan" iterator is where we expect it to be.  In the original
code we went one element beyond the end of the array so the iterator
wasn't in the correct place and it would always return -EINVAL.  However,
now it will always be in the correct place.  I deleted the check since
we know the result.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38538/">CVE-2025-38538 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38538">CVE-2025-38538 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248213">SUSE bug 1248213</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38539</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38539" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38539" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38539" ref_url="https://www.suse.com/security/cve/CVE-2025-38539" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tracing: Add down_write(trace_event_sem) when adding trace event

When a module is loaded, it adds trace events defined by the module. It
may also need to modify the modules trace printk formats to replace enum
names with their values.

If two modules are loaded at the same time, the adding of the event to the
ftrace_events list can corrupt the walking of the list in the code that is
modifying the printk format strings and crash the kernel.

The addition of the event should take the trace_event_sem for write while
it adds the new event.

Also add a lockdep_assert_held() on that semaphore in
__trace_add_event_dirs() as it iterates the list.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38539/">CVE-2025-38539 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38539">CVE-2025-38539 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248211">SUSE bug 1248211</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38540</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38540" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38540" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38540" ref_url="https://www.suse.com/security/cve/CVE-2025-38540" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: quirks: Add quirk for 2 Chicony Electronics HP 5MP Cameras

The Chicony Electronics HP 5MP Cameras (USB ID 04F2:B824 &amp; 04F2:B82C)
report a HID sensor interface that is not actually implemented.
Attempting to access this non-functional sensor via iio_info causes
system hangs as runtime PM tries to wake up an unresponsive sensor.

Add these 2 devices to the HID ignore list since the sensor interface is
non-functional by design and should not be exposed to userspace.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38540/">CVE-2025-38540 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38540">CVE-2025-38540 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248208">SUSE bug 1248208</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38541</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38541" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38541" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38541" ref_url="https://www.suse.com/security/cve/CVE-2025-38541" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mt76: mt7925: Fix null-ptr-deref in mt7925_thermal_init()

devm_kasprintf() returns NULL on error. Currently, mt7925_thermal_init()
does not check for this case, which results in a NULL pointer
dereference.

Add NULL check after devm_kasprintf() to prevent this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38541/">CVE-2025-38541 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38541">CVE-2025-38541 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248216">SUSE bug 1248216</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538543" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38543</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38543" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38543" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38543" ref_url="https://www.suse.com/security/cve/CVE-2025-38543" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/tegra: nvdec: Fix dma_alloc_coherent error check

Check for NULL return value with dma_alloc_coherent, in line with
Robin's fix for vic.c in 'drm/tegra: vic: Fix DMA API misuse'.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38543/">CVE-2025-38543 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38543">CVE-2025-38543 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248214">SUSE bug 1248214</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38544</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38544" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38544" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38544" ref_url="https://www.suse.com/security/cve/CVE-2025-38544" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

rxrpc: Fix bug due to prealloc collision

When userspace is using AF_RXRPC to provide a server, it has to preallocate
incoming calls and assign to them call IDs that will be used to thread
related recvmsg() and sendmsg() together.  The preallocated call IDs will
automatically be attached to calls as they come in until the pool is empty.

To the kernel, the call IDs are just arbitrary numbers, but userspace can
use the call ID to hold a pointer to prepared structs.  In any case, the
user isn't permitted to create two calls with the same call ID (call IDs
become available again when the call ends) and EBADSLT should result from
sendmsg() if an attempt is made to preallocate a call with an in-use call
ID.

However, the cleanup in the error handling will trigger both assertions in
rxrpc_cleanup_call() because the call isn't marked complete and isn't
marked as having been released.

Fix this by setting the call state in rxrpc_service_prealloc_one() and then
marking it as being released before calling the cleanup function.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38544/">CVE-2025-38544 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38544">CVE-2025-38544 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248225">SUSE bug 1248225</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538545" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38545</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38545" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38545" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38545" ref_url="https://www.suse.com/security/cve/CVE-2025-38545" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: ethernet: ti: am65-cpsw-nuss: Fix skb size by accounting for skb_shared_info

While transitioning from netdev_alloc_ip_align() to build_skb(), memory
for the "skb_shared_info" member of an "skb" was not allocated. Fix this
by allocating "PAGE_SIZE" as the skb length, accounting for the packet
length, headroom and tailroom, thereby including the required memory space
for skb_shared_info.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38545/">CVE-2025-38545 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38545">CVE-2025-38545 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248224">SUSE bug 1248224</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38546</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38546" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38546" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38546" ref_url="https://www.suse.com/security/cve/CVE-2025-38546" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03283-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03310-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03314-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

atm: clip: Fix memory leak of struct clip_vcc.

ioctl(ATMARP_MKIP) allocates struct clip_vcc and set it to
vcc-&gt;user_back.

The code assumes that vcc_destroy_socket() passes NULL skb
to vcc-&gt;push() when the socket is close()d, and then clip_push()
frees clip_vcc.

However, ioctl(ATMARPD_CTRL) sets NULL to vcc-&gt;push() in
atm_init_atmarp(), resulting in memory leak.

Let's serialise two ioctl() by lock_sock() and check vcc-&gt;push()
in atm_init_atmarp() to prevent memleak.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38546/">CVE-2025-38546 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38546">CVE-2025-38546 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248223">SUSE bug 1248223</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38547</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38547" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38547" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38547" ref_url="https://www.suse.com/security/cve/CVE-2025-38547" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iio: adc: axp20x_adc: Add missing sentinel to AXP717 ADC channel maps

The AXP717 ADC channel maps is missing a sentinel entry at the end. This
causes a KASAN warning.

Add the missing sentinel entry.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-06"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38547/">CVE-2025-38547 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38547">CVE-2025-38547 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248222">SUSE bug 1248222</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538548" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38548</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38548" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38548" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38548" ref_url="https://www.suse.com/security/cve/CVE-2025-38548" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hwmon: (corsair-cpro) Validate the size of the received input buffer

Add buffer_recv_size to store the size of the received bytes.
Validate buffer_recv_size in send_usb_cmd().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38548/">CVE-2025-38548 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38548">CVE-2025-38548 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248228">SUSE bug 1248228</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538549" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38549</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38549" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38549" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38549" ref_url="https://www.suse.com/security/cve/CVE-2025-38549" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

efivarfs: Fix memory leak of efivarfs_fs_info in fs_context error paths

When processing mount options, efivarfs allocates efivarfs_fs_info (sfi)
early in fs_context initialization. However, sfi is associated with the
superblock and typically freed when the superblock is destroyed. If the
fs_context is released (final put) before fill_super is called-such as
on error paths or during reconfiguration-the sfi structure would leak,
as ownership never transfers to the superblock.

Implement the .free callback in efivarfs_context_ops to ensure any
allocated sfi is properly freed if the fs_context is torn down before
fill_super, preventing this memory leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38549/">CVE-2025-38549 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38549">CVE-2025-38549 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248235">SUSE bug 1248235</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538550" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38550</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38550" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38550" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38550" ref_url="https://www.suse.com/security/cve/CVE-2025-38550" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:15740" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002018.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv6: mcast: Delay put pmc-&gt;idev in mld_del_delrec()

pmc-&gt;idev is still used in ip6_mc_clear_src(), so as mld_clear_delrec()
does, the reference should be put after ip6_mc_clear_src() return.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38550/">CVE-2025-38550 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38550">CVE-2025-38550 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248227">SUSE bug 1248227</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538551" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38551</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38551" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38551" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38551" ref_url="https://www.suse.com/security/cve/CVE-2025-38551" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

virtio-net: fix recursived rtnl_lock() during probe()

The deadlock appears in a stack trace like:

  virtnet_probe()
    rtnl_lock()
    virtio_config_changed_work()
      netdev_notify_peers()
        rtnl_lock()

It happens if the VMM sends a VIRTIO_NET_S_ANNOUNCE request while the
virtio-net driver is still probing.

The config_work in probe() will get scheduled until virtnet_open() enables
the config change notification via virtio_config_driver_enable().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38551/">CVE-2025-38551 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38551">CVE-2025-38551 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248234">SUSE bug 1248234</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538552" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38552</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38552" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38552" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38552" ref_url="https://www.suse.com/security/cve/CVE-2025-38552" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mptcp: plug races between subflow fail and subflow creation

We have races similar to the one addressed by the previous patch between
subflow failing and additional subflow creation. They are just harder to
trigger.

The solution is similar. Use a separate flag to track the condition
'socket state prevent any additional subflow creation' protected by the
fallback lock.

The socket fallback makes such flag true, and also receiving or sending
an MP_FAIL option.

The field 'allow_infinite_fallback' is now always touched under the
relevant lock, we can drop the ONCE annotation on write.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38552/">CVE-2025-38552 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38552">CVE-2025-38552 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248230">SUSE bug 1248230</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538553" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38553</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38553" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38553" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38553" ref_url="https://www.suse.com/security/cve/CVE-2025-38553" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03626-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: Restrict conditions for adding duplicating netems to qdisc tree

netem_enqueue's duplication prevention logic breaks when a netem
resides in a qdisc tree with other netems - this can lead to a
soft lockup and OOM loop in netem_dequeue, as seen in [1].
Ensure that a duplicating netem cannot exist in a tree with other
netems.

Previous approaches suggested in discussions in chronological order:

1) Track duplication status or ttl in the sk_buff struct. Considered
too specific a use case to extend such a struct, though this would
be a resilient fix and address other previous and potential future
DOS bugs like the one described in loopy fun [2].

2) Restrict netem_enqueue recursion depth like in act_mirred with a
per cpu variable. However, netem_dequeue can call enqueue on its
child, and the depth restriction could be bypassed if the child is a
netem.

3) Use the same approach as in 2, but add metadata in netem_skb_cb
to handle the netem_dequeue case and track a packet's involvement
in duplication. This is an overly complex approach, and Jamal
notes that the skb cb can be overwritten to circumvent this
safeguard.

4) Prevent the addition of a netem to a qdisc tree if its ancestral
path contains a netem. However, filters and actions can cause a
packet to change paths when re-enqueued to the root from netem
duplication, leading us to the current solution: prevent a
duplicating netem from inhabiting the same tree as other netems.

[1] https://lore.kernel.org/netdev/8DuRWwfqjoRDLDmBMlIfbrsZg9Gx50DHJc1ilxsEBNe2D6NMoigR_eIRIG0LOjMc3r10nUUZtArXx4oZBIdUfZQrwjcQhdinnMis_0G7VEk=@willsroot.io/
[2] https://lwn.net/Articles/719297/
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38553/">CVE-2025-38553 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38553">CVE-2025-38553 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248255">SUSE bug 1248255</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538554" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38554</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38554" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38554" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38554" ref_url="https://www.suse.com/security/cve/CVE-2025-38554" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm: fix a UAF when vma-&gt;mm is freed after vma-&gt;vm_refcnt got dropped

By inducing delays in the right places, Jann Horn created a reproducer for
a hard to hit UAF issue that became possible after VMAs were allowed to be
recycled by adding SLAB_TYPESAFE_BY_RCU to their cache.

Race description is borrowed from Jann's discovery report:
lock_vma_under_rcu() looks up a VMA locklessly with mas_walk() under
rcu_read_lock().  At that point, the VMA may be concurrently freed, and it
can be recycled by another process.  vma_start_read() then increments the
vma-&gt;vm_refcnt (if it is in an acceptable range), and if this succeeds,
vma_start_read() can return a recycled VMA.

In this scenario where the VMA has been recycled, lock_vma_under_rcu()
will then detect the mismatching -&gt;vm_mm pointer and drop the VMA through
vma_end_read(), which calls vma_refcount_put().  vma_refcount_put() drops
the refcount and then calls rcuwait_wake_up() using a copy of vma-&gt;vm_mm. 
This is wrong: It implicitly assumes that the caller is keeping the VMA's
mm alive, but in this scenario the caller has no relation to the VMA's mm,
so the rcuwait_wake_up() can cause UAF.

The diagram depicting the race:
T1         T2         T3
==         ==         ==
lock_vma_under_rcu
  mas_walk
          &lt;VMA gets removed from mm&gt;
                      mmap
                        &lt;the same VMA is reallocated&gt;
  vma_start_read
    __refcount_inc_not_zero_limited_acquire
                      munmap
                        __vma_enter_locked
                          refcount_add_not_zero
  vma_end_read
    vma_refcount_put
      __refcount_dec_and_test
                          rcuwait_wait_event
                            &lt;finish operation&gt;
      rcuwait_wake_up [UAF]

Note that rcuwait_wait_event() in T3 does not block because refcount was
already dropped by T1.  At this point T3 can exit and free the mm causing
UAF in T1.

To avoid this we move vma-&gt;vm_mm verification into vma_start_read() and
grab vma-&gt;vm_mm to stabilize it before vma_refcount_put() operation.

[surenb@google.com: v3]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38554/">CVE-2025-38554 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38554">CVE-2025-38554 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248299">SUSE bug 1248299</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248301">SUSE bug 1248301</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538555" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38555</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38555" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38555" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38555" ref_url="https://www.suse.com/security/cve/CVE-2025-38555" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03283-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03314-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03317-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03318-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03319-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03321-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03341-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03343-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03370-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041847.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03374-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03375-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03381-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03387-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03389-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03391-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041965.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03392-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03393-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03395-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03396-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03397-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03400-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03403-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03406-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03408-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03410-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03411-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03412-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03413-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03418-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03419-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20722-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20723-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20724-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20726-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20727-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20728-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20729-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20730-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20731-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20732-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20733-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20734-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20735-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20736-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20737-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20738-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20768-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20769-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20770-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20771-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20772-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20773-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20774-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20784-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20785-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20786-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041868.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20787-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20788-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20789-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20790-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20791-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: gadget : fix use-after-free in composite_dev_cleanup()

1. In func configfs_composite_bind() -&gt; composite_os_desc_req_prepare():
if kmalloc fails, the pointer cdev-&gt;os_desc_req will be freed but not
set to NULL. Then it will return a failure to the upper-level function.
2. in func configfs_composite_bind() -&gt; composite_dev_cleanup():
it will checks whether cdev-&gt;os_desc_req is NULL. If it is not NULL, it
will attempt to use it.This will lead to a use-after-free issue.

BUG: KASAN: use-after-free in composite_dev_cleanup+0xf4/0x2c0
Read of size 8 at addr 0000004827837a00 by task init/1

CPU: 10 PID: 1 Comm: init Tainted: G           O      5.10.97-oh #1
 kasan_report+0x188/0x1cc
 __asan_load8+0xb4/0xbc
 composite_dev_cleanup+0xf4/0x2c0
 configfs_composite_bind+0x210/0x7ac
 udc_bind_to_driver+0xb4/0x1ec
 usb_gadget_probe_driver+0xec/0x21c
 gadget_dev_desc_UDC_store+0x264/0x27c
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38555/">CVE-2025-38555 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38555">CVE-2025-38555 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248297">SUSE bug 1248297</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248298">SUSE bug 1248298</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538556" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38556</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38556" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38556" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38556" ref_url="https://www.suse.com/security/cve/CVE-2025-38556" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16372" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002043.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:17760" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002101.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21063" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: core: Harden s32ton() against conversion to 0 bits

Testing by the syzbot fuzzer showed that the HID core gets a
shift-out-of-bounds exception when it tries to convert a 32-bit
quantity to a 0-bit quantity.  Ideally this should never occur, but
there are buggy devices and some might have a report field with size
set to zero; we shouldn't reject the report or the device just because
of that.

Instead, harden the s32ton() routine so that it returns a reasonable
result instead of crashing when it is called with the number of bits
set to 0 -- the same as what snto32() does.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38556/">CVE-2025-38556 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38556">CVE-2025-38556 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248296">SUSE bug 1248296</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538557" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38557</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38557" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38557" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38557" ref_url="https://www.suse.com/security/cve/CVE-2025-38557" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: apple: validate feature-report field count to prevent NULL pointer dereference

A malicious HID device with quirk APPLE_MAGIC_BACKLIGHT can trigger a NULL
pointer dereference whilst the power feature-report is toggled and sent to
the device in apple_magic_backlight_report_set(). The power feature-report
is expected to have two data fields, but if the descriptor declares one
field then accessing field[1] and dereferencing it in
apple_magic_backlight_report_set() becomes invalid
since field[1] will be NULL.

An example of a minimal descriptor which can cause the crash is something
like the following where the report with ID 3 (power report) only
references a single 1-byte field. When hid core parses the descriptor it
will encounter the final feature tag, allocate a hid_report (all members
of field[] will be zeroed out), create field structure and populate it,
increasing the maxfield to 1. The subsequent field[1] access and
dereference causes the crash.

  Usage Page (Vendor Defined 0xFF00)
  Usage (0x0F)
  Collection (Application)
    Report ID (1)
    Usage (0x01)
    Logical Minimum (0)
    Logical Maximum (255)
    Report Size (8)
    Report Count (1)
    Feature (Data,Var,Abs)

    Usage (0x02)
    Logical Maximum (32767)
    Report Size (16)
    Report Count (1)
    Feature (Data,Var,Abs)

    Report ID (3)
    Usage (0x03)
    Logical Minimum (0)
    Logical Maximum (1)
    Report Size (8)
    Report Count (1)
    Feature (Data,Var,Abs)
  End Collection

Here we see the KASAN splat when the kernel dereferences the
NULL pointer and crashes:

  [   15.164723] Oops: general protection fault, probably for non-canonical address 0xdffffc0000000006: 0000 [#1] SMP KASAN NOPTI
  [   15.165691] KASAN: null-ptr-deref in range [0x0000000000000030-0x0000000000000037]
  [   15.165691] CPU: 0 UID: 0 PID: 10 Comm: kworker/0:1 Not tainted 6.15.0 #31 PREEMPT(voluntary)
  [   15.165691] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014
  [   15.165691] RIP: 0010:apple_magic_backlight_report_set+0xbf/0x210
  [   15.165691] Call Trace:
  [   15.165691]  &lt;TASK&gt;
  [   15.165691]  apple_probe+0x571/0xa20
  [   15.165691]  hid_device_probe+0x2e2/0x6f0
  [   15.165691]  really_probe+0x1ca/0x5c0
  [   15.165691]  __driver_probe_device+0x24f/0x310
  [   15.165691]  driver_probe_device+0x4a/0xd0
  [   15.165691]  __device_attach_driver+0x169/0x220
  [   15.165691]  bus_for_each_drv+0x118/0x1b0
  [   15.165691]  __device_attach+0x1d5/0x380
  [   15.165691]  device_initial_probe+0x12/0x20
  [   15.165691]  bus_probe_device+0x13d/0x180
  [   15.165691]  device_add+0xd87/0x1510
  [...]

To fix this issue we should validate the number of fields that the
backlight and power reports have and if they do not have the required
number of fields then bail.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38557/">CVE-2025-38557 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38557">CVE-2025-38557 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248304">SUSE bug 1248304</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538559" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38559</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38559" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38559" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38559" ref_url="https://www.suse.com/security/cve/CVE-2025-38559" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

platform/x86/intel/pmt: fix a crashlog NULL pointer access

Usage of the intel_pmt_read() for binary sysfs, requires a pcidev. The
current use of the endpoint value is only valid for telemetry endpoint
usage.

Without the ep, the crashlog usage causes the following NULL pointer
exception:

BUG: kernel NULL pointer dereference, address: 0000000000000000
Oops: Oops: 0000 [#1] SMP NOPTI
RIP: 0010:intel_pmt_read+0x3b/0x70 [pmt_class]
Code:
Call Trace:
 &lt;TASK&gt;
 ? sysfs_kf_bin_read+0xc0/0xe0
 kernfs_fop_read_iter+0xac/0x1a0
 vfs_read+0x26d/0x350
 ksys_read+0x6b/0xe0
 __x64_sys_read+0x1d/0x30
 x64_sys_call+0x1bc8/0x1d70
 do_syscall_64+0x6d/0x110

Augment struct intel_pmt_entry with a pointer to the pcidev to avoid
the NULL pointer exception.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38559/">CVE-2025-38559 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38559">CVE-2025-38559 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248302">SUSE bug 1248302</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538560" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38560</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38560" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38560" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38560" ref_url="https://www.suse.com/security/cve/CVE-2025-38560" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03283-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03314-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/sev: Evict cache lines during SNP memory validation

An SNP cache coherency vulnerability requires a cache line eviction
mitigation when validating memory after a page state change to private.
The specific mitigation is to touch the first and last byte of each 4K
page that is being validated. There is no need to perform the mitigation
when performing a page state change to shared and rescinding validation.

CPUID bit Fn8000001F_EBX[31] defines the COHERENCY_SFW_NO CPUID bit
that, when set, indicates that the software mitigation for this
vulnerability is not needed.

Implement the mitigation and invoke it when validating memory (making it
private) and the COHERENCY_SFW_NO bit is not set, indicating the SNP
guest is vulnerable.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" cvss4="5/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-38560/">CVE-2025-38560 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38560">CVE-2025-38560 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248312">SUSE bug 1248312</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248313">SUSE bug 1248313</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538563" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38563</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38563" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38563" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38563" ref_url="https://www.suse.com/security/cve/CVE-2025-38563" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03283-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03310-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03314-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1131-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

perf/core: Prevent VMA split of buffer mappings

The perf mmap code is careful about mmap()'ing the user page with the
ringbuffer and additionally the auxiliary buffer, when the event supports
it. Once the first mapping is established, subsequent mapping have to use
the same offset and the same size in both cases. The reference counting for
the ringbuffer and the auxiliary buffer depends on this being correct.

Though perf does not prevent that a related mapping is split via mmap(2),
munmap(2) or mremap(2). A split of a VMA results in perf_mmap_open() calls,
which take reference counts, but then the subsequent perf_mmap_close()
calls are not longer fulfilling the offset and size checks. This leads to
reference count leaks.

As perf already has the requirement for subsequent mappings to match the
initial mapping, the obvious consequence is that VMA splits, caused by
resizing of a mapping or partial unmapping, have to be prevented.

Implement the vm_operations_struct::may_split() callback and return
unconditionally -EINVAL.

That ensures that the mapping offsets and sizes cannot be changed after the
fact. Remapping to a different fixed address with the same size is still
possible as it takes the references for the new mapping and drops those of
the old mapping.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-31"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-38563/">CVE-2025-38563 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38563">CVE-2025-38563 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248306">SUSE bug 1248306</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248307">SUSE bug 1248307</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38564</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38564" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38564" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38564" ref_url="https://www.suse.com/security/cve/CVE-2025-38564" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

perf/core: Handle buffer mapping fail correctly in perf_mmap()

After successful allocation of a buffer or a successful attachment to an
existing buffer perf_mmap() tries to map the buffer read only into the page
table. If that fails, the already set up page table entries are zapped, but
the other perf specific side effects of that failure are not handled.  The
calling code just cleans up the VMA and does not invoke perf_mmap_close().

This leaks reference counts, corrupts user-&gt;vm accounting and also results
in an unbalanced invocation of event::event_mapped().

Cure this by moving the event::event_mapped() invocation before the
map_range() call so that on map_range() failure perf_mmap_close() can be
invoked without causing an unbalanced event::event_unmapped() call.

perf_mmap_close() undoes the reference counts and eventually frees buffers.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38564/">CVE-2025-38564 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38564">CVE-2025-38564 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248367">SUSE bug 1248367</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538565" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38565</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38565" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38565" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38565" ref_url="https://www.suse.com/security/cve/CVE-2025-38565" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1131-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

perf/core: Exit early on perf_mmap() fail

When perf_mmap() fails to allocate a buffer, it still invokes the
event_mapped() callback of the related event. On X86 this might increase
the perf_rdpmc_allowed reference counter. But nothing undoes this as
perf_mmap_close() is never called in this case, which causes another
reference count leak.

Return early on failure to prevent that.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-31"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38565/">CVE-2025-38565 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38565">CVE-2025-38565 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248377">SUSE bug 1248377</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538566" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38566</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38566" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38566" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38566" ref_url="https://www.suse.com/security/cve/CVE-2025-38566" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:18281" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023108.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3742-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3748-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3755-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3762-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3764-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3765-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3768-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3770-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3771-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3772-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sunrpc: fix handling of server side tls alerts

Scott Mayhew discovered a security exploit in NFS over TLS in
tls_alert_recv() due to its assumption it can read data from
the msg iterator's kvec..

kTLS implementation splits TLS non-data record payload between
the control message buffer (which includes the type such as TLS
aler or TLS cipher change) and the rest of the payload (say TLS
alert's level/description) which goes into the msg payload buffer.

This patch proposes to rework how control messages are setup and
used by sock_recvmsg().

If no control message structure is setup, kTLS layer will read and
process TLS data record types. As soon as it encounters a TLS control
message, it would return an error. At that point, NFS can setup a
kvec backed msg buffer and read in the control message such as a
TLS alert. Msg iterator can advance the kvec pointer as a part of
the copy process thus we need to revert the iterator before calling
into the tls_alert_recv.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38566/">CVE-2025-38566 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38566">CVE-2025-38566 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248374">SUSE bug 1248374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248376">SUSE bug 1248376</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538568" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38568</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38568" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38568" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38568" ref_url="https://www.suse.com/security/cve/CVE-2025-38568" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1617" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003184.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2352" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: mqprio: fix stack out-of-bounds write in tc entry parsing

TCA_MQPRIO_TC_ENTRY_INDEX is validated using
NLA_POLICY_MAX(NLA_U32, TC_QOPT_MAX_QUEUE), which allows the value
TC_QOPT_MAX_QUEUE (16). This leads to a 4-byte out-of-bounds stack
write in the fp[] array, which only has room for 16 elements (0-15).

Fix this by changing the policy to allow only up to TC_QOPT_MAX_QUEUE - 1.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38568/">CVE-2025-38568 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38568">CVE-2025-38568 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248386">SUSE bug 1248386</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38569</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38569" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38569" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38569" ref_url="https://www.suse.com/security/cve/CVE-2025-38569" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

benet: fix BUG when creating VFs

benet crashes as soon as SRIOV VFs are created:

 kernel BUG at mm/vmalloc.c:3457!
 Oops: invalid opcode: 0000 [#1] SMP KASAN NOPTI
 CPU: 4 UID: 0 PID: 7408 Comm: test.sh Kdump: loaded Not tainted 6.16.0+ #1 PREEMPT(voluntary)
 [...]
 RIP: 0010:vunmap+0x5f/0x70
 [...]
 Call Trace:
  &lt;TASK&gt;
  __iommu_dma_free+0xe8/0x1c0
  be_cmd_set_mac_list+0x3fe/0x640 [be2net]
  be_cmd_set_mac+0xaf/0x110 [be2net]
  be_vf_eth_addr_config+0x19f/0x330 [be2net]
  be_vf_setup+0x4f7/0x990 [be2net]
  be_pci_sriov_configure+0x3a1/0x470 [be2net]
  sriov_numvfs_store+0x20b/0x380
  kernfs_fop_write_iter+0x354/0x530
  vfs_write+0x9b9/0xf60
  ksys_write+0xf3/0x1d0
  do_syscall_64+0x8c/0x3d0

be_cmd_set_mac_list() calls dma_free_coherent() under a spin_lock_bh.
Fix it by freeing only after the lock has been released.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38569/">CVE-2025-38569 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38569">CVE-2025-38569 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248384">SUSE bug 1248384</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538571" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38571</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38571" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38571" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38571" ref_url="https://www.suse.com/security/cve/CVE-2025-38571" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:18281" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sunrpc: fix client side handling of tls alerts

A security exploit was discovered in NFS over TLS in tls_alert_recv
due to its assumption that there is valid data in the msghdr's
iterator's kvec.

Instead, this patch proposes the rework how control messages are
setup and used by sock_recvmsg().

If no control message structure is setup, kTLS layer will read and
process TLS data record types. As soon as it encounters a TLS control
message, it would return an error. At that point, NFS can setup a kvec
backed control buffer and read in the control message such as a TLS
alert. Scott found that a msg iterator can advance the kvec pointer
as a part of the copy process thus we need to revert the iterator
before calling into the tls_alert_recv.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38571/">CVE-2025-38571 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38571">CVE-2025-38571 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248401">SUSE bug 1248401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248402">SUSE bug 1248402</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538572" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38572</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38572" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38572" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38572" ref_url="https://www.suse.com/security/cve/CVE-2025-38572" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03626-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023801.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024228.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv6: reject malicious packets in ipv6_gso_segment()

syzbot was able to craft a packet with very long IPv6 extension headers
leading to an overflow of skb-&gt;transport_header.

This 16bit field has a limited range.

Add skb_reset_transport_header_careful() helper and use it
from ipv6_gso_segment()

WARNING: CPU: 0 PID: 5871 at ./include/linux/skbuff.h:3032 skb_reset_transport_header include/linux/skbuff.h:3032 [inline]
WARNING: CPU: 0 PID: 5871 at ./include/linux/skbuff.h:3032 ipv6_gso_segment+0x15e2/0x21e0 net/ipv6/ip6_offload.c:151
Modules linked in:
CPU: 0 UID: 0 PID: 5871 Comm: syz-executor211 Not tainted 6.16.0-rc6-syzkaller-g7abc678e3084 #0 PREEMPT(full)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025
 RIP: 0010:skb_reset_transport_header include/linux/skbuff.h:3032 [inline]
 RIP: 0010:ipv6_gso_segment+0x15e2/0x21e0 net/ipv6/ip6_offload.c:151
Call Trace:
 &lt;TASK&gt;
  skb_mac_gso_segment+0x31c/0x640 net/core/gso.c:53
  nsh_gso_segment+0x54a/0xe10 net/nsh/nsh.c:110
  skb_mac_gso_segment+0x31c/0x640 net/core/gso.c:53
  __skb_gso_segment+0x342/0x510 net/core/gso.c:124
  skb_gso_segment include/net/gso.h:83 [inline]
  validate_xmit_skb+0x857/0x11b0 net/core/dev.c:3950
  validate_xmit_skb_list+0x84/0x120 net/core/dev.c:4000
  sch_direct_xmit+0xd3/0x4b0 net/sched/sch_generic.c:329
  __dev_xmit_skb net/core/dev.c:4102 [inline]
  __dev_queue_xmit+0x17b6/0x3a70 net/core/dev.c:4679
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38572/">CVE-2025-38572 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38572">CVE-2025-38572 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248399">SUSE bug 1248399</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248400">SUSE bug 1248400</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538573" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38573</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38573" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38573" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38573" ref_url="https://www.suse.com/security/cve/CVE-2025-38573" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

spi: cs42l43: Property entry should be a null-terminated array

The software node does not specify a count of property entries, so the
array must be null-terminated.

When unterminated, this can lead to a fault in the downstream cs35l56
amplifier driver, because the node parse walks off the end of the
array into unknown memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38573/">CVE-2025-38573 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38573">CVE-2025-38573 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248396">SUSE bug 1248396</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538574" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38574</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38574" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38574" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38574" ref_url="https://www.suse.com/security/cve/CVE-2025-38574" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pptp: ensure minimal skb length in pptp_xmit()

Commit aabc6596ffb3 ("net: ppp: Add bound checking for skb data
on ppp_sync_txmung") fixed ppp_sync_txmunge()

We need a similar fix in pptp_xmit(), otherwise we might
read uninit data as reported by syzbot.

BUG: KMSAN: uninit-value in pptp_xmit+0xc34/0x2720 drivers/net/ppp/pptp.c:193
  pptp_xmit+0xc34/0x2720 drivers/net/ppp/pptp.c:193
  ppp_channel_bridge_input drivers/net/ppp/ppp_generic.c:2290 [inline]
  ppp_input+0x1d6/0xe60 drivers/net/ppp/ppp_generic.c:2314
  pppoe_rcv_core+0x1e8/0x760 drivers/net/ppp/pppoe.c:379
  sk_backlog_rcv+0x142/0x420 include/net/sock.h:1148
  __release_sock+0x1d3/0x330 net/core/sock.c:3213
  release_sock+0x6b/0x270 net/core/sock.c:3767
  pppoe_sendmsg+0x15d/0xcb0 drivers/net/ppp/pppoe.c:904
  sock_sendmsg_nosec net/socket.c:712 [inline]
  __sock_sendmsg+0x330/0x3d0 net/socket.c:727
  ____sys_sendmsg+0x893/0xd80 net/socket.c:2566
  ___sys_sendmsg+0x271/0x3b0 net/socket.c:2620
  __sys_sendmmsg+0x2d9/0x7c0 net/socket.c:2709
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38574/">CVE-2025-38574 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38574">CVE-2025-38574 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248365">SUSE bug 1248365</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38576</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38576" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38576" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38576" ref_url="https://www.suse.com/security/cve/CVE-2025-38576" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/eeh: Make EEH driver device hotplug safe

Multiple race conditions existed between the PCIe hotplug driver and the
EEH driver, leading to a variety of kernel oopses of the same general
nature:

&lt;pcie device unplug&gt;
&lt;eeh driver trigger&gt;
&lt;hotplug removal trigger&gt;
&lt;pcie tree reconfiguration&gt;
&lt;eeh recovery next step&gt;
&lt;oops in EEH driver bus iteration loop&gt;

A second class of oops is also seen when the underlying bus disappears
during device recovery.

Refactor the EEH module to be PCI rescan and remove safe.  Also clean
up a few minor formatting / readability issues.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38576/">CVE-2025-38576 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38576">CVE-2025-38576 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248354">SUSE bug 1248354</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538581" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38581</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38581" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38581" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38581" ref_url="https://www.suse.com/security/cve/CVE-2025-38581" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: ccp - Fix crash when rebind ccp device for ccp.ko

When CONFIG_CRYPTO_DEV_CCP_DEBUGFS is enabled, rebinding
the ccp device causes the following crash:

$ echo '0000:0a:00.2' &gt; /sys/bus/pci/drivers/ccp/unbind
$ echo '0000:0a:00.2' &gt; /sys/bus/pci/drivers/ccp/bind

[  204.976930] BUG: kernel NULL pointer dereference, address: 0000000000000098
[  204.978026] #PF: supervisor write access in kernel mode
[  204.979126] #PF: error_code(0x0002) - not-present page
[  204.980226] PGD 0 P4D 0
[  204.981317] Oops: Oops: 0002 [#1] SMP NOPTI
...
[  204.997852] Call Trace:
[  204.999074]  &lt;TASK&gt;
[  205.000297]  start_creating+0x9f/0x1c0
[  205.001533]  debugfs_create_dir+0x1f/0x170
[  205.002769]  ? srso_return_thunk+0x5/0x5f
[  205.004000]  ccp5_debugfs_setup+0x87/0x170 [ccp]
[  205.005241]  ccp5_init+0x8b2/0x960 [ccp]
[  205.006469]  ccp_dev_init+0xd4/0x150 [ccp]
[  205.007709]  sp_init+0x5f/0x80 [ccp]
[  205.008942]  sp_pci_probe+0x283/0x2e0 [ccp]
[  205.010165]  ? srso_return_thunk+0x5/0x5f
[  205.011376]  local_pci_probe+0x4f/0xb0
[  205.012584]  pci_device_probe+0xdb/0x230
[  205.013810]  really_probe+0xed/0x380
[  205.015024]  __driver_probe_device+0x7e/0x160
[  205.016240]  device_driver_attach+0x2f/0x60
[  205.017457]  bind_store+0x7c/0xb0
[  205.018663]  drv_attr_store+0x28/0x40
[  205.019868]  sysfs_kf_write+0x5f/0x70
[  205.021065]  kernfs_fop_write_iter+0x145/0x1d0
[  205.022267]  vfs_write+0x308/0x440
[  205.023453]  ksys_write+0x6d/0xe0
[  205.024616]  __x64_sys_write+0x1e/0x30
[  205.025778]  x64_sys_call+0x16ba/0x2150
[  205.026942]  do_syscall_64+0x56/0x1e0
[  205.028108]  entry_SYSCALL_64_after_hwframe+0x76/0x7e
[  205.029276] RIP: 0033:0x7fbc36f10104
[  205.030420] Code: 89 02 48 c7 c0 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 8d 05 e1 08 2e 00 8b 00 85 c0 75 13 b8 01 00 00 00 0f 05 &lt;48&gt; 3d 00 f0 ff ff 77 54 f3 c3 66 90 41 54 55 49 89 d4 53 48 89 f5

This patch sets ccp_debugfs_dir to NULL after destroying it in
ccp5_debugfs_destroy, allowing the directory dentry to be
recreated when rebinding the ccp device.

Tested on AMD Ryzen 7 1700X.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38581/">CVE-2025-38581 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38581">CVE-2025-38581 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248345">SUSE bug 1248345</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538582" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38582</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38582" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38582" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38582" ref_url="https://www.suse.com/security/cve/CVE-2025-38582" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/hns: Fix double destruction of rsv_qp

rsv_qp may be double destroyed in error flow, first in free_mr_init(),
and then in hns_roce_exit(). Fix it by moving the free_mr_init() call
into hns_roce_v2_init().

list_del corruption, ffff589732eb9b50-&gt;next is LIST_POISON1 (dead000000000100)
WARNING: CPU: 8 PID: 1047115 at lib/list_debug.c:53 __list_del_entry_valid+0x148/0x240
...
Call trace:
 __list_del_entry_valid+0x148/0x240
 hns_roce_qp_remove+0x4c/0x3f0 [hns_roce_hw_v2]
 hns_roce_v2_destroy_qp_common+0x1dc/0x5f4 [hns_roce_hw_v2]
 hns_roce_v2_destroy_qp+0x22c/0x46c [hns_roce_hw_v2]
 free_mr_exit+0x6c/0x120 [hns_roce_hw_v2]
 hns_roce_v2_exit+0x170/0x200 [hns_roce_hw_v2]
 hns_roce_exit+0x118/0x350 [hns_roce_hw_v2]
 __hns_roce_hw_v2_init_instance+0x1c8/0x304 [hns_roce_hw_v2]
 hns_roce_hw_v2_reset_notify_init+0x170/0x21c [hns_roce_hw_v2]
 hns_roce_hw_v2_reset_notify+0x6c/0x190 [hns_roce_hw_v2]
 hclge_notify_roce_client+0x6c/0x160 [hclge]
 hclge_reset_rebuild+0x150/0x5c0 [hclge]
 hclge_reset+0x10c/0x140 [hclge]
 hclge_reset_subtask+0x80/0x104 [hclge]
 hclge_reset_service_task+0x168/0x3ac [hclge]
 hclge_service_task+0x50/0x100 [hclge]
 process_one_work+0x250/0x9a0
 worker_thread+0x324/0x990
 kthread+0x190/0x210
 ret_from_fork+0x10/0x18
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38582/">CVE-2025-38582 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38582">CVE-2025-38582 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248349">SUSE bug 1248349</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538583" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38583</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38583" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38583" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38583" ref_url="https://www.suse.com/security/cve/CVE-2025-38583" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

clk: xilinx: vcu: unregister pll_post only if registered correctly

If registration of pll_post is failed, it will be set to NULL or ERR,
unregistering same will fail with following call trace:

Unable to handle kernel NULL pointer dereference at virtual address 008
pc : clk_hw_unregister+0xc/0x20
lr : clk_hw_unregister_fixed_factor+0x18/0x30
sp : ffff800011923850
...
Call trace:
 clk_hw_unregister+0xc/0x20
 clk_hw_unregister_fixed_factor+0x18/0x30
 xvcu_unregister_clock_provider+0xcc/0xf4 [xlnx_vcu]
 xvcu_probe+0x2bc/0x53c [xlnx_vcu]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38583/">CVE-2025-38583 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38583">CVE-2025-38583 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248350">SUSE bug 1248350</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538584" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38584</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38584" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38584" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38584" ref_url="https://www.suse.com/security/cve/CVE-2025-38584" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

padata: Fix pd UAF once and for all

There is a race condition/UAF in padata_reorder that goes back
to the initial commit.  A reference count is taken at the start
of the process in padata_do_parallel, and released at the end in
padata_serial_worker.

This reference count is (and only is) required for padata_replace
to function correctly.  If padata_replace is never called then
there is no issue.

In the function padata_reorder which serves as the core of padata,
as soon as padata is added to queue-&gt;serial.list, and the associated
spin lock released, that padata may be processed and the reference
count on pd would go away.

Fix this by getting the next padata before the squeue-&gt;serial lock
is released.

In order to make this possible, simplify padata_reorder by only
calling it once the next padata arrives.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38584/">CVE-2025-38584 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38584">CVE-2025-38584 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248343">SUSE bug 1248343</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538585" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38585</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38585" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38585" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38585" ref_url="https://www.suse.com/security/cve/CVE-2025-38585" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

staging: media: atomisp: Fix stack buffer overflow in gmin_get_var_int()

When gmin_get_config_var() calls efi.get_variable() and the EFI variable
is larger than the expected buffer size, two behaviors combine to create
a stack buffer overflow:

1. gmin_get_config_var() does not return the proper error code when
   efi.get_variable() fails. It returns the stale 'ret' value from
   earlier operations instead of indicating the EFI failure.

2. When efi.get_variable() returns EFI_BUFFER_TOO_SMALL, it updates
   *out_len to the required buffer size but writes no data to the output
   buffer. However, due to bug #1, gmin_get_var_int() believes the call
   succeeded.

The caller gmin_get_var_int() then performs:
- Allocates val[CFG_VAR_NAME_MAX + 1] (65 bytes) on stack
- Calls gmin_get_config_var(dev, is_gmin, var, val, &amp;len) with len=64
- If EFI variable is &gt;64 bytes, efi.get_variable() sets len=required_size
- Due to bug #1, thinks call succeeded with len=required_size
- Executes val[len] = 0, writing past end of 65-byte stack buffer

This creates a stack buffer overflow when EFI variables are larger than
64 bytes. Since EFI variables can be controlled by firmware or system
configuration, this could potentially be exploited for code execution.

Fix the bug by returning proper error codes from gmin_get_config_var()
based on EFI status instead of stale 'ret' value.

The gmin_get_var_int() function is called during device initialization
for camera sensor configuration on Intel Bay Trail and Cherry Trail
platforms using the atomisp camera stack.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38585/">CVE-2025-38585 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38585">CVE-2025-38585 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248355">SUSE bug 1248355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248671">SUSE bug 1248671</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538586" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38586</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38586" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38586" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38586" ref_url="https://www.suse.com/security/cve/CVE-2025-38586" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf, arm64: Fix fp initialization for exception boundary

In the ARM64 BPF JIT when prog-&gt;aux-&gt;exception_boundary is set for a BPF
program, find_used_callee_regs() is not called because for a program
acting as exception boundary, all callee saved registers are saved.
find_used_callee_regs() sets `ctx-&gt;fp_used = true;` when it sees FP
being used in any of the instructions.

For programs acting as exception boundary, ctx-&gt;fp_used remains false
even if frame pointer is used by the program and therefore, FP is not
set-up for such programs in the prologue. This can cause the kernel to
crash due to a pagefault.

Fix it by setting ctx-&gt;fp_used = true for exception boundary programs as
fp is always saved in such programs.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38586/">CVE-2025-38586 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38586">CVE-2025-38586 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248359">SUSE bug 1248359</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538587" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38587</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38587" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38587" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38587" ref_url="https://www.suse.com/security/cve/CVE-2025-38587" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv6: fix possible infinite loop in fib6_info_uses_dev()

fib6_info_uses_dev() seems to rely on RCU without an explicit
protection.

Like the prior fix in rt6_nlmsg_size(),
we need to make sure fib6_del_route() or fib6_add_rt2node()
have not removed the anchor from the list, or we risk an infinite loop.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38587/">CVE-2025-38587 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38587">CVE-2025-38587 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248361">SUSE bug 1248361</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538588" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38588</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38588" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38588" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38588" ref_url="https://www.suse.com/security/cve/CVE-2025-38588" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023801.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024228.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20276-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024306.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20387-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv6: prevent infinite loop in rt6_nlmsg_size()

While testing prior patch, I was able to trigger
an infinite loop in rt6_nlmsg_size() in the following place:

list_for_each_entry_rcu(sibling, &amp;f6i-&gt;fib6_siblings,
			fib6_siblings) {
	rt6_nh_nlmsg_size(sibling-&gt;fib6_nh, &amp;nexthop_len);
}

This is because fib6_del_route() and fib6_add_rt2node()
uses list_del_rcu(), which can confuse rcu readers,
because they might no longer see the head of the list.

Restart the loop if f6i-&gt;fib6_nsiblings is zero.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38588/">CVE-2025-38588 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38588">CVE-2025-38588 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248368">SUSE bug 1248368</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249241">SUSE bug 1249241</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538589" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38589</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38589" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38589" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38589" ref_url="https://www.suse.com/security/cve/CVE-2025-38589" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

neighbour: Fix null-ptr-deref in neigh_flush_dev().

kernel test robot reported null-ptr-deref in neigh_flush_dev(). [0]

The cited commit introduced per-netdev neighbour list and converted
neigh_flush_dev() to use it instead of the global hash table.

One thing we missed is that neigh_table_clear() calls neigh_ifdown()
with NULL dev.

Let's restore the hash table iteration.

Note that IPv6 module is no longer unloadable, so neigh_table_clear()
is called only when IPv6 fails to initialise, which is unlikely to
happen.

[0]:
IPv6: Attempt to unregister permanent protocol 136
IPv6: Attempt to unregister permanent protocol 17
Oops: general protection fault, probably for non-canonical address 0xdffffc00000001a0: 0000 [#1] SMP KASAN
KASAN: null-ptr-deref in range [0x0000000000000d00-0x0000000000000d07]
CPU: 1 UID: 0 PID: 1 Comm: systemd Tainted: G                T  6.12.0-rc6-01246-gf7f52738637f #1
Tainted: [T]=RANDSTRUCT
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014
RIP: 0010:neigh_flush_dev.llvm.6395807810224103582+0x52/0x570
Code: c1 e8 03 42 8a 04 38 84 c0 0f 85 15 05 00 00 31 c0 41 83 3e 0a 0f 94 c0 48 8d 1c c3 48 81 c3 f8 0c 00 00 48 89 d8 48 c1 e8 03 &lt;42&gt; 80 3c 38 00 74 08 48 89 df e8 f7 49 93 fe 4c 8b 3b 4d 85 ff 0f
RSP: 0000:ffff88810026f408 EFLAGS: 00010206
RAX: 00000000000001a0 RBX: 0000000000000d00 RCX: 0000000000000000
RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffffffc0631640
RBP: ffff88810026f470 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000
R13: ffffffffc0625250 R14: ffffffffc0631640 R15: dffffc0000000000
FS:  00007f575cb83940(0000) GS:ffff8883aee00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f575db40008 CR3: 00000002bf936000 CR4: 00000000000406f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
 __neigh_ifdown.llvm.6395807810224103582+0x44/0x390
 neigh_table_clear+0xb1/0x268
 ndisc_cleanup+0x21/0x38 [ipv6]
 init_module+0x2f5/0x468 [ipv6]
 do_one_initcall+0x1ba/0x628
 do_init_module+0x21a/0x530
 load_module+0x2550/0x2ea0
 __se_sys_finit_module+0x3d2/0x620
 __x64_sys_finit_module+0x76/0x88
 x64_sys_call+0x7ff/0xde8
 do_syscall_64+0xfb/0x1e8
 entry_SYSCALL_64_after_hwframe+0x67/0x6f
RIP: 0033:0x7f575d6f2719
Code: 08 89 e8 5b 5d c3 66 2e 0f 1f 84 00 00 00 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 8b 0d b7 06 0d 00 f7 d8 64 89 01 48
RSP: 002b:00007fff82a2a268 EFLAGS: 00000246 ORIG_RAX: 0000000000000139
RAX: ffffffffffffffda RBX: 0000557827b45310 RCX: 00007f575d6f2719
RDX: 0000000000000000 RSI: 00007f575d584efd RDI: 0000000000000004
RBP: 00007f575d584efd R08: 0000000000000000 R09: 0000557827b47b00
R10: 0000000000000004 R11: 0000000000000246 R12: 0000000000020000
R13: 0000000000000000 R14: 0000557827b470e0 R15: 00007f575dbb4270
 &lt;/TASK&gt;
Modules linked in: ipv6(+)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38589/">CVE-2025-38589 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38589">CVE-2025-38589 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248366">SUSE bug 1248366</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538590" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38590</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38590" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38590" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38590" ref_url="https://www.suse.com/security/cve/CVE-2025-38590" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: Remove skb secpath if xfrm state is not found

Hardware returns a unique identifier for a decrypted packet's xfrm
state, this state is looked up in an xarray. However, the state might
have been freed by the time of this lookup.

Currently, if the state is not found, only a counter is incremented.
The secpath (sp) extension on the skb is not removed, resulting in
sp-&gt;len becoming 0.

Subsequently, functions like __xfrm_policy_check() attempt to access
fields such as xfrm_input_state(skb)-&gt;xso.type (which dereferences
sp-&gt;xvec[sp-&gt;len - 1]) without first validating sp-&gt;len. This leads to
a crash when dereferencing an invalid state pointer.

This patch prevents the crash by explicitly removing the secpath
extension from the skb if the xfrm state is not found after hardware
decryption. This ensures downstream functions do not operate on a
zero-length secpath.

 BUG: unable to handle page fault for address: ffffffff000002c8
 #PF: supervisor read access in kernel mode
 #PF: error_code(0x0000) - not-present page
 PGD 282e067 P4D 282e067 PUD 0
 Oops: Oops: 0000 [#1] SMP
 CPU: 12 UID: 0 PID: 0 Comm: swapper/12 Not tainted 6.15.0-rc7_for_upstream_min_debug_2025_05_27_22_44 #1 NONE
 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
 RIP: 0010:__xfrm_policy_check+0x61a/0xa30
 Code: b6 77 7f 83 e6 02 74 14 4d 8b af d8 00 00 00 41 0f b6 45 05 c1 e0 03 48 98 49 01 c5 41 8b 45 00 83 e8 01 48 98 49 8b 44 c5 10 &lt;0f&gt; b6 80 c8 02 00 00 83 e0 0c 3c 04 0f 84 0c 02 00 00 31 ff 80 fa
 RSP: 0018:ffff88885fb04918 EFLAGS: 00010297
 RAX: ffffffff00000000 RBX: 0000000000000002 RCX: 0000000000000000
 RDX: 0000000000000002 RSI: 0000000000000002 RDI: 0000000000000000
 RBP: ffffffff8311af80 R08: 0000000000000020 R09: 00000000c2eda353
 R10: ffff88812be2bbc8 R11: 000000001faab533 R12: ffff88885fb049c8
 R13: ffff88812be2bbc8 R14: 0000000000000000 R15: ffff88811896ae00
 FS:  0000000000000000(0000) GS:ffff8888dca82000(0000) knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: ffffffff000002c8 CR3: 0000000243050002 CR4: 0000000000372eb0
 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
 Call Trace:
  &lt;IRQ&gt;
  ? try_to_wake_up+0x108/0x4c0
  ? udp4_lib_lookup2+0xbe/0x150
  ? udp_lib_lport_inuse+0x100/0x100
  ? __udp4_lib_lookup+0x2b0/0x410
  __xfrm_policy_check2.constprop.0+0x11e/0x130
  udp_queue_rcv_one_skb+0x1d/0x530
  udp_unicast_rcv_skb+0x76/0x90
  __udp4_lib_rcv+0xa64/0xe90
  ip_protocol_deliver_rcu+0x20/0x130
  ip_local_deliver_finish+0x75/0xa0
  ip_local_deliver+0xc1/0xd0
  ? ip_protocol_deliver_rcu+0x130/0x130
  ip_sublist_rcv+0x1f9/0x240
  ? ip_rcv_finish_core+0x430/0x430
  ip_list_rcv+0xfc/0x130
  __netif_receive_skb_list_core+0x181/0x1e0
  netif_receive_skb_list_internal+0x200/0x360
  ? mlx5e_build_rx_skb+0x1bc/0xda0 [mlx5_core]
  gro_receive_skb+0xfd/0x210
  mlx5e_handle_rx_cqe_mpwrq+0x141/0x280 [mlx5_core]
  mlx5e_poll_rx_cq+0xcc/0x8e0 [mlx5_core]
  ? mlx5e_handle_rx_dim+0x91/0xd0 [mlx5_core]
  mlx5e_napi_poll+0x114/0xab0 [mlx5_core]
  __napi_poll+0x25/0x170
  net_rx_action+0x32d/0x3a0
  ? mlx5_eq_comp_int+0x8d/0x280 [mlx5_core]
  ? notifier_call_chain+0x33/0xa0
  handle_softirqs+0xda/0x250
  irq_exit_rcu+0x6d/0xc0
  common_interrupt+0x81/0xa0
  &lt;/IRQ&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38590/">CVE-2025-38590 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38590">CVE-2025-38590 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248360">SUSE bug 1248360</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538591" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38591</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38591" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38591" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38591" ref_url="https://www.suse.com/security/cve/CVE-2025-38591" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Reject narrower access to pointer ctx fields

The following BPF program, simplified from a syzkaller repro, causes a
kernel warning:

    r0 = *(u8 *)(r1 + 169);
    exit;

With pointer field sk being at offset 168 in __sk_buff. This access is
detected as a narrower read in bpf_skb_is_valid_access because it
doesn't match offsetof(struct __sk_buff, sk). It is therefore allowed
and later proceeds to bpf_convert_ctx_access. Note that for the
"is_narrower_load" case in the convert_ctx_accesses(), the insn-&gt;off
is aligned, so the cnt may not be 0 because it matches the
offsetof(struct __sk_buff, sk) in the bpf_convert_ctx_access. However,
the target_size stays 0 and the verifier errors with a kernel warning:

    verifier bug: error during ctx access conversion(1)

This patch fixes that to return a proper "invalid bpf_context access
off=X size=Y" error on the load instruction.

The same issue affects multiple other fields in context structures that
allow narrow access. Some other non-affected fields (for sk_msg,
sk_lookup, and sockopt) were also changed to use bpf_ctx_range_ptr for
consistency.

Note this syzkaller crash was reported in the "Closes" link below, which
used to be about a different bug, fixed in
commit fce7bd8e385a ("bpf/verifier: Handle BPF_LOAD_ACQ instructions
in insn_def_regno()"). Because syzbot somehow confused the two bugs,
the new crash and repro didn't get reported to the mailing list.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38591/">CVE-2025-38591 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38591">CVE-2025-38591 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248363">SUSE bug 1248363</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538593" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38593</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38593" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38593" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38593" ref_url="https://www.suse.com/security/cve/CVE-2025-38593" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: hci_sync: fix double free in 'hci_discovery_filter_clear()'

Function 'hci_discovery_filter_clear()' frees 'uuids' array and then
sets it to NULL. There is a tiny chance of the following race:

'hci_cmd_sync_work()'

 'update_passive_scan_sync()'

   'hci_update_passive_scan_sync()'

     'hci_discovery_filter_clear()'
       kfree(uuids);

       &lt;-------------------------preempted--------------------------------&gt;
                                           'start_service_discovery()'

                                             'hci_discovery_filter_clear()'
                                               kfree(uuids); // DOUBLE FREE

       &lt;-------------------------preempted--------------------------------&gt;

      uuids = NULL;

To fix it let's add locking around 'kfree()' call and NULL pointer
assignment. Otherwise the following backtrace fires:

[ ] ------------[ cut here ]------------
[ ] kernel BUG at mm/slub.c:547!
[ ] Internal error: Oops - BUG: 00000000f2000800 [#1] PREEMPT SMP
[ ] CPU: 3 UID: 0 PID: 246 Comm: bluetoothd Tainted: G O 6.12.19-kernel #1
[ ] Tainted: [O]=OOT_MODULE
[ ] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[ ] pc : __slab_free+0xf8/0x348
[ ] lr : __slab_free+0x48/0x348
...
[ ] Call trace:
[ ]  __slab_free+0xf8/0x348
[ ]  kfree+0x164/0x27c
[ ]  start_service_discovery+0x1d0/0x2c0
[ ]  hci_sock_sendmsg+0x518/0x924
[ ]  __sock_sendmsg+0x54/0x60
[ ]  sock_write_iter+0x98/0xf8
[ ]  do_iter_readv_writev+0xe4/0x1c8
[ ]  vfs_writev+0x128/0x2b0
[ ]  do_writev+0xfc/0x118
[ ]  __arm64_sys_writev+0x20/0x2c
[ ]  invoke_syscall+0x68/0xf0
[ ]  el0_svc_common.constprop.0+0x40/0xe0
[ ]  do_el0_svc+0x1c/0x28
[ ]  el0_svc+0x30/0xd0
[ ]  el0t_64_sync_handler+0x100/0x12c
[ ]  el0t_64_sync+0x194/0x198
[ ] Code: 8b0002e6 eb17031f 54fffbe1 d503201f (d4210000)
[ ] ---[ end trace 0000000000000000 ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38593/">CVE-2025-38593 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38593">CVE-2025-38593 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248357">SUSE bug 1248357</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538595" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38595</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38595" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38595" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38595" ref_url="https://www.suse.com/security/cve/CVE-2025-38595" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xen: fix UAF in dmabuf_exp_from_pages()

[dma_buf_fd() fixes; no preferences regarding the tree it goes through -
up to xen folks]

As soon as we'd inserted a file reference into descriptor table, another
thread could close it.  That's fine for the case when all we are doing is
returning that descriptor to userland (it's a race, but it's a userland
race and there's nothing the kernel can do about it).  However, if we
follow fd_install() with any kind of access to objects that would be
destroyed on close (be it the struct file itself or anything destroyed
by its -&gt;release()), we have a UAF.

dma_buf_fd() is a combination of reserving a descriptor and fd_install().
gntdev dmabuf_exp_from_pages() calls it and then proceeds to access the
objects destroyed on close - starting with gntdev_dmabuf itself.

Fix that by doing reserving descriptor before anything else and do
fd_install() only when everything had been set up.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38595/">CVE-2025-38595 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38595">CVE-2025-38595 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248380">SUSE bug 1248380</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38597</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38597" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38597" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38597" ref_url="https://www.suse.com/security/cve/CVE-2025-38597" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/rockchip: vop2: fail cleanly if missing a primary plane for a video-port

Each window of a vop2 is usable by a specific set of video ports, so while
binding the vop2, we look through the list of available windows trying to
find one designated as primary-plane and usable by that specific port.

The code later wants to use drm_crtc_init_with_planes with that found
primary plane, but nothing has checked so far if a primary plane was
actually found.

For whatever reason, the rk3576 vp2 does not have a usable primary window
(if vp0 is also in use) which brought the issue to light and ended in a
null-pointer dereference further down.

As we expect a primary-plane to exist for a video-port, add a check at
the end of the window-iteration and fail probing if none was found.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38597/">CVE-2025-38597 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38597">CVE-2025-38597 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248378">SUSE bug 1248378</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538601" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38601</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38601" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38601" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38601" ref_url="https://www.suse.com/security/cve/CVE-2025-38601" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath11k: clear initialized flag for deinit-ed srng lists

In a number of cases we see kernel panics on resume due
to ath11k kernel page fault, which happens under the
following circumstances:

1) First ath11k_hal_dump_srng_stats() call

 Last interrupt received for each group:
 ath11k_pci 0000:01:00.0: group_id 0 22511ms before
 ath11k_pci 0000:01:00.0: group_id 1 14440788ms before
 [..]
 ath11k_pci 0000:01:00.0: failed to receive control response completion, polling..
 ath11k_pci 0000:01:00.0: Service connect timeout
 ath11k_pci 0000:01:00.0: failed to connect to HTT: -110
 ath11k_pci 0000:01:00.0: failed to start core: -110
 ath11k_pci 0000:01:00.0: firmware crashed: MHI_CB_EE_RDDM
 ath11k_pci 0000:01:00.0: already resetting count 2
 ath11k_pci 0000:01:00.0: failed to wait wlan mode request (mode 4): -110
 ath11k_pci 0000:01:00.0: qmi failed to send wlan mode off: -110
 ath11k_pci 0000:01:00.0: failed to reconfigure driver on crash recovery
 [..]

2) At this point reconfiguration fails (we have 2 resets) and
  ath11k_core_reconfigure_on_crash() calls ath11k_hal_srng_deinit()
  which destroys srng lists.  However, it does not reset per-list
  -&gt;initialized flag.

3) Second ath11k_hal_dump_srng_stats() call sees stale -&gt;initialized
  flag and attempts to dump srng stats:

 Last interrupt received for each group:
 ath11k_pci 0000:01:00.0: group_id 0 66785ms before
 ath11k_pci 0000:01:00.0: group_id 1 14485062ms before
 ath11k_pci 0000:01:00.0: group_id 2 14485062ms before
 ath11k_pci 0000:01:00.0: group_id 3 14485062ms before
 ath11k_pci 0000:01:00.0: group_id 4 14780845ms before
 ath11k_pci 0000:01:00.0: group_id 5 14780845ms before
 ath11k_pci 0000:01:00.0: group_id 6 14485062ms before
 ath11k_pci 0000:01:00.0: group_id 7 66814ms before
 ath11k_pci 0000:01:00.0: group_id 8 68997ms before
 ath11k_pci 0000:01:00.0: group_id 9 67588ms before
 ath11k_pci 0000:01:00.0: group_id 10 69511ms before
 BUG: unable to handle page fault for address: ffffa007404eb010
 #PF: supervisor read access in kernel mode
 #PF: error_code(0x0000) - not-present page
 PGD 100000067 P4D 100000067 PUD 10022d067 PMD 100b01067 PTE 0
 Oops: 0000 [#1] PREEMPT SMP NOPTI
 RIP: 0010:ath11k_hal_dump_srng_stats+0x2b4/0x3b0 [ath11k]
 Call Trace:
 &lt;TASK&gt;
 ? __die_body+0xae/0xb0
 ? page_fault_oops+0x381/0x3e0
 ? exc_page_fault+0x69/0xa0
 ? asm_exc_page_fault+0x22/0x30
 ? ath11k_hal_dump_srng_stats+0x2b4/0x3b0 [ath11k (HASH:6cea 4)]
 ath11k_qmi_driver_event_work+0xbd/0x1050 [ath11k (HASH:6cea 4)]
 worker_thread+0x389/0x930
 kthread+0x149/0x170

Clear per-list -&gt;initialized flag in ath11k_hal_srng_deinit().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38601/">CVE-2025-38601 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38601">CVE-2025-38601 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248340">SUSE bug 1248340</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538602" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38602</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38602" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38602" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38602" ref_url="https://www.suse.com/security/cve/CVE-2025-38602" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iwlwifi: Add missing check for alloc_ordered_workqueue

Add check for the return value of alloc_ordered_workqueue since it may
return NULL pointer.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38602/">CVE-2025-38602 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38602">CVE-2025-38602 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248341">SUSE bug 1248341</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538604" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38604</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38604" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38604" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38604" ref_url="https://www.suse.com/security/cve/CVE-2025-38604" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: rtl818x: Kill URBs before clearing tx status queue

In rtl8187_stop() move the call of usb_kill_anchored_urbs() before clearing
b_tx_status.queue. This change prevents callbacks from using already freed
skb due to anchor was not killed before freeing such skb.

 BUG: kernel NULL pointer dereference, address: 0000000000000080
 #PF: supervisor read access in kernel mode
 #PF: error_code(0x0000) - not-present page
 PGD 0 P4D 0
 Oops: Oops: 0000 [#1] SMP NOPTI
 CPU: 7 UID: 0 PID: 0 Comm: swapper/7 Not tainted 6.15.0 #8 PREEMPT(voluntary)
 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 0.0.0 02/06/2015
 RIP: 0010:ieee80211_tx_status_irqsafe+0x21/0xc0 [mac80211]
 Call Trace:
  &lt;IRQ&gt;
  rtl8187_tx_cb+0x116/0x150 [rtl8187]
  __usb_hcd_giveback_urb+0x9d/0x120
  usb_giveback_urb_bh+0xbb/0x140
  process_one_work+0x19b/0x3c0
  bh_worker+0x1a7/0x210
  tasklet_action+0x10/0x30
  handle_softirqs+0xf0/0x340
  __irq_exit_rcu+0xcd/0xf0
  common_interrupt+0x85/0xa0
  &lt;/IRQ&gt;

Tested on RTL8187BvE device.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38604/">CVE-2025-38604 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38604">CVE-2025-38604 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248333">SUSE bug 1248333</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538605" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38605</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38605" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38605" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38605" ref_url="https://www.suse.com/security/cve/CVE-2025-38605" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath12k: Pass ab pointer directly to ath12k_dp_tx_get_encap_type()

In ath12k_dp_tx_get_encap_type(), the arvif parameter is only used to
retrieve the ab pointer. In vdev delete sequence the arvif-&gt;ar could
become NULL and that would trigger kernel panic.
Since the caller ath12k_dp_tx() already has a valid ab pointer, pass it
directly to avoid panic and unnecessary dereferencing.

PC points to "ath12k_dp_tx+0x228/0x988 [ath12k]"
LR points to "ath12k_dp_tx+0xc8/0x988 [ath12k]".
The Backtrace obtained is as follows:
ath12k_dp_tx+0x228/0x988 [ath12k]
ath12k_mac_tx_check_max_limit+0x608/0x920 [ath12k]
ieee80211_process_measurement_req+0x320/0x348 [mac80211]
ieee80211_tx_dequeue+0x9ac/0x1518 [mac80211]
ieee80211_tx_dequeue+0xb14/0x1518 [mac80211]
ieee80211_tx_prepare_skb+0x224/0x254 [mac80211]
ieee80211_xmit+0xec/0x100 [mac80211]
__ieee80211_subif_start_xmit+0xc50/0xf40 [mac80211]
ieee80211_subif_start_xmit+0x2e8/0x308 [mac80211]
netdev_start_xmit+0x150/0x18c
dev_hard_start_xmit+0x74/0xc0

Tested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.3.1-00173-QCAHKSWPL_SILICONZ-1
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38605/">CVE-2025-38605 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38605">CVE-2025-38605 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248334">SUSE bug 1248334</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538608" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38608</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38608" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38608" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38608" ref_url="https://www.suse.com/security/cve/CVE-2025-38608" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03283-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03310-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03314-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023801.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024228.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls

When sending plaintext data, we initially calculated the corresponding
ciphertext length. However, if we later reduced the plaintext data length
via socket policy, we failed to recalculate the ciphertext length.

This results in transmitting buffers containing uninitialized data during
ciphertext transmission.

This causes uninitialized bytes to be appended after a complete
"Application Data" packet, leading to errors on the receiving end when
parsing TLS record.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38608/">CVE-2025-38608 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38608">CVE-2025-38608 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248338">SUSE bug 1248338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248670">SUSE bug 1248670</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538609" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38609</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38609" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38609" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38609" ref_url="https://www.suse.com/security/cve/CVE-2025-38609" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

PM / devfreq: Check governor before using governor-&gt;name

Commit 96ffcdf239de ("PM / devfreq: Remove redundant governor_name from
struct devfreq") removes governor_name and uses governor-&gt;name to replace
it. But devfreq-&gt;governor may be NULL and directly using
devfreq-&gt;governor-&gt;name may cause null pointer exception. Move the check of
governor to before using governor-&gt;name.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38609/">CVE-2025-38609 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38609">CVE-2025-38609 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248337">SUSE bug 1248337</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538610" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38610</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38610" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38610" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38610" ref_url="https://www.suse.com/security/cve/CVE-2025-38610" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powercap: dtpm_cpu: Fix NULL pointer dereference in get_pd_power_uw()

The get_pd_power_uw() function can crash with a NULL pointer dereference
when em_cpu_get() returns NULL. This occurs when a CPU becomes impossible
during runtime, causing get_cpu_device() to return NULL, which propagates
through em_cpu_get() and leads to a crash when em_span_cpus() dereferences
the NULL pointer.

Add a NULL check after em_cpu_get() and return 0 if unavailable,
matching the existing fallback behavior in __dtpm_cpu_setup().

[ rjw: Drop an excess empty code line ]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38610/">CVE-2025-38610 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38610">CVE-2025-38610 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248395">SUSE bug 1248395</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538612" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38612</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38612" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38612" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38612" ref_url="https://www.suse.com/security/cve/CVE-2025-38612" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

staging: fbtft: fix potential memory leak in fbtft_framebuffer_alloc()

In the error paths after fb_info structure is successfully allocated,
the memory allocated in fb_deferred_io_init() for info-&gt;pagerefs is not
freed. Fix that by adding the cleanup function on the error path.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38612/">CVE-2025-38612 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38612">CVE-2025-38612 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248390">SUSE bug 1248390</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538614" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38614</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38614" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38614" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38614" ref_url="https://www.suse.com/security/cve/CVE-2025-38614" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:17760" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

eventpoll: Fix semi-unbounded recursion

Ensure that epoll instances can never form a graph deeper than
EP_MAX_NESTS+1 links.

Currently, ep_loop_check_proc() ensures that the graph is loop-free and
does some recursion depth checks, but those recursion depth checks don't
limit the depth of the resulting tree for two reasons:

 - They don't look upwards in the tree.
 - If there are multiple downwards paths of different lengths, only one of
   the paths is actually considered for the depth check since commit
   28d82dc1c4ed ("epoll: limit paths").

Essentially, the current recursion depth check in ep_loop_check_proc() just
serves to prevent it from recursing too deeply while checking for loops.

A more thorough check is done in reverse_path_check() after the new graph
edge has already been created; this checks, among other things, that no
paths going upwards from any non-epoll file with a length of more than 5
edges exist. However, this check does not apply to non-epoll files.

As a result, it is possible to recurse to a depth of at least roughly 500,
tested on v6.15. (I am unsure if deeper recursion is possible; and this may
have changed with commit 8c44dac8add7 ("eventpoll: Fix priority inversion
problem").)

To fix it:

1. In ep_loop_check_proc(), note the subtree depth of each visited node,
and use subtree depths for the total depth calculation even when a subtree
has already been visited.
2. Add ep_get_upwards_depth_proc() for similarly determining the maximum
depth of an upwards walk.
3. In ep_loop_check(), use these values to limit the total path length
between epoll nodes to EP_MAX_NESTS edges.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38614/">CVE-2025-38614 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38614">CVE-2025-38614 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248392">SUSE bug 1248392</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538616" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38616</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38616" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38616" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38616" ref_url="https://www.suse.com/security/cve/CVE-2025-38616" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023488.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023487.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023486.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023484.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21092-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023481.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023480.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023479.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21113-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21119-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21120-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21124-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4160-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4208-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023348.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023372.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4275-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4282-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4302-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023433.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4306-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tls: handle data disappearing from under the TLS ULP

TLS expects that it owns the receive queue of the TCP socket.
This cannot be guaranteed in case the reader of the TCP socket
entered before the TLS ULP was installed, or uses some non-standard
read API (eg. zerocopy ones). Replace the WARN_ON() and a buggy
early exit (which leaves anchor pointing to a freed skb) with real
error handling. Wipe the parsing state and tell the reader to retry.

We already reload the anchor every time we (re)acquire the socket lock,
so the only condition we need to avoid is an out of bounds read
(not having enough bytes in the socket for previously parsed record len).

If some data was read from under TLS but there's enough in the queue
we'll reload and decrypt what is most likely not a valid TLS record.
Leading to some undefined behavior from TLS perspective (corrupting
a stream? missing an alert? missing an attack?) but no kernel crash
should take place.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-38616/">CVE-2025-38616 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38616">CVE-2025-38616 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248512">SUSE bug 1248512</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249537">SUSE bug 1249537</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538617" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38617</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38617" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38617" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38617" ref_url="https://www.suse.com/security/cve/CVE-2025-38617" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03283-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03310-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03314-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023243.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023242.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20944-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023241.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023228.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20959-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20974-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20977-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20980-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20981-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20982-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20984-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042613.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20985-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20987-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20988-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20989-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3936-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4050-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/packet: fix a race in packet_set_ring() and packet_notifier()

When packet_set_ring() releases po-&gt;bind_lock, another thread can
run packet_notifier() and process an NETDEV_UP event.

This race and the fix are both similar to that of commit 15fe076edea7
("net/packet: fix a race in packet_bind() and packet_notifier()").

There too the packet_notifier NETDEV_UP event managed to run while a
po-&gt;bind_lock critical section had to be temporarily released. And
the fix was similarly to temporarily set po-&gt;num to zero to keep
the socket unhooked until the lock is retaken.

The po-&gt;bind_lock in packet_set_ring and packet_notifier precede the
introduction of git history.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38617/">CVE-2025-38617 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38617">CVE-2025-38617 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247374">SUSE bug 1247374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248621">SUSE bug 1248621</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249208">SUSE bug 1249208</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253291">SUSE bug 1253291</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538618" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38618</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38618" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38618" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38618" ref_url="https://www.suse.com/security/cve/CVE-2025-38618" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03283-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03310-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03314-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023243.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023242.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20944-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023241.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023228.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20959-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20974-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20977-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20980-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20981-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20982-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20984-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042613.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20985-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20986-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20987-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20988-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20989-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3936-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3987-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4024-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023189.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4050-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vsock: Do not allow binding to VMADDR_PORT_ANY

It is possible for a vsock to autobind to VMADDR_PORT_ANY. This can
cause a use-after-free when a connection is made to the bound socket.
The socket returned by accept() also has port VMADDR_PORT_ANY but is not
on the list of unbound sockets. Binding it will result in an extra
refcount decrement similar to the one fixed in fcdd2242c023 (vsock: Keep
the binding until socket destruction).

Modify the check in __vsock_bind_connectible() to also prevent binding
to VMADDR_PORT_ANY.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38618/">CVE-2025-38618 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38618">CVE-2025-38618 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248511">SUSE bug 1248511</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249207">SUSE bug 1249207</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538619" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38619</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38619" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38619" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38619" ref_url="https://www.suse.com/security/cve/CVE-2025-38619" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: ti: j721e-csi2rx: fix list_del corruption

If ti_csi2rx_start_dma() fails in ti_csi2rx_dma_callback(), the buffer is
marked done with VB2_BUF_STATE_ERROR but is not removed from the DMA queue.
This causes the same buffer to be retried in the next iteration, resulting
in a double list_del() and eventual list corruption.

Fix this by removing the buffer from the queue before calling
vb2_buffer_done() on error.

This resolves a crash due to list_del corruption:
[   37.811243] j721e-csi2rx 30102000.ticsi2rx: Failed to queue the next buffer for DMA
[   37.832187]  slab kmalloc-2k start ffff00000255b000 pointer offset 1064 size 2048
[   37.839761] list_del corruption. next-&gt;prev should be ffff00000255bc28, but was ffff00000255d428. (next=ffff00000255b428)
[   37.850799] ------------[ cut here ]------------
[   37.855424] kernel BUG at lib/list_debug.c:65!
[   37.859876] Internal error: Oops - BUG: 00000000f2000800 [#1]  SMP
[   37.866061] Modules linked in: i2c_dev usb_f_rndis u_ether libcomposite dwc3 udc_core usb_common aes_ce_blk aes_ce_cipher ghash_ce gf128mul sha1_ce cpufreq_dt dwc3_am62 phy_gmii_sel sa2ul
[   37.882830] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Not tainted 6.16.0-rc3+ #28 VOLUNTARY
[   37.890851] Hardware name: Bosch STLA-GSRV2-B0 (DT)
[   37.895737] pstate: 600000c5 (nZCv daIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[   37.902703] pc : __list_del_entry_valid_or_report+0xdc/0x114
[   37.908390] lr : __list_del_entry_valid_or_report+0xdc/0x114
[   37.914059] sp : ffff800080003db0
[   37.917375] x29: ffff800080003db0 x28: 0000000000000007 x27: ffff800080e50000
[   37.924521] x26: 0000000000000000 x25: ffff0000016abb50 x24: dead000000000122
[   37.931666] x23: ffff0000016abb78 x22: ffff0000016ab080 x21: ffff800080003de0
[   37.938810] x20: ffff00000255bc00 x19: ffff00000255b800 x18: 000000000000000a
[   37.945956] x17: 20747562202c3832 x16: 6362353532303030 x15: 0720072007200720
[   37.953101] x14: 0720072007200720 x13: 0720072007200720 x12: 00000000ffffffea
[   37.960248] x11: ffff800080003b18 x10: 00000000ffffefff x9 : ffff800080f5b568
[   37.967396] x8 : ffff800080f5b5c0 x7 : 0000000000017fe8 x6 : c0000000ffffefff
[   37.974542] x5 : ffff00000fea6688 x4 : 0000000000000000 x3 : 0000000000000000
[   37.981686] x2 : 0000000000000000 x1 : ffff800080ef2b40 x0 : 000000000000006d
[   37.988832] Call trace:
[   37.991281]  __list_del_entry_valid_or_report+0xdc/0x114 (P)
[   37.996959]  ti_csi2rx_dma_callback+0x84/0x1c4
[   38.001419]  udma_vchan_complete+0x1e0/0x344
[   38.005705]  tasklet_action_common+0x118/0x310
[   38.010163]  tasklet_action+0x30/0x3c
[   38.013832]  handle_softirqs+0x10c/0x2e0
[   38.017761]  __do_softirq+0x14/0x20
[   38.021256]  ____do_softirq+0x10/0x20
[   38.024931]  call_on_irq_stack+0x24/0x60
[   38.028873]  do_softirq_own_stack+0x1c/0x40
[   38.033064]  __irq_exit_rcu+0x130/0x15c
[   38.036909]  irq_exit_rcu+0x10/0x20
[   38.040403]  el1_interrupt+0x38/0x60
[   38.043987]  el1h_64_irq_handler+0x18/0x24
[   38.048091]  el1h_64_irq+0x6c/0x70
[   38.051501]  default_idle_call+0x34/0xe0 (P)
[   38.055783]  do_idle+0x1f8/0x250
[   38.059021]  cpu_startup_entry+0x34/0x3c
[   38.062951]  rest_init+0xb4/0xc0
[   38.066186]  console_on_rootfs+0x0/0x6c
[   38.070031]  __primary_switched+0x88/0x90
[   38.074059] Code: b00037e0 91378000 f9400462 97e9bf49 (d4210000)
[   38.080168] ---[ end trace 0000000000000000 ]---
[   38.084795] Kernel panic - not syncing: Oops - BUG: Fatal exception in interrupt
[   38.092197] SMP: stopping secondary CPUs
[   38.096139] Kernel Offset: disabled
[   38.099631] CPU features: 0x0000,00002000,02000801,0400420b
[   38.105202] Memory Limit: none
[   38.108260] ---[ end Kernel panic - not syncing: Oops - BUG: Fatal exception in interrupt ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-04-08"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38619/">CVE-2025-38619 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38619">CVE-2025-38619 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248664">SUSE bug 1248664</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248665">SUSE bug 1248665</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538621" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38621</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38621" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38621" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38621" ref_url="https://www.suse.com/security/cve/CVE-2025-38621" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

md: make rdev_addable usable for rcu mode

Our testcase trigger panic:

BUG: kernel NULL pointer dereference, address: 00000000000000e0
...
Oops: Oops: 0000 [#1] SMP NOPTI
CPU: 2 UID: 0 PID: 85 Comm: kworker/2:1 Not tainted 6.16.0+ #94
PREEMPT(none)
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS
1.16.1-2.fc37 04/01/2014
Workqueue: md_misc md_start_sync
RIP: 0010:rdev_addable+0x4d/0xf0
...
Call Trace:
 &lt;TASK&gt;
 md_start_sync+0x329/0x480
 process_one_work+0x226/0x6d0
 worker_thread+0x19e/0x340
 kthread+0x10f/0x250
 ret_from_fork+0x14d/0x180
 ret_from_fork_asm+0x1a/0x30
 &lt;/TASK&gt;
Modules linked in: raid10
CR2: 00000000000000e0
---[ end trace 0000000000000000 ]---
RIP: 0010:rdev_addable+0x4d/0xf0

md_spares_need_change in md_start_sync will call rdev_addable which
protected by rcu_read_lock/rcu_read_unlock. This rcu context will help
protect rdev won't be released, but rdev-&gt;mddev will be set to NULL
before we call synchronize_rcu in md_kick_rdev_from_array. Fix this by
using READ_ONCE and check does rdev-&gt;mddev still alive.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38621/">CVE-2025-38621 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38621">CVE-2025-38621 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248609">SUSE bug 1248609</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38622</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38622" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38622" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38622" ref_url="https://www.suse.com/security/cve/CVE-2025-38622" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: drop UFO packets in udp_rcv_segment()

When sending a packet with virtio_net_hdr to tun device, if the gso_type
in virtio_net_hdr is SKB_GSO_UDP and the gso_size is less than udphdr
size, below crash may happen.

  ------------[ cut here ]------------
  kernel BUG at net/core/skbuff.c:4572!
  Oops: invalid opcode: 0000 [#1] SMP NOPTI
  CPU: 0 UID: 0 PID: 62 Comm: mytest Not tainted 6.16.0-rc7 #203 PREEMPT(voluntary)
  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014
  RIP: 0010:skb_pull_rcsum+0x8e/0xa0
  Code: 00 00 5b c3 cc cc cc cc 8b 93 88 00 00 00 f7 da e8 37 44 38 00 f7 d8 89 83 88 00 00 00 48 8b 83 c8 00 00 00 5b c3 cc cc cc cc &lt;0f&gt; 0b 0f 0b 66 66 2e 0f 1f 84 00 000
  RSP: 0018:ffffc900001fba38 EFLAGS: 00000297
  RAX: 0000000000000004 RBX: ffff8880040c1000 RCX: ffffc900001fb948
  RDX: ffff888003e6d700 RSI: 0000000000000008 RDI: ffff88800411a062
  RBP: ffff8880040c1000 R08: 0000000000000000 R09: 0000000000000001
  R10: ffff888003606c00 R11: 0000000000000001 R12: 0000000000000000
  R13: ffff888004060900 R14: ffff888004050000 R15: ffff888004060900
  FS:  000000002406d3c0(0000) GS:ffff888084a19000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: 0000000020000040 CR3: 0000000004007000 CR4: 00000000000006f0
  Call Trace:
   &lt;TASK&gt;
   udp_queue_rcv_one_skb+0x176/0x4b0 net/ipv4/udp.c:2445
   udp_queue_rcv_skb+0x155/0x1f0 net/ipv4/udp.c:2475
   udp_unicast_rcv_skb+0x71/0x90 net/ipv4/udp.c:2626
   __udp4_lib_rcv+0x433/0xb00 net/ipv4/udp.c:2690
   ip_protocol_deliver_rcu+0xa6/0x160 net/ipv4/ip_input.c:205
   ip_local_deliver_finish+0x72/0x90 net/ipv4/ip_input.c:233
   ip_sublist_rcv_finish+0x5f/0x70 net/ipv4/ip_input.c:579
   ip_sublist_rcv+0x122/0x1b0 net/ipv4/ip_input.c:636
   ip_list_rcv+0xf7/0x130 net/ipv4/ip_input.c:670
   __netif_receive_skb_list_core+0x21d/0x240 net/core/dev.c:6067
   netif_receive_skb_list_internal+0x186/0x2b0 net/core/dev.c:6210
   napi_complete_done+0x78/0x180 net/core/dev.c:6580
   tun_get_user+0xa63/0x1120 drivers/net/tun.c:1909
   tun_chr_write_iter+0x65/0xb0 drivers/net/tun.c:1984
   vfs_write+0x300/0x420 fs/read_write.c:593
   ksys_write+0x60/0xd0 fs/read_write.c:686
   do_syscall_64+0x50/0x1c0 arch/x86/entry/syscall_64.c:63
   &lt;/TASK&gt;

To trigger gso segment in udp_queue_rcv_skb(), we should also set option
UDP_ENCAP_ESPINUDP to enable udp_sk(sk)-&gt;encap_rcv. When the encap_rcv
hook return 1 in udp_queue_rcv_one_skb(), udp_csum_pull_header() will try
to pull udphdr, but the skb size has been segmented to gso size, which
leads to this crash.

Previous commit cf329aa42b66 ("udp: cope with UDP GRO packet misdirection")
introduces segmentation in UDP receive path only for GRO, which was never
intended to be used for UFO, so drop UFO packets in udp_rcv_segment().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38622/">CVE-2025-38622 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38622">CVE-2025-38622 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248619">SUSE bug 1248619</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538623" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38623</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38623" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38623" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38623" ref_url="https://www.suse.com/security/cve/CVE-2025-38623" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

PCI: pnv_php: Fix surprise plug detection and recovery

The existing PowerNV hotplug code did not handle surprise plug events
correctly, leading to a complete failure of the hotplug system after device
removal and a required reboot to detect new devices.

This comes down to two issues:

 1) When a device is surprise removed, often the bridge upstream
    port will cause a PE freeze on the PHB.  If this freeze is not
    cleared, the MSI interrupts from the bridge hotplug notification
    logic will not be received by the kernel, stalling all plug events
    on all slots associated with the PE.

 2) When a device is removed from a slot, regardless of surprise or
    programmatic removal, the associated PHB/PE ls left frozen.
    If this freeze is not cleared via a fundamental reset, skiboot
    is unable to clear the freeze and cannot retrain / rescan the
    slot.  This also requires a reboot to clear the freeze and redetect
    the device in the slot.

Issue the appropriate unfreeze and rescan commands on hotplug events,
and don't oops on hotplug if pci_bus_to_OF_node() returns NULL.

[bhelgaas: tidy comments]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38623/">CVE-2025-38623 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38623">CVE-2025-38623 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248610">SUSE bug 1248610</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538624" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38624</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38624" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38624" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38624" ref_url="https://www.suse.com/security/cve/CVE-2025-38624" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

PCI: pnv_php: Clean up allocated IRQs on unplug

When the root of a nested PCIe bridge configuration is unplugged, the
pnv_php driver leaked the allocated IRQ resources for the child bridges'
hotplug event notifications, resulting in a panic.

Fix this by walking all child buses and deallocating all its IRQ resources
before calling pci_hp_remove_devices().

Also modify the lifetime of the workqueue at struct pnv_php_slot::wq so
that it is only destroyed in pnv_php_free_slot(), instead of
pnv_php_disable_irq(). This is required since pnv_php_disable_irq() will
now be called by workers triggered by hot unplug interrupts, so the
workqueue needs to stay allocated.

The abridged kernel panic that occurs without this patch is as follows:

  WARNING: CPU: 0 PID: 687 at kernel/irq/msi.c:292 msi_device_data_release+0x6c/0x9c
  CPU: 0 UID: 0 PID: 687 Comm: bash Not tainted 6.14.0-rc5+ #2
  Call Trace:
   msi_device_data_release+0x34/0x9c (unreliable)
   release_nodes+0x64/0x13c
   devres_release_all+0xc0/0x140
   device_del+0x2d4/0x46c
   pci_destroy_dev+0x5c/0x194
   pci_hp_remove_devices+0x90/0x128
   pci_hp_remove_devices+0x44/0x128
   pnv_php_disable_slot+0x54/0xd4
   power_write_file+0xf8/0x18c
   pci_slot_attr_store+0x40/0x5c
   sysfs_kf_write+0x64/0x78
   kernfs_fop_write_iter+0x1b0/0x290
   vfs_write+0x3bc/0x50c
   ksys_write+0x84/0x140
   system_call_exception+0x124/0x230
   system_call_vectored_common+0x15c/0x2ec

[bhelgaas: tidy comments]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38624/">CVE-2025-38624 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38624">CVE-2025-38624 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248617">SUSE bug 1248617</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538628" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38628</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38628" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38628" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38628" ref_url="https://www.suse.com/security/cve/CVE-2025-38628" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vdpa/mlx5: Fix release of uninitialized resources on error path

The commit in the fixes tag made sure that mlx5_vdpa_free()
is the single entrypoint for removing the vdpa device resources
added in mlx5_vdpa_dev_add(), even in the cleanup path of
mlx5_vdpa_dev_add().

This means that all functions from mlx5_vdpa_free() should be able to
handle uninitialized resources. This was not the case though:
mlx5_vdpa_destroy_mr_resources() and mlx5_cmd_cleanup_async_ctx()
were not able to do so. This caused the splat below when adding
a vdpa device without a MAC address.

This patch fixes these remaining issues:

- Makes mlx5_vdpa_destroy_mr_resources() return early if called on
  uninitialized resources.

- Moves mlx5_cmd_init_async_ctx() early on during device addition
  because it can't fail. This means that mlx5_cmd_cleanup_async_ctx()
  also can't fail. To mirror this, move the call site of
  mlx5_cmd_cleanup_async_ctx() in mlx5_vdpa_free().

An additional comment was added in mlx5_vdpa_free() to document
the expectations of functions called from this context.

Splat:

  mlx5_core 0000:b5:03.2: mlx5_vdpa_dev_add:3950:(pid 2306) warning: No mac address provisioned?
  ------------[ cut here ]------------
  WARNING: CPU: 13 PID: 2306 at kernel/workqueue.c:4207 __flush_work+0x9a/0xb0
  [...]
  Call Trace:
   &lt;TASK&gt;
   ? __try_to_del_timer_sync+0x61/0x90
   ? __timer_delete_sync+0x2b/0x40
   mlx5_vdpa_destroy_mr_resources+0x1c/0x40 [mlx5_vdpa]
   mlx5_vdpa_free+0x45/0x160 [mlx5_vdpa]
   vdpa_release_dev+0x1e/0x50 [vdpa]
   device_release+0x31/0x90
   kobject_cleanup+0x37/0x130
   mlx5_vdpa_dev_add+0x327/0x890 [mlx5_vdpa]
   vdpa_nl_cmd_dev_add_set_doit+0x2c1/0x4d0 [vdpa]
   genl_family_rcv_msg_doit+0xd8/0x130
   genl_family_rcv_msg+0x14b/0x220
   ? __pfx_vdpa_nl_cmd_dev_add_set_doit+0x10/0x10 [vdpa]
   genl_rcv_msg+0x47/0xa0
   ? __pfx_genl_rcv_msg+0x10/0x10
   netlink_rcv_skb+0x53/0x100
   genl_rcv+0x24/0x40
   netlink_unicast+0x27b/0x3b0
   netlink_sendmsg+0x1f7/0x430
   __sys_sendto+0x1fa/0x210
   ? ___pte_offset_map+0x17/0x160
   ? next_uptodate_folio+0x85/0x2b0
   ? percpu_counter_add_batch+0x51/0x90
   ? filemap_map_pages+0x515/0x660
   __x64_sys_sendto+0x20/0x30
   do_syscall_64+0x7b/0x2c0
   ? do_read_fault+0x108/0x220
   ? do_pte_missing+0x14a/0x3e0
   ? __handle_mm_fault+0x321/0x730
   ? count_memcg_events+0x13f/0x180
   ? handle_mm_fault+0x1fb/0x2d0
   ? do_user_addr_fault+0x20c/0x700
   ? syscall_exit_work+0x104/0x140
   entry_SYSCALL_64_after_hwframe+0x76/0x7e
  RIP: 0033:0x7f0c25b0feca
  [...]
  ---[ end trace 0000000000000000 ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38628/">CVE-2025-38628 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38628">CVE-2025-38628 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248616">SUSE bug 1248616</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538630" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38630</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38630" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38630" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38630" ref_url="https://www.suse.com/security/cve/CVE-2025-38630" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fbdev: imxfb: Check fb_add_videomode to prevent null-ptr-deref

fb_add_videomode() can fail with -ENOMEM when its internal kmalloc() cannot
allocate a struct fb_modelist.  If that happens, the modelist stays empty but
the driver continues to register.  Add a check for its return value to prevent
poteintial null-ptr-deref, which is similar to the commit 17186f1f90d3 ("fbdev:
Fix do_register_framebuffer to prevent null-ptr-deref in fb_videomode_to_var").
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38630/">CVE-2025-38630 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38630">CVE-2025-38630 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248575">SUSE bug 1248575</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538631" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38631</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38631" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38631" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38631" ref_url="https://www.suse.com/security/cve/CVE-2025-38631" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

clk: imx95-blk-ctl: Fix synchronous abort

When enabling runtime PM for clock suppliers that also belong to a power
domain, the following crash is thrown:
error: synchronous external abort: 0000000096000010 [#1] PREEMPT SMP
Workqueue: events_unbound deferred_probe_work_func
pstate: 60400009 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : clk_mux_get_parent+0x60/0x90
lr : clk_core_reparent_orphans_nolock+0x58/0xd8
  Call trace:
   clk_mux_get_parent+0x60/0x90
   clk_core_reparent_orphans_nolock+0x58/0xd8
   of_clk_add_hw_provider.part.0+0x90/0x100
   of_clk_add_hw_provider+0x1c/0x38
   imx95_bc_probe+0x2e0/0x3f0
   platform_probe+0x70/0xd8

Enabling runtime PM without explicitly resuming the device caused
the power domain cut off after clk_register() is called. As a result,
a crash happens when the clock hardware provider is added and attempts
to access the BLK_CTL register.

Fix this by using devm_pm_runtime_enable() instead of pm_runtime_enable()
and getting rid of the pm_runtime_disable() in the cleanup path.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38631/">CVE-2025-38631 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38631">CVE-2025-38631 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248662">SUSE bug 1248662</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538632" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38632</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38632" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38632" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38632" ref_url="https://www.suse.com/security/cve/CVE-2025-38632" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pinmux: fix race causing mux_owner NULL with active mux_usecount

commit 5a3e85c3c397 ("pinmux: Use sequential access to access
desc-&gt;pinmux data") tried to address the issue when two client of the
same gpio calls pinctrl_select_state() for the same functionality, was
resulting in NULL pointer issue while accessing desc-&gt;mux_owner.
However, issue was not completely fixed due to the way it was handled
and it can still result in the same NULL pointer.

The issue occurs due to the following interleaving:

     cpu0 (process A)                   cpu1 (process B)

      pin_request() {                   pin_free() {

                                         mutex_lock()
                                         desc-&gt;mux_usecount--; //becomes 0
                                         ..
                                         mutex_unlock()

  mutex_lock(desc-&gt;mux)
  desc-&gt;mux_usecount++; // becomes 1
  desc-&gt;mux_owner = owner;
  mutex_unlock(desc-&gt;mux)

                                         mutex_lock(desc-&gt;mux)
                                         desc-&gt;mux_owner = NULL;
                                         mutex_unlock(desc-&gt;mux)

This sequence leads to a state where the pin appears to be in use
(`mux_usecount == 1`) but has no owner (`mux_owner == NULL`), which can
cause NULL pointer on next pin_request on the same pin.

Ensure that updates to mux_usecount and mux_owner are performed
atomically under the same lock. Only clear mux_owner when mux_usecount
reaches zero and no new owner has been assigned.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38632/">CVE-2025-38632 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38632">CVE-2025-38632 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248669">SUSE bug 1248669</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538634" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38634</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38634" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38634" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38634" ref_url="https://www.suse.com/security/cve/CVE-2025-38634" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

power: supply: cpcap-charger: Fix null check for power_supply_get_by_name

In the cpcap_usb_detect() function, the power_supply_get_by_name()
function may return `NULL` instead of an error pointer.
To prevent potential null pointer dereferences, Added a null check.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38634/">CVE-2025-38634 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38634">CVE-2025-38634 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248666">SUSE bug 1248666</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538635" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38635</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38635" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38635" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38635" ref_url="https://www.suse.com/security/cve/CVE-2025-38635" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

clk: davinci: Add NULL check in davinci_lpsc_clk_register()

devm_kasprintf() returns NULL when memory allocation fails. Currently,
davinci_lpsc_clk_register() does not check for this case, which results
in a NULL pointer dereference.

Add NULL check after devm_kasprintf() to prevent this issue and ensuring
no resources are left allocated.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38635/">CVE-2025-38635 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38635">CVE-2025-38635 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248573">SUSE bug 1248573</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538639" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38639</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38639" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38639" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38639" ref_url="https://www.suse.com/security/cve/CVE-2025-38639" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: xt_nfacct: don't assume acct name is null-terminated

BUG: KASAN: slab-out-of-bounds in .. lib/vsprintf.c:721
Read of size 1 at addr ffff88801eac95c8 by task syz-executor183/5851
[..]
 string+0x231/0x2b0 lib/vsprintf.c:721
 vsnprintf+0x739/0xf00 lib/vsprintf.c:2874
 [..]
 nfacct_mt_checkentry+0xd2/0xe0 net/netfilter/xt_nfacct.c:41
 xt_check_match+0x3d1/0xab0 net/netfilter/x_tables.c:523

nfnl_acct_find_get() handles non-null input, but the error
printk relied on its presence.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38639/">CVE-2025-38639 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38639">CVE-2025-38639 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248674">SUSE bug 1248674</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38640</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38640" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38640" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38640" ref_url="https://www.suse.com/security/cve/CVE-2025-38640" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Disable migration in nf_hook_run_bpf().

syzbot reported that the netfilter bpf prog can be called without
migration disabled in xmit path.

Then the assertion in __bpf_prog_run() fails, triggering the splat
below. [0]

Let's use bpf_prog_run_pin_on_cpu() in nf_hook_run_bpf().

[0]:
BUG: assuming non migratable context at ./include/linux/filter.h:703
in_atomic(): 0, irqs_disabled(): 0, migration_disabled() 0 pid: 5829, name: sshd-session
3 locks held by sshd-session/5829:
 #0: ffff88807b4e4218 (sk_lock-AF_INET){+.+.}-{0:0}, at: lock_sock include/net/sock.h:1667 [inline]
 #0: ffff88807b4e4218 (sk_lock-AF_INET){+.+.}-{0:0}, at: tcp_sendmsg+0x20/0x50 net/ipv4/tcp.c:1395
 #1: ffffffff8e5c4e00 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire include/linux/rcupdate.h:331 [inline]
 #1: ffffffff8e5c4e00 (rcu_read_lock){....}-{1:3}, at: rcu_read_lock include/linux/rcupdate.h:841 [inline]
 #1: ffffffff8e5c4e00 (rcu_read_lock){....}-{1:3}, at: __ip_queue_xmit+0x69/0x26c0 net/ipv4/ip_output.c:470
 #2: ffffffff8e5c4e00 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire include/linux/rcupdate.h:331 [inline]
 #2: ffffffff8e5c4e00 (rcu_read_lock){....}-{1:3}, at: rcu_read_lock include/linux/rcupdate.h:841 [inline]
 #2: ffffffff8e5c4e00 (rcu_read_lock){....}-{1:3}, at: nf_hook+0xb2/0x680 include/linux/netfilter.h:241
CPU: 0 UID: 0 PID: 5829 Comm: sshd-session Not tainted 6.16.0-rc6-syzkaller-00002-g155a3c003e55 #0 PREEMPT(full)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:94 [inline]
 dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120
 __cant_migrate kernel/sched/core.c:8860 [inline]
 __cant_migrate+0x1c7/0x250 kernel/sched/core.c:8834
 __bpf_prog_run include/linux/filter.h:703 [inline]
 bpf_prog_run include/linux/filter.h:725 [inline]
 nf_hook_run_bpf+0x83/0x1e0 net/netfilter/nf_bpf_link.c:20
 nf_hook_entry_hookfn include/linux/netfilter.h:157 [inline]
 nf_hook_slow+0xbb/0x200 net/netfilter/core.c:623
 nf_hook+0x370/0x680 include/linux/netfilter.h:272
 NF_HOOK_COND include/linux/netfilter.h:305 [inline]
 ip_output+0x1bc/0x2a0 net/ipv4/ip_output.c:433
 dst_output include/net/dst.h:459 [inline]
 ip_local_out net/ipv4/ip_output.c:129 [inline]
 __ip_queue_xmit+0x1d7d/0x26c0 net/ipv4/ip_output.c:527
 __tcp_transmit_skb+0x2686/0x3e90 net/ipv4/tcp_output.c:1479
 tcp_transmit_skb net/ipv4/tcp_output.c:1497 [inline]
 tcp_write_xmit+0x1274/0x84e0 net/ipv4/tcp_output.c:2838
 __tcp_push_pending_frames+0xaf/0x390 net/ipv4/tcp_output.c:3021
 tcp_push+0x225/0x700 net/ipv4/tcp.c:759
 tcp_sendmsg_locked+0x1870/0x42b0 net/ipv4/tcp.c:1359
 tcp_sendmsg+0x2e/0x50 net/ipv4/tcp.c:1396
 inet_sendmsg+0xb9/0x140 net/ipv4/af_inet.c:851
 sock_sendmsg_nosec net/socket.c:712 [inline]
 __sock_sendmsg net/socket.c:727 [inline]
 sock_write_iter+0x4aa/0x5b0 net/socket.c:1131
 new_sync_write fs/read_write.c:593 [inline]
 vfs_write+0x6c7/0x1150 fs/read_write.c:686
 ksys_write+0x1f8/0x250 fs/read_write.c:738
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xcd/0x4c0 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7fe7d365d407
Code: 48 89 fa 4c 89 df e8 38 aa 00 00 8b 93 08 03 00 00 59 5e 48 83 f8 fc 74 1a 5b c3 0f 1f 84 00 00 00 00 00 48 8b 44 24 10 0f 05 &lt;5b&gt; c3 0f 1f 80 00 00 00 00 83 e2 39 83 fa 08 75 de e8 23 ff ff ff
RSP:
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38640/">CVE-2025-38640 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38640">CVE-2025-38640 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248622">SUSE bug 1248622</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538643" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38643</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38643" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38643" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38643" ref_url="https://www.suse.com/security/cve/CVE-2025-38643" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: cfg80211: Add missing lock in cfg80211_check_and_end_cac()

Callers of wdev_chandef() must hold the wiphy mutex.

But the worker cfg80211_propagate_cac_done_wk() never takes the lock.
Which triggers the warning below with the mesh_peer_connected_dfs
test from hostapd and not (yet) released mac80211 code changes:

WARNING: CPU: 0 PID: 495 at net/wireless/chan.c:1552 wdev_chandef+0x60/0x165
Modules linked in:
CPU: 0 UID: 0 PID: 495 Comm: kworker/u4:2 Not tainted 6.14.0-rc5-wt-g03960e6f9d47 #33 13c287eeabfe1efea01c0bcc863723ab082e17cf
Workqueue: cfg80211 cfg80211_propagate_cac_done_wk
Stack:
 00000000 00000001 ffffff00 6093267c
 00000000 6002ec30 6d577c50 60037608
 00000000 67e8d108 6063717b 00000000
Call Trace:
 [&lt;6002ec30&gt;] ? _printk+0x0/0x98
 [&lt;6003c2b3&gt;] show_stack+0x10e/0x11a
 [&lt;6002ec30&gt;] ? _printk+0x0/0x98
 [&lt;60037608&gt;] dump_stack_lvl+0x71/0xb8
 [&lt;6063717b&gt;] ? wdev_chandef+0x60/0x165
 [&lt;6003766d&gt;] dump_stack+0x1e/0x20
 [&lt;6005d1b7&gt;] __warn+0x101/0x20f
 [&lt;6005d3a8&gt;] warn_slowpath_fmt+0xe3/0x15d
 [&lt;600b0c5c&gt;] ? mark_lock.part.0+0x0/0x4ec
 [&lt;60751191&gt;] ? __this_cpu_preempt_check+0x0/0x16
 [&lt;600b11a2&gt;] ? mark_held_locks+0x5a/0x6e
 [&lt;6005d2c5&gt;] ? warn_slowpath_fmt+0x0/0x15d
 [&lt;60052e53&gt;] ? unblock_signals+0x3a/0xe7
 [&lt;60052f2d&gt;] ? um_set_signals+0x2d/0x43
 [&lt;60751191&gt;] ? __this_cpu_preempt_check+0x0/0x16
 [&lt;607508b2&gt;] ? lock_is_held_type+0x207/0x21f
 [&lt;6063717b&gt;] wdev_chandef+0x60/0x165
 [&lt;605f89b4&gt;] regulatory_propagate_dfs_state+0x247/0x43f
 [&lt;60052f00&gt;] ? um_set_signals+0x0/0x43
 [&lt;605e6bfd&gt;] cfg80211_propagate_cac_done_wk+0x3a/0x4a
 [&lt;6007e460&gt;] process_scheduled_works+0x3bc/0x60e
 [&lt;6007d0ec&gt;] ? move_linked_works+0x4d/0x81
 [&lt;6007d120&gt;] ? assign_work+0x0/0xaa
 [&lt;6007f81f&gt;] worker_thread+0x220/0x2dc
 [&lt;600786ef&gt;] ? set_pf_worker+0x0/0x57
 [&lt;60087c96&gt;] ? to_kthread+0x0/0x43
 [&lt;6008ab3c&gt;] kthread+0x2d3/0x2e2
 [&lt;6007f5ff&gt;] ? worker_thread+0x0/0x2dc
 [&lt;6006c05b&gt;] ? calculate_sigpending+0x0/0x56
 [&lt;6003b37d&gt;] new_thread_handler+0x4a/0x64
irq event stamp: 614611
hardirqs last  enabled at (614621): [&lt;00000000600bc96b&gt;] __up_console_sem+0x82/0xaf
hardirqs last disabled at (614630): [&lt;00000000600bc92c&gt;] __up_console_sem+0x43/0xaf
softirqs last  enabled at (614268): [&lt;00000000606c55c6&gt;] __ieee80211_wake_queue+0x933/0x985
softirqs last disabled at (614266): [&lt;00000000606c52d6&gt;] __ieee80211_wake_queue+0x643/0x985
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38643/">CVE-2025-38643 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38643">CVE-2025-38643 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248681">SUSE bug 1248681</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538644" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38644</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38644" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38644" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38644" ref_url="https://www.suse.com/security/cve/CVE-2025-38644" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03204-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03283-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03310-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03314-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03344-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022724.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03384-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03652-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03656-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03662-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042205.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03663-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042204.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03664-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03666-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042202.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03671-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03672-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023108.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3675-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3683-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3703-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3704-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3705-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042243.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3712-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3717-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3720-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3721-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3731-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3733-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3734-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3736-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3740-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3742-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3748-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3755-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3762-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3764-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3765-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3768-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3771-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3772-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4123-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mac80211: reject TDLS operations when station is not associated

syzbot triggered a WARN in ieee80211_tdls_oper() by sending
NL80211_TDLS_ENABLE_LINK immediately after NL80211_CMD_CONNECT,
before association completed and without prior TDLS setup.

This left internal state like sdata-&gt;u.mgd.tdls_peer uninitialized,
leading to a WARN_ON() in code paths that assumed it was valid.

Reject the operation early if not in station mode or not associated.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38644/">CVE-2025-38644 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38644">CVE-2025-38644 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247374">SUSE bug 1247374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248748">SUSE bug 1248748</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248749">SUSE bug 1248749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253291">SUSE bug 1253291</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538645" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38645</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38645" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38645" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38645" ref_url="https://www.suse.com/security/cve/CVE-2025-38645" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: Check device memory pointer before usage

Add a NULL check before accessing device memory to prevent a crash if
dev-&gt;dm allocation in mlx5_init_once() fails.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38645/">CVE-2025-38645 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38645">CVE-2025-38645 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248626">SUSE bug 1248626</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538646" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38646</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38646" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38646" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38646" ref_url="https://www.suse.com/security/cve/CVE-2025-38646" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: rtw89: avoid NULL dereference when RX problematic packet on unsupported 6 GHz band

With a quite rare chance, RX report might be problematic to make SW think
a packet is received on 6 GHz band even if the chip does not support 6 GHz
band actually. Since SW won't initialize stuffs for unsupported bands, NULL
dereference will happen then in the sequence, rtw89_vif_rx_stats_iter() -&gt;
rtw89_core_cancel_6ghz_probe_tx(). So, add a check to avoid it.

The following is a crash log for this case.

 BUG: kernel NULL pointer dereference, address: 0000000000000032
 #PF: supervisor read access in kernel mode
 #PF: error_code(0x0000) - not-present page
 PGD 0 P4D 0
 Oops: 0000 [#1] PREEMPT SMP NOPTI
 CPU: 1 PID: 1907 Comm: irq/131-rtw89_p Tainted: G     U             6.6.56-05896-g89f5fb0eb30b #1 (HASH:1400 4)
 Hardware name: Google Telith/Telith, BIOS Google_Telith.15217.747.0 11/12/2024
 RIP: 0010:rtw89_vif_rx_stats_iter+0xd2/0x310 [rtw89_core]
 Code: 4c 89 7d c8 48 89 55 c0 49 8d 44 24 02 48 89 45 b8 45 31 ff eb 11
 41 c6 45 3a 01 41 b7 01 4d 8b 6d 00 4d 39 f5 74 42 8b 43 10 &lt;41&gt; 33 45
 32 0f b7 4b 14 66 41 33 4d 36 0f b7 c9 09 c1 74 d8 4d 85
 RSP: 0018:ffff9f3080138ca0 EFLAGS: 00010246
 RAX: 00000000b8bf5770 RBX: ffff91b5e8c639c0 RCX: 0000000000000011
 RDX: ffff91b582de1be8 RSI: 0000000000000000 RDI: ffff91b5e8c639e6
 RBP: ffff9f3080138d00 R08: 0000000000000000 R09: 0000000000000000
 R10: ffff91b59de70000 R11: ffffffffc069be50 R12: ffff91b5e8c639e4
 R13: 0000000000000000 R14: ffff91b5828020b8 R15: 0000000000000000
 FS:  0000000000000000(0000) GS:ffff91b8efa40000(0000) knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: 0000000000000032 CR3: 00000002bf838000 CR4: 0000000000750ee0
 PKRU: 55555554
 Call Trace:
  &lt;IRQ&gt;
  ? __die_body+0x68/0xb0
  ? page_fault_oops+0x379/0x3e0
  ? exc_page_fault+0x4f/0xa0
  ? asm_exc_page_fault+0x22/0x30
  ? __pfx_rtw89_vif_rx_stats_iter+0x10/0x10 [rtw89_core (HASH:1400 5)]
  ? rtw89_vif_rx_stats_iter+0xd2/0x310 [rtw89_core (HASH:1400 5)]
  __iterate_interfaces+0x59/0x110 [mac80211 (HASH:1400 6)]
  ? __pfx_rtw89_vif_rx_stats_iter+0x10/0x10 [rtw89_core (HASH:1400 5)]
  ? __pfx_rtw89_vif_rx_stats_iter+0x10/0x10 [rtw89_core (HASH:1400 5)]
  ieee80211_iterate_active_interfaces_atomic+0x36/0x50 [mac80211 (HASH:1400 6)]
  rtw89_core_rx_to_mac80211+0xfd/0x1b0 [rtw89_core (HASH:1400 5)]
  rtw89_core_rx+0x43a/0x980 [rtw89_core (HASH:1400 5)]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6/CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38646/">CVE-2025-38646 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38646">CVE-2025-38646 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248577">SUSE bug 1248577</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538648" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38648</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38648" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38648" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38648" ref_url="https://www.suse.com/security/cve/CVE-2025-38648" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

spi: stm32: Check for cfg availability in stm32_spi_probe

The stm32_spi_probe function now includes a check to ensure that the
pointer returned by of_device_get_match_data is not NULL before
accessing its members. This resolves a warning where a potential NULL
pointer dereference could occur when accessing cfg-&gt;has_device_mode.

Before accessing the 'has_device_mode' member, we verify that 'cfg' is
not NULL. If 'cfg' is NULL, an error message is logged.

This change ensures that the driver does not attempt to access
configuration data if it is not available, thus preventing a potential
system crash due to a NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38648/">CVE-2025-38648 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38648">CVE-2025-38648 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248624">SUSE bug 1248624</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538653" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38653</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38653" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38653" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38653" ref_url="https://www.suse.com/security/cve/CVE-2025-38653" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

proc: use the same treatment to check proc_lseek as ones for proc_read_iter et.al

Check pde-&gt;proc_ops-&gt;proc_lseek directly may cause UAF in rmmod scenario. 
It's a gap in proc_reg_open() after commit 654b33ada4ab("proc: fix UAF in
proc_get_inode()").  Followed by AI Viro's suggestion, fix it in same
manner.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38653/">CVE-2025-38653 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38653">CVE-2025-38653 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248630">SUSE bug 1248630</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031708" comment="cluster-md-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031709" comment="cluster-md-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031710" comment="cluster-md-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031711" comment="dlm-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031712" comment="dlm-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031713" comment="dlm-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031714" comment="dtb-allwinner-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031715" comment="dtb-altera-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031716" comment="dtb-amazon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031717" comment="dtb-amd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031718" comment="dtb-amlogic-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031719" comment="dtb-apm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031720" comment="dtb-apple-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031721" comment="dtb-arm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031722" comment="dtb-broadcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031723" comment="dtb-cavium-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031724" comment="dtb-exynos-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031725" comment="dtb-freescale-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031726" comment="dtb-hisilicon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031727" comment="dtb-lg-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031728" comment="dtb-marvell-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031729" comment="dtb-mediatek-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031730" comment="dtb-nvidia-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031731" comment="dtb-qcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031732" comment="dtb-renesas-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031733" comment="dtb-rockchip-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031734" comment="dtb-socionext-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031735" comment="dtb-sprd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031736" comment="dtb-xilinx-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031737" comment="gfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031738" comment="gfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031739" comment="gfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031742" comment="kernel-64kb-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031743" comment="kernel-64kb-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031747" comment="kernel-default-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031748" comment="kernel-default-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031750" comment="kernel-docs-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031751" comment="kernel-docs-html-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031752" comment="kernel-kvmsmall-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031754" comment="kernel-kvmsmall-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031756" comment="kernel-obs-build-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031757" comment="kernel-obs-qa-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031760" comment="kernel-rt-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031761" comment="kernel-rt-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031762" comment="kernel-rt-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031764" comment="kernel-source-vanilla-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031765" comment="kernel-syms-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031766" comment="kernel-zfcpdump-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031767" comment="kselftests-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031768" comment="kselftests-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031769" comment="kselftests-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031770" comment="ocfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031771" comment="ocfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031772" comment="ocfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538656" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38656</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38656" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38656" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38656" ref_url="https://www.suse.com/security/cve/CVE-2025-38656" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: iwlwifi: Fix error code in iwl_op_mode_dvm_start()

Preserve the error code if iwl_setup_deferred_work() fails.  The current
code returns ERR_PTR(0) (which is NULL) on this path.  I believe the
missing error code potentially leads to a use after free involving
debugfs.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38656/">CVE-2025-38656 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38656">CVE-2025-38656 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248643">SUSE bug 1248643</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538658" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38658</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38658" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38658" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38658" ref_url="https://www.suse.com/security/cve/CVE-2025-38658" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvmet: pci-epf: Do not complete commands twice if nvmet_req_init() fails

Have nvmet_req_init() and req-&gt;execute() complete failed commands.

Description of the problem:
nvmet_req_init() calls __nvmet_req_complete() internally upon failure,
e.g., unsupported opcode, which calls the "queue_response" callback,
this results in nvmet_pci_epf_queue_response() being called, which will
call nvmet_pci_epf_complete_iod() if data_len is 0 or if dma_dir is
different from DMA_TO_DEVICE. This results in a double completion as
nvmet_pci_epf_exec_iod_work() also calls nvmet_pci_epf_complete_iod()
when nvmet_req_init() fails.

Steps to reproduce:
On the host send a command with an unsupported opcode with nvme-cli,
For example the admin command "security receive"
$ sudo nvme security-recv /dev/nvme0n1 -n1 -x4096

This triggers a double completion as nvmet_req_init() fails and
nvmet_pci_epf_queue_response() is called, here iod-&gt;dma_dir is still
in the default state of "DMA_NONE" as set by default in
nvmet_pci_epf_alloc_iod(), so nvmet_pci_epf_complete_iod() is called.
Because nvmet_req_init() failed nvmet_pci_epf_complete_iod() is also
called in nvmet_pci_epf_exec_iod_work() leading to a double completion.
This not only sends two completions to the host but also corrupts the
state of the PCI NVMe target leading to kernel oops.

This patch lets nvmet_req_init() and req-&gt;execute() complete all failed
commands, and removes the double completion case in
nvmet_pci_epf_exec_iod_work() therefore fixing the edge cases where
double completions occurred.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38658/">CVE-2025-38658 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38658">CVE-2025-38658 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248627">SUSE bug 1248627</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538659" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38659</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38659" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38659" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38659" ref_url="https://www.suse.com/security/cve/CVE-2025-38659" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gfs2: No more self recovery

When a node withdraws and it turns out that it is the only node that has
the filesystem mounted, gfs2 currently tries to replay the local journal
to bring the filesystem back into a consistent state.  Not only is that
a very bad idea, it has also never worked because gfs2_recover_func()
will refuse to do anything during a withdraw.

However, before even getting to this point, gfs2_recover_func()
dereferences sdp-&gt;sd_jdesc-&gt;jd_inode.  This was a use-after-free before
commit 04133b607a78 ("gfs2: Prevent double iput for journal on error")
and is a NULL pointer dereference since then.

Simply get rid of self recovery to fix that.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38659/">CVE-2025-38659 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38659">CVE-2025-38659 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248639">SUSE bug 1248639</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248759">SUSE bug 1248759</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538660" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38660</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38660" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38660" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38660" ref_url="https://www.suse.com/security/cve/CVE-2025-38660" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

[ceph] parse_longname(): strrchr() expects NUL-terminated string

... and parse_longname() is not guaranteed that.  That's the reason
why it uses kmemdup_nul() to build the argument for kstrtou64();
the problem is, kstrtou64() is not the only thing that need it.

Just get a NUL-terminated copy of the entire thing and be done
with that...
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38660/">CVE-2025-38660 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38660">CVE-2025-38660 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248634">SUSE bug 1248634</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538662" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38662</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38662" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38662" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38662" ref_url="https://www.suse.com/security/cve/CVE-2025-38662" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: mediatek: mt8365-dai-i2s: pass correct size to mt8365_dai_set_priv

Given mt8365_dai_set_priv allocate priv_size space to copy priv_data which
means we should pass mt8365_i2s_priv[i] or "struct mtk_afe_i2s_priv"
instead of afe_priv which has the size of "struct mt8365_afe_private".

Otherwise the KASAN complains about.

[   59.389765] BUG: KASAN: global-out-of-bounds in mt8365_dai_set_priv+0xc8/0x168 [snd_soc_mt8365_pcm]
...
[   59.394789] Call trace:
[   59.395167]  dump_backtrace+0xa0/0x128
[   59.395733]  show_stack+0x20/0x38
[   59.396238]  dump_stack_lvl+0xe8/0x148
[   59.396806]  print_report+0x37c/0x5e0
[   59.397358]  kasan_report+0xac/0xf8
[   59.397885]  kasan_check_range+0xe8/0x190
[   59.398485]  asan_memcpy+0x3c/0x98
[   59.399022]  mt8365_dai_set_priv+0xc8/0x168 [snd_soc_mt8365_pcm]
[   59.399928]  mt8365_dai_i2s_register+0x1e8/0x2b0 [snd_soc_mt8365_pcm]
[   59.400893]  mt8365_afe_pcm_dev_probe+0x4d0/0xdf0 [snd_soc_mt8365_pcm]
[   59.401873]  platform_probe+0xcc/0x228
[   59.402442]  really_probe+0x340/0x9e8
[   59.402992]  driver_probe_device+0x16c/0x3f8
[   59.403638]  driver_probe_device+0x64/0x1d8
[   59.404256]  driver_attach+0x1dc/0x4c8
[   59.404840]  bus_for_each_dev+0x100/0x190
[   59.405442]  driver_attach+0x44/0x68
[   59.405980]  bus_add_driver+0x23c/0x500
[   59.406550]  driver_register+0xf8/0x3d0
[   59.407122]  platform_driver_register+0x68/0x98
[   59.407810]  mt8365_afe_pcm_driver_init+0x2c/0xff8 [snd_soc_mt8365_pcm]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38662/">CVE-2025-38662 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38662">CVE-2025-38662 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248635">SUSE bug 1248635</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538664" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38664</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38664" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38664" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38664" ref_url="https://www.suse.com/security/cve/CVE-2025-38664" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03626-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20942-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023243.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023242.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20944-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023241.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023240.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20948-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20949-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20952-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023228.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20959-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20973-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20974-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20977-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20980-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20981-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20982-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042615.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20984-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042613.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20985-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042612.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20986-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042611.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20987-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20988-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20989-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20990-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042607.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20991-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023123.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023127.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3927-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023147.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3935-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023145.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3936-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023148.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3970-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3987-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3995-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023182.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4001-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023186.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023198.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023200.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4050-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: Fix a null pointer dereference in ice_copy_and_init_pkg()

Add check for the return value of devm_kmemdup()
to prevent potential null pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38664/">CVE-2025-38664 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38664">CVE-2025-38664 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248628">SUSE bug 1248628</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1248631">SUSE bug 1248631</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538665" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38665</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38665" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38665" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38665" ref_url="https://www.suse.com/security/cve/CVE-2025-38665" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: netlink: can_changelink(): fix NULL pointer deref of struct can_priv::do_set_mode

Andrei Lalaev reported a NULL pointer deref when a CAN device is
restarted from Bus Off and the driver does not implement the struct
can_priv::do_set_mode callback.

There are 2 code path that call struct can_priv::do_set_mode:
- directly by a manual restart from the user space, via
  can_changelink()
- delayed automatic restart after bus off (deactivated by default)

To prevent the NULL pointer deference, refuse a manual restart or
configure the automatic restart delay in can_changelink() and report
the error via extack to user space.

As an additional safety measure let can_restart() return an error if
can_priv::do_set_mode is not set instead of dereferencing it
unchecked.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38665/">CVE-2025-38665 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38665">CVE-2025-38665 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248648">SUSE bug 1248648</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538668" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38668</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38668" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38668" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38668" ref_url="https://www.suse.com/security/cve/CVE-2025-38668" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

regulator: core: fix NULL dereference on unbind due to stale coupling data

Failing to reset coupling_desc.n_coupled after freeing coupled_rdevs can
lead to NULL pointer dereference when regulators are accessed post-unbind.

This can happen during runtime PM or other regulator operations that rely
on coupling metadata.

For example, on ridesx4, unbinding the 'reg-dummy' platform device triggers
a panic in regulator_lock_recursive() due to stale coupling state.

Ensure n_coupled is set to 0 to prevent access to invalid pointers.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38668/">CVE-2025-38668 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38668">CVE-2025-38668 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248647">SUSE bug 1248647</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538670" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38670</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38670" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38670" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38670" ref_url="https://www.suse.com/security/cve/CVE-2025-38670" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

arm64/entry: Mask DAIF in cpu_switch_to(), call_on_irq_stack()

`cpu_switch_to()` and `call_on_irq_stack()` manipulate SP to change
to different stacks along with the Shadow Call Stack if it is enabled.
Those two stack changes cannot be done atomically and both functions
can be interrupted by SErrors or Debug Exceptions which, though unlikely,
is very much broken : if interrupted, we can end up with mismatched stacks
and Shadow Call Stack leading to clobbered stacks.

In `cpu_switch_to()`, it can happen when SP_EL0 points to the new task,
but x18 stills points to the old task's SCS. When the interrupt handler
tries to save the task's SCS pointer, it will save the old task
SCS pointer (x18) into the new task struct (pointed to by SP_EL0),
clobbering it.

In `call_on_irq_stack()`, it can happen when switching from the task stack
to the IRQ stack and when switching back. In both cases, we can be
interrupted when the SCS pointer points to the IRQ SCS, but SP points to
the task stack. The nested interrupt handler pushes its return addresses
on the IRQ SCS. It then detects that SP points to the task stack,
calls `call_on_irq_stack()` and clobbers the task SCS pointer with
the IRQ SCS pointer, which it will also use !

This leads to tasks returning to addresses on the wrong SCS,
or even on the IRQ SCS, triggering kernel panics via CONFIG_VMAP_STACK
or FPAC if enabled.

This is possible on a default config, but unlikely.
However, when enabling CONFIG_ARM64_PSEUDO_NMI, DAIF is unmasked and
instead the GIC is responsible for filtering what interrupts the CPU
should receive based on priority.
Given the goal of emulating NMIs, pseudo-NMIs can be received by the CPU
even in `cpu_switch_to()` and `call_on_irq_stack()`, possibly *very*
frequently depending on the system configuration and workload, leading
to unpredictable kernel panics.

Completely mask DAIF in `cpu_switch_to()` and restore it when returning.
Do the same in `call_on_irq_stack()`, but restore and mask around
the branch.
Mask DAIF even if CONFIG_SHADOW_CALL_STACK is not enabled for consistency
of behaviour between all configurations.

Introduce and use an assembly macro for saving and masking DAIF,
as the existing one saves but only masks IF.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38670/">CVE-2025-38670 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38670">CVE-2025-38670 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248655">SUSE bug 1248655</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38671</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38671" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38671" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38671" ref_url="https://www.suse.com/security/cve/CVE-2025-38671" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041777.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03290-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041793.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03301-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03382-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20653-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20669-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20739-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20756-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i2c: qup: jump out of the loop in case of timeout

Original logic only sets the return value but doesn't jump out of the
loop if the bus is kept active by a client. This is not expected. A
malicious or buggy i2c client can hang the kernel in this case and
should be avoided. This is observed during a long time test with a
PCA953x GPIO extender.

Fix it by changing the logic to not only sets the return value, but also
jumps out of the loop and return to the caller with -ETIMEDOUT.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38671/">CVE-2025-38671 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38671">CVE-2025-38671 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248652">SUSE bug 1248652</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538676" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38676</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38676" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38676" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38676" ref_url="https://www.suse.com/security/cve/CVE-2025-38676" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommu/amd: Avoid stack buffer overflow from kernel cmdline

While the kernel command line is considered trusted in most environments,
avoid writing 1 byte past the end of "acpiid" if the "str" argument is
maximum length.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38676/">CVE-2025-38676 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38676">CVE-2025-38676 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248775">SUSE bug 1248775</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538678" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38678</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38678" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38678" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38678" ref_url="https://www.suse.com/security/cve/CVE-2025-38678" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03638-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03643-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03646-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042210.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03648-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03650-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20887-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20889-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023040.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023108.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20908-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20913-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20914-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20979-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3675-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3679-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3704-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3705-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042243.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3712-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3717-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3720-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3721-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3731-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3733-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3734-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3736-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3740-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3741-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3742-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3748-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3755-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3762-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3764-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042286.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3765-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3768-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3769-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3770-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3771-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3772-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: reject duplicate device on updates

A chain/flowtable update with duplicated devices in the same batch is
possible. Unfortunately, netdev event path only removes the first
device that is found, leaving unregistered the hook of the duplicated
device.

Check if a duplicated device exists in the transaction batch, bail out
with EEXIST in such case.

WARNING is hit when unregistering the hook:

 [49042.221275] WARNING: CPU: 4 PID: 8425 at net/netfilter/core.c:340 nf_hook_entry_head+0xaa/0x150
 [49042.221375] CPU: 4 UID: 0 PID: 8425 Comm: nft Tainted: G S                  6.16.0+ #170 PREEMPT(full)
 [...]
 [49042.221382] RIP: 0010:nf_hook_entry_head+0xaa/0x150
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-38678/">CVE-2025-38678 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38678">CVE-2025-38678 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249126">SUSE bug 1249126</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249534">SUSE bug 1249534</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538679" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38679</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38679" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38679" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38679" ref_url="https://www.suse.com/security/cve/CVE-2025-38679" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: venus: Fix OOB read due to missing payload bound check

Currently, The event_seq_changed() handler processes a variable number
of properties sent by the firmware. The number of properties is indicated
by the firmware and used to iterate over the payload. However, the
payload size is not being validated against the actual message length.

This can lead to out-of-bounds memory access if the firmware provides a
property count that exceeds the data available in the payload. Such a
condition can result in kernel crashes or potential information leaks if
memory beyond the buffer is accessed.

Fix this by properly validating the remaining size of the payload before
each property access and updating bounds accordingly as properties are
parsed.

This ensures that property parsing is safely bounded within the received
message buffer and protects against malformed or malicious firmware
behavior.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38679/">CVE-2025-38679 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38679">CVE-2025-38679 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249202">SUSE bug 1249202</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538680" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38680</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38680" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38680" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38680" ref_url="https://www.suse.com/security/cve/CVE-2025-38680" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: uvcvideo: Fix 1-byte out-of-bounds read in uvc_parse_format()

The buffer length check before calling uvc_parse_format() only ensured
that the buffer has at least 3 bytes (buflen &gt; 2), buf the function
accesses buffer[3], requiring at least 4 bytes.

This can lead to an out-of-bounds read if the buffer has exactly 3 bytes.

Fix it by checking that the buffer has at least 4 bytes in
uvc_parse_format().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38680/">CVE-2025-38680 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38680">CVE-2025-38680 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249203">SUSE bug 1249203</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538681" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38681</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38681" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38681" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38681" ref_url="https://www.suse.com/security/cve/CVE-2025-38681" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/ptdump: take the memory hotplug lock inside ptdump_walk_pgd()

Memory hot remove unmaps and tears down various kernel page table regions
as required.  The ptdump code can race with concurrent modifications of
the kernel page tables.  When leaf entries are modified concurrently, the
dump code may log stale or inconsistent information for a VA range, but
this is otherwise not harmful.

But when intermediate levels of kernel page table are freed, the dump code
will continue to use memory that has been freed and potentially
reallocated for another purpose.  In such cases, the ptdump code may
dereference bogus addresses, leading to a number of potential problems.

To avoid the above mentioned race condition, platforms such as arm64,
riscv and s390 take memory hotplug lock, while dumping kernel page table
via the sysfs interface /sys/kernel/debug/kernel_page_tables.

Similar race condition exists while checking for pages that might have
been marked W+X via /sys/kernel/debug/kernel_page_tables/check_wx_pages
which in turn calls ptdump_check_wx().  Instead of solving this race
condition again, let's just move the memory hotplug lock inside generic
ptdump_check_wx() which will benefit both the scenarios.

Drop get_online_mems() and put_online_mems() combination from all existing
platform ptdump code paths.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38681/">CVE-2025-38681 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38681">CVE-2025-38681 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249204">SUSE bug 1249204</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538683" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38683</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38683" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38683" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38683" ref_url="https://www.suse.com/security/cve/CVE-2025-38683" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hv_netvsc: Fix panic during namespace deletion with VF

The existing code move the VF NIC to new namespace when NETDEV_REGISTER is
received on netvsc NIC. During deletion of the namespace,
default_device_exit_batch() &gt;&gt; default_device_exit_net() is called. When
netvsc NIC is moved back and registered to the default namespace, it
automatically brings VF NIC back to the default namespace. This will cause
the default_device_exit_net() &gt;&gt; for_each_netdev_safe loop unable to detect
the list end, and hit NULL ptr:

[  231.449420] mana 7870:00:00.0 enP30832s1: Moved VF to namespace with: eth0
[  231.449656] BUG: kernel NULL pointer dereference, address: 0000000000000010
[  231.450246] #PF: supervisor read access in kernel mode
[  231.450579] #PF: error_code(0x0000) - not-present page
[  231.450916] PGD 17b8a8067 P4D 0
[  231.451163] Oops: Oops: 0000 [#1] SMP NOPTI
[  231.451450] CPU: 82 UID: 0 PID: 1394 Comm: kworker/u768:1 Not tainted 6.16.0-rc4+ #3 VOLUNTARY
[  231.452042] Hardware name: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 11/21/2024
[  231.452692] Workqueue: netns cleanup_net
[  231.452947] RIP: 0010:default_device_exit_batch+0x16c/0x3f0
[  231.453326] Code: c0 0c f5 b3 e8 d5 db fe ff 48 85 c0 74 15 48 c7 c2 f8 fd ca b2 be 10 00 00 00 48 8d 7d c0 e8 7b 77 25 00 49 8b 86 28 01 00 00 &lt;48&gt; 8b 50 10 4c 8b 2a 4c 8d 62 f0 49 83 ed 10 4c 39 e0 0f 84 d6 00
[  231.454294] RSP: 0018:ff75fc7c9bf9fd00 EFLAGS: 00010246
[  231.454610] RAX: 0000000000000000 RBX: 0000000000000002 RCX: 61c8864680b583eb
[  231.455094] RDX: ff1fa9f71462d800 RSI: ff75fc7c9bf9fd38 RDI: 0000000030766564
[  231.455686] RBP: ff75fc7c9bf9fd78 R08: 0000000000000000 R09: 0000000000000000
[  231.456126] R10: 0000000000000001 R11: 0000000000000004 R12: ff1fa9f70088e340
[  231.456621] R13: ff1fa9f70088e340 R14: ffffffffb3f50c20 R15: ff1fa9f7103e6340
[  231.457161] FS:  0000000000000000(0000) GS:ff1faa6783a08000(0000) knlGS:0000000000000000
[  231.457707] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  231.458031] CR2: 0000000000000010 CR3: 0000000179ab2006 CR4: 0000000000b73ef0
[  231.458434] Call Trace:
[  231.458600]  &lt;TASK&gt;
[  231.458777]  ops_undo_list+0x100/0x220
[  231.459015]  cleanup_net+0x1b8/0x300
[  231.459285]  process_one_work+0x184/0x340

To fix it, move the ns change to a workqueue, and take rtnl_lock to avoid
changing the netdev list when default_device_exit_net() is using it.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38683/">CVE-2025-38683 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38683">CVE-2025-38683 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249159">SUSE bug 1249159</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538684" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38684</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38684" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38684" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38684" ref_url="https://www.suse.com/security/cve/CVE-2025-38684" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1131-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: ets: use old 'nbands' while purging unused classes

Shuang reported sch_ets test-case [1] crashing in ets_class_qlen_notify()
after recent changes from Lion [2]. The problem is: in ets_qdisc_change()
we purge unused DWRR queues; the value of 'q-&gt;nbands' is the new one, and
the cleanup should be done with the old one. The problem is here since my
first attempts to fix ets_qdisc_change(), but it surfaced again after the
recent qdisc len accounting fixes. Fix it purging idle DWRR queues before
assigning a new value of 'q-&gt;nbands', so that all purge operations find a
consistent configuration:

 - old 'q-&gt;nbands' because it's needed by ets_class_find()
 - old 'q-&gt;nstrict' because it's needed by ets_class_is_strict()

 BUG: kernel NULL pointer dereference, address: 0000000000000000
 #PF: supervisor read access in kernel mode
 #PF: error_code(0x0000) - not-present page
 PGD 0 P4D 0
 Oops: Oops: 0000 [#1] SMP NOPTI
 CPU: 62 UID: 0 PID: 39457 Comm: tc Kdump: loaded Not tainted 6.12.0-116.el10.x86_64 #1 PREEMPT(voluntary)
 Hardware name: Dell Inc. PowerEdge R640/06DKY5, BIOS 2.12.2 07/09/2021
 RIP: 0010:__list_del_entry_valid_or_report+0x4/0x80
 Code: ff 4c 39 c7 0f 84 39 19 8e ff b8 01 00 00 00 c3 cc cc cc cc 66 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa &lt;48&gt; 8b 17 48 8b 4f 08 48 85 d2 0f 84 56 19 8e ff 48 85 c9 0f 84 ab
 RSP: 0018:ffffba186009f400 EFLAGS: 00010202
 RAX: 00000000000000d6 RBX: 0000000000000000 RCX: 0000000000000004
 RDX: ffff9f0fa29b69c0 RSI: 0000000000000000 RDI: 0000000000000000
 RBP: ffffffffc12c2400 R08: 0000000000000008 R09: 0000000000000004
 R10: ffffffffffffffff R11: 0000000000000004 R12: 0000000000000000
 R13: ffff9f0f8cfe0000 R14: 0000000000100005 R15: 0000000000000000
 FS:  00007f2154f37480(0000) GS:ffff9f269c1c0000(0000) knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: 0000000000000000 CR3: 00000001530be001 CR4: 00000000007726f0
 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
 PKRU: 55555554
 Call Trace:
  &lt;TASK&gt;
  ets_class_qlen_notify+0x65/0x90 [sch_ets]
  qdisc_tree_reduce_backlog+0x74/0x110
  ets_qdisc_change+0x630/0xa40 [sch_ets]
  __tc_modify_qdisc.constprop.0+0x216/0x7f0
  tc_modify_qdisc+0x7c/0x120
  rtnetlink_rcv_msg+0x145/0x3f0
  netlink_rcv_skb+0x53/0x100
  netlink_unicast+0x245/0x390
  netlink_sendmsg+0x21b/0x470
  ____sys_sendmsg+0x39d/0x3d0
  ___sys_sendmsg+0x9a/0xe0
  __sys_sendmsg+0x7a/0xd0
  do_syscall_64+0x7d/0x160
  entry_SYSCALL_64_after_hwframe+0x76/0x7e
 RIP: 0033:0x7f2155114084
 Code: 89 02 b8 ff ff ff ff eb bb 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 f3 0f 1e fa 80 3d 25 f0 0c 00 00 74 13 b8 2e 00 00 00 0f 05 &lt;48&gt; 3d 00 f0 ff ff 77 54 c3 0f 1f 00 48 83 ec 28 89 54 24 1c 48 89
 RSP: 002b:00007fff1fd7a988 EFLAGS: 00000202 ORIG_RAX: 000000000000002e
 RAX: ffffffffffffffda RBX: 0000560ec063e5e0 RCX: 00007f2155114084
 RDX: 0000000000000000 RSI: 00007fff1fd7a9f0 RDI: 0000000000000003
 RBP: 00007fff1fd7aa60 R08: 0000000000000010 R09: 000000000000003f
 R10: 0000560ee9b3a010 R11: 0000000000000202 R12: 00007fff1fd7aae0
 R13: 000000006891ccde R14: 0000560ec063e5e0 R15: 00007fff1fd7aad0
  &lt;/TASK&gt;

 [1] https://lore.kernel.org/netdev/e08c7f4a6882f260011909a868311c6e9b54f3e4.1639153474.git.dcaratti@redhat.com/
 [2] https://lore.kernel.org/netdev/d912cbd7-193b-4269-9857-525bee8bbb6a@gmail.com/
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38684/">CVE-2025-38684 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38684">CVE-2025-38684 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249156">SUSE bug 1249156</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538685" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38685</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38685" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38685" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38685" ref_url="https://www.suse.com/security/cve/CVE-2025-38685" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03626-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fbdev: Fix vmalloc out-of-bounds write in fast_imageblit

This issue triggers when a userspace program does an ioctl
FBIOPUT_CON2FBMAP by passing console number and frame buffer number.
Ideally this maps console to frame buffer and updates the screen if
console is visible.

As part of mapping it has to do resize of console according to frame
buffer info. if this resize fails and returns from vc_do_resize() and
continues further. At this point console and new frame buffer are mapped
and sets display vars. Despite failure still it continue to proceed
updating the screen at later stages where vc_data is related to previous
frame buffer and frame buffer info and display vars are mapped to new
frame buffer and eventully leading to out-of-bounds write in
fast_imageblit(). This bheviour is excepted only when fg_console is
equal to requested console which is a visible console and updates screen
with invalid struct references in fbcon_putcs().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38685/">CVE-2025-38685 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38685">CVE-2025-38685 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249220">SUSE bug 1249220</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249240">SUSE bug 1249240</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538686" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38686</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38686" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38686" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38686" ref_url="https://www.suse.com/security/cve/CVE-2025-38686" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

userfaultfd: fix a crash in UFFDIO_MOVE when PMD is a migration entry

When UFFDIO_MOVE encounters a migration PMD entry, it proceeds with
obtaining a folio and accessing it even though the entry is swp_entry_t. 
Add the missing check and let split_huge_pmd() handle migration entries. 
While at it also remove unnecessary folio check.

[surenb@google.com: remove extra folio check, per David]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38686/">CVE-2025-38686 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38686">CVE-2025-38686 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249160">SUSE bug 1249160</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38687</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38687" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38687" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38687" ref_url="https://www.suse.com/security/cve/CVE-2025-38687" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

comedi: fix race between polling and detaching

syzbot reports a use-after-free in comedi in the below link, which is
due to comedi gladly removing the allocated async area even though poll
requests are still active on the wait_queue_head inside of it. This can
cause a use-after-free when the poll entries are later triggered or
removed, as the memory for the wait_queue_head has been freed.  We need
to check there are no tasks queued on any of the subdevices' wait queues
before allowing the device to be detached by the `COMEDI_DEVCONFIG`
ioctl.

Tasks will read-lock `dev-&gt;attach_lock` before adding themselves to the
subdevice wait queue, so fix the problem in the `COMEDI_DEVCONFIG` ioctl
handler by write-locking `dev-&gt;attach_lock` before checking that all of
the subdevices are safe to be deleted.  This includes testing for any
sleepers on the subdevices' wait queues.  It remains locked until the
device has been detached.  This requires the `comedi_device_detach()`
function to be refactored slightly, moving the bulk of it into new
function `comedi_device_detach_locked()`.

Note that the refactor of `comedi_device_detach()` results in
`comedi_device_cancel_all()` now being called while `dev-&gt;attach_lock`
is write-locked, which wasn't the case previously, but that does not
matter.

Thanks to Jens Axboe for diagnosing the problem and co-developing this
patch.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38687/">CVE-2025-38687 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38687">CVE-2025-38687 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249177">SUSE bug 1249177</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538691" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38691</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38691" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38691" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38691" ref_url="https://www.suse.com/security/cve/CVE-2025-38691" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pNFS: Fix uninited ptr deref in block/scsi layout

The error occurs on the third attempt to encode extents. When function
ext_tree_prepare_commit() reallocates a larger buffer to retry encoding
extents, the "layoutupdate_pages" page array is initialized only after the
retry loop. But ext_tree_free_commitdata() is called on every iteration
and tries to put pages in the array, thus dereferencing uninitialized
pointers.

An additional problem is that there is no limit on the maximum possible
buffer_size. When there are too many extents, the client may create a
layoutcommit that is larger than the maximum possible RPC size accepted
by the server.

During testing, we observed two typical scenarios. First, one memory page
for extents is enough when we work with small files, append data to the
end of the file, or preallocate extents before writing. But when we fill
a new large file without preallocating, the number of extents can be huge,
and counting the number of written extents in ext_tree_encode_commit()
does not help much. Since this number increases even more between
unlocking and locking of ext_tree, the reallocated buffer may not be
large enough again and again.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38691/">CVE-2025-38691 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38691">CVE-2025-38691 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249215">SUSE bug 1249215</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38692</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38692" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38692" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38692" ref_url="https://www.suse.com/security/cve/CVE-2025-38692" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

exfat: add cluster chain loop check for dir

An infinite loop may occur if the following conditions occur due to
file system corruption.

(1) Condition for exfat_count_dir_entries() to loop infinitely.
    - The cluster chain includes a loop.
    - There is no UNUSED entry in the cluster chain.

(2) Condition for exfat_create_upcase_table() to loop infinitely.
    - The cluster chain of the root directory includes a loop.
    - There are no UNUSED entry and up-case table entry in the cluster
      chain of the root directory.

(3) Condition for exfat_load_bitmap() to loop infinitely.
    - The cluster chain of the root directory includes a loop.
    - There are no UNUSED entry and bitmap entry in the cluster chain
      of the root directory.

(4) Condition for exfat_find_dir_entry() to loop infinitely.
    - The cluster chain includes a loop.
    - The unused directory entries were exhausted by some operation.

(5) Condition for exfat_check_dir_empty() to loop infinitely.
    - The cluster chain includes a loop.
    - The unused directory entries were exhausted by some operation.
    - All files and sub-directories under the directory are deleted.

This commit adds checks to break the above infinite loop.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38692/">CVE-2025-38692 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38692">CVE-2025-38692 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249221">SUSE bug 1249221</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249239">SUSE bug 1249239</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538693" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38693</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38693" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38693" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38693" ref_url="https://www.suse.com/security/cve/CVE-2025-38693" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: dvb-frontends: w7090p: fix null-ptr-deref in w7090p_tuner_write_serpar and w7090p_tuner_read_serpar

In w7090p_tuner_write_serpar, msg is controlled by user. When msg[0].buf is null and msg[0].len is zero, former checks on msg[0].buf would be passed. If accessing msg[0].buf[2] without sanity check, null pointer deref would happen. We add
check on msg[0].len to prevent crash.

Similar commit: commit 0ed554fd769a ("media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()")
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38693/">CVE-2025-38693 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38693">CVE-2025-38693 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249190">SUSE bug 1249190</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538694" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38694</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38694" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38694" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38694" ref_url="https://www.suse.com/security/cve/CVE-2025-38694" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: dvb-frontends: dib7090p: fix null-ptr-deref in dib7090p_rw_on_apb()

In dib7090p_rw_on_apb, msg is controlled by user. When msg[0].buf is null and
msg[0].len is zero, former checks on msg[0].buf would be passed. If accessing
msg[0].buf[2] without sanity check, null pointer deref would happen. We add
check on msg[0].len to prevent crash. Similar issue occurs when access
msg[1].buf[0] and msg[1].buf[1].

Similar commit: commit 0ed554fd769a ("media: dvb-usb: az6027: fix null-ptr-deref in az6027_i2c_xfer()")
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38694/">CVE-2025-38694 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38694">CVE-2025-38694 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249272">SUSE bug 1249272</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38695</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38695" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38695" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38695" ref_url="https://www.suse.com/security/cve/CVE-2025-38695" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: lpfc: Check for hdwq null ptr when cleaning up lpfc_vport structure

If a call to lpfc_sli4_read_rev() from lpfc_sli4_hba_setup() fails, the
resultant cleanup routine lpfc_sli4_vport_delete_fcp_xri_aborted() may
occur before sli4_hba.hdwqs are allocated.  This may result in a null
pointer dereference when attempting to take the abts_io_buf_list_lock for
the first hardware queue.  Fix by adding a null ptr check on
phba-&gt;sli4_hba.hdwq and early return because this situation means there
must have been an error during port initialization.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-38695/">CVE-2025-38695 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38695">CVE-2025-38695 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249285">SUSE bug 1249285</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538700" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38700</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38700" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38700" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38700" ref_url="https://www.suse.com/security/cve/CVE-2025-38700" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: libiscsi: Initialize iscsi_conn-&gt;dd_data only if memory is allocated

In case of an ib_fast_reg_mr allocation failure during iSER setup, the
machine hits a panic because iscsi_conn-&gt;dd_data is initialized
unconditionally, even when no memory is allocated (dd_size == 0).  This
leads invalid pointer dereference during connection teardown.

Fix by setting iscsi_conn-&gt;dd_data only if memory is actually allocated.

Panic trace:
------------
 iser: iser_create_fastreg_desc: Failed to allocate ib_fast_reg_mr err=-12
 iser: iser_alloc_rx_descriptors: failed allocating rx descriptors / data buffers
 BUG: unable to handle page fault for address: fffffffffffffff8
 RIP: 0010:swake_up_locked.part.5+0xa/0x40
 Call Trace:
  complete+0x31/0x40
  iscsi_iser_conn_stop+0x88/0xb0 [ib_iser]
  iscsi_stop_conn+0x66/0xc0 [scsi_transport_iscsi]
  iscsi_if_stop_conn+0x14a/0x150 [scsi_transport_iscsi]
  iscsi_if_rx+0x1135/0x1834 [scsi_transport_iscsi]
  ? netlink_lookup+0x12f/0x1b0
  ? netlink_deliver_tap+0x2c/0x200
  netlink_unicast+0x1ab/0x280
  netlink_sendmsg+0x257/0x4f0
  ? _copy_from_user+0x29/0x60
  sock_sendmsg+0x5f/0x70
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38700/">CVE-2025-38700 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38700">CVE-2025-38700 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249182">SUSE bug 1249182</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538701" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38701</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38701" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38701" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38701" ref_url="https://www.suse.com/security/cve/CVE-2025-38701" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: do not BUG when INLINE_DATA_FL lacks system.data xattr

A syzbot fuzzed image triggered a BUG_ON in ext4_update_inline_data()
when an inode had the INLINE_DATA_FL flag set but was missing the
system.data extended attribute.

Since this can happen due to a maiciouly fuzzed file system, we
shouldn't BUG, but rather, report it as a corrupted file system.

Add similar replacements of BUG_ON with EXT4_ERROR_INODE() ii
ext4_create_inline_data() and ext4_inline_data_truncate().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38701/">CVE-2025-38701 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38701">CVE-2025-38701 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249258">SUSE bug 1249258</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38702</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38702" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38702" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38702" ref_url="https://www.suse.com/security/cve/CVE-2025-38702" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fbdev: fix potential buffer overflow in do_register_framebuffer()

The current implementation may lead to buffer overflow when:
1.  Unregistration creates NULL gaps in registered_fb[]
2.  All array slots become occupied despite num_registered_fb &lt; FB_MAX
3.  The registration loop exceeds array bounds

Add boundary check to prevent registered_fb[FB_MAX] access.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38702/">CVE-2025-38702 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38702">CVE-2025-38702 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249254">SUSE bug 1249254</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538703" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38703</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38703" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38703" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38703" ref_url="https://www.suse.com/security/cve/CVE-2025-38703" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0793" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/xe: Make dma-fences compliant with the safe access rules

Xe can free some of the data pointed to by the dma-fences it exports. Most
notably the timeline name can get freed if userspace closes the associated
submit queue. At the same time the fence could have been exported to a
third party (for example a sync_fence fd) which will then cause an use-
after-free on subsequent access.

To make this safe we need to make the driver compliant with the newly
documented dma-fence rules. Driver has to ensure a RCU grace period
between signalling a fence and freeing any data pointed to by said fence.

For the timeline name we simply make the queue be freed via kfree_rcu and
for the shared lock associated with multiple queues we add a RCU grace
period before freeing the per GT structure holding the lock.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38703/">CVE-2025-38703 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38703">CVE-2025-38703 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249193">SUSE bug 1249193</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249763">SUSE bug 1249763</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38704</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38704" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38704" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38704" ref_url="https://www.suse.com/security/cve/CVE-2025-38704" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

rcu/nocb: Fix possible invalid rdp's-&gt;nocb_cb_kthread pointer access

In the preparation stage of CPU online, if the corresponding
the rdp's-&gt;nocb_cb_kthread does not exist, will be created,
there is a situation where the rdp's rcuop kthreads creation fails,
and then de-offload this CPU's rdp, does not assign this CPU's
rdp-&gt;nocb_cb_kthread pointer, but this rdp's-&gt;nocb_gp_rdp and
rdp's-&gt;rdp_gp-&gt;nocb_gp_kthread is still valid.

This will cause the subsequent re-offload operation of this offline
CPU, which will pass the conditional check and the kthread_unpark()
will access invalid rdp's-&gt;nocb_cb_kthread pointer.

This commit therefore use rdp's-&gt;nocb_gp_kthread instead of
rdp_gp's-&gt;nocb_gp_kthread for safety check.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38704/">CVE-2025-38704 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38704">CVE-2025-38704 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254408">SUSE bug 1254408</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38705</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38705" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38705" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38705" ref_url="https://www.suse.com/security/cve/CVE-2025-38705" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/pm: fix null pointer access

Writing a string without delimiters (' ', '\n', '\0') to the under
gpu_od/fan_ctrl sysfs or pp_power_profile_mode for the CUSTOM profile
will result in a null pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38705/">CVE-2025-38705 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38705">CVE-2025-38705 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249334">SUSE bug 1249334</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538706" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38706</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38706" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38706" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38706" ref_url="https://www.suse.com/security/cve/CVE-2025-38706" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: core: Check for rtd == NULL in snd_soc_remove_pcm_runtime()

snd_soc_remove_pcm_runtime() might be called with rtd == NULL which will
leads to null pointer dereference.
This was reproduced with topology loading and marking a link as ignore
due to missing hardware component on the system.
On module removal the soc_tplg_remove_link() would call
snd_soc_remove_pcm_runtime() with rtd == NULL since the link was ignored,
no runtime was created.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38706/">CVE-2025-38706 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38706">CVE-2025-38706 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249195">SUSE bug 1249195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250193">SUSE bug 1250193</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38709</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38709" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38709" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38709" ref_url="https://www.suse.com/security/cve/CVE-2025-38709" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

loop: Avoid updating block size under exclusive owner

Syzbot came up with a reproducer where a loop device block size is
changed underneath a mounted filesystem. This causes a mismatch between
the block device block size and the block size stored in the superblock
causing confusion in various places such as fs/buffer.c. The particular
issue triggered by syzbot was a warning in __getblk_slow() due to
requested buffer size not matching block device block size.

Fix the problem by getting exclusive hold of the loop device to change
its block size. This fails if somebody (such as filesystem) has already
an exclusive ownership of the block device and thus prevents modifying
the loop device under some exclusive owner which doesn't expect it.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38709/">CVE-2025-38709 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38709">CVE-2025-38709 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249199">SUSE bug 1249199</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249535">SUSE bug 1249535</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38710</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38710" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38710" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38710" ref_url="https://www.suse.com/security/cve/CVE-2025-38710" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gfs2: Validate i_depth for exhash directories

A fuzzer test introduced corruption that ends up with a depth of 0 in
dir_e_read(), causing an undefined shift by 32 at:

  index = hash &gt;&gt; (32 - dip-&gt;i_depth);

As calculated in an open-coded way in dir_make_exhash(), the minimum
depth for an exhash directory is ilog2(sdp-&gt;sd_hash_ptrs) and 0 is
invalid as sdp-&gt;sd_hash_ptrs is fixed as sdp-&gt;bsize / 16 at mount time.

So we can avoid the undefined behaviour by checking for depth values
lower than the minimum in gfs2_dinode_in(). Values greater than the
maximum are already being checked for there.

Also switch the calculation in dir_make_exhash() to use ilog2() to
clarify how the depth is calculated.

Tested with the syzkaller repro.c and xfstests '-g quick'.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38710/">CVE-2025-38710 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38710">CVE-2025-38710 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249201">SUSE bug 1249201</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249536">SUSE bug 1249536</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538717" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38717</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38717" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38717" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38717" ref_url="https://www.suse.com/security/cve/CVE-2025-38717" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: kcm: Fix race condition in kcm_unattach()

syzbot found a race condition when kcm_unattach(psock)
and kcm_release(kcm) are executed at the same time.

kcm_unattach() is missing a check of the flag
kcm-&gt;tx_stopped before calling queue_work().

If the kcm has a reserved psock, kcm_unattach() might get executed
between cancel_work_sync() and unreserve_psock() in kcm_release(),
requeuing kcm-&gt;tx_work right before kcm gets freed in kcm_done().

Remove kcm-&gt;tx_stopped and replace it by the less
error-prone disable_work_sync().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38717/">CVE-2025-38717 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38717">CVE-2025-38717 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249167">SUSE bug 1249167</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38718</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38718" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38718" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38718" ref_url="https://www.suse.com/security/cve/CVE-2025-38718" source="SUSE CVE"/>
		<reference ref_id="ESSA-2026:0024" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002461.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16880" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002048.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:16919" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002052.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22910" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sctp: linearize cloned gso packets in sctp_rcv

A cloned head skb still shares these frag skbs in fraglist with the
original head skb. It's not safe to access these frag skbs.

syzbot reported two use-of-uninitialized-memory bugs caused by this:

  BUG: KMSAN: uninit-value in sctp_inq_pop+0x15b7/0x1920 net/sctp/inqueue.c:211
   sctp_inq_pop+0x15b7/0x1920 net/sctp/inqueue.c:211
   sctp_assoc_bh_rcv+0x1a7/0xc50 net/sctp/associola.c:998
   sctp_inq_push+0x2ef/0x380 net/sctp/inqueue.c:88
   sctp_backlog_rcv+0x397/0xdb0 net/sctp/input.c:331
   sk_backlog_rcv+0x13b/0x420 include/net/sock.h:1122
   __release_sock+0x1da/0x330 net/core/sock.c:3106
   release_sock+0x6b/0x250 net/core/sock.c:3660
   sctp_wait_for_connect+0x487/0x820 net/sctp/socket.c:9360
   sctp_sendmsg_to_asoc+0x1ec1/0x1f00 net/sctp/socket.c:1885
   sctp_sendmsg+0x32b9/0x4a80 net/sctp/socket.c:2031
   inet_sendmsg+0x25a/0x280 net/ipv4/af_inet.c:851
   sock_sendmsg_nosec net/socket.c:718 [inline]

and

  BUG: KMSAN: uninit-value in sctp_assoc_bh_rcv+0x34e/0xbc0 net/sctp/associola.c:987
   sctp_assoc_bh_rcv+0x34e/0xbc0 net/sctp/associola.c:987
   sctp_inq_push+0x2a3/0x350 net/sctp/inqueue.c:88
   sctp_backlog_rcv+0x3c7/0xda0 net/sctp/input.c:331
   sk_backlog_rcv+0x142/0x420 include/net/sock.h:1148
   __release_sock+0x1d3/0x330 net/core/sock.c:3213
   release_sock+0x6b/0x270 net/core/sock.c:3767
   sctp_wait_for_connect+0x458/0x820 net/sctp/socket.c:9367
   sctp_sendmsg_to_asoc+0x223a/0x2260 net/sctp/socket.c:1886
   sctp_sendmsg+0x3910/0x49f0 net/sctp/socket.c:2032
   inet_sendmsg+0x269/0x2a0 net/ipv4/af_inet.c:851
   sock_sendmsg_nosec net/socket.c:712 [inline]

This patch fixes it by linearizing cloned gso packets in sctp_rcv().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38718/">CVE-2025-38718 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38718">CVE-2025-38718 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249161">SUSE bug 1249161</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031708" comment="cluster-md-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031709" comment="cluster-md-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031710" comment="cluster-md-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031711" comment="dlm-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031712" comment="dlm-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031713" comment="dlm-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031714" comment="dtb-allwinner-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031715" comment="dtb-altera-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031716" comment="dtb-amazon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031717" comment="dtb-amd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031718" comment="dtb-amlogic-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031719" comment="dtb-apm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031720" comment="dtb-apple-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031721" comment="dtb-arm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031722" comment="dtb-broadcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031723" comment="dtb-cavium-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031724" comment="dtb-exynos-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031725" comment="dtb-freescale-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031726" comment="dtb-hisilicon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031727" comment="dtb-lg-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031728" comment="dtb-marvell-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031729" comment="dtb-mediatek-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031730" comment="dtb-nvidia-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031731" comment="dtb-qcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031732" comment="dtb-renesas-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031733" comment="dtb-rockchip-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031734" comment="dtb-socionext-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031735" comment="dtb-sprd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031736" comment="dtb-xilinx-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031737" comment="gfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031738" comment="gfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031739" comment="gfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031742" comment="kernel-64kb-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031743" comment="kernel-64kb-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031747" comment="kernel-default-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031748" comment="kernel-default-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031750" comment="kernel-docs-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031751" comment="kernel-docs-html-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031752" comment="kernel-kvmsmall-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031754" comment="kernel-kvmsmall-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031756" comment="kernel-obs-build-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031757" comment="kernel-obs-qa-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031760" comment="kernel-rt-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031761" comment="kernel-rt-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031762" comment="kernel-rt-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031764" comment="kernel-source-vanilla-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031765" comment="kernel-syms-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031766" comment="kernel-zfcpdump-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031767" comment="kselftests-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031768" comment="kselftests-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031769" comment="kselftests-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031770" comment="ocfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031771" comment="ocfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031772" comment="ocfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38721</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38721" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38721" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38721" ref_url="https://www.suse.com/security/cve/CVE-2025-38721" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: ctnetlink: fix refcount leak on table dump

There is a reference count leak in ctnetlink_dump_table():
      if (res &lt; 0) {
                nf_conntrack_get(&amp;ct-&gt;ct_general); // HERE
                cb-&gt;args[1] = (unsigned long)ct;
                ...

While its very unlikely, its possible that ct == last.
If this happens, then the refcount of ct was already incremented.
This 2nd increment is never undone.

This prevents the conntrack object from being released, which in turn
keeps prevents cnet-&gt;count from dropping back to 0.

This will then block the netns dismantle (or conntrack rmmod) as
nf_conntrack_cleanup_net_list() will wait forever.

This can be reproduced by running conntrack_resize.sh selftest in a loop.
It takes ~20 minutes for me on a preemptible kernel on average before
I see a runaway kworker spinning in nf_conntrack_cleanup_net_list.

One fix would to change this to:
        if (res &lt; 0) {
		if (ct != last)
	                nf_conntrack_get(&amp;ct-&gt;ct_general);

But this reference counting isn't needed in the first place.
We can just store a cookie value instead.

A followup patch will do the same for ctnetlink_exp_dump_table,
it looks to me as if this has the same problem and like
ctnetlink_dump_table, we only need a 'skip hint', not the actual
object so we can apply the same cookie strategy there as well.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38721/">CVE-2025-38721 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38721">CVE-2025-38721 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249176">SUSE bug 1249176</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538722" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38722</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38722" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38722" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38722" ref_url="https://www.suse.com/security/cve/CVE-2025-38722" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

habanalabs: fix UAF in export_dmabuf()

As soon as we'd inserted a file reference into descriptor table, another
thread could close it.  That's fine for the case when all we are doing is
returning that descriptor to userland (it's a race, but it's a userland
race and there's nothing the kernel can do about it).  However, if we
follow fd_install() with any kind of access to objects that would be
destroyed on close (be it the struct file itself or anything destroyed
by its -&gt;release()), we have a UAF.

dma_buf_fd() is a combination of reserving a descriptor and fd_install().
habanalabs export_dmabuf() calls it and then proceeds to access the
objects destroyed on close.  In particular, it grabs an extra reference to
another struct file that will be dropped as part of -&gt;release() for ours;
that "will be" is actually "might have already been".

Fix that by reserving descriptor before anything else and do fd_install()
only when everything had been set up.  As a side benefit, we no longer
have the failure exit with file already created, but reference to
underlying file (as well as -&gt;dmabuf_export_cnt, etc.) not grabbed yet;
unlike dma_buf_fd(), fd_install() can't fail.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38722/">CVE-2025-38722 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38722">CVE-2025-38722 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249163">SUSE bug 1249163</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538724" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38724</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38724" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38724" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38724" ref_url="https://www.suse.com/security/cve/CVE-2025-38724" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:22388" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002268.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22405" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfsd: handle get_client_locked() failure in nfsd4_setclientid_confirm()

Lei Lu recently reported that nfsd4_setclientid_confirm() did not check
the return value from get_client_locked(). a SETCLIENTID_CONFIRM could
race with a confirmed client expiring and fail to get a reference. That
could later lead to a UAF.

Fix this by getting a reference early in the case where there is an
extant confirmed client. If that fails then treat it as if there were no
confirmed client found at all.

In the case where the unconfirmed client is expiring, just fail and
return the result from get_client_locked().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38724/">CVE-2025-38724 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38724">CVE-2025-38724 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249169">SUSE bug 1249169</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538725" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38725</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38725" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38725" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38725" ref_url="https://www.suse.com/security/cve/CVE-2025-38725" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: usb: asix_devices: add phy_mask for ax88772 mdio bus

Without setting phy_mask for ax88772 mdio bus, current driver may create
at most 32 mdio phy devices with phy address range from 0x00 ~ 0x1f.
DLink DUB-E100 H/W Ver B1 is such a device. However, only one main phy
device will bind to net phy driver. This is creating issue during system
suspend/resume since phy_polling_mode() in phy_state_machine() will
directly deference member of phydev-&gt;drv for non-main phy devices. Then
NULL pointer dereference issue will occur. Due to only external phy or
internal phy is necessary, add phy_mask for ax88772 mdio bus to workarnoud
the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38725/">CVE-2025-38725 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38725">CVE-2025-38725 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249170">SUSE bug 1249170</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538727" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38727</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38727" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38727" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38727" ref_url="https://www.suse.com/security/cve/CVE-2025-38727" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netlink: avoid infinite retry looping in netlink_unicast()

netlink_attachskb() checks for the socket's read memory allocation
constraints. Firstly, it has:

  rmem &lt; READ_ONCE(sk-&gt;sk_rcvbuf)

to check if the just increased rmem value fits into the socket's receive
buffer. If not, it proceeds and tries to wait for the memory under:

  rmem + skb-&gt;truesize &gt; READ_ONCE(sk-&gt;sk_rcvbuf)

The checks don't cover the case when skb-&gt;truesize + sk-&gt;sk_rmem_alloc is
equal to sk-&gt;sk_rcvbuf. Thus the function neither successfully accepts
these conditions, nor manages to reschedule the task - and is called in
retry loop for indefinite time which is caught as:

  rcu: INFO: rcu_sched self-detected stall on CPU
  rcu:     0-....: (25999 ticks this GP) idle=ef2/1/0x4000000000000000 softirq=262269/262269 fqs=6212
  (t=26000 jiffies g=230833 q=259957)
  NMI backtrace for cpu 0
  CPU: 0 PID: 22 Comm: kauditd Not tainted 5.10.240 #68
  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.17.0-4.fc42 04/01/2014
  Call Trace:
  &lt;IRQ&gt;
  dump_stack lib/dump_stack.c:120
  nmi_cpu_backtrace.cold lib/nmi_backtrace.c:105
  nmi_trigger_cpumask_backtrace lib/nmi_backtrace.c:62
  rcu_dump_cpu_stacks kernel/rcu/tree_stall.h:335
  rcu_sched_clock_irq.cold kernel/rcu/tree.c:2590
  update_process_times kernel/time/timer.c:1953
  tick_sched_handle kernel/time/tick-sched.c:227
  tick_sched_timer kernel/time/tick-sched.c:1399
  __hrtimer_run_queues kernel/time/hrtimer.c:1652
  hrtimer_interrupt kernel/time/hrtimer.c:1717
  __sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1113
  asm_call_irq_on_stack arch/x86/entry/entry_64.S:808
  &lt;/IRQ&gt;

  netlink_attachskb net/netlink/af_netlink.c:1234
  netlink_unicast net/netlink/af_netlink.c:1349
  kauditd_send_queue kernel/audit.c:776
  kauditd_thread kernel/audit.c:897
  kthread kernel/kthread.c:328
  ret_from_fork arch/x86/entry/entry_64.S:304

Restore the original behavior of the check which commit in Fixes
accidentally missed when restructuring the code.

Found by Linux Verification Center (linuxtesting.org).
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38727/">CVE-2025-38727 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38727">CVE-2025-38727 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249166">SUSE bug 1249166</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538728" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38728</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38728" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38728" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38728" ref_url="https://www.suse.com/security/cve/CVE-2025-38728" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb3: fix for slab out of bounds on mount to ksmbd

With KASAN enabled, it is possible to get a slab out of bounds
during mount to ksmbd due to missing check in parse_server_interfaces()
(see below):

 BUG: KASAN: slab-out-of-bounds in
 parse_server_interfaces+0x14ee/0x1880 [cifs]
 Read of size 4 at addr ffff8881433dba98 by task mount/9827

 CPU: 5 UID: 0 PID: 9827 Comm: mount Tainted: G
 OE       6.16.0-rc2-kasan #2 PREEMPT(voluntary)
 Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE
 Hardware name: Dell Inc. Precision Tower 3620/0MWYPT,
 BIOS 2.13.1 06/14/2019
 Call Trace:
  &lt;TASK&gt;
 dump_stack_lvl+0x9f/0xf0
 print_report+0xd1/0x670
 __virt_addr_valid+0x22c/0x430
 ? parse_server_interfaces+0x14ee/0x1880 [cifs]
 ? kasan_complete_mode_report_info+0x2a/0x1f0
 ? parse_server_interfaces+0x14ee/0x1880 [cifs]
   kasan_report+0xd6/0x110
   parse_server_interfaces+0x14ee/0x1880 [cifs]
   __asan_report_load_n_noabort+0x13/0x20
   parse_server_interfaces+0x14ee/0x1880 [cifs]
 ? __pfx_parse_server_interfaces+0x10/0x10 [cifs]
 ? trace_hardirqs_on+0x51/0x60
 SMB3_request_interfaces+0x1ad/0x3f0 [cifs]
 ? __pfx_SMB3_request_interfaces+0x10/0x10 [cifs]
 ? SMB2_tcon+0x23c/0x15d0 [cifs]
 smb3_qfs_tcon+0x173/0x2b0 [cifs]
 ? __pfx_smb3_qfs_tcon+0x10/0x10 [cifs]
 ? cifs_get_tcon+0x105d/0x2120 [cifs]
 ? do_raw_spin_unlock+0x5d/0x200
 ? cifs_get_tcon+0x105d/0x2120 [cifs]
 ? __pfx_smb3_qfs_tcon+0x10/0x10 [cifs]
 cifs_mount_get_tcon+0x369/0xb90 [cifs]
 ? dfs_cache_find+0xe7/0x150 [cifs]
 dfs_mount_share+0x985/0x2970 [cifs]
 ? check_path.constprop.0+0x28/0x50
 ? save_trace+0x54/0x370
 ? __pfx_dfs_mount_share+0x10/0x10 [cifs]
 ? __lock_acquire+0xb82/0x2ba0
 ? __kasan_check_write+0x18/0x20
 cifs_mount+0xbc/0x9e0 [cifs]
 ? __pfx_cifs_mount+0x10/0x10 [cifs]
 ? do_raw_spin_unlock+0x5d/0x200
 ? cifs_setup_cifs_sb+0x29d/0x810 [cifs]
 cifs_smb3_do_mount+0x263/0x1990 [cifs]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38728/">CVE-2025-38728 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38728">CVE-2025-38728 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249256">SUSE bug 1249256</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538729" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38729</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38729" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38729" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38729" ref_url="https://www.suse.com/security/cve/CVE-2025-38729" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23947" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: usb-audio: Validate UAC3 power domain descriptors, too

UAC3 power domain descriptors need to be verified with its variable
bLength for avoiding the unexpected OOB accesses by malicious
firmware, too.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38729/">CVE-2025-38729 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38729">CVE-2025-38729 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249164">SUSE bug 1249164</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38730</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38730" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38730" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38730" ref_url="https://www.suse.com/security/cve/CVE-2025-38730" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2212" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003185.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2759" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

io_uring/net: commit partial buffers on retry

Ring provided buffers are potentially only valid within the single
execution context in which they were acquired. io_uring deals with this
and invalidates them on retry. But on the networking side, if
MSG_WAITALL is set, or if the socket is of the streaming type and too
little was processed, then it will hang on to the buffer rather than
recycle or commit it. This is problematic for two reasons:

1) If someone unregisters the provided buffer ring before a later retry,
   then the req-&gt;buf_list will no longer be valid.

2) If multiple sockers are using the same buffer group, then multiple
   receives can consume the same memory. This can cause data corruption
   in the application, as either receive could land in the same
   userspace buffer.

Fix this by disallowing partial retries from pinning a provided buffer
across multiple executions, if ring provided buffers are used.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38730/">CVE-2025-38730 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38730">CVE-2025-38730 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249172">SUSE bug 1249172</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38732</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38732" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38732" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38732" ref_url="https://www.suse.com/security/cve/CVE-2025-38732" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_reject: don't leak dst refcount for loopback packets

recent patches to add a WARN() when replacing skb dst entry found an
old bug:

WARNING: include/linux/skbuff.h:1165 skb_dst_check_unset include/linux/skbuff.h:1164 [inline]
WARNING: include/linux/skbuff.h:1165 skb_dst_set include/linux/skbuff.h:1210 [inline]
WARNING: include/linux/skbuff.h:1165 nf_reject_fill_skb_dst+0x2a4/0x330 net/ipv4/netfilter/nf_reject_ipv4.c:234
[..]
Call Trace:
 nf_send_unreach+0x17b/0x6e0 net/ipv4/netfilter/nf_reject_ipv4.c:325
 nft_reject_inet_eval+0x4bc/0x690 net/netfilter/nft_reject_inet.c:27
 expr_call_ops_eval net/netfilter/nf_tables_core.c:237 [inline]
 ..

This is because blamed commit forgot about loopback packets.
Such packets already have a dst_entry attached, even at PRE_ROUTING stage.

Instead of checking hook just check if the skb already has a route
attached to it.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-38732/">CVE-2025-38732 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38732">CVE-2025-38732 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249262">SUSE bug 1249262</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538733" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38733</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38733" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38733" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38733" ref_url="https://www.suse.com/security/cve/CVE-2025-38733" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390/mm: Do not map lowcore with identity mapping

Since the identity mapping is pinned to address zero the lowcore is always
also mapped to address zero, this happens regardless of the relocate_lowcore
command line option. If the option is specified the lowcore is mapped
twice, instead of only once.

This means that NULL pointer accesses will succeed instead of causing an
exception (low address protection still applies, but covers only parts).
To fix this never map the first two pages of physical memory with the
identity mapping.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38733/">CVE-2025-38733 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38733">CVE-2025-38733 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249313">SUSE bug 1249313</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538734" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38734</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38734" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38734" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38734" ref_url="https://www.suse.com/security/cve/CVE-2025-38734" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/smc: fix UAF on smcsk after smc_listen_out()

BPF CI testing report a UAF issue:

  [   16.446633] BUG: kernel NULL pointer dereference, address: 000000000000003  0
  [   16.447134] #PF: supervisor read access in kernel mod  e
  [   16.447516] #PF: error_code(0x0000) - not-present pag  e
  [   16.447878] PGD 0 P4D   0
  [   16.448063] Oops: Oops: 0000 [#1] PREEMPT SMP NOPT  I
  [   16.448409] CPU: 0 UID: 0 PID: 9 Comm: kworker/0:1 Tainted: G           OE      6.13.0-rc3-g89e8a75fda73-dirty #4  2
  [   16.449124] Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODUL  E
  [   16.449502] Hardware name: QEMU Ubuntu 24.04 PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/201  4
  [   16.450201] Workqueue: smc_hs_wq smc_listen_wor  k
  [   16.450531] RIP: 0010:smc_listen_work+0xc02/0x159  0
  [   16.452158] RSP: 0018:ffffb5ab40053d98 EFLAGS: 0001024  6
  [   16.452526] RAX: 0000000000000001 RBX: 0000000000000002 RCX: 000000000000030  0
  [   16.452994] RDX: 0000000000000280 RSI: 00003513840053f0 RDI: 000000000000000  0
  [   16.453492] RBP: ffffa097808e3800 R08: ffffa09782dba1e0 R09: 000000000000000  5
  [   16.453987] R10: 0000000000000000 R11: 0000000000000000 R12: ffffa0978274640  0
  [   16.454497] R13: 0000000000000000 R14: 0000000000000000 R15: ffffa09782d4092  0
  [   16.454996] FS:  0000000000000000(0000) GS:ffffa097bbc00000(0000) knlGS:000000000000000  0
  [   16.455557] CS:  0010 DS: 0000 ES: 0000 CR0: 000000008005003  3
  [   16.455961] CR2: 0000000000000030 CR3: 0000000102788004 CR4: 0000000000770ef  0
  [   16.456459] PKRU: 5555555  4
  [   16.456654] Call Trace  :
  [   16.456832]  &lt;TASK  &gt;
  [   16.456989]  ? __die+0x23/0x7  0
  [   16.457215]  ? page_fault_oops+0x180/0x4c  0
  [   16.457508]  ? __lock_acquire+0x3e6/0x249  0
  [   16.457801]  ? exc_page_fault+0x68/0x20  0
  [   16.458080]  ? asm_exc_page_fault+0x26/0x3  0
  [   16.458389]  ? smc_listen_work+0xc02/0x159  0
  [   16.458689]  ? smc_listen_work+0xc02/0x159  0
  [   16.458987]  ? lock_is_held_type+0x8f/0x10  0
  [   16.459284]  process_one_work+0x1ea/0x6d  0
  [   16.459570]  worker_thread+0x1c3/0x38  0
  [   16.459839]  ? __pfx_worker_thread+0x10/0x1  0
  [   16.460144]  kthread+0xe0/0x11  0
  [   16.460372]  ? __pfx_kthread+0x10/0x1  0
  [   16.460640]  ret_from_fork+0x31/0x5  0
  [   16.460896]  ? __pfx_kthread+0x10/0x1  0
  [   16.461166]  ret_from_fork_asm+0x1a/0x3  0
  [   16.461453]  &lt;/TASK  &gt;
  [   16.461616] Modules linked in: bpf_testmod(OE) [last unloaded: bpf_testmod(OE)  ]
  [   16.462134] CR2: 000000000000003  0
  [   16.462380] ---[ end trace 0000000000000000 ]---
  [   16.462710] RIP: 0010:smc_listen_work+0xc02/0x1590

The direct cause of this issue is that after smc_listen_out_connected(),
newclcsock-&gt;sk may be NULL since it will releases the smcsk. Therefore,
if the application closes the socket immediately after accept,
newclcsock-&gt;sk can be NULL. A possible execution order could be as
follows:

smc_listen_work                                 | userspace
-----------------------------------------------------------------
lock_sock(sk)                                   |
smc_listen_out_connected()                      |
| \- smc_listen_out                             |
|    | \- release_sock                          |
     | |- sk-&gt;sk_data_ready()                   |
                                                | fd = accept();
                                                | close(fd);
                                                |  \- socket-&gt;sk = NULL;
/* newclcsock-&gt;sk is NULL now */
SMC_STAT_SERV_SUCC_INC(sock_net(newclcsock-&gt;sk))

Since smc_listen_out_connected() will not fail, simply swapping the order
of the code can easily fix this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38734/">CVE-2025-38734 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38734">CVE-2025-38734 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249324">SUSE bug 1249324</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538735" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38735</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38735" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38735" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38735" ref_url="https://www.suse.com/security/cve/CVE-2025-38735" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gve: prevent ethtool ops after shutdown

A crash can occur if an ethtool operation is invoked
after shutdown() is called.

shutdown() is invoked during system shutdown to stop DMA operations
without performing expensive deallocations. It is discouraged to
unregister the netdev in this path, so the device may still be visible
to userspace and kernel helpers.

In gve, shutdown() tears down most internal data structures. If an
ethtool operation is dispatched after shutdown(), it will dereference
freed or NULL pointers, leading to a kernel panic. While graceful
shutdown normally quiesces userspace before invoking the reboot
syscall, forced shutdowns (as observed on GCP VMs) can still trigger
this path.

Fix by calling netif_device_detach() in shutdown().
This marks the device as detached so the ethtool ioctl handler
will skip dispatching operations to the driver.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38735/">CVE-2025-38735 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38735">CVE-2025-38735 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249288">SUSE bug 1249288</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202538736" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-38736</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-38736" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-38736" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-38736" ref_url="https://www.suse.com/security/cve/CVE-2025-38736" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: usb: asix_devices: Fix PHY address mask in MDIO bus initialization

Syzbot reported shift-out-of-bounds exception on MDIO bus initialization.

The PHY address should be masked to 5 bits (0-31). Without this
mask, invalid PHY addresses could be used, potentially causing issues
with MDIO bus operations.

Fix this by masking the PHY address with 0x1f (31 decimal) to ensure
it stays within the valid range.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-38736/">CVE-2025-38736 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-38736">CVE-2025-38736 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249318">SUSE bug 1249318</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39673</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39673" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39673" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39673" ref_url="https://www.suse.com/security/cve/CVE-2025-39673" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ppp: fix race conditions in ppp_fill_forward_path

ppp_fill_forward_path() has two race conditions:

1. The ppp-&gt;channels list can change between list_empty() and
   list_first_entry(), as ppp_lock() is not held. If the only channel
   is deleted in ppp_disconnect_channel(), list_first_entry() may
   access an empty head or a freed entry, and trigger a panic.

2. pch-&gt;chan can be NULL. When ppp_unregister_channel() is called,
   pch-&gt;chan is set to NULL before pch is removed from ppp-&gt;channels.

Fix these by using a lockless RCU approach:
- Use list_first_or_null_rcu() to safely test and access the first list
  entry.
- Convert list modifications on ppp-&gt;channels to their RCU variants and
  add synchronize_net() after removal.
- Check for a NULL pch-&gt;chan before dereferencing it.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39673/">CVE-2025-39673 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39673">CVE-2025-39673 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249320">SUSE bug 1249320</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39675</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39675" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39675" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39675" ref_url="https://www.suse.com/security/cve/CVE-2025-39675" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Add null pointer check in mod_hdcp_hdcp1_create_session()

The function mod_hdcp_hdcp1_create_session() calls the function
get_first_active_display(), but does not check its return value.
The return value is a null pointer if the display list is empty.
This will lead to a null pointer dereference.

Add a null pointer check for get_first_active_display() and return
MOD_HDCP_STATUS_DISPLAY_NOT_FOUND if the function return null.

This is similar to the commit c3e9826a2202
("drm/amd/display: Add null pointer check for get_first_active_display()").

(cherry picked from commit 5e43eb3cd731649c4f8b9134f857be62a416c893)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39675/">CVE-2025-39675 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39675">CVE-2025-39675 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249263">SUSE bug 1249263</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539676" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39676</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39676" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39676" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39676" ref_url="https://www.suse.com/security/cve/CVE-2025-39676" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: qla4xxx: Prevent a potential error pointer dereference

The qla4xxx_get_ep_fwdb() function is supposed to return NULL on error,
but qla4xxx_ep_connect() returns error pointers.  Propagating the error
pointers will lead to an Oops in the caller, so change the error pointers
to NULL.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39676/">CVE-2025-39676 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39676">CVE-2025-39676 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249302">SUSE bug 1249302</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031708" comment="cluster-md-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031709" comment="cluster-md-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031710" comment="cluster-md-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031711" comment="dlm-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031712" comment="dlm-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031713" comment="dlm-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031714" comment="dtb-allwinner-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031715" comment="dtb-altera-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031716" comment="dtb-amazon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031717" comment="dtb-amd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031718" comment="dtb-amlogic-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031719" comment="dtb-apm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031720" comment="dtb-apple-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031721" comment="dtb-arm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031722" comment="dtb-broadcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031723" comment="dtb-cavium-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031724" comment="dtb-exynos-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031725" comment="dtb-freescale-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031726" comment="dtb-hisilicon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031727" comment="dtb-lg-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031728" comment="dtb-marvell-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031729" comment="dtb-mediatek-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031730" comment="dtb-nvidia-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031731" comment="dtb-qcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031732" comment="dtb-renesas-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031733" comment="dtb-rockchip-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031734" comment="dtb-socionext-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031735" comment="dtb-sprd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031736" comment="dtb-xilinx-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031737" comment="gfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031738" comment="gfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031739" comment="gfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031742" comment="kernel-64kb-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031743" comment="kernel-64kb-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031747" comment="kernel-default-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031748" comment="kernel-default-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031750" comment="kernel-docs-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031751" comment="kernel-docs-html-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031752" comment="kernel-kvmsmall-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031754" comment="kernel-kvmsmall-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031756" comment="kernel-obs-build-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031757" comment="kernel-obs-qa-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031760" comment="kernel-rt-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031761" comment="kernel-rt-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031762" comment="kernel-rt-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031764" comment="kernel-source-vanilla-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031765" comment="kernel-syms-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031766" comment="kernel-zfcpdump-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031767" comment="kselftests-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031768" comment="kselftests-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031769" comment="kselftests-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031770" comment="ocfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031771" comment="ocfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031772" comment="ocfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539677" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39677</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39677" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39677" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39677" ref_url="https://www.suse.com/security/cve/CVE-2025-39677" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: Fix backlog accounting in qdisc_dequeue_internal

This issue applies for the following qdiscs: hhf, fq, fq_codel, and
fq_pie, and occurs in their change handlers when adjusting to the new
limit. The problem is the following in the values passed to the
subsequent qdisc_tree_reduce_backlog call given a tbf parent:

   When the tbf parent runs out of tokens, skbs of these qdiscs will
   be placed in gso_skb. Their peek handlers are qdisc_peek_dequeued,
   which accounts for both qlen and backlog. However, in the case of
   qdisc_dequeue_internal, ONLY qlen is accounted for when pulling
   from gso_skb. This means that these qdiscs are missing a
   qdisc_qstats_backlog_dec when dropping packets to satisfy the
   new limit in their change handlers.

   One can observe this issue with the following (with tc patched to
   support a limit of 0):

   export TARGET=fq
   tc qdisc del dev lo root
   tc qdisc add dev lo root handle 1: tbf rate 8bit burst 100b latency 1ms
   tc qdisc replace dev lo handle 3: parent 1:1 $TARGET limit 1000
   echo ''; echo 'add child'; tc -s -d qdisc show dev lo
   ping -I lo -f -c2 -s32 -W0.001 127.0.0.1 2&gt;&amp;1 &gt;/dev/null
   echo ''; echo 'after ping'; tc -s -d qdisc show dev lo
   tc qdisc change dev lo handle 3: parent 1:1 $TARGET limit 0
   echo ''; echo 'after limit drop'; tc -s -d qdisc show dev lo
   tc qdisc replace dev lo handle 2: parent 1:1 sfq
   echo ''; echo 'post graft'; tc -s -d qdisc show dev lo

   The second to last show command shows 0 packets but a positive
   number (74) of backlog bytes. The problem becomes clearer in the
   last show command, where qdisc_purge_queue triggers
   qdisc_tree_reduce_backlog with the positive backlog and causes an
   underflow in the tbf parent's backlog (4096 Mb instead of 0).

To fix this issue, the codepath for all clients of qdisc_dequeue_internal
has been simplified: codel, pie, hhf, fq, fq_pie, and fq_codel.
qdisc_dequeue_internal handles the backlog adjustments for all cases that
do not directly use the dequeue handler.

The old fq_codel_change limit adjustment loop accumulated the arguments to
the subsequent qdisc_tree_reduce_backlog call through the cstats field.
However, this is confusing and error prone as fq_codel_dequeue could also
potentially mutate this field (which qdisc_dequeue_internal calls in the
non gso_skb case), so we have unified the code here with other qdiscs.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39677/">CVE-2025-39677 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39677">CVE-2025-39677 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249300">SUSE bug 1249300</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539678" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39678</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39678" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39678" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39678" ref_url="https://www.suse.com/security/cve/CVE-2025-39678" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

platform/x86/amd/hsmp: Ensure sock-&gt;metric_tbl_addr is non-NULL

If metric table address is not allocated, accessing metrics_bin will
result in a NULL pointer dereference, so add a check.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39678/">CVE-2025-39678 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39678">CVE-2025-39678 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249290">SUSE bug 1249290</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539679" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39679</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39679" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39679" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39679" ref_url="https://www.suse.com/security/cve/CVE-2025-39679" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/nouveau/nvif: Fix potential memory leak in nvif_vmm_ctor().

When the nvif_vmm_type is invalid, we will return error directly
without freeing the args in nvif_vmm_ctor(), which leading a memory
leak. Fix it by setting the ret -EINVAL and goto done.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39679/">CVE-2025-39679 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39679">CVE-2025-39679 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249338">SUSE bug 1249338</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539681" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39681</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39681" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39681" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39681" ref_url="https://www.suse.com/security/cve/CVE-2025-39681" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/cpu/hygon: Add missing resctrl_cpu_detect() in bsp_init helper

Since

  923f3a2b48bd ("x86/resctrl: Query LLC monitoring properties once during boot")

resctrl_cpu_detect() has been moved from common CPU initialization code to
the vendor-specific BSP init helper, while Hygon didn't put that call in their
code.

This triggers a division by zero fault during early booting stage on our
machines with X86_FEATURE_CQM* supported, where get_rdt_mon_resources() tries
to calculate mon_l3_config with uninitialized boot_cpu_data.x86_cache_occ_scale.

Add the missing resctrl_cpu_detect() in the Hygon BSP init helper.

  [ bp: Massage commit message. ]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39681/">CVE-2025-39681 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39681">CVE-2025-39681 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249303">SUSE bug 1249303</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539682" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39682</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39682" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39682" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39682" ref_url="https://www.suse.com/security/cve/CVE-2025-39682" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16880" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023801.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024228.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tls: fix handling of zero-length records on the rx_list

Each recvmsg() call must process either
 - only contiguous DATA records (any number of them)
 - one non-DATA record

If the next record has different type than what has already been
processed we break out of the main processing loop. If the record
has already been decrypted (which may be the case for TLS 1.3 where
we don't know type until decryption) we queue the pending record
to the rx_list. Next recvmsg() will pick it up from there.

Queuing the skb to rx_list after zero-copy decrypt is not possible,
since in that case we decrypted directly to the user space buffer,
and we don't have an skb to queue (darg.skb points to the ciphertext
skb for access to metadata like length).

Only data records are allowed zero-copy, and we break the processing
loop after each non-data record. So we should never zero-copy and
then find out that the record type has changed. The corner case
we missed is when the initial record comes from rx_list, and it's
zero length.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-39682/">CVE-2025-39682 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39682">CVE-2025-39682 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249284">SUSE bug 1249284</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250192">SUSE bug 1250192</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539683" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39683</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39683" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39683" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39683" ref_url="https://www.suse.com/security/cve/CVE-2025-39683" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tracing: Limit access to parser-&gt;buffer when trace_get_user failed

When the length of the string written to set_ftrace_filter exceeds
FTRACE_BUFF_MAX, the following KASAN alarm will be triggered:

BUG: KASAN: slab-out-of-bounds in strsep+0x18c/0x1b0
Read of size 1 at addr ffff0000d00bd5ba by task ash/165

CPU: 1 UID: 0 PID: 165 Comm: ash Not tainted 6.16.0-g6bcdbd62bd56-dirty
Hardware name: linux,dummy-virt (DT)
Call trace:
 show_stack+0x34/0x50 (C)
 dump_stack_lvl+0xa0/0x158
 print_address_description.constprop.0+0x88/0x398
 print_report+0xb0/0x280
 kasan_report+0xa4/0xf0
 __asan_report_load1_noabort+0x20/0x30
 strsep+0x18c/0x1b0
 ftrace_process_regex.isra.0+0x100/0x2d8
 ftrace_regex_release+0x484/0x618
 __fput+0x364/0xa58
 ____fput+0x28/0x40
 task_work_run+0x154/0x278
 do_notify_resume+0x1f0/0x220
 el0_svc+0xec/0xf0
 el0t_64_sync_handler+0xa0/0xe8
 el0t_64_sync+0x1ac/0x1b0

The reason is that trace_get_user will fail when processing a string
longer than FTRACE_BUFF_MAX, but not set the end of parser-&gt;buffer to 0.
Then an OOB access will be triggered in ftrace_regex_release-&gt;
ftrace_process_regex-&gt;strsep-&gt;strpbrk. We can solve this problem by
limiting access to parser-&gt;buffer when trace_get_user failed.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39683/">CVE-2025-39683 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39683">CVE-2025-39683 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249286">SUSE bug 1249286</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539684" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39684</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39684" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39684" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39684" ref_url="https://www.suse.com/security/cve/CVE-2025-39684" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

comedi: Fix use of uninitialized memory in do_insn_ioctl() and do_insnlist_ioctl()

syzbot reports a KMSAN kernel-infoleak in `do_insn_ioctl()`.  A kernel
buffer is allocated to hold `insn-&gt;n` samples (each of which is an
`unsigned int`).  For some instruction types, `insn-&gt;n` samples are
copied back to user-space, unless an error code is being returned.  The
problem is that not all the instruction handlers that need to return
data to userspace fill in the whole `insn-&gt;n` samples, so that there is
an information leak.  There is a similar syzbot report for
`do_insnlist_ioctl()`, although it does not have a reproducer for it at
the time of writing.

One culprit is `insn_rw_emulate_bits()` which is used as the handler for
`INSN_READ` or `INSN_WRITE` instructions for subdevices that do not have
a specific handler for that instruction, but do have an `INSN_BITS`
handler.  For `INSN_READ` it only fills in at most 1 sample, so if
`insn-&gt;n` is greater than 1, the remaining `insn-&gt;n - 1` samples copied
to userspace will be uninitialized kernel data.

Another culprit is `vm80xx_ai_insn_read()` in the "vm80xx" driver.  It
never returns an error, even if it fails to fill the buffer.

Fix it in `do_insn_ioctl()` and `do_insnlist_ioctl()` by making sure
that uninitialized parts of the allocated buffer are zeroed before
handling each instruction.

Thanks to Arnaud Lecomte for their fix to `do_insn_ioctl()`.  That fix
replaced the call to `kmalloc_array()` with `kcalloc()`, but it is not
always necessary to clear the whole buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39684/">CVE-2025-39684 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39684">CVE-2025-39684 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249281">SUSE bug 1249281</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539685" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39685</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39685" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39685" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39685" ref_url="https://www.suse.com/security/cve/CVE-2025-39685" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

comedi: pcl726: Prevent invalid irq number

The reproducer passed in an irq number(0x80008000) that was too large,
which triggered the oob.

Added an interrupt number check to prevent users from passing in an irq
number that was too large.

If `it-&gt;options[1]` is 31, then `1 &lt;&lt; it-&gt;options[1]` is still invalid
because it shifts a 1-bit into the sign bit (which is UB in C).
Possible solutions include reducing the upper bound on the
`it-&gt;options[1]` value to 30 or lower, or using `1U &lt;&lt; it-&gt;options[1]`.

The old code would just not attempt to request the IRQ if the
`options[1]` value were invalid.  And it would still configure the
device without interrupts even if the call to `request_irq` returned an
error.  So it would be better to combine this test with the test below.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39685/">CVE-2025-39685 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39685">CVE-2025-39685 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249282">SUSE bug 1249282</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539686" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39686</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39686" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39686" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39686" ref_url="https://www.suse.com/security/cve/CVE-2025-39686" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

comedi: Make insn_rw_emulate_bits() do insn-&gt;n samples

The `insn_rw_emulate_bits()` function is used as a default handler for
`INSN_READ` instructions for subdevices that have a handler for
`INSN_BITS` but not for `INSN_READ`.  Similarly, it is used as a default
handler for `INSN_WRITE` instructions for subdevices that have a handler
for `INSN_BITS` but not for `INSN_WRITE`. It works by emulating the
`INSN_READ` or `INSN_WRITE` instruction handling with a constructed
`INSN_BITS` instruction.  However, `INSN_READ` and `INSN_WRITE`
instructions are supposed to be able read or write multiple samples,
indicated by the `insn-&gt;n` value, but `insn_rw_emulate_bits()` currently
only handles a single sample.  For `INSN_READ`, the comedi core will
copy `insn-&gt;n` samples back to user-space.  (That triggered KASAN
kernel-infoleak errors when `insn-&gt;n` was greater than 1, but that is
being fixed more generally elsewhere in the comedi core.)

Make `insn_rw_emulate_bits()` either handle `insn-&gt;n` samples, or return
an error, to conform to the general expectation for `INSN_READ` and
`INSN_WRITE` handlers.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39686/">CVE-2025-39686 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39686">CVE-2025-39686 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249312">SUSE bug 1249312</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39687</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39687" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39687" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39687" ref_url="https://www.suse.com/security/cve/CVE-2025-39687" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iio: light: as73211: Ensure buffer holes are zeroed

Given that the buffer is copied to a kfifo that ultimately user space
can read, ensure we zero it.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39687/">CVE-2025-39687 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39687">CVE-2025-39687 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249316">SUSE bug 1249316</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539689" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39689</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39689" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39689" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39689" ref_url="https://www.suse.com/security/cve/CVE-2025-39689" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ftrace: Also allocate and copy hash for reading of filter files

Currently the reader of set_ftrace_filter and set_ftrace_notrace just adds
the pointer to the global tracer hash to its iterator. Unlike the writer
that allocates a copy of the hash, the reader keeps the pointer to the
filter hashes. This is problematic because this pointer is static across
function calls that release the locks that can update the global tracer
hashes. This can cause UAF and similar bugs.

Allocate and copy the hash for reading the filter files like it is done
for the writers. This not only fixes UAF bugs, but also makes the code a
bit simpler as it doesn't have to differentiate when to free the
iterator's hash between writers and readers.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39689/">CVE-2025-39689 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39689">CVE-2025-39689 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249307">SUSE bug 1249307</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539691" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39691</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39691" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39691" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39691" ref_url="https://www.suse.com/security/cve/CVE-2025-39691" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs/buffer: fix use-after-free when call bh_read() helper

There's issue as follows:
BUG: KASAN: stack-out-of-bounds in end_buffer_read_sync+0xe3/0x110
Read of size 8 at addr ffffc9000168f7f8 by task swapper/3/0
CPU: 3 UID: 0 PID: 0 Comm: swapper/3 Not tainted 6.16.0-862.14.0.6.x86_64
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996)
Call Trace:
 &lt;IRQ&gt;
 dump_stack_lvl+0x55/0x70
 print_address_description.constprop.0+0x2c/0x390
 print_report+0xb4/0x270
 kasan_report+0xb8/0xf0
 end_buffer_read_sync+0xe3/0x110
 end_bio_bh_io_sync+0x56/0x80
 blk_update_request+0x30a/0x720
 scsi_end_request+0x51/0x2b0
 scsi_io_completion+0xe3/0x480
 ? scsi_device_unbusy+0x11e/0x160
 blk_complete_reqs+0x7b/0x90
 handle_softirqs+0xef/0x370
 irq_exit_rcu+0xa5/0xd0
 sysvec_apic_timer_interrupt+0x6e/0x90
 &lt;/IRQ&gt;

 Above issue happens when do ntfs3 filesystem mount, issue may happens
 as follows:
           mount                            IRQ
ntfs_fill_super
  read_cache_page
    do_read_cache_folio
      filemap_read_folio
        mpage_read_folio
	 do_mpage_readpage
	  ntfs_get_block_vbo
	   bh_read
	     submit_bh
	     wait_on_buffer(bh);
	                            blk_complete_reqs
				     scsi_io_completion
				      scsi_end_request
				       blk_update_request
				        end_bio_bh_io_sync
					 end_buffer_read_sync
					  __end_buffer_read_notouch
					   unlock_buffer

            wait_on_buffer(bh);--&gt; return will return to caller

					  put_bh
					    --&gt; trigger stack-out-of-bounds
In the mpage_read_folio() function, the stack variable 'map_bh' is
passed to ntfs_get_block_vbo(). Once unlock_buffer() unlocks and
wait_on_buffer() returns to continue processing, the stack variable
is likely to be reclaimed. Consequently, during the end_buffer_read_sync()
process, calling put_bh() may result in stack overrun.

If the bh is not allocated on the stack, it belongs to a folio.  Freeing
a buffer head which belongs to a folio is done by drop_buffers() which
will fail to free buffers which are still locked.  So it is safe to call
put_bh() before __end_buffer_read_notouch().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-39691/">CVE-2025-39691 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39691">CVE-2025-39691 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249374">SUSE bug 1249374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249392">SUSE bug 1249392</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539693" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39693</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39693" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39693" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39693" ref_url="https://www.suse.com/security/cve/CVE-2025-39693" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Avoid a NULL pointer dereference

[WHY]
Although unlikely drm_atomic_get_new_connector_state() or
drm_atomic_get_old_connector_state() can return NULL.

[HOW]
Check returns before dereference.

(cherry picked from commit 1e5e8d672fec9f2ab352be121be971877bff2af9)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39693/">CVE-2025-39693 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39693">CVE-2025-39693 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249279">SUSE bug 1249279</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539694" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39694</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39694" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39694" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39694" ref_url="https://www.suse.com/security/cve/CVE-2025-39694" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16398" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390/sclp: Fix SCCB present check

Tracing code called by the SCLP interrupt handler contains early exits
if the SCCB address associated with an interrupt is NULL. This check is
performed after physical to virtual address translation.

If the kernel identity mapping does not start at address zero, the
resulting virtual address is never zero, so that the NULL checks won't
work. Subsequently this may result in incorrect accesses to the first
page of the identity mapping.

Fix this by introducing a function that handles the NULL case before
address translation.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39694/">CVE-2025-39694 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39694">CVE-2025-39694 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249299">SUSE bug 1249299</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39695</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39695" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39695" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39695" ref_url="https://www.suse.com/security/cve/CVE-2025-39695" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/rxe: Flush delayed SKBs while releasing RXE resources

When skb packets are sent out, these skb packets still depends on
the rxe resources, for example, QP, sk, when these packets are
destroyed.

If these rxe resources are released when the skb packets are destroyed,
the call traces will appear.

To avoid skb packets hang too long time in some network devices,
a timestamp is added when these skb packets are created. If these
skb packets hang too long time in network devices, these network
devices can free these skb packets to release rxe resources.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39695/">CVE-2025-39695 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39695">CVE-2025-39695 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249306">SUSE bug 1249306</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539697" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39697</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39697" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39697" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39697" ref_url="https://www.suse.com/security/cve/CVE-2025-39697" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:21469" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003115.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21917" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFS: Fix a race when updating an existing write

After nfs_lock_and_join_requests() tests for whether the request is
still attached to the mapping, nothing prevents a call to
nfs_inode_remove_request() from succeeding until we actually lock the
page group.
The reason is that whoever called nfs_inode_remove_request() doesn't
necessarily have a lock on the page group head.

So in order to avoid races, let's take the page group lock earlier in
nfs_lock_and_join_requests(), and hold it across the removal of the
request in nfs_inode_remove_request().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39697/">CVE-2025-39697 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39697">CVE-2025-39697 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249319">SUSE bug 1249319</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39698</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39698" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39698" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39698" ref_url="https://www.suse.com/security/cve/CVE-2025-39698" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:16880" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20635-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024655.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

io_uring/futex: ensure io_futex_wait() cleans up properly on failure

The io_futex_data is allocated upfront and assigned to the io_kiocb
async_data field, but the request isn't marked with REQ_F_ASYNC_DATA
at that point. Those two should always go together, as the flag tells
io_uring whether the field is valid or not.

Additionally, on failure cleanup, the futex handler frees the data but
does not clear -&gt;async_data. Clear the data and the flag in the error
path as well.

Thanks to Trend Micro Zero Day Initiative and particularly ReDress for
reporting this.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-39698/">CVE-2025-39698 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39698">CVE-2025-39698 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249322">SUSE bug 1249322</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250190">SUSE bug 1250190</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539700" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39700</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39700" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39700" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39700" ref_url="https://www.suse.com/security/cve/CVE-2025-39700" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/damon/ops-common: ignore migration request to invalid nodes

damon_migrate_pages() tries migration even if the target node is invalid. 
If users mistakenly make such invalid requests via
DAMOS_MIGRATE_{HOT,COLD} action, the below kernel BUG can happen.

    [ 7831.883495] BUG: unable to handle page fault for address: 0000000000001f48
    [ 7831.884160] #PF: supervisor read access in kernel mode
    [ 7831.884681] #PF: error_code(0x0000) - not-present page
    [ 7831.885203] PGD 0 P4D 0
    [ 7831.885468] Oops: Oops: 0000 [#1] SMP PTI
    [ 7831.885852] CPU: 31 UID: 0 PID: 94202 Comm: kdamond.0 Not tainted 6.16.0-rc5-mm-new-damon+ #93 PREEMPT(voluntary)
    [ 7831.886913] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-4.el9 04/01/2014
    [ 7831.887777] RIP: 0010:__alloc_frozen_pages_noprof (include/linux/mmzone.h:1724 include/linux/mmzone.h:1750 mm/page_alloc.c:4936 mm/page_alloc.c:5137)
    [...]
    [ 7831.895953] Call Trace:
    [ 7831.896195]  &lt;TASK&gt;
    [ 7831.896397] __folio_alloc_noprof (mm/page_alloc.c:5183 mm/page_alloc.c:5192)
    [ 7831.896787] migrate_pages_batch (mm/migrate.c:1189 mm/migrate.c:1851)
    [ 7831.897228] ? __pfx_alloc_migration_target (mm/migrate.c:2137)
    [ 7831.897735] migrate_pages (mm/migrate.c:2078)
    [ 7831.898141] ? __pfx_alloc_migration_target (mm/migrate.c:2137)
    [ 7831.898664] damon_migrate_folio_list (mm/damon/ops-common.c:321 mm/damon/ops-common.c:354)
    [ 7831.899140] damon_migrate_pages (mm/damon/ops-common.c:405)
    [...]

Add a target node validity check in damon_migrate_pages().  The validity
check is stolen from that of do_pages_move(), which is being used for the
move_pages() system call.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39700/">CVE-2025-39700 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39700">CVE-2025-39700 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249309">SUSE bug 1249309</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539701" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39701</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39701" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39701" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39701" ref_url="https://www.suse.com/security/cve/CVE-2025-39701" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ACPI: pfr_update: Fix the driver update version check

The security-version-number check should be used rather
than the runtime version check for driver updates.

Otherwise, the firmware update would fail when the update binary had
a lower runtime version number than the current one.

[ rjw: Changelog edits ]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39701/">CVE-2025-39701 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39701">CVE-2025-39701 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249308">SUSE bug 1249308</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39702</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39702" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39702" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39702" ref_url="https://www.suse.com/security/cve/CVE-2025-39702" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:19409" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv6: sr: Fix MAC comparison to be constant-time

To prevent timing attacks, MACs need to be compared in constant time.
Use the appropriate helper function for this.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39702/">CVE-2025-39702 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39702">CVE-2025-39702 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249317">SUSE bug 1249317</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031708" comment="cluster-md-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031709" comment="cluster-md-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031710" comment="cluster-md-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031711" comment="dlm-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031712" comment="dlm-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031713" comment="dlm-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031714" comment="dtb-allwinner-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031715" comment="dtb-altera-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031716" comment="dtb-amazon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031717" comment="dtb-amd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031718" comment="dtb-amlogic-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031719" comment="dtb-apm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031720" comment="dtb-apple-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031721" comment="dtb-arm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031722" comment="dtb-broadcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031723" comment="dtb-cavium-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031724" comment="dtb-exynos-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031725" comment="dtb-freescale-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031726" comment="dtb-hisilicon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031727" comment="dtb-lg-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031728" comment="dtb-marvell-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031729" comment="dtb-mediatek-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031730" comment="dtb-nvidia-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031731" comment="dtb-qcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031732" comment="dtb-renesas-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031733" comment="dtb-rockchip-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031734" comment="dtb-socionext-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031735" comment="dtb-sprd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031736" comment="dtb-xilinx-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031737" comment="gfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031738" comment="gfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031739" comment="gfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031742" comment="kernel-64kb-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031743" comment="kernel-64kb-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031747" comment="kernel-default-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031748" comment="kernel-default-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031750" comment="kernel-docs-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031751" comment="kernel-docs-html-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031752" comment="kernel-kvmsmall-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031754" comment="kernel-kvmsmall-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031756" comment="kernel-obs-build-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031757" comment="kernel-obs-qa-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031760" comment="kernel-rt-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031761" comment="kernel-rt-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031762" comment="kernel-rt-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031764" comment="kernel-source-vanilla-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031765" comment="kernel-syms-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031766" comment="kernel-zfcpdump-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031767" comment="kselftests-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031768" comment="kselftests-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031769" comment="kselftests-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031770" comment="ocfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031771" comment="ocfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031772" comment="ocfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539703" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39703</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39703" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39703" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39703" ref_url="https://www.suse.com/security/cve/CVE-2025-39703" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net, hsr: reject HSR frame if skb can't hold tag

Receiving HSR frame with insufficient space to hold HSR tag in the skb
can result in a crash (kernel BUG):

[   45.390915] skbuff: skb_under_panic: text:ffffffff86f32cac len:26 put:14 head:ffff888042418000 data:ffff888042417ff4 tail:0xe end:0x180 dev:bridge_slave_1
[   45.392559] ------------[ cut here ]------------
[   45.392912] kernel BUG at net/core/skbuff.c:211!
[   45.393276] Oops: invalid opcode: 0000 [#1] SMP DEBUG_PAGEALLOC KASAN NOPTI
[   45.393809] CPU: 1 UID: 0 PID: 2496 Comm: reproducer Not tainted 6.15.0 #12 PREEMPT(undef)
[   45.394433] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014
[   45.395273] RIP: 0010:skb_panic+0x15b/0x1d0

&lt;snip registers, remove unreliable trace&gt;

[   45.402911] Call Trace:
[   45.403105]  &lt;IRQ&gt;
[   45.404470]  skb_push+0xcd/0xf0
[   45.404726]  br_dev_queue_push_xmit+0x7c/0x6c0
[   45.406513]  br_forward_finish+0x128/0x260
[   45.408483]  __br_forward+0x42d/0x590
[   45.409464]  maybe_deliver+0x2eb/0x420
[   45.409763]  br_flood+0x174/0x4a0
[   45.410030]  br_handle_frame_finish+0xc7c/0x1bc0
[   45.411618]  br_handle_frame+0xac3/0x1230
[   45.413674]  __netif_receive_skb_core.constprop.0+0x808/0x3df0
[   45.422966]  __netif_receive_skb_one_core+0xb4/0x1f0
[   45.424478]  __netif_receive_skb+0x22/0x170
[   45.424806]  process_backlog+0x242/0x6d0
[   45.425116]  __napi_poll+0xbb/0x630
[   45.425394]  net_rx_action+0x4d1/0xcc0
[   45.427613]  handle_softirqs+0x1a4/0x580
[   45.427926]  do_softirq+0x74/0x90
[   45.428196]  &lt;/IRQ&gt;

This issue was found by syzkaller.

The panic happens in br_dev_queue_push_xmit() once it receives a
corrupted skb with ETH header already pushed in linear data. When it
attempts the skb_push() call, there's not enough headroom and
skb_push() panics.

The corrupted skb is put on the queue by HSR layer, which makes a
sequence of unintended transformations when it receives a specific
corrupted HSR frame (with incomplete TAG).

Fix it by dropping and consuming frames that are not long enough to
contain both ethernet and hsr headers.

Alternative fix would be to check for enough headroom before skb_push()
in br_dev_queue_push_xmit().

In the reproducer, this is injected via AF_PACKET, but I don't easily
see why it couldn't be sent over the wire from adjacent network.

Further Details:

In the reproducer, the following network interface chain is set up:

 ────────────────┐    ────────────────┐
| veth0_to_hsr   ├───┤  hsr_slave0    ┼───┐
 ────────────────┘    ────────────────┘   |
                                          |  ──────┐
                                          ├─┤ hsr0 ├───┐
                                          |  ──────┘   |
 ────────────────┐    ────────────────┐   |            | ────────┐
| veth1_to_hsr   ┼───┤  hsr_slave1    ├───┘             ┤        |
 ────────────────┘    ────────────────┘                 ┼ bridge |
                                                       ||        |
                                                       | ────────┘
                                                       |
                                         ───────┐      |
                                        |  ...  ├──────┘
                                         ───────┘

To trigger the events leading up to crash, reproducer sends a corrupted
HSR fr
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39703/">CVE-2025-39703 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39703">CVE-2025-39703 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249315">SUSE bug 1249315</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39705</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39705" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39705" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39705" ref_url="https://www.suse.com/security/cve/CVE-2025-39705" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: fix a Null pointer dereference vulnerability

[Why]
A null pointer dereference vulnerability exists in the AMD display driver's
(DC module) cleanup function dc_destruct().
When display control context (dc-&gt;ctx) construction fails
(due to memory allocation failure), this pointer remains NULL.
During subsequent error handling when dc_destruct() is called,
there's no NULL check before dereferencing the perf_trace member
(dc-&gt;ctx-&gt;perf_trace), causing a kernel null pointer dereference crash.

[How]
Check if dc-&gt;ctx is non-NULL before dereferencing.

(Updated commit text and removed unnecessary error message)
(cherry picked from commit 9dd8e2ba268c636c240a918e0a31e6feaee19404)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39705/">CVE-2025-39705 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39705">CVE-2025-39705 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249295">SUSE bug 1249295</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539706" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39706</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39706" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39706" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39706" ref_url="https://www.suse.com/security/cve/CVE-2025-39706" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdkfd: Destroy KFD debugfs after destroy KFD wq

Since KFD proc content was moved to kernel debugfs, we can't destroy KFD
debugfs before kfd_process_destroy_wq. Move kfd_process_destroy_wq prior
to kfd_debugfs_fini to fix a kernel NULL pointer problem. It happens
when /sys/kernel/debug/kfd was already destroyed in kfd_debugfs_fini but
kfd_process_destroy_wq calls kfd_debugfs_remove_process. This line
    debugfs_remove_recursive(entry-&gt;proc_dentry);
tries to remove /sys/kernel/debug/kfd/proc/&lt;pid&gt; while
/sys/kernel/debug/kfd is already gone. It hangs the kernel by kernel
NULL pointer.

(cherry picked from commit 0333052d90683d88531558dcfdbf2525cc37c233)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39706/">CVE-2025-39706 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39706">CVE-2025-39706 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249413">SUSE bug 1249413</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539707" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39707</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39707" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39707" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39707" ref_url="https://www.suse.com/security/cve/CVE-2025-39707" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: check if hubbub is NULL in debugfs/amdgpu_dm_capabilities

HUBBUB structure is not initialized on DCE hardware, so check if it is NULL
to avoid null dereference while accessing amdgpu_dm_capabilities file in
debugfs.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39707/">CVE-2025-39707 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39707">CVE-2025-39707 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249333">SUSE bug 1249333</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39709</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39709" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39709" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39709" ref_url="https://www.suse.com/security/cve/CVE-2025-39709" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: venus: protect against spurious interrupts during probe

Make sure the interrupt handler is initialized before the interrupt is
registered.

If the IRQ is registered before hfi_create(), it's possible that an
interrupt fires before the handler setup is complete, leading to a NULL
dereference.

This error condition has been observed during system boot on Rb3Gen2.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39709/">CVE-2025-39709 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39709">CVE-2025-39709 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249278">SUSE bug 1249278</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39710</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39710" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39710" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39710" ref_url="https://www.suse.com/security/cve/CVE-2025-39710" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: venus: Add a check for packet size after reading from shared memory

Add a check to ensure that the packet size does not exceed the number of
available words after reading the packet header from shared memory. This
ensures that the size provided by the firmware is safe to process and
prevent potential out-of-bounds memory access.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39710/">CVE-2025-39710 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39710">CVE-2025-39710 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249304">SUSE bug 1249304</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539711" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39711</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39711" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39711" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39711" ref_url="https://www.suse.com/security/cve/CVE-2025-39711" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: ivsc: Fix crash at shutdown due to missing mei_cldev_disable() calls

Both the ACE and CSI driver are missing a mei_cldev_disable() call in
their remove() function.

This causes the mei_cl client to stay part of the mei_device-&gt;file_list
list even though its memory is freed by mei_cl_bus_dev_release() calling
kfree(cldev-&gt;cl).

This leads to a use-after-free when mei_vsc_remove() runs mei_stop()
which first removes all mei bus devices calling mei_ace_remove() and
mei_csi_remove() followed by mei_cl_bus_dev_release() and then calls
mei_cl_all_disconnect() which walks over mei_device-&gt;file_list dereferecing
the just freed cldev-&gt;cl.

And mei_vsc_remove() it self is run at shutdown because of the
platform_device_unregister(tp-&gt;pdev) in vsc_tp_shutdown()

When building a kernel with KASAN this leads to the following KASAN report:

[ 106.634504] ==================================================================
[ 106.634623] BUG: KASAN: slab-use-after-free in mei_cl_set_disconnected (drivers/misc/mei/client.c:783) mei
[ 106.634683] Read of size 4 at addr ffff88819cb62018 by task systemd-shutdow/1
[ 106.634729]
[ 106.634767] Tainted: [E]=UNSIGNED_MODULE
[ 106.634770] Hardware name: Dell Inc. XPS 16 9640/09CK4V, BIOS 1.12.0 02/10/2025
[ 106.634773] Call Trace:
[ 106.634777]  &lt;TASK&gt;
...
[ 106.634871] kasan_report (mm/kasan/report.c:221 mm/kasan/report.c:636)
[ 106.634901] mei_cl_set_disconnected (drivers/misc/mei/client.c:783) mei
[ 106.634921] mei_cl_all_disconnect (drivers/misc/mei/client.c:2165 (discriminator 4)) mei
[ 106.634941] mei_reset (drivers/misc/mei/init.c:163) mei
...
[ 106.635042] mei_stop (drivers/misc/mei/init.c:348) mei
[ 106.635062] mei_vsc_remove (drivers/misc/mei/mei_dev.h:784 drivers/misc/mei/platform-vsc.c:393) mei_vsc
[ 106.635066] platform_remove (drivers/base/platform.c:1424)

Add the missing mei_cldev_disable() calls so that the mei_cl gets removed
from mei_device-&gt;file_list before it is freed to fix this.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39711/">CVE-2025-39711 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39711">CVE-2025-39711 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249274">SUSE bug 1249274</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39712</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39712" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39712" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39712" ref_url="https://www.suse.com/security/cve/CVE-2025-39712" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: mt9m114: Fix deadlock in get_frame_interval/set_frame_interval

Getting / Setting the frame interval using the V4L2 subdev pad ops
get_frame_interval/set_frame_interval causes a deadlock, as the
subdev state is locked in the [1] but also in the driver itself.

In [2] it's described that the caller is responsible to acquire and
release the lock in this case. Therefore, acquiring the lock in the
driver is wrong.

Remove the lock acquisitions/releases from mt9m114_ifp_get_frame_interval()
and mt9m114_ifp_set_frame_interval().

[1] drivers/media/v4l2-core/v4l2-subdev.c - line 1129
[2] Documentation/driver-api/media/v4l2-subdev.rst
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39712/">CVE-2025-39712 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39712">CVE-2025-39712 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249269">SUSE bug 1249269</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39713</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39713" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39713" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39713" ref_url="https://www.suse.com/security/cve/CVE-2025-39713" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: rainshadow-cec: fix TOCTOU race condition in rain_interrupt()

In the interrupt handler rain_interrupt(), the buffer full check on
rain-&gt;buf_len is performed before acquiring rain-&gt;buf_lock. This
creates a Time-of-Check to Time-of-Use (TOCTOU) race condition, as
rain-&gt;buf_len is concurrently accessed and modified in the work
handler rain_irq_work_handler() under the same lock.

Multiple interrupt invocations can race, with each reading buf_len
before it becomes full and then proceeding. This can lead to both
interrupts attempting to write to the buffer, incrementing buf_len
beyond its capacity (DATA_SIZE) and causing a buffer overflow.

Fix this bug by moving the spin_lock() to before the buffer full
check. This ensures that the check and the subsequent buffer modification
are performed atomically, preventing the race condition. An corresponding
spin_unlock() is added to the overflow path to correctly release the
lock.

This possible bug was found by an experimental static analysis tool
developed by our team.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39713/">CVE-2025-39713 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39713">CVE-2025-39713 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249321">SUSE bug 1249321</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539714" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39714</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39714" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39714" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39714" ref_url="https://www.suse.com/security/cve/CVE-2025-39714" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: usbtv: Lock resolution while streaming

When an program is streaming (ffplay) and another program (qv4l2)
changes the TV standard from NTSC to PAL, the kernel crashes due to trying
to copy to unmapped memory.

Changing from NTSC to PAL increases the resolution in the usbtv struct,
but the video plane buffer isn't adjusted, so it overflows.

[hverkuil: call vb2_is_busy instead of vb2_is_streaming]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39714/">CVE-2025-39714 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39714">CVE-2025-39714 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249273">SUSE bug 1249273</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39718</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39718" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39718" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39718" ref_url="https://www.suse.com/security/cve/CVE-2025-39718" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:19105" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002134.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21398" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vsock/virtio: Validate length in packet header before skb_put()

When receiving a vsock packet in the guest, only the virtqueue buffer
size is validated prior to virtio_vsock_skb_rx_put(). Unfortunately,
virtio_vsock_skb_rx_put() uses the length from the packet header as the
length argument to skb_put(), potentially resulting in SKB overflow if
the host has gone wonky.

Validate the length as advertised by the packet header before calling
virtio_vsock_skb_rx_put().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39718/">CVE-2025-39718 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39718">CVE-2025-39718 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249305">SUSE bug 1249305</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539719" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39719</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39719" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39719" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39719" ref_url="https://www.suse.com/security/cve/CVE-2025-39719" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iio: imu: bno055: fix OOB access of hw_xlate array

Fix a potential out-of-bounds array access of the hw_xlate array in
bno055.c.

In bno055_get_regmask(), hw_xlate was iterated over the length of the
vals array instead of the length of the hw_xlate array. In the case of
bno055_gyr_scale, the vals array is larger than the hw_xlate array,
so this could result in an out-of-bounds access. In practice, this
shouldn't happen though because a match should always be found which
breaks out of the for loop before it iterates beyond the end of the
hw_xlate array.

By adding a new hw_xlate_len field to the bno055_sysfs_attr, we can be
sure we are iterating over the correct length.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39719/">CVE-2025-39719 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39719">CVE-2025-39719 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249271">SUSE bug 1249271</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39721</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39721" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39721" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39721" ref_url="https://www.suse.com/security/cve/CVE-2025-39721" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: qat - flush misc workqueue during device shutdown

Repeated loading and unloading of a device specific QAT driver, for
example qat_4xxx, in a tight loop can lead to a crash due to a
use-after-free scenario. This occurs when a power management (PM)
interrupt triggers just before the device-specific driver (e.g.,
qat_4xxx.ko) is unloaded, while the core driver (intel_qat.ko) remains
loaded.

Since the driver uses a shared workqueue (`qat_misc_wq`) across all
devices and owned by intel_qat.ko, a deferred routine from the
device-specific driver may still be pending in the queue. If this
routine executes after the driver is unloaded, it can dereference freed
memory, resulting in a page fault and kernel crash like the following:

    BUG: unable to handle page fault for address: ffa000002e50a01c
    #PF: supervisor read access in kernel mode
    RIP: 0010:pm_bh_handler+0x1d2/0x250 [intel_qat]
    Call Trace:
      pm_bh_handler+0x1d2/0x250 [intel_qat]
      process_one_work+0x171/0x340
      worker_thread+0x277/0x3a0
      kthread+0xf0/0x120
      ret_from_fork+0x2d/0x50

To prevent this, flush the misc workqueue during device shutdown to
ensure that all pending work items are completed before the driver is
unloaded.

Note: This approach may slightly increase shutdown latency if the
workqueue contains jobs from other devices, but it ensures correctness
and stability.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39721/">CVE-2025-39721 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39721">CVE-2025-39721 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249323">SUSE bug 1249323</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539722" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39722</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39722" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39722" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39722" ref_url="https://www.suse.com/security/cve/CVE-2025-39722" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: caam - Prevent crash on suspend with iMX8QM / iMX8ULP

Since the CAAM on these SoCs is managed by another ARM core, called the
SECO (Security Controller) on iMX8QM and Secure Enclave on iMX8ULP, which
also reserves access to register page 0 suspend operations cannot touch
this page.

This is similar to when running OPTEE, where OPTEE will reserve page 0.

Track this situation using a new state variable no_page0, reflecting if
page 0 is reserved elsewhere, either by other management cores in SoC or
by OPTEE.

Replace the optee_en check in suspend/resume with the new check.

optee_en cannot go away as it's needed elsewhere to gate OPTEE specific
situations.

Fixes the following splat at suspend:

    Internal error: synchronous external abort: 0000000096000010 [#1] SMP
    Hardware name: Freescale i.MX8QXP ACU6C (DT)
    pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
    pc : readl+0x0/0x18
    lr : rd_reg32+0x18/0x3c
    sp : ffffffc08192ba20
    x29: ffffffc08192ba20 x28: ffffff8025190000 x27: 0000000000000000
    x26: ffffffc0808ae808 x25: ffffffc080922338 x24: ffffff8020e89090
    x23: 0000000000000000 x22: ffffffc080922000 x21: ffffff8020e89010
    x20: ffffffc080387ef8 x19: ffffff8020e89010 x18: 000000005d8000d5
    x17: 0000000030f35963 x16: 000000008f785f3f x15: 000000003b8ef57c
    x14: 00000000c418aef8 x13: 00000000f5fea526 x12: 0000000000000001
    x11: 0000000000000002 x10: 0000000000000001 x9 : 0000000000000000
    x8 : ffffff8025190870 x7 : ffffff8021726880 x6 : 0000000000000002
    x5 : ffffff80217268f0 x4 : ffffff8021726880 x3 : ffffffc081200000
    x2 : 0000000000000001 x1 : ffffff8020e89010 x0 : ffffffc081200004
    Call trace:
     readl+0x0/0x18
     caam_ctrl_suspend+0x30/0xdc
     dpm_run_callback.constprop.0+0x24/0x5c
     device_suspend+0x170/0x2e8
     dpm_suspend+0xa0/0x104
     dpm_suspend_start+0x48/0x50
     suspend_devices_and_enter+0x7c/0x45c
     pm_suspend+0x148/0x160
     state_store+0xb4/0xf8
     kobj_attr_store+0x14/0x24
     sysfs_kf_write+0x38/0x48
     kernfs_fop_write_iter+0xb4/0x178
     vfs_write+0x118/0x178
     ksys_write+0x6c/0xd0
     __arm64_sys_write+0x14/0x1c
     invoke_syscall.constprop.0+0x64/0xb0
     do_el0_svc+0x90/0xb0
     el0_svc+0x18/0x44
     el0t_64_sync_handler+0x88/0x124
     el0t_64_sync+0x150/0x154
    Code: 88dffc21 88dffc21 5ac00800 d65f03c0 (b9400000)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39722/">CVE-2025-39722 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39722">CVE-2025-39722 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249301">SUSE bug 1249301</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539723" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39723</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39723" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39723" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39723" ref_url="https://www.suse.com/security/cve/CVE-2025-39723" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfs: Fix unbuffered write error handling

If all the subrequests in an unbuffered write stream fail, the subrequest
collector doesn't update the stream-&gt;transferred value and it retains its
initial LONG_MAX value.  Unfortunately, if all active streams fail, then we
take the smallest value of { LONG_MAX, LONG_MAX, ... } as the value to set
in wreq-&gt;transferred - which is then returned from -&gt;write_iter().

LONG_MAX was chosen as the initial value so that all the streams can be
quickly assessed by taking the smallest value of all stream-&gt;transferred -
but this only works if we've set any of them.

Fix this by adding a flag to indicate whether the value in
stream-&gt;transferred is valid and checking that when we integrate the
values.  stream-&gt;transferred can then be initialised to zero.

This was found by running the generic/750 xfstest against cifs with
cache=none.  It splices data to the target file.  Once (if) it has used up
all the available scratch space, the writes start failing with ENOSPC.
This causes -&gt;write_iter() to fail.  However, it was returning
wreq-&gt;transferred, i.e. LONG_MAX, rather than an error (because it thought
the amount transferred was non-zero) and iter_file_splice_write() would
then try to clean up that amount of pipe bufferage - leading to an oops
when it overran.  The kernel log showed:

    CIFS: VFS: Send error in write = -28

followed by:

    BUG: kernel NULL pointer dereference, address: 0000000000000008

with:

    RIP: 0010:iter_file_splice_write+0x3a4/0x520
    do_splice+0x197/0x4e0

or:

    RIP: 0010:pipe_buf_release (include/linux/pipe_fs_i.h:282)
    iter_file_splice_write (fs/splice.c:755)

Also put a warning check into splice to announce if -&gt;write_iter() returned
that it had written more than it was asked to.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39723/">CVE-2025-39723 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39723">CVE-2025-39723 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249314">SUSE bug 1249314</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539724" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39724</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39724" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39724" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39724" ref_url="https://www.suse.com/security/cve/CVE-2025-39724" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

serial: 8250: fix panic due to PSLVERR

When the PSLVERR_RESP_EN parameter is set to 1, the device generates
an error response if an attempt is made to read an empty RBR (Receive
Buffer Register) while the FIFO is enabled.

In serial8250_do_startup(), calling serial_port_out(port, UART_LCR,
UART_LCR_WLEN8) triggers dw8250_check_lcr(), which invokes
dw8250_force_idle() and serial8250_clear_and_reinit_fifos(). The latter
function enables the FIFO via serial_out(p, UART_FCR, p-&gt;fcr).
Execution proceeds to the serial_port_in(port, UART_RX).
This satisfies the PSLVERR trigger condition.

When another CPU (e.g., using printk()) is accessing the UART (UART
is busy), the current CPU fails the check (value &amp; ~UART_LCR_SPAR) ==
(lcr &amp; ~UART_LCR_SPAR) in dw8250_check_lcr(), causing it to enter
dw8250_force_idle().

Put serial_port_out(port, UART_LCR, UART_LCR_WLEN8) under the port-&gt;lock
to fix this issue.

Panic backtrace:
[    0.442336] Oops - unknown exception [#1]
[    0.442343] epc : dw8250_serial_in32+0x1e/0x4a
[    0.442351]  ra : serial8250_do_startup+0x2c8/0x88e
...
[    0.442416] console_on_rootfs+0x26/0x70
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39724/">CVE-2025-39724 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39724">CVE-2025-39724 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249265">SUSE bug 1249265</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539726" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39726</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39726" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39726" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39726" ref_url="https://www.suse.com/security/cve/CVE-2025-39726" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

s390/ism: fix concurrency management in ism_cmd()

The s390x ISM device data sheet clearly states that only one
request-response sequence is allowable per ISM function at any point in
time.  Unfortunately as of today the s390/ism driver in Linux does not
honor that requirement. This patch aims to rectify that.

This problem was discovered based on Aliaksei's bug report which states
that for certain workloads the ISM functions end up entering error state
(with PEC 2 as seen from the logs) after a while and as a consequence
connections handled by the respective function break, and for future
connection requests the ISM device is not considered -- given it is in a
dysfunctional state. During further debugging PEC 3A was observed as
well.

A kernel message like
[ 1211.244319] zpci: 061a:00:00.0: Event 0x2 reports an error for PCI function 0x61a
is a reliable indicator of the stated function entering error state
with PEC 2. Let me also point out that a kernel message like
[ 1211.244325] zpci: 061a:00:00.0: The ism driver bound to the device does not support error recovery
is a reliable indicator that the ISM function won't be auto-recovered
because the ISM driver currently lacks support for it.

On a technical level, without this synchronization, commands (inputs to
the FW) may be partially or fully overwritten (corrupted) by another CPU
trying to issue commands on the same function. There is hard evidence that
this can lead to DMB token values being used as DMB IOVAs, leading to
PEC 2 PCI events indicating invalid DMA. But this is only one of the
failure modes imaginable. In theory even completely losing one command
and executing another one twice and then trying to interpret the outputs
as if the command we intended to execute was actually executed and not
the other one is also possible.  Frankly, I don't feel confident about
providing an exhaustive list of possible consequences.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39726/">CVE-2025-39726 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39726">CVE-2025-39726 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249266">SUSE bug 1249266</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539727" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39727</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39727" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39727" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39727" ref_url="https://www.suse.com/security/cve/CVE-2025-39727" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm: swap: fix potential buffer overflow in setup_clusters()

In setup_swap_map(), we only ensure badpages are in range (0, last_page]. 
As maxpages might be &lt; last_page, setup_clusters() will encounter a buffer
overflow when a badpage is &gt;= maxpages.

Only call inc_cluster_info_page() for badpage which is &lt; maxpages to fix
the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39727/">CVE-2025-39727 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39727">CVE-2025-39727 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249297">SUSE bug 1249297</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39730</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39730" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39730" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39730" ref_url="https://www.suse.com/security/cve/CVE-2025-39730" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:17397" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002074.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19105" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFS: Fix filehandle bounds checking in nfs_fh_to_dentry()

The function needs to check the minimal filehandle length before it can
access the embedded filehandle.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39730/">CVE-2025-39730 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39730">CVE-2025-39730 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249296">SUSE bug 1249296</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39732</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39732" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39732" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39732" ref_url="https://www.suse.com/security/cve/CVE-2025-39732" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath11k: fix sleeping-in-atomic in ath11k_mac_op_set_bitrate_mask()

ath11k_mac_disable_peer_fixed_rate() is passed as the iterator to
ieee80211_iterate_stations_atomic(). Note in this case the iterator is
required to be atomic, however ath11k_mac_disable_peer_fixed_rate() does
not follow it as it might sleep. Consequently below warning is seen:

BUG: sleeping function called from invalid context at wmi.c:304
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl
 __might_resched.cold
 ath11k_wmi_cmd_send
 ath11k_wmi_set_peer_param
 ath11k_mac_disable_peer_fixed_rate
 ieee80211_iterate_stations_atomic
 ath11k_mac_op_set_bitrate_mask.cold

Change to ieee80211_iterate_stations_mtx() to fix this issue.

Tested-on: WCN6855 hw2.0 PCI WLAN.HSP.1.1-03125-QCAHSPSWPL_V1_V2_SILICONZ_LITE-3.6510.30
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39732/">CVE-2025-39732 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39732">CVE-2025-39732 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249292">SUSE bug 1249292</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539738" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39738</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39738" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39738" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39738" ref_url="https://www.suse.com/security/cve/CVE-2025-39738" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: do not allow relocation of partially dropped subvolumes

[BUG]
There is an internal report that balance triggered transaction abort,
with the following call trace:

  item 85 key (594509824 169 0) itemoff 12599 itemsize 33
          extent refs 1 gen 197740 flags 2
          ref#0: tree block backref root 7
  item 86 key (594558976 169 0) itemoff 12566 itemsize 33
          extent refs 1 gen 197522 flags 2
          ref#0: tree block backref root 7
 ...
 BTRFS error (device loop0): extent item not found for insert, bytenr 594526208 num_bytes 16384 parent 449921024 root_objectid 934 owner 1 offset 0
 BTRFS error (device loop0): failed to run delayed ref for logical 594526208 num_bytes 16384 type 182 action 1 ref_mod 1: -117
 ------------[ cut here ]------------
 BTRFS: Transaction aborted (error -117)
 WARNING: CPU: 1 PID: 6963 at ../fs/btrfs/extent-tree.c:2168 btrfs_run_delayed_refs+0xfa/0x110 [btrfs]

And btrfs check doesn't report anything wrong related to the extent
tree.

[CAUSE]
The cause is a little complex, firstly the extent tree indeed doesn't
have the backref for 594526208.

The extent tree only have the following two backrefs around that bytenr
on-disk:

        item 65 key (594509824 METADATA_ITEM 0) itemoff 13880 itemsize 33
                refs 1 gen 197740 flags TREE_BLOCK
                tree block skinny level 0
                (176 0x7) tree block backref root CSUM_TREE
        item 66 key (594558976 METADATA_ITEM 0) itemoff 13847 itemsize 33
                refs 1 gen 197522 flags TREE_BLOCK
                tree block skinny level 0
                (176 0x7) tree block backref root CSUM_TREE

But the such missing backref item is not an corruption on disk, as the
offending delayed ref belongs to subvolume 934, and that subvolume is
being dropped:

        item 0 key (934 ROOT_ITEM 198229) itemoff 15844 itemsize 439
                generation 198229 root_dirid 256 bytenr 10741039104 byte_limit 0 bytes_used 345571328
                last_snapshot 198229 flags 0x1000000000001(RDONLY) refs 0
                drop_progress key (206324 EXTENT_DATA 2711650304) drop_level 2
                level 2 generation_v2 198229

And that offending tree block 594526208 is inside the dropped range of
that subvolume.  That explains why there is no backref item for that
bytenr and why btrfs check is not reporting anything wrong.

But this also shows another problem, as btrfs will do all the orphan
subvolume cleanup at a read-write mount.

So half-dropped subvolume should not exist after an RW mount, and
balance itself is also exclusive to subvolume cleanup, meaning we
shouldn't hit a subvolume half-dropped during relocation.

The root cause is, there is no orphan item for this subvolume.
In fact there are 5 subvolumes from around 2021 that have the same
problem.

It looks like the original report has some older kernels running, and
caused those zombie subvolumes.

Thankfully upstream commit 8d488a8c7ba2 ("btrfs: fix subvolume/snapshot
deletion not triggered on mount") has long fixed the bug.

[ENHANCEMENT]
For repairing such old fs, btrfs-progs will be enhanced.

Considering how delayed the problem will show up (at run delayed ref
time) and at that time we have to abort transaction already, it is too
late.

Instead here we reject any half-dropped subvolume for reloc tree at the
earliest time, preventing confusion and extra time wasted on debugging
similar bugs.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39738/">CVE-2025-39738 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39738">CVE-2025-39738 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249540">SUSE bug 1249540</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539739" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39739</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39739" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39739" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39739" ref_url="https://www.suse.com/security/cve/CVE-2025-39739" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommu/arm-smmu-qcom: Add SM6115 MDSS compatible

Add the SM6115 MDSS compatible to clients compatible list, as it also
needs that workaround.
Without this workaround, for example, QRB4210 RB2 which is based on
SM4250/SM6115 generates a lot of smmu unhandled context faults during
boot:

arm_smmu_context_fault: 116854 callbacks suppressed
arm-smmu c600000.iommu: Unhandled context fault: fsr=0x402,
iova=0x5c0ec600, fsynr=0x320021, cbfrsynra=0x420, cb=5
arm-smmu c600000.iommu: FSR    = 00000402 [Format=2 TF], SID=0x420
arm-smmu c600000.iommu: FSYNR0 = 00320021 [S1CBNDX=50 PNU PLVL=1]
arm-smmu c600000.iommu: Unhandled context fault: fsr=0x402,
iova=0x5c0d7800, fsynr=0x320021, cbfrsynra=0x420, cb=5
arm-smmu c600000.iommu: FSR    = 00000402 [Format=2 TF], SID=0x420

and also failed initialisation of lontium lt9611uxc, gpu and dpu is
observed:
(binding MDSS components triggered by lt9611uxc have failed)

 ------------[ cut here ]------------
 !aspace
 WARNING: CPU: 6 PID: 324 at drivers/gpu/drm/msm/msm_gem_vma.c:130 msm_gem_vma_init+0x150/0x18c [msm]
 Modules linked in: ... (long list of modules)
 CPU: 6 UID: 0 PID: 324 Comm: (udev-worker) Not tainted 6.15.0-03037-gaacc73ceeb8b #4 PREEMPT
 Hardware name: Qualcomm Technologies, Inc. QRB4210 RB2 (DT)
 pstate: 80000005 (Nzcv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
 pc : msm_gem_vma_init+0x150/0x18c [msm]
 lr : msm_gem_vma_init+0x150/0x18c [msm]
 sp : ffff80008144b280
  		...
 Call trace:
  msm_gem_vma_init+0x150/0x18c [msm] (P)
  get_vma_locked+0xc0/0x194 [msm]
  msm_gem_get_and_pin_iova_range+0x4c/0xdc [msm]
  msm_gem_kernel_new+0x48/0x160 [msm]
  msm_gpu_init+0x34c/0x53c [msm]
  adreno_gpu_init+0x1b0/0x2d8 [msm]
  a6xx_gpu_init+0x1e8/0x9e0 [msm]
  adreno_bind+0x2b8/0x348 [msm]
  component_bind_all+0x100/0x230
  msm_drm_bind+0x13c/0x3d0 [msm]
  try_to_bring_up_aggregate_device+0x164/0x1d0
  __component_add+0xa4/0x174
  component_add+0x14/0x20
  dsi_dev_attach+0x20/0x34 [msm]
  dsi_host_attach+0x58/0x98 [msm]
  devm_mipi_dsi_attach+0x34/0x90
  lt9611uxc_attach_dsi.isra.0+0x94/0x124 [lontium_lt9611uxc]
  lt9611uxc_probe+0x540/0x5fc [lontium_lt9611uxc]
  i2c_device_probe+0x148/0x2a8
  really_probe+0xbc/0x2c0
  __driver_probe_device+0x78/0x120
  driver_probe_device+0x3c/0x154
  __driver_attach+0x90/0x1a0
  bus_for_each_dev+0x68/0xb8
  driver_attach+0x24/0x30
  bus_add_driver+0xe4/0x208
  driver_register+0x68/0x124
  i2c_register_driver+0x48/0xcc
  lt9611uxc_driver_init+0x20/0x1000 [lontium_lt9611uxc]
  do_one_initcall+0x60/0x1d4
  do_init_module+0x54/0x1fc
  load_module+0x1748/0x1c8c
  init_module_from_file+0x74/0xa0
  __arm64_sys_finit_module+0x130/0x2f8
  invoke_syscall+0x48/0x104
  el0_svc_common.constprop.0+0xc0/0xe0
  do_el0_svc+0x1c/0x28
  el0_svc+0x2c/0x80
  el0t_64_sync_handler+0x10c/0x138
  el0t_64_sync+0x198/0x19c
 ---[ end trace 0000000000000000 ]---
 msm_dpu 5e01000.display-controller: [drm:msm_gpu_init [msm]] *ERROR* could not allocate memptrs: -22
 msm_dpu 5e01000.display-controller: failed to load adreno gpu
 platform a400000.remoteproc:glink-edge:apr:service@7:dais: Adding to iommu group 19
 msm_dpu 5e01000.display-controller: failed to bind 5900000.gpu (ops a3xx_ops [msm]): -22
 msm_dpu 5e01000.display-controller: adev bind failed: -22
 lt9611uxc 0-002b: failed to attach dsi to host
 lt9611uxc 0-002b: probe with driver lt9611uxc failed with error -22
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39739/">CVE-2025-39739 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39739">CVE-2025-39739 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249542">SUSE bug 1249542</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539742" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39742</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39742" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39742" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39742" ref_url="https://www.suse.com/security/cve/CVE-2025-39742" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024251.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20455-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20456-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20457-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20458-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20459-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20460-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20461-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20462-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20463-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20464-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20465-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20470-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20471-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20635-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024655.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA: hfi1: fix possible divide-by-zero in find_hw_thread_mask()

The function divides number of online CPUs by num_core_siblings, and
later checks the divider by zero. This implies a possibility to get
and divide-by-zero runtime error. Fix it by moving the check prior to
division. This also helps to save one indentation level.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39742/">CVE-2025-39742 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39742">CVE-2025-39742 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247374">SUSE bug 1247374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249479">SUSE bug 1249479</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249480">SUSE bug 1249480</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253291">SUSE bug 1253291</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539744" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39744</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39744" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39744" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39744" ref_url="https://www.suse.com/security/cve/CVE-2025-39744" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

rcu: Fix rcu_read_unlock() deadloop due to IRQ work

During rcu_read_unlock_special(), if this happens during irq_exit(), we
can lockup if an IPI is issued. This is because the IPI itself triggers
the irq_exit() path causing a recursive lock up.

This is precisely what Xiongfeng found when invoking a BPF program on
the trace_tick_stop() tracepoint As shown in the trace below. Fix by
managing the irq_work state correctly.

irq_exit()
  __irq_exit_rcu()
    /* in_hardirq() returns false after this */
    preempt_count_sub(HARDIRQ_OFFSET)
    tick_irq_exit()
      tick_nohz_irq_exit()
	    tick_nohz_stop_sched_tick()
	      trace_tick_stop()  /* a bpf prog is hooked on this trace point */
		   __bpf_trace_tick_stop()
		      bpf_trace_run2()
			    rcu_read_unlock_special()
                              /* will send a IPI to itself */
			      irq_work_queue_on(&amp;rdp-&gt;defer_qs_iw, rdp-&gt;cpu);

A simple reproducer can also be obtained by doing the following in
tick_irq_exit(). It will hang on boot without the patch:

  static inline void tick_irq_exit(void)
  {
 +	rcu_read_lock();
 +	WRITE_ONCE(current-&gt;rcu_read_unlock_special.b.need_qs, true);
 +	rcu_read_unlock();
 +

[neeraj: Apply Frederic's suggested fix for PREEMPT_RT]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39744/">CVE-2025-39744 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39744">CVE-2025-39744 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249494">SUSE bug 1249494</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39746</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39746" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39746" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39746" ref_url="https://www.suse.com/security/cve/CVE-2025-39746" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath10k: shutdown driver when hardware is unreliable

In rare cases, ath10k may lose connection with the PCIe bus due to
some unknown reasons, which could further lead to system crashes during
resuming due to watchdog timeout:

ath10k_pci 0000:01:00.0: wmi command 20486 timeout, restarting hardware
ath10k_pci 0000:01:00.0: already restarting
ath10k_pci 0000:01:00.0: failed to stop WMI vdev 0: -11
ath10k_pci 0000:01:00.0: failed to stop vdev 0: -11
ieee80211 phy0: PM: **** DPM device timeout ****
Call Trace:
 panic+0x125/0x315
 dpm_watchdog_set+0x54/0x54
 dpm_watchdog_handler+0x57/0x57
 call_timer_fn+0x31/0x13c

At this point, all WMI commands will timeout and attempt to restart
device. So set a threshold for consecutive restart failures. If the
threshold is exceeded, consider the hardware is unreliable and all
ath10k operations should be skipped to avoid system crash.

fail_cont_count and pending_recovery are atomic variables, and
do not involve complex conditional logic. Therefore, even if recovery
check and reconfig complete are executed concurrently, the recovery
mechanism will not be broken.

Tested-on: QCA6174 hw3.2 PCI WLAN.RM.4.4.1-00288-QCARMSWPZ-1
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39746/">CVE-2025-39746 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39746">CVE-2025-39746 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249516">SUSE bug 1249516</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249517">SUSE bug 1249517</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539747" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39747</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39747" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39747" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39747" ref_url="https://www.suse.com/security/cve/CVE-2025-39747" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/msm: Add error handling for krealloc in metadata setup

Function msm_ioctl_gem_info_set_metadata() now checks for krealloc
failure and returns -ENOMEM, avoiding potential NULL pointer dereference.
Explicitly avoids __GFP_NOFAIL due to deadlock risks and allocation constraints.

Patchwork: https://patchwork.freedesktop.org/patch/661235/
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39747/">CVE-2025-39747 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39747">CVE-2025-39747 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249566">SUSE bug 1249566</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39748</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39748" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39748" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39748" ref_url="https://www.suse.com/security/cve/CVE-2025-39748" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Forget ranges when refining tnum after JSET

Syzbot reported a kernel warning due to a range invariant violation on
the following BPF program.

  0: call bpf_get_netns_cookie
  1: if r0 == 0 goto &lt;exit&gt;
  2: if r0 &amp; Oxffffffff goto &lt;exit&gt;

The issue is on the path where we fall through both jumps.

That path is unreachable at runtime: after insn 1, we know r0 != 0, but
with the sign extension on the jset, we would only fallthrough insn 2
if r0 == 0. Unfortunately, is_branch_taken() isn't currently able to
figure this out, so the verifier walks all branches. The verifier then
refines the register bounds using the second condition and we end
up with inconsistent bounds on this unreachable path:

  1: if r0 == 0 goto &lt;exit&gt;
    r0: u64=[0x1, 0xffffffffffffffff] var_off=(0, 0xffffffffffffffff)
  2: if r0 &amp; 0xffffffff goto &lt;exit&gt;
    r0 before reg_bounds_sync: u64=[0x1, 0xffffffffffffffff] var_off=(0, 0)
    r0 after reg_bounds_sync:  u64=[0x1, 0] var_off=(0, 0)

Improving the range refinement for JSET to cover all cases is tricky. We
also don't expect many users to rely on JSET given LLVM doesn't generate
those instructions. So instead of improving the range refinement for
JSETs, Eduard suggested we forget the ranges whenever we're narrowing
tnums after a JSET. This patch implements that approach.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39748/">CVE-2025-39748 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39748">CVE-2025-39748 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249587">SUSE bug 1249587</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39749</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39749" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39749" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39749" ref_url="https://www.suse.com/security/cve/CVE-2025-39749" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

rcu: Protect -&gt;defer_qs_iw_pending from data race

On kernels built with CONFIG_IRQ_WORK=y, when rcu_read_unlock() is
invoked within an interrupts-disabled region of code [1], it will invoke
rcu_read_unlock_special(), which uses an irq-work handler to force the
system to notice when the RCU read-side critical section actually ends.
That end won't happen until interrupts are enabled at the soonest.

In some kernels, such as those booted with rcutree.use_softirq=y, the
irq-work handler is used unconditionally.

The per-CPU rcu_data structure's -&gt;defer_qs_iw_pending field is
updated by the irq-work handler and is both read and updated by
rcu_read_unlock_special().  This resulted in the following KCSAN splat:

------------------------------------------------------------------------

BUG: KCSAN: data-race in rcu_preempt_deferred_qs_handler / rcu_read_unlock_special

read to 0xffff96b95f42d8d8 of 1 bytes by task 90 on cpu 8:
 rcu_read_unlock_special+0x175/0x260
 __rcu_read_unlock+0x92/0xa0
 rt_spin_unlock+0x9b/0xc0
 __local_bh_enable+0x10d/0x170
 __local_bh_enable_ip+0xfb/0x150
 rcu_do_batch+0x595/0xc40
 rcu_cpu_kthread+0x4e9/0x830
 smpboot_thread_fn+0x24d/0x3b0
 kthread+0x3bd/0x410
 ret_from_fork+0x35/0x40
 ret_from_fork_asm+0x1a/0x30

write to 0xffff96b95f42d8d8 of 1 bytes by task 88 on cpu 8:
 rcu_preempt_deferred_qs_handler+0x1e/0x30
 irq_work_single+0xaf/0x160
 run_irq_workd+0x91/0xc0
 smpboot_thread_fn+0x24d/0x3b0
 kthread+0x3bd/0x410
 ret_from_fork+0x35/0x40
 ret_from_fork_asm+0x1a/0x30

no locks held by irq_work/8/88.
irq event stamp: 200272
hardirqs last  enabled at (200272): [&lt;ffffffffb0f56121&gt;] finish_task_switch+0x131/0x320
hardirqs last disabled at (200271): [&lt;ffffffffb25c7859&gt;] __schedule+0x129/0xd70
softirqs last  enabled at (0): [&lt;ffffffffb0ee093f&gt;] copy_process+0x4df/0x1cc0
softirqs last disabled at (0): [&lt;0000000000000000&gt;] 0x0

------------------------------------------------------------------------

The problem is that irq-work handlers run with interrupts enabled, which
means that rcu_preempt_deferred_qs_handler() could be interrupted,
and that interrupt handler might contain an RCU read-side critical
section, which might invoke rcu_read_unlock_special().  In the strict
KCSAN mode of operation used by RCU, this constitutes a data race on
the -&gt;defer_qs_iw_pending field.

This commit therefore disables interrupts across the portion of the
rcu_preempt_deferred_qs_handler() that updates the -&gt;defer_qs_iw_pending
field.  This suffices because this handler is not a fast path.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39749/">CVE-2025-39749 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39749">CVE-2025-39749 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249533">SUSE bug 1249533</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539750" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39750</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39750" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39750" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39750" ref_url="https://www.suse.com/security/cve/CVE-2025-39750" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath12k: Correct tid cleanup when tid setup fails

Currently, if any error occurs during ath12k_dp_rx_peer_tid_setup(),
the tid value is already incremented, even though the corresponding
TID is not actually allocated. Proceed to
ath12k_dp_rx_peer_tid_delete() starting from unallocated tid,
which might leads to freeing unallocated TID and cause potential
crash or out-of-bounds access.

Hence, fix by correctly decrementing tid before cleanup to match only
the successfully allocated TIDs.

Also, remove tid-- from failure case of ath12k_dp_rx_peer_frag_setup(),
as decrementing the tid before cleanup in loop will take care of this.

Compile tested only.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-39750/">CVE-2025-39750 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39750">CVE-2025-39750 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249523">SUSE bug 1249523</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252715">SUSE bug 1252715</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539751" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39751</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39751" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39751" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39751" ref_url="https://www.suse.com/security/cve/CVE-2025-39751" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:18297" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002123.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19105" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002134.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21063" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03626-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39751/">CVE-2025-39751 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39751">CVE-2025-39751 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249538">SUSE bug 1249538</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249539">SUSE bug 1249539</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39753</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39753" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39753" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39753" ref_url="https://www.suse.com/security/cve/CVE-2025-39753" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gfs2: Set .migrate_folio in gfs2_{rgrp,meta}_aops

Clears up the warning added in 7ee3647243e5 ("migrate: Remove call to
-&gt;writepage") that occurs in various xfstests, causing "something found
in dmesg" failures.

[  341.136573] gfs2_meta_aops does not implement migrate_folio
[  341.136953] WARNING: CPU: 1 PID: 36 at mm/migrate.c:944 move_to_new_folio+0x2f8/0x300
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39753/">CVE-2025-39753 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39753">CVE-2025-39753 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249590">SUSE bug 1249590</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539754" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39754</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39754" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39754" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39754" ref_url="https://www.suse.com/security/cve/CVE-2025-39754" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/smaps: fix race between smaps_hugetlb_range and migration

smaps_hugetlb_range() handles the pte without holdling ptl, and may be
concurrenct with migration, leaing to BUG_ON in pfn_swap_entry_to_page(). 
The race is as follows.

smaps_hugetlb_range              migrate_pages
  huge_ptep_get
                                   remove_migration_ptes
				   folio_unlock
  pfn_swap_entry_folio
    BUG_ON

To fix it, hold ptl lock in smaps_hugetlb_range().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39754/">CVE-2025-39754 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39754">CVE-2025-39754 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249524">SUSE bug 1249524</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539756" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39756</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39756" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39756" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39756" ref_url="https://www.suse.com/security/cve/CVE-2025-39756" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs: Prevent file descriptor table allocations exceeding INT_MAX

When sysctl_nr_open is set to a very high value (for example, 1073741816
as set by systemd), processes attempting to use file descriptors near
the limit can trigger massive memory allocation attempts that exceed
INT_MAX, resulting in a WARNING in mm/slub.c:

  WARNING: CPU: 0 PID: 44 at mm/slub.c:5027 __kvmalloc_node_noprof+0x21a/0x288

This happens because kvmalloc_array() and kvmalloc() check if the
requested size exceeds INT_MAX and emit a warning when the allocation is
not flagged with __GFP_NOWARN.

Specifically, when nr_open is set to 1073741816 (0x3ffffff8) and a
process calls dup2(oldfd, 1073741880), the kernel attempts to allocate:
- File descriptor array: 1073741880 * 8 bytes = 8,589,935,040 bytes
- Multiple bitmaps: ~400MB
- Total allocation size: &gt; 8GB (exceeding INT_MAX = 2,147,483,647)

Reproducer:
1. Set /proc/sys/fs/nr_open to 1073741816:
   # echo 1073741816 &gt; /proc/sys/fs/nr_open

2. Run a program that uses a high file descriptor:
   #include &lt;unistd.h&gt;
   #include &lt;sys/resource.h&gt;

   int main() {
       struct rlimit rlim = {1073741824, 1073741824};
       setrlimit(RLIMIT_NOFILE, &amp;rlim);
       dup2(2, 1073741880);  // Triggers the warning
       return 0;
   }

3. Observe WARNING in dmesg at mm/slub.c:5027

systemd commit a8b627a introduced automatic bumping of fs.nr_open to the
maximum possible value. The rationale was that systems with memory
control groups (memcg) no longer need separate file descriptor limits
since memory is properly accounted. However, this change overlooked
that:

1. The kernel's allocation functions still enforce INT_MAX as a maximum
   size regardless of memcg accounting
2. Programs and tests that legitimately test file descriptor limits can
   inadvertently trigger massive allocations
3. The resulting allocations (&gt;8GB) are impractical and will always fail

systemd's algorithm starts with INT_MAX and keeps halving the value
until the kernel accepts it. On most systems, this results in nr_open
being set to 1073741816 (0x3ffffff8), which is just under 1GB of file
descriptors.

While processes rarely use file descriptors near this limit in normal
operation, certain selftests (like
tools/testing/selftests/core/unshare_test.c) and programs that test file
descriptor limits can trigger this issue.

Fix this by adding a check in alloc_fdtable() to ensure the requested
allocation size does not exceed INT_MAX. This causes the operation to
fail with -EMFILE instead of triggering a kernel warning and avoids the
impractical &gt;8GB memory allocation request.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39756/">CVE-2025-39756 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39756">CVE-2025-39756 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249512">SUSE bug 1249512</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031708" comment="cluster-md-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031709" comment="cluster-md-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031710" comment="cluster-md-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031711" comment="dlm-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031712" comment="dlm-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031713" comment="dlm-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031714" comment="dtb-allwinner-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031715" comment="dtb-altera-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031716" comment="dtb-amazon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031717" comment="dtb-amd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031718" comment="dtb-amlogic-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031719" comment="dtb-apm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031720" comment="dtb-apple-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031721" comment="dtb-arm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031722" comment="dtb-broadcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031723" comment="dtb-cavium-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031724" comment="dtb-exynos-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031725" comment="dtb-freescale-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031726" comment="dtb-hisilicon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031727" comment="dtb-lg-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031728" comment="dtb-marvell-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031729" comment="dtb-mediatek-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031730" comment="dtb-nvidia-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031731" comment="dtb-qcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031732" comment="dtb-renesas-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031733" comment="dtb-rockchip-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031734" comment="dtb-socionext-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031735" comment="dtb-sprd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031736" comment="dtb-xilinx-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031737" comment="gfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031738" comment="gfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031739" comment="gfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031742" comment="kernel-64kb-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031743" comment="kernel-64kb-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031747" comment="kernel-default-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031748" comment="kernel-default-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031750" comment="kernel-docs-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031751" comment="kernel-docs-html-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031752" comment="kernel-kvmsmall-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031754" comment="kernel-kvmsmall-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031756" comment="kernel-obs-build-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031757" comment="kernel-obs-qa-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031760" comment="kernel-rt-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031761" comment="kernel-rt-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031762" comment="kernel-rt-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031764" comment="kernel-source-vanilla-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031765" comment="kernel-syms-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031766" comment="kernel-zfcpdump-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031767" comment="kselftests-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031768" comment="kselftests-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031769" comment="kselftests-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031770" comment="ocfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031771" comment="ocfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031772" comment="ocfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539757" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39757</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39757" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39757" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39757" ref_url="https://www.suse.com/security/cve/CVE-2025-39757" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:17760" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002101.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18297" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002123.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23947" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: usb-audio: Validate UAC3 cluster segment descriptors

UAC3 class segment descriptors need to be verified whether their sizes
match with the declared lengths and whether they fit with the
allocated buffer sizes, too.  Otherwise malicious firmware may lead to
the unexpected OOB accesses.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39757/">CVE-2025-39757 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39757">CVE-2025-39757 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249515">SUSE bug 1249515</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539758" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39758</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39758" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39758" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39758" ref_url="https://www.suse.com/security/cve/CVE-2025-39758" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/siw: Fix the sendmsg byte count in siw_tcp_sendpages

Ever since commit c2ff29e99a76 ("siw: Inline do_tcp_sendpages()"),
we have been doing this:

static int siw_tcp_sendpages(struct socket *s, struct page **page, int offset,
                             size_t size)
[...]
        /* Calculate the number of bytes we need to push, for this page
         * specifically */
        size_t bytes = min_t(size_t, PAGE_SIZE - offset, size);
        /* If we can't splice it, then copy it in, as normal */
        if (!sendpage_ok(page[i]))
                msg.msg_flags &amp;= ~MSG_SPLICE_PAGES;
        /* Set the bvec pointing to the page, with len $bytes */
        bvec_set_page(&amp;bvec, page[i], bytes, offset);
        /* Set the iter to $size, aka the size of the whole sendpages (!!!) */
        iov_iter_bvec(&amp;msg.msg_iter, ITER_SOURCE, &amp;bvec, 1, size);
try_page_again:
        lock_sock(sk);
        /* Sendmsg with $size size (!!!) */
        rv = tcp_sendmsg_locked(sk, &amp;msg, size);

This means we've been sending oversized iov_iters and tcp_sendmsg calls
for a while. This has a been a benign bug because sendpage_ok() always
returned true. With the recent slab allocator changes being slowly
introduced into next (that disallow sendpage on large kmalloc
allocations), we have recently hit out-of-bounds crashes, due to slight
differences in iov_iter behavior between the MSG_SPLICE_PAGES and
"regular" copy paths:

(MSG_SPLICE_PAGES)
skb_splice_from_iter
  iov_iter_extract_pages
    iov_iter_extract_bvec_pages
      uses i-&gt;nr_segs to correctly stop in its tracks before OoB'ing everywhere
  skb_splice_from_iter gets a "short" read

(!MSG_SPLICE_PAGES)
skb_copy_to_page_nocache copy=iov_iter_count
 [...]
   copy_from_iter
        /* this doesn't help */
        if (unlikely(iter-&gt;count &lt; len))
                len = iter-&gt;count;
          iterate_bvec
            ... and we run off the bvecs

Fix this by properly setting the iov_iter's byte count, plus sending the
correct byte count to tcp_sendmsg_locked.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39758/">CVE-2025-39758 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39758">CVE-2025-39758 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249490">SUSE bug 1249490</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539759" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39759</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39759" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39759" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39759" ref_url="https://www.suse.com/security/cve/CVE-2025-39759" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: qgroup: fix race between quota disable and quota rescan ioctl

There's a race between a task disabling quotas and another running the
rescan ioctl that can result in a use-after-free of qgroup records from
the fs_info-&gt;qgroup_tree rbtree.

This happens as follows:

1) Task A enters btrfs_ioctl_quota_rescan() -&gt; btrfs_qgroup_rescan();

2) Task B enters btrfs_quota_disable() and calls
   btrfs_qgroup_wait_for_completion(), which does nothing because at that
   point fs_info-&gt;qgroup_rescan_running is false (it wasn't set yet by
   task A);

3) Task B calls btrfs_free_qgroup_config() which starts freeing qgroups
   from fs_info-&gt;qgroup_tree without taking the lock fs_info-&gt;qgroup_lock;

4) Task A enters qgroup_rescan_zero_tracking() which starts iterating
   the fs_info-&gt;qgroup_tree tree while holding fs_info-&gt;qgroup_lock,
   but task B is freeing qgroup records from that tree without holding
   the lock, resulting in a use-after-free.

Fix this by taking fs_info-&gt;qgroup_lock at btrfs_free_qgroup_config().
Also at btrfs_qgroup_rescan() don't start the rescan worker if quotas
were already disabled.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:L/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39759/">CVE-2025-39759 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39759">CVE-2025-39759 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249522">SUSE bug 1249522</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539760" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39760</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39760" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39760" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39760" ref_url="https://www.suse.com/security/cve/CVE-2025-39760" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1662" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002457.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2212" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003185.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2759" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002619.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3685" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: core: config: Prevent OOB read in SS endpoint companion parsing

usb_parse_ss_endpoint_companion() checks descriptor type before length,
enabling a potentially odd read outside of the buffer size.

Fix this up by checking the size first before looking at any of the
fields in the descriptor.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39760/">CVE-2025-39760 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39760">CVE-2025-39760 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249598">SUSE bug 1249598</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539761" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39761</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39761" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39761" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39761" ref_url="https://www.suse.com/security/cve/CVE-2025-39761" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:17377" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath12k: Decrement TID on RX peer frag setup error handling

Currently, TID is not decremented before peer cleanup, during error
handling path of ath12k_dp_rx_peer_frag_setup(). This could lead to
out-of-bounds access in peer-&gt;rx_tid[].

Hence, add a decrement operation for TID, before peer cleanup to
ensures proper cleanup and prevents out-of-bounds access issues when
the RX peer frag setup fails.

Found during code review. Compile tested only.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39761/">CVE-2025-39761 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39761">CVE-2025-39761 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249554">SUSE bug 1249554</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249555">SUSE bug 1249555</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539763" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39763</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39763" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39763" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39763" ref_url="https://www.suse.com/security/cve/CVE-2025-39763" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ACPI: APEI: send SIGBUS to current task if synchronous memory error not recovered

If a synchronous error is detected as a result of user-space process
triggering a 2-bit uncorrected error, the CPU will take a synchronous
error exception such as Synchronous External Abort (SEA) on Arm64. The
kernel will queue a memory_failure() work which poisons the related
page, unmaps the page, and then sends a SIGBUS to the process, so that
a system wide panic can be avoided.

However, no memory_failure() work will be queued when abnormal
synchronous errors occur. These errors can include situations like
invalid PA, unexpected severity, no memory failure config support,
invalid GUID section, etc. In such a case, the user-space process will
trigger SEA again.  This loop can potentially exceed the platform
firmware threshold or even trigger a kernel hard lockup, leading to a
system reboot.

Fix it by performing a force kill if no memory_failure() work is queued
for synchronous errors.

[ rjw: Changelog edits ]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39763/">CVE-2025-39763 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39763">CVE-2025-39763 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249615">SUSE bug 1249615</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539764" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39764</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39764" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39764" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39764" ref_url="https://www.suse.com/security/cve/CVE-2025-39764" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: ctnetlink: remove refcounting in expectation dumpers

Same pattern as previous patch: do not keep the expectation object
alive via refcount, only store a cookie value and then use that
as the skip hint for dump resumption.

AFAICS this has the same issue as the one resolved in the conntrack
dumper, when we do
  if (!refcount_inc_not_zero(&amp;exp-&gt;use))

to increment the refcount, there is a chance that exp == last, which
causes a double-increment of the refcount and subsequent memory leak.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39764/">CVE-2025-39764 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39764">CVE-2025-39764 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249513">SUSE bug 1249513</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539765" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39765</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39765" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39765" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39765" ref_url="https://www.suse.com/security/cve/CVE-2025-39765" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: timer: fix ida_free call while not allocated

In the snd_utimer_create() function, if the kasprintf() function return
NULL, snd_utimer_put_id() will be called, finally use ida_free()
to free the unallocated id 0.

the syzkaller reported the following information:
  ------------[ cut here ]------------
  ida_free called for id=0 which is not allocated.
  WARNING: CPU: 1 PID: 1286 at lib/idr.c:592 ida_free+0x1fd/0x2f0 lib/idr.c:592
  Modules linked in:
  CPU: 1 UID: 0 PID: 1286 Comm: syz-executor164 Not tainted 6.15.8 #3 PREEMPT(lazy)
  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-4.fc42 04/01/2014
  RIP: 0010:ida_free+0x1fd/0x2f0 lib/idr.c:592
  Code: f8 fc 41 83 fc 3e 76 69 e8 70 b2 f8 (...)
  RSP: 0018:ffffc900007f79c8 EFLAGS: 00010282
  RAX: 0000000000000000 RBX: 1ffff920000fef3b RCX: ffffffff872176a5
  RDX: ffff88800369d200 RSI: 0000000000000000 RDI: ffff88800369d200
  RBP: 0000000000000000 R08: ffffffff87ba60a5 R09: 0000000000000000
  R10: 0000000000000001 R11: 0000000000000000 R12: 0000000000000000
  R13: 0000000000000002 R14: 0000000000000000 R15: 0000000000000000
  FS:  00007f6f1abc1740(0000) GS:ffff8880d76a0000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: 00007f6f1ad7a784 CR3: 000000007a6e2000 CR4: 00000000000006f0
  Call Trace:
   &lt;TASK&gt;
   snd_utimer_put_id sound/core/timer.c:2043 [inline] [snd_timer]
   snd_utimer_create+0x59b/0x6a0 sound/core/timer.c:2184 [snd_timer]
   snd_utimer_ioctl_create sound/core/timer.c:2202 [inline] [snd_timer]
   __snd_timer_user_ioctl.isra.0+0x724/0x1340 sound/core/timer.c:2287 [snd_timer]
   snd_timer_user_ioctl+0x75/0xc0 sound/core/timer.c:2298 [snd_timer]
   vfs_ioctl fs/ioctl.c:51 [inline]
   __do_sys_ioctl fs/ioctl.c:907 [inline]
   __se_sys_ioctl fs/ioctl.c:893 [inline]
   __x64_sys_ioctl+0x198/0x200 fs/ioctl.c:893
   do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
   do_syscall_64+0x7b/0x160 arch/x86/entry/syscall_64.c:94
   entry_SYSCALL_64_after_hwframe+0x76/0x7e
  [...]

The utimer-&gt;id should be set properly before the kasprintf() function,
ensures the snd_utimer_put_id() function will free the allocated id.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39765/">CVE-2025-39765 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39765">CVE-2025-39765 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249509">SUSE bug 1249509</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539766" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39766</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39766" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39766" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39766" ref_url="https://www.suse.com/security/cve/CVE-2025-39766" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: Make cake_enqueue return NET_XMIT_CN when past buffer_limit

The following setup can trigger a WARNING in htb_activate due to
the condition: !cl-&gt;leaf.q-&gt;q.qlen

tc qdisc del dev lo root
tc qdisc add dev lo root handle 1: htb default 1
tc class add dev lo parent 1: classid 1:1 \
       htb rate 64bit
tc qdisc add dev lo parent 1:1 handle f: \
       cake memlimit 1b
ping -I lo -f -c1 -s64 -W0.001 127.0.0.1

This is because the low memlimit leads to a low buffer_limit, which
causes packet dropping. However, cake_enqueue still returns
NET_XMIT_SUCCESS, causing htb_enqueue to call htb_activate with an
empty child qdisc. We should return NET_XMIT_CN when packets are
dropped from the same tin and flow.

I do not believe return value of NET_XMIT_CN is necessary for packet
drops in the case of ack filtering, as that is meant to optimize
performance, not to signal congestion.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39766/">CVE-2025-39766 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39766">CVE-2025-39766 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249510">SUSE bug 1249510</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539770" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39770</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39770" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39770" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39770" ref_url="https://www.suse.com/security/cve/CVE-2025-39770" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: gso: Forbid IPv6 TSO with extensions on devices with only IPV6_CSUM

When performing Generic Segmentation Offload (GSO) on an IPv6 packet that
contains extension headers, the kernel incorrectly requests checksum offload
if the egress device only advertises NETIF_F_IPV6_CSUM feature, which has
a strict contract: it supports checksum offload only for plain TCP or UDP
over IPv6 and explicitly does not support packets with extension headers.
The current GSO logic violates this contract by failing to disable the feature
for packets with extension headers, such as those used in GREoIPv6 tunnels.

This violation results in the device being asked to perform an operation
it cannot support, leading to a `skb_warn_bad_offload` warning and a collapse
of network throughput. While device TSO/USO is correctly bypassed in favor
of software GSO for these packets, the GSO stack must be explicitly told not
to request checksum offload.

Mask NETIF_F_IPV6_CSUM, NETIF_F_TSO6 and NETIF_F_GSO_UDP_L4
in gso_features_check if the IPv6 header contains extension headers to compute
checksum in software.

The exception is a BIG TCP extension, which, as stated in commit
68e068cabd2c6c53 ("net: reenable NETIF_F_IPV6_CSUM offload for BIG TCP packets"):
"The feature is only enabled on devices that support BIG TCP TSO.
The header is only present for PF_PACKET taps like tcpdump,
and not transmitted by physical devices."

kernel log output (truncated):
WARNING: CPU: 1 PID: 5273 at net/core/dev.c:3535 skb_warn_bad_offload+0x81/0x140
...
Call Trace:
 &lt;TASK&gt;
 skb_checksum_help+0x12a/0x1f0
 validate_xmit_skb+0x1a3/0x2d0
 validate_xmit_skb_list+0x4f/0x80
 sch_direct_xmit+0x1a2/0x380
 __dev_xmit_skb+0x242/0x670
 __dev_queue_xmit+0x3fc/0x7f0
 ip6_finish_output2+0x25e/0x5d0
 ip6_finish_output+0x1fc/0x3f0
 ip6_tnl_xmit+0x608/0xc00 [ip6_tunnel]
 ip6gre_tunnel_xmit+0x1c0/0x390 [ip6_gre]
 dev_hard_start_xmit+0x63/0x1c0
 __dev_queue_xmit+0x6d0/0x7f0
 ip6_finish_output2+0x214/0x5d0
 ip6_finish_output+0x1fc/0x3f0
 ip6_xmit+0x2ca/0x6f0
 ip6_finish_output+0x1fc/0x3f0
 ip6_xmit+0x2ca/0x6f0
 inet6_csk_xmit+0xeb/0x150
 __tcp_transmit_skb+0x555/0xa80
 tcp_write_xmit+0x32a/0xe90
 tcp_sendmsg_locked+0x437/0x1110
 tcp_sendmsg+0x2f/0x50
...
skb linear:   00000000: e4 3d 1a 7d ec 30 e4 3d 1a 7e 5d 90 86 dd 60 0e
skb linear:   00000010: 00 0a 1b 34 3c 40 20 11 00 00 00 00 00 00 00 00
skb linear:   00000020: 00 00 00 00 00 12 20 11 00 00 00 00 00 00 00 00
skb linear:   00000030: 00 00 00 00 00 11 2f 00 04 01 04 01 01 00 00 00
skb linear:   00000040: 86 dd 60 0e 00 0a 1b 00 06 40 20 23 00 00 00 00
skb linear:   00000050: 00 00 00 00 00 00 00 00 00 12 20 23 00 00 00 00
skb linear:   00000060: 00 00 00 00 00 00 00 00 00 11 bf 96 14 51 13 f9
skb linear:   00000070: ae 27 a0 a8 2b e3 80 18 00 40 5b 6f 00 00 01 01
skb linear:   00000080: 08 0a 42 d4 50 d5 4b 70 f8 1a
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39770/">CVE-2025-39770 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39770">CVE-2025-39770 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249508">SUSE bug 1249508</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39772</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39772" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39772" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39772" ref_url="https://www.suse.com/security/cve/CVE-2025-39772" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/hisilicon/hibmc: fix the hibmc loaded failed bug

When hibmc loaded failed, the driver use hibmc_unload to free the
resource, but the mutexes in mode.config are not init, which will
access an NULL pointer. Just change goto statement to return, because
hibnc_hw_init() doesn't need to free anything.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39772/">CVE-2025-39772 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39772">CVE-2025-39772 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249506">SUSE bug 1249506</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539773" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39773</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39773" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39773" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39773" ref_url="https://www.suse.com/security/cve/CVE-2025-39773" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: bridge: fix soft lockup in br_multicast_query_expired()

When set multicast_query_interval to a large value, the local variable
'time' in br_multicast_send_query() may overflow. If the time is smaller
than jiffies, the timer will expire immediately, and then call mod_timer()
again, which creates a loop and may trigger the following soft lockup
issue.

  watchdog: BUG: soft lockup - CPU#1 stuck for 221s! [rb_consumer:66]
  CPU: 1 UID: 0 PID: 66 Comm: rb_consumer Not tainted 6.16.0+ #259 PREEMPT(none)
  Call Trace:
   &lt;IRQ&gt;
   __netdev_alloc_skb+0x2e/0x3a0
   br_ip6_multicast_alloc_query+0x212/0x1b70
   __br_multicast_send_query+0x376/0xac0
   br_multicast_send_query+0x299/0x510
   br_multicast_query_expired.constprop.0+0x16d/0x1b0
   call_timer_fn+0x3b/0x2a0
   __run_timers+0x619/0x950
   run_timer_softirq+0x11c/0x220
   handle_softirqs+0x18e/0x560
   __irq_exit_rcu+0x158/0x1a0
   sysvec_apic_timer_interrupt+0x76/0x90
   &lt;/IRQ&gt;

This issue can be reproduced with:
  ip link add br0 type bridge
  echo 1 &gt; /sys/class/net/br0/bridge/multicast_querier
  echo 0xffffffffffffffff &gt;
  	/sys/class/net/br0/bridge/multicast_query_interval
  ip link set dev br0 up

The multicast_startup_query_interval can also cause this issue. Similar to
the commit 99b40610956a ("net: bridge: mcast: add and enforce query
interval minimum"), add check for the query interval maximum to fix this
issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39773/">CVE-2025-39773 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39773">CVE-2025-39773 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249504">SUSE bug 1249504</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39775</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39775" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39775" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39775" ref_url="https://www.suse.com/security/cve/CVE-2025-39775" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/mremap: fix WARN with uffd that has remap events disabled

Registering userfaultd on a VMA that spans at least one PMD and then
mremap()'ing that VMA can trigger a WARN when recovering from a failed
page table move due to a page table allocation error.

The code ends up doing the right thing (recurse, avoiding moving actual
page tables), but triggering that WARN is unpleasant:

WARNING: CPU: 2 PID: 6133 at mm/mremap.c:357 move_normal_pmd mm/mremap.c:357 [inline]
WARNING: CPU: 2 PID: 6133 at mm/mremap.c:357 move_pgt_entry mm/mremap.c:595 [inline]
WARNING: CPU: 2 PID: 6133 at mm/mremap.c:357 move_page_tables+0x3832/0x44a0 mm/mremap.c:852
Modules linked in:
CPU: 2 UID: 0 PID: 6133 Comm: syz.0.19 Not tainted 6.17.0-rc1-syzkaller-00004-g53e760d89498 #0 PREEMPT(full)
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
RIP: 0010:move_normal_pmd mm/mremap.c:357 [inline]
RIP: 0010:move_pgt_entry mm/mremap.c:595 [inline]
RIP: 0010:move_page_tables+0x3832/0x44a0 mm/mremap.c:852
Code: ...
RSP: 0018:ffffc900037a76d8 EFLAGS: 00010293
RAX: 0000000000000000 RBX: 0000000032930007 RCX: ffffffff820c6645
RDX: ffff88802e56a440 RSI: ffffffff820c7201 RDI: 0000000000000007
RBP: ffff888037728fc0 R08: 0000000000000007 R09: 0000000000000000
R10: 0000000032930007 R11: 0000000000000000 R12: 0000000000000000
R13: ffffc900037a79a8 R14: 0000000000000001 R15: dffffc0000000000
FS:  000055556316a500(0000) GS:ffff8880d68bc000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000001b30863fff CR3: 0000000050171000 CR4: 0000000000352ef0
Call Trace:
 &lt;TASK&gt;
 copy_vma_and_data+0x468/0x790 mm/mremap.c:1215
 move_vma+0x548/0x1780 mm/mremap.c:1282
 mremap_to+0x1b7/0x450 mm/mremap.c:1406
 do_mremap+0xfad/0x1f80 mm/mremap.c:1921
 __do_sys_mremap+0x119/0x170 mm/mremap.c:1977
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xcd/0x4c0 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f00d0b8ebe9
Code: ...
RSP: 002b:00007ffe5ea5ee98 EFLAGS: 00000246 ORIG_RAX: 0000000000000019
RAX: ffffffffffffffda RBX: 00007f00d0db5fa0 RCX: 00007f00d0b8ebe9
RDX: 0000000000400000 RSI: 0000000000c00000 RDI: 0000200000000000
RBP: 00007ffe5ea5eef0 R08: 0000200000c00000 R09: 0000000000000000
R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000002
R13: 00007f00d0db5fa0 R14: 00007f00d0db5fa0 R15: 0000000000000005
 &lt;/TASK&gt;

The underlying issue is that we recurse during the original page table
move, but not during the recovery move.

Fix it by checking for both VMAs and performing the check before the
pmd_none() sanity check.

Add a new helper where we perform+document that check for the PMD and PUD
level.

Thanks to Harry for bisecting.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39775/">CVE-2025-39775 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39775">CVE-2025-39775 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249500">SUSE bug 1249500</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539779" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39779</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39779" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39779" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39779" ref_url="https://www.suse.com/security/cve/CVE-2025-39779" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: subpage: keep TOWRITE tag until folio is cleaned

btrfs_subpage_set_writeback() calls folio_start_writeback() the first time
a folio is written back, and it also clears the PAGECACHE_TAG_TOWRITE tag
even if there are still dirty blocks in the folio. This can break ordering
guarantees, such as those required by btrfs_wait_ordered_extents().

That ordering breakage leads to a real failure. For example, running
generic/464 on a zoned setup will hit the following ASSERT. This happens
because the broken ordering fails to flush existing dirty pages before the
file size is truncated.

  assertion failed: !list_empty(&amp;ordered-&gt;list) :: 0, in fs/btrfs/zoned.c:1899
  ------------[ cut here ]------------
  kernel BUG at fs/btrfs/zoned.c:1899!
  Oops: invalid opcode: 0000 [#1] SMP NOPTI
  CPU: 2 UID: 0 PID: 1906169 Comm: kworker/u130:2 Kdump: loaded Not tainted 6.16.0-rc6-BTRFS-ZNS+ #554 PREEMPT(voluntary)
  Hardware name: Supermicro Super Server/H12SSL-NT, BIOS 2.0 02/22/2021
  Workqueue: btrfs-endio-write btrfs_work_helper [btrfs]
  RIP: 0010:btrfs_finish_ordered_zoned.cold+0x50/0x52 [btrfs]
  RSP: 0018:ffffc9002efdbd60 EFLAGS: 00010246
  RAX: 000000000000004c RBX: ffff88811923c4e0 RCX: 0000000000000000
  RDX: 0000000000000000 RSI: ffffffff827e38b1 RDI: 00000000ffffffff
  RBP: ffff88810005d000 R08: 00000000ffffdfff R09: ffffffff831051c8
  R10: ffffffff83055220 R11: 0000000000000000 R12: ffff8881c2458c00
  R13: ffff88811923c540 R14: ffff88811923c5e8 R15: ffff8881c1bd9680
  FS:  0000000000000000(0000) GS:ffff88a04acd0000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: 00007f907c7a918c CR3: 0000000004024000 CR4: 0000000000350ef0
  Call Trace:
   &lt;TASK&gt;
   ? srso_return_thunk+0x5/0x5f
   btrfs_finish_ordered_io+0x4a/0x60 [btrfs]
   btrfs_work_helper+0xf9/0x490 [btrfs]
   process_one_work+0x204/0x590
   ? srso_return_thunk+0x5/0x5f
   worker_thread+0x1d6/0x3d0
   ? __pfx_worker_thread+0x10/0x10
   kthread+0x118/0x230
   ? __pfx_kthread+0x10/0x10
   ret_from_fork+0x205/0x260
   ? __pfx_kthread+0x10/0x10
   ret_from_fork_asm+0x1a/0x30
   &lt;/TASK&gt;

Consider process A calling writepages() with WB_SYNC_NONE. In zoned mode or
for compressed writes, it locks several folios for delalloc and starts
writing them out. Let's call the last locked folio folio X. Suppose the
write range only partially covers folio X, leaving some pages dirty.
Process A calls btrfs_subpage_set_writeback() when building a bio. This
function call clears the TOWRITE tag of folio X, whose size = 8K and
the block size = 4K. It is following state.

   0     4K    8K
   |/////|/////|  (flag: DIRTY, tag: DIRTY)
   &lt;-----&gt; Process A will write this range.

Now suppose process B concurrently calls writepages() with WB_SYNC_ALL. It
calls tag_pages_for_writeback() to tag dirty folios with
PAGECACHE_TAG_TOWRITE. Since folio X is still dirty, it gets tagged. Then,
B collects tagged folios using filemap_get_folios_tag() and must wait for
folio X to be written before returning from writepages().

   0     4K    8K
   |/////|/////|  (flag: DIRTY, tag: DIRTY|TOWRITE)

However, between tagging and collecting, process A may call
btrfs_subpage_set_writeback() and clear folio X's TOWRITE tag.
   0     4K    8K
   |     |/////|  (flag: DIRTY|WRITEBACK, tag: DIRTY)

As a result, process B won't see folio X in its batch, and returns without
waiting for it. This breaks the WB_SYNC_ALL ordering requirement.

Fix this by using btrfs_subpage_set_writeback_keepwrite(), which retains
the TOWRITE tag. We now manually clear the tag only after the folio becomes
clean, via the xas operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39779/">CVE-2025-39779 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39779">CVE-2025-39779 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249495">SUSE bug 1249495</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031708" comment="cluster-md-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031709" comment="cluster-md-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031710" comment="cluster-md-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031711" comment="dlm-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031712" comment="dlm-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031713" comment="dlm-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031714" comment="dtb-allwinner-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031715" comment="dtb-altera-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031716" comment="dtb-amazon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031717" comment="dtb-amd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031718" comment="dtb-amlogic-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031719" comment="dtb-apm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031720" comment="dtb-apple-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031721" comment="dtb-arm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031722" comment="dtb-broadcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031723" comment="dtb-cavium-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031724" comment="dtb-exynos-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031725" comment="dtb-freescale-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031726" comment="dtb-hisilicon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031727" comment="dtb-lg-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031728" comment="dtb-marvell-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031729" comment="dtb-mediatek-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031730" comment="dtb-nvidia-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031731" comment="dtb-qcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031732" comment="dtb-renesas-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031733" comment="dtb-rockchip-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031734" comment="dtb-socionext-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031735" comment="dtb-sprd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031736" comment="dtb-xilinx-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031737" comment="gfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031738" comment="gfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031739" comment="gfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031742" comment="kernel-64kb-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031743" comment="kernel-64kb-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031747" comment="kernel-default-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031748" comment="kernel-default-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031750" comment="kernel-docs-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031751" comment="kernel-docs-html-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031752" comment="kernel-kvmsmall-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031754" comment="kernel-kvmsmall-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031756" comment="kernel-obs-build-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031757" comment="kernel-obs-qa-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031760" comment="kernel-rt-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031761" comment="kernel-rt-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031762" comment="kernel-rt-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031764" comment="kernel-source-vanilla-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031765" comment="kernel-syms-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031766" comment="kernel-zfcpdump-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031767" comment="kselftests-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031768" comment="kselftests-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031769" comment="kselftests-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031770" comment="ocfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031771" comment="ocfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031772" comment="ocfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539782" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39782</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39782" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39782" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39782" ref_url="https://www.suse.com/security/cve/CVE-2025-39782" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03602-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042174.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

jbd2: prevent softlockup in jbd2_log_do_checkpoint()

Both jbd2_log_do_checkpoint() and jbd2_journal_shrink_checkpoint_list()
periodically release j_list_lock after processing a batch of buffers to
avoid long hold times on the j_list_lock. However, since both functions
contend for j_list_lock, the combined time spent waiting and processing
can be significant.

jbd2_journal_shrink_checkpoint_list() explicitly calls cond_resched() when
need_resched() is true to avoid softlockups during prolonged operations.
But jbd2_log_do_checkpoint() only exits its loop when need_resched() is
true, relying on potentially sleeping functions like __flush_batch() or
wait_on_buffer() to trigger rescheduling. If those functions do not sleep,
the kernel may hit a softlockup.

watchdog: BUG: soft lockup - CPU#3 stuck for 156s! [kworker/u129:2:373]
CPU: 3 PID: 373 Comm: kworker/u129:2 Kdump: loaded Not tainted 6.6.0+ #10
Hardware name: Huawei TaiShan 2280 /BC11SPCD, BIOS 1.27 06/13/2017
Workqueue: writeback wb_workfn (flush-7:2)
pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : native_queued_spin_lock_slowpath+0x358/0x418
lr : jbd2_log_do_checkpoint+0x31c/0x438 [jbd2]
Call trace:
 native_queued_spin_lock_slowpath+0x358/0x418
 jbd2_log_do_checkpoint+0x31c/0x438 [jbd2]
 __jbd2_log_wait_for_space+0xfc/0x2f8 [jbd2]
 add_transaction_credits+0x3bc/0x418 [jbd2]
 start_this_handle+0xf8/0x560 [jbd2]
 jbd2__journal_start+0x118/0x228 [jbd2]
 __ext4_journal_start_sb+0x110/0x188 [ext4]
 ext4_do_writepages+0x3dc/0x740 [ext4]
 ext4_writepages+0xa4/0x190 [ext4]
 do_writepages+0x94/0x228
 __writeback_single_inode+0x48/0x318
 writeback_sb_inodes+0x204/0x590
 __writeback_inodes_wb+0x54/0xf8
 wb_writeback+0x2cc/0x3d8
 wb_do_writeback+0x2e0/0x2f8
 wb_workfn+0x80/0x2a8
 process_one_work+0x178/0x3e8
 worker_thread+0x234/0x3b8
 kthread+0xf0/0x108
 ret_from_fork+0x10/0x20

So explicitly call cond_resched() in jbd2_log_do_checkpoint() to avoid
softlockup.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39782/">CVE-2025-39782 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39782">CVE-2025-39782 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249526">SUSE bug 1249526</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539783" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39783</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39783" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39783" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39783" ref_url="https://www.suse.com/security/cve/CVE-2025-39783" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

PCI: endpoint: Fix configfs group list head handling

Doing a list_del() on the epf_group field of struct pci_epf_driver in
pci_epf_remove_cfs() is not correct as this field is a list head, not
a list entry. This list_del() call triggers a KASAN warning when an
endpoint function driver which has a configfs attribute group is torn
down:

==================================================================
BUG: KASAN: slab-use-after-free in pci_epf_remove_cfs+0x17c/0x198
Write of size 8 at addr ffff00010f4a0d80 by task rmmod/319

CPU: 3 UID: 0 PID: 319 Comm: rmmod Not tainted 6.16.0-rc2 #1 NONE
Hardware name: Radxa ROCK 5B (DT)
Call trace:
show_stack+0x2c/0x84 (C)
dump_stack_lvl+0x70/0x98
print_report+0x17c/0x538
kasan_report+0xb8/0x190
__asan_report_store8_noabort+0x20/0x2c
pci_epf_remove_cfs+0x17c/0x198
pci_epf_unregister_driver+0x18/0x30
nvmet_pci_epf_cleanup_module+0x24/0x30 [nvmet_pci_epf]
__arm64_sys_delete_module+0x264/0x424
invoke_syscall+0x70/0x260
el0_svc_common.constprop.0+0xac/0x230
do_el0_svc+0x40/0x58
el0_svc+0x48/0xdc
el0t_64_sync_handler+0x10c/0x138
el0t_64_sync+0x198/0x19c
...

Remove this incorrect list_del() call from pci_epf_remove_cfs().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39783/">CVE-2025-39783 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39783">CVE-2025-39783 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249486">SUSE bug 1249486</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539787" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39787</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39787" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39787" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39787" ref_url="https://www.suse.com/security/cve/CVE-2025-39787" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

soc: qcom: mdt_loader: Ensure we don't read past the ELF header

When the MDT loader is used in remoteproc, the ELF header is sanitized
beforehand, but that's not necessary the case for other clients.

Validate the size of the firmware buffer to ensure that we don't read
past the end as we iterate over the header. e_phentsize and e_shentsize
are validated as well, to ensure that the assumptions about step size in
the traversal are valid.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39787/">CVE-2025-39787 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39787">CVE-2025-39787 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249545">SUSE bug 1249545</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39788</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39788" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39788" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39788" ref_url="https://www.suse.com/security/cve/CVE-2025-39788" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: ufs: exynos: Fix programming of HCI_UTRL_NEXUS_TYPE

On Google gs101, the number of UTP transfer request slots (nutrs) is 32,
and in this case the driver ends up programming the UTRL_NEXUS_TYPE
incorrectly as 0.

This is because the left hand side of the shift is 1, which is of type
int, i.e. 31 bits wide. Shifting by more than that width results in
undefined behaviour.

Fix this by switching to the BIT() macro, which applies correct type
casting as required. This ensures the correct value is written to
UTRL_NEXUS_TYPE (0xffffffff on gs101), and it also fixes a UBSAN shift
warning:

    UBSAN: shift-out-of-bounds in drivers/ufs/host/ufs-exynos.c:1113:21
    shift exponent 32 is too large for 32-bit type 'int'

For consistency, apply the same change to the nutmrs / UTMRL_NEXUS_TYPE
write.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39788/">CVE-2025-39788 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39788">CVE-2025-39788 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249547">SUSE bug 1249547</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39790</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39790" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39790" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39790" ref_url="https://www.suse.com/security/cve/CVE-2025-39790" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bus: mhi: host: Detect events pointing to unexpected TREs

When a remote device sends a completion event to the host, it contains a
pointer to the consumed TRE. The host uses this pointer to process all of
the TREs between it and the host's local copy of the ring's read pointer.
This works when processing completion for chained transactions, but can
lead to nasty results if the device sends an event for a single-element
transaction with a read pointer that is multiple elements ahead of the
host's read pointer.

For instance, if the host accesses an event ring while the device is
updating it, the pointer inside of the event might still point to an old
TRE. If the host uses the channel's xfer_cb() to directly free the buffer
pointed to by the TRE, the buffer will be double-freed.

This behavior was observed on an ep that used upstream EP stack without
'commit 6f18d174b73d ("bus: mhi: ep: Update read pointer only after buffer
is written")'. Where the device updated the events ring pointer before
updating the event contents, so it left a window where the host was able to
access the stale data the event pointed to, before the device had the
chance to update them. The usual pattern was that the host received an
event pointing to a TRE that is not immediately after the last processed
one, so it got treated as if it was a chained transaction, processing all
of the TREs in between the two read pointers.

This commit aims to harden the host by ensuring transactions where the
event points to a TRE that isn't local_rp + 1 are chained.

[mani: added stable tag and reworded commit message]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39790/">CVE-2025-39790 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39790">CVE-2025-39790 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249548">SUSE bug 1249548</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1249549">SUSE bug 1249549</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539791" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39791</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39791" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39791" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39791" ref_url="https://www.suse.com/security/cve/CVE-2025-39791" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dm: dm-crypt: Do not partially accept write BIOs with zoned targets

Read and write operations issued to a dm-crypt target may be split
according to the dm-crypt internal limits defined by the max_read_size
and max_write_size module parameters (default is 128 KB). The intent is
to improve processing time of large BIOs by splitting them into smaller
operations that can be parallelized on different CPUs.

For zoned dm-crypt targets, this BIO splitting is still done but without
the parallel execution to ensure that the issuing order of write
operations to the underlying devices remains sequential. However, the
splitting itself causes other problems:

1) Since dm-crypt relies on the block layer zone write plugging to
   handle zone append emulation using regular write operations, the
   reminder of a split write BIO will always be plugged into the target
   zone write plugged. Once the on-going write BIO finishes, this
   reminder BIO is unplugged and issued from the zone write plug work.
   If this reminder BIO itself needs to be split, the reminder will be
   re-issued and plugged again, but that causes a call to a
   blk_queue_enter(), which may block if a queue freeze operation was
   initiated. This results in a deadlock as DM submission still holds
   BIOs that the queue freeze side is waiting for.

2) dm-crypt relies on the emulation done by the block layer using
   regular write operations for processing zone append operations. This
   still requires to properly return the written sector as the BIO
   sector of the original BIO. However, this can be done correctly only
   and only if there is a single clone BIO used for processing the
   original zone append operation issued by the user. If the size of a
   zone append operation is larger than dm-crypt max_write_size, then
   the orginal BIO will be split and processed as a chain of regular
   write operations. Such chaining result in an incorrect written sector
   being returned to the zone append issuer using the original BIO
   sector.  This in turn results in file system data corruptions using
   xfs or btrfs.

Fix this by modifying get_max_request_size() to always return the size
of the BIO to avoid it being split with dm_accpet_partial_bio() in
crypt_map(). get_max_request_size() is renamed to
get_max_request_sectors() to clarify the unit of the value returned
and its interface is changed to take a struct dm_target pointer and a
pointer to the struct bio being processed. In addition to this change,
to ensure that crypt_alloc_buffer() works correctly, set the dm-crypt
device max_hw_sectors limit to be at most
BIO_MAX_VECS &lt;&lt; PAGE_SECTORS_SHIFT (1 MB with a 4KB page architecture).
This forces DM core to split write BIOs before passing them to
crypt_map(), and thus guaranteeing that dm-crypt can always accept an
entire write BIO without needing to split it.

This change does not have any effect on the read path of dm-crypt. Read
operations can still be split and the BIO fragments processed in
parallel. There is also no impact on the performance of the write path
given that all zone write BIOs were already processed inline instead of
in parallel.

This change also does not affect in any way regular dm-crypt block
devices.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39791/">CVE-2025-39791 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39791">CVE-2025-39791 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249550">SUSE bug 1249550</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539792" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39792</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39792" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39792" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39792" ref_url="https://www.suse.com/security/cve/CVE-2025-39792" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dm: Always split write BIOs to zoned device limits

Any zoned DM target that requires zone append emulation will use the
block layer zone write plugging. In such case, DM target drivers must
not split BIOs using dm_accept_partial_bio() as doing so can potentially
lead to deadlocks with queue freeze operations. Regular write operations
used to emulate zone append operations also cannot be split by the
target driver as that would result in an invalid writen sector value
return using the BIO sector.

In order for zoned DM target drivers to avoid such incorrect BIO
splitting, we must ensure that large BIOs are split before being passed
to the map() function of the target, thus guaranteeing that the
limits for the mapped device are not exceeded.

dm-crypt and dm-flakey are the only target drivers supporting zoned
devices and using dm_accept_partial_bio().

In the case of dm-crypt, this function is used to split BIOs to the
internal max_write_size limit (which will be suppressed in a different
patch). However, since crypt_alloc_buffer() uses a bioset allowing only
up to BIO_MAX_VECS (256) vectors in a BIO. The dm-crypt device
max_segments limit, which is not set and so default to BLK_MAX_SEGMENTS
(128), must thus be respected and write BIOs split accordingly.

In the case of dm-flakey, since zone append emulation is not required,
the block layer zone write plugging is not used and no splitting of BIOs
required.

Modify the function dm_zone_bio_needs_split() to use the block layer
helper function bio_needs_zone_write_plugging() to force a call to
bio_split_to_limits() in dm_split_and_process_bio(). This allows DM
target drivers to avoid using dm_accept_partial_bio() for write
operations on zoned DM devices.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39792/">CVE-2025-39792 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39792">CVE-2025-39792 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249618">SUSE bug 1249618</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539795" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39795</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39795" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39795" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39795" ref_url="https://www.suse.com/security/cve/CVE-2025-39795" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

block: avoid possible overflow for chunk_sectors check in blk_stack_limits()

In blk_stack_limits(), we check that the t-&gt;chunk_sectors value is a
multiple of the t-&gt;physical_block_size value.

However, by finding the chunk_sectors value in bytes, we may overflow
the unsigned int which holds chunk_sectors, so change the check to be
based on sectors.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39795/">CVE-2025-39795 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39795">CVE-2025-39795 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249609">SUSE bug 1249609</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39797</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39797" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39797" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39797" ref_url="https://www.suse.com/security/cve/CVE-2025-39797" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xfrm: Duplicate SPI Handling

The issue originates when Strongswan initiates an XFRM_MSG_ALLOCSPI
Netlink message, which triggers the kernel function xfrm_alloc_spi().
This function is expected to ensure uniqueness of the Security Parameter
Index (SPI) for inbound Security Associations (SAs). However, it can
return success even when the requested SPI is already in use, leading
to duplicate SPIs assigned to multiple inbound SAs, differentiated
only by their destination addresses.

This behavior causes inconsistencies during SPI lookups for inbound packets.
Since the lookup may return an arbitrary SA among those with the same SPI,
packet processing can fail, resulting in packet drops.

According to RFC 4301 section 4.4.2 , for inbound processing a unicast SA
is uniquely identified by the SPI and optionally protocol.

Reproducing the Issue Reliably:
To consistently reproduce the problem, restrict the available SPI range in
charon.conf : spi_min = 0x10000000 spi_max = 0x10000002
This limits the system to only 2 usable SPI values.
Next, create more than 2 Child SA. each using unique pair of src/dst address.
As soon as the 3rd Child SA is initiated, it will be assigned a duplicate
SPI, since the SPI pool is already exhausted.
With a narrow SPI range, the issue is consistently reproducible.
With a broader/default range, it becomes rare and unpredictable.

Current implementation:
xfrm_spi_hash() lookup function computes hash using daddr, proto, and family.
So if two SAs have the same SPI but different destination addresses, then
they will:
a. Hash into different buckets
b. Be stored in different linked lists (byspi + h)
c. Not be seen in the same hlist_for_each_entry_rcu() iteration.
As a result, the lookup will result in NULL and kernel allows that Duplicate SPI

Proposed Change:
xfrm_state_lookup_spi_proto() does a truly global search - across all states,
regardless of hash bucket and matches SPI and proto.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39797/">CVE-2025-39797 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39797">CVE-2025-39797 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249608">SUSE bug 1249608</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031708" comment="cluster-md-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031709" comment="cluster-md-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031710" comment="cluster-md-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031711" comment="dlm-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031712" comment="dlm-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031713" comment="dlm-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031714" comment="dtb-allwinner-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031715" comment="dtb-altera-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031716" comment="dtb-amazon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031717" comment="dtb-amd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031718" comment="dtb-amlogic-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031719" comment="dtb-apm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031720" comment="dtb-apple-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031721" comment="dtb-arm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031722" comment="dtb-broadcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031723" comment="dtb-cavium-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031724" comment="dtb-exynos-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031725" comment="dtb-freescale-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031726" comment="dtb-hisilicon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031727" comment="dtb-lg-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031728" comment="dtb-marvell-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031729" comment="dtb-mediatek-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031730" comment="dtb-nvidia-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031731" comment="dtb-qcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031732" comment="dtb-renesas-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031733" comment="dtb-rockchip-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031734" comment="dtb-socionext-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031735" comment="dtb-sprd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031736" comment="dtb-xilinx-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031737" comment="gfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031738" comment="gfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031739" comment="gfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031742" comment="kernel-64kb-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031743" comment="kernel-64kb-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031747" comment="kernel-default-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031748" comment="kernel-default-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031750" comment="kernel-docs-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031751" comment="kernel-docs-html-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031752" comment="kernel-kvmsmall-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031754" comment="kernel-kvmsmall-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031756" comment="kernel-obs-build-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031757" comment="kernel-obs-qa-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031760" comment="kernel-rt-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031761" comment="kernel-rt-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031762" comment="kernel-rt-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031764" comment="kernel-source-vanilla-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031765" comment="kernel-syms-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031766" comment="kernel-zfcpdump-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031767" comment="kselftests-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031768" comment="kselftests-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031769" comment="kselftests-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031770" comment="ocfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031771" comment="ocfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031772" comment="ocfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39798</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39798" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39798" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39798" ref_url="https://www.suse.com/security/cve/CVE-2025-39798" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFS: Fix the setting of capabilities when automounting a new filesystem

Capabilities cannot be inherited when we cross into a new filesystem.
They need to be reset to the minimal defaults, and then probed for
again.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39798/">CVE-2025-39798 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39798">CVE-2025-39798 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249774">SUSE bug 1249774</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39800</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39800" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39800" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39800" ref_url="https://www.suse.com/security/cve/CVE-2025-39800" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: abort transaction on unexpected eb generation at btrfs_copy_root()

If we find an unexpected generation for the extent buffer we are cloning
at btrfs_copy_root(), we just WARN_ON() and don't error out and abort the
transaction, meaning we allow to persist metadata with an unexpected
generation. Instead of warning only, abort the transaction and return
-EUCLEAN.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39800/">CVE-2025-39800 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39800">CVE-2025-39800 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250177">SUSE bug 1250177</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39801</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39801" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39801" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39801" ref_url="https://www.suse.com/security/cve/CVE-2025-39801" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: dwc3: Remove WARN_ON for device endpoint command timeouts

This commit addresses a rarely observed endpoint command timeout
which causes kernel panic due to warn when 'panic_on_warn' is enabled
and unnecessary call trace prints when 'panic_on_warn' is disabled.
It is seen during fast software-controlled connect/disconnect testcases.
The following is one such endpoint command timeout that we observed:

1. Connect
   =======
-&gt;dwc3_thread_interrupt
 -&gt;dwc3_ep0_interrupt
  -&gt;configfs_composite_setup
   -&gt;composite_setup
    -&gt;usb_ep_queue
     -&gt;dwc3_gadget_ep0_queue
      -&gt;__dwc3_gadget_ep0_queue
       -&gt;__dwc3_ep0_do_control_data
        -&gt;dwc3_send_gadget_ep_cmd

2. Disconnect
   ==========
-&gt;dwc3_thread_interrupt
 -&gt;dwc3_gadget_disconnect_interrupt
  -&gt;dwc3_ep0_reset_state
   -&gt;dwc3_ep0_end_control_data
    -&gt;dwc3_send_gadget_ep_cmd

In the issue scenario, in Exynos platforms, we observed that control
transfers for the previous connect have not yet been completed and end
transfer command sent as a part of the disconnect sequence and
processing of USB_ENDPOINT_HALT feature request from the host timeout.
This maybe an expected scenario since the controller is processing EP
commands sent as a part of the previous connect. It maybe better to
remove WARN_ON in all places where device endpoint commands are sent to
avoid unnecessary kernel panic due to warn.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39801/">CVE-2025-39801 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39801">CVE-2025-39801 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250450">SUSE bug 1250450</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39805</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39805" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39805" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39805" ref_url="https://www.suse.com/security/cve/CVE-2025-39805" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: macb: fix unregister_netdev call order in macb_remove()

When removing a macb device, the driver calls phy_exit() before
unregister_netdev(). This leads to a WARN from kernfs:

  ------------[ cut here ]------------
  kernfs: can not remove 'attached_dev', no directory
  WARNING: CPU: 1 PID: 27146 at fs/kernfs/dir.c:1683
  Call trace:
    kernfs_remove_by_name_ns+0xd8/0xf0
    sysfs_remove_link+0x24/0x58
    phy_detach+0x5c/0x168
    phy_disconnect+0x4c/0x70
    phylink_disconnect_phy+0x6c/0xc0 [phylink]
    macb_close+0x6c/0x170 [macb]
    ...
    macb_remove+0x60/0x168 [macb]
    platform_remove+0x5c/0x80
    ...

The warning happens because the PHY is being exited while the netdev
is still registered. The correct order is to unregister the netdev
before shutting down the PHY and cleaning up the MDIO bus.

Fix this by moving unregister_netdev() ahead of phy_exit() in
macb_remove().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39805/">CVE-2025-39805 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39805">CVE-2025-39805 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249982">SUSE bug 1249982</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539806" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39806</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39806" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39806" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39806" ref_url="https://www.suse.com/security/cve/CVE-2025-39806" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0445" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: multitouch: fix slab out-of-bounds access in mt_report_fixup()

A malicious HID device can trigger a slab out-of-bounds during
mt_report_fixup() by passing in report descriptor smaller than
607 bytes. mt_report_fixup() attempts to patch byte offset 607
of the descriptor with 0x25 by first checking if byte offset
607 is 0x15 however it lacks bounds checks to verify if the
descriptor is big enough before conducting this check. Fix
this bug by ensuring the descriptor size is at least 608
bytes before accessing it.

Below is the KASAN splat after the out of bounds access happens:

[   13.671954] ==================================================================
[   13.672667] BUG: KASAN: slab-out-of-bounds in mt_report_fixup+0x103/0x110
[   13.673297] Read of size 1 at addr ffff888103df39df by task kworker/0:1/10
[   13.673297]
[   13.673297] CPU: 0 UID: 0 PID: 10 Comm: kworker/0:1 Not tainted 6.15.0-00005-gec5d573d83f4-dirty #3
[   13.673297] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/04
[   13.673297] Call Trace:
[   13.673297]  &lt;TASK&gt;
[   13.673297]  dump_stack_lvl+0x5f/0x80
[   13.673297]  print_report+0xd1/0x660
[   13.673297]  kasan_report+0xe5/0x120
[   13.673297]  __asan_report_load1_noabort+0x18/0x20
[   13.673297]  mt_report_fixup+0x103/0x110
[   13.673297]  hid_open_report+0x1ef/0x810
[   13.673297]  mt_probe+0x422/0x960
[   13.673297]  hid_device_probe+0x2e2/0x6f0
[   13.673297]  really_probe+0x1c6/0x6b0
[   13.673297]  __driver_probe_device+0x24f/0x310
[   13.673297]  driver_probe_device+0x4e/0x220
[   13.673297]  __device_attach_driver+0x169/0x320
[   13.673297]  bus_for_each_drv+0x11d/0x1b0
[   13.673297]  __device_attach+0x1b8/0x3e0
[   13.673297]  device_initial_probe+0x12/0x20
[   13.673297]  bus_probe_device+0x13d/0x180
[   13.673297]  device_add+0xe3a/0x1670
[   13.673297]  hid_add_device+0x31d/0xa40
[...]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39806/">CVE-2025-39806 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39806">CVE-2025-39806 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249888">SUSE bug 1249888</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39807</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39807" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39807" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39807" ref_url="https://www.suse.com/security/cve/CVE-2025-39807" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/mediatek: Add error handling for old state CRTC in atomic_disable

Introduce error handling to address an issue where, after a hotplug
event, the cursor continues to update. This situation can lead to a
kernel panic due to accessing the NULL `old_state-&gt;crtc`.

E,g.
Unable to handle kernel NULL pointer dereference at virtual address
Call trace:
 mtk_crtc_plane_disable+0x24/0x140
 mtk_plane_atomic_update+0x8c/0xa8
 drm_atomic_helper_commit_planes+0x114/0x2c8
 drm_atomic_helper_commit_tail_rpm+0x4c/0x158
 commit_tail+0xa0/0x168
 drm_atomic_helper_commit+0x110/0x120
 drm_atomic_commit+0x8c/0xe0
 drm_atomic_helper_update_plane+0xd4/0x128
 __setplane_atomic+0xcc/0x110
 drm_mode_cursor_common+0x250/0x440
 drm_mode_cursor_ioctl+0x44/0x70
 drm_ioctl+0x264/0x5d8
 __arm64_sys_ioctl+0xd8/0x510
 invoke_syscall+0x6c/0xe0
 do_el0_svc+0x68/0xe8
 el0_svc+0x34/0x60
 el0t_64_sync_handler+0x1c/0xf8
 el0t_64_sync+0x180/0x188

Adding NULL pointer checks to ensure stability by preventing operations
on an invalid CRTC state.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39807/">CVE-2025-39807 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39807">CVE-2025-39807 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249887">SUSE bug 1249887</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539808" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39808</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39808" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39808" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39808" ref_url="https://www.suse.com/security/cve/CVE-2025-39808" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: hid-ntrig: fix unable to handle page fault in ntrig_report_version()

in ntrig_report_version(), hdev parameter passed from hid_probe().
sending descriptor to /dev/uhid can make hdev-&gt;dev.parent-&gt;parent to null
if hdev-&gt;dev.parent-&gt;parent is null, usb_dev has
invalid address(0xffffffffffffff58) that hid_to_usb_dev(hdev) returned
when usb_rcvctrlpipe() use usb_dev,it trigger
page fault error for address(0xffffffffffffff58)

add null check logic to ntrig_report_version()
before calling hid_to_usb_dev()
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39808/">CVE-2025-39808 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39808">CVE-2025-39808 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250088">SUSE bug 1250088</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39810</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39810" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39810" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39810" ref_url="https://www.suse.com/security/cve/CVE-2025-39810" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bnxt_en: Fix memory corruption when FW resources change during ifdown

bnxt_set_dflt_rings() assumes that it is always called before any TC has
been created.  So it doesn't take bp-&gt;num_tc into account and assumes
that it is always 0 or 1.

In the FW resource or capability change scenario, the FW will return
flags in bnxt_hwrm_if_change() that will cause the driver to
reinitialize and call bnxt_cancel_reservations().  This will lead to
bnxt_init_dflt_ring_mode() calling bnxt_set_dflt_rings() and bp-&gt;num_tc
may be greater than 1.  This will cause bp-&gt;tx_ring[] to be sized too
small and cause memory corruption in bnxt_alloc_cp_rings().

Fix it by properly scaling the TX rings by bp-&gt;num_tc in the code
paths mentioned above.  Add 2 helper functions to determine
bp-&gt;tx_nr_rings and bp-&gt;tx_nr_rings_per_tc.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39810/">CVE-2025-39810 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39810">CVE-2025-39810 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249975">SUSE bug 1249975</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539811" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39811</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39811" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39811" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39811" ref_url="https://www.suse.com/security/cve/CVE-2025-39811" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/xe/vm: Clear the scratch_pt pointer on error

Avoid triggering a dereference of an error pointer on cleanup in
xe_vm_free_scratch() by clearing any scratch_pt error pointer.

(cherry picked from commit 358ee50ab565f3c8ea32480e9d03127a81ba32f8)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39811/">CVE-2025-39811 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39811">CVE-2025-39811 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249915">SUSE bug 1249915</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539812" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39812</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39812" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39812" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39812" ref_url="https://www.suse.com/security/cve/CVE-2025-39812" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sctp: initialize more fields in sctp_v6_from_sk()

syzbot found that sin6_scope_id was not properly initialized,
leading to undefined behavior.

Clear sin6_scope_id and sin6_flowinfo.

BUG: KMSAN: uninit-value in __sctp_v6_cmp_addr+0x887/0x8c0 net/sctp/ipv6.c:649
  __sctp_v6_cmp_addr+0x887/0x8c0 net/sctp/ipv6.c:649
  sctp_inet6_cmp_addr+0x4f2/0x510 net/sctp/ipv6.c:983
  sctp_bind_addr_conflict+0x22a/0x3b0 net/sctp/bind_addr.c:390
  sctp_get_port_local+0x21eb/0x2440 net/sctp/socket.c:8452
  sctp_get_port net/sctp/socket.c:8523 [inline]
  sctp_listen_start net/sctp/socket.c:8567 [inline]
  sctp_inet_listen+0x710/0xfd0 net/sctp/socket.c:8636
  __sys_listen_socket net/socket.c:1912 [inline]
  __sys_listen net/socket.c:1927 [inline]
  __do_sys_listen net/socket.c:1932 [inline]
  __se_sys_listen net/socket.c:1930 [inline]
  __x64_sys_listen+0x343/0x4c0 net/socket.c:1930
  x64_sys_call+0x271d/0x3e20 arch/x86/include/generated/asm/syscalls_64.h:51
  do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
  do_syscall_64+0xd9/0x210 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

Local variable addr.i.i created at:
  sctp_get_port net/sctp/socket.c:8515 [inline]
  sctp_listen_start net/sctp/socket.c:8567 [inline]
  sctp_inet_listen+0x650/0xfd0 net/sctp/socket.c:8636
  __sys_listen_socket net/socket.c:1912 [inline]
  __sys_listen net/socket.c:1927 [inline]
  __do_sys_listen net/socket.c:1932 [inline]
  __se_sys_listen net/socket.c:1930 [inline]
  __x64_sys_listen+0x343/0x4c0 net/socket.c:1930
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39812/">CVE-2025-39812 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39812">CVE-2025-39812 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250202">SUSE bug 1250202</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031708" comment="cluster-md-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031709" comment="cluster-md-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031710" comment="cluster-md-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031711" comment="dlm-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031712" comment="dlm-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031713" comment="dlm-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031714" comment="dtb-allwinner-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031715" comment="dtb-altera-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031716" comment="dtb-amazon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031717" comment="dtb-amd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031718" comment="dtb-amlogic-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031719" comment="dtb-apm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031720" comment="dtb-apple-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031721" comment="dtb-arm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031722" comment="dtb-broadcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031723" comment="dtb-cavium-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031724" comment="dtb-exynos-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031725" comment="dtb-freescale-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031726" comment="dtb-hisilicon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031727" comment="dtb-lg-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031728" comment="dtb-marvell-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031729" comment="dtb-mediatek-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031730" comment="dtb-nvidia-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031731" comment="dtb-qcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031732" comment="dtb-renesas-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031733" comment="dtb-rockchip-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031734" comment="dtb-socionext-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031735" comment="dtb-sprd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031736" comment="dtb-xilinx-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031737" comment="gfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031738" comment="gfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031739" comment="gfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031742" comment="kernel-64kb-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031743" comment="kernel-64kb-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031747" comment="kernel-default-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031748" comment="kernel-default-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031750" comment="kernel-docs-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031751" comment="kernel-docs-html-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031752" comment="kernel-kvmsmall-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031754" comment="kernel-kvmsmall-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031756" comment="kernel-obs-build-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031757" comment="kernel-obs-qa-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031760" comment="kernel-rt-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031761" comment="kernel-rt-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031762" comment="kernel-rt-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031764" comment="kernel-source-vanilla-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031765" comment="kernel-syms-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031766" comment="kernel-zfcpdump-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031767" comment="kselftests-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031768" comment="kselftests-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031769" comment="kselftests-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031770" comment="ocfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031771" comment="ocfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031772" comment="ocfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39813</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39813" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39813" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39813" ref_url="https://www.suse.com/security/cve/CVE-2025-39813" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ftrace: Fix potential warning in trace_printk_seq during ftrace_dump

When calling ftrace_dump_one() concurrently with reading trace_pipe,
a WARN_ON_ONCE() in trace_printk_seq() can be triggered due to a race
condition.

The issue occurs because:

CPU0 (ftrace_dump)                              CPU1 (reader)
echo z &gt; /proc/sysrq-trigger

!trace_empty(&amp;iter)
trace_iterator_reset(&amp;iter) &lt;- len = size = 0
                                                cat /sys/kernel/tracing/trace_pipe
trace_find_next_entry_inc(&amp;iter)
  __find_next_entry
    ring_buffer_empty_cpu &lt;- all empty
  return NULL

trace_printk_seq(&amp;iter.seq)
  WARN_ON_ONCE(s-&gt;seq.len &gt;= s-&gt;seq.size)

In the context between trace_empty() and trace_find_next_entry_inc()
during ftrace_dump, the ring buffer data was consumed by other readers.
This caused trace_find_next_entry_inc to return NULL, failing to populate
`iter.seq`. At this point, due to the prior trace_iterator_reset, both
`iter.seq.len` and `iter.seq.size` were set to 0. Since they are equal,
the WARN_ON_ONCE condition is triggered.

Move the trace_printk_seq() into the if block that checks to make sure the
return value of trace_find_next_entry_inc() is non-NULL in
ftrace_dump_one(), ensuring the 'iter.seq' is properly populated before
subsequent operations.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39813/">CVE-2025-39813 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39813">CVE-2025-39813 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250032">SUSE bug 1250032</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39814</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39814" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39814" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39814" ref_url="https://www.suse.com/security/cve/CVE-2025-39814" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: fix NULL pointer dereference in ice_unplug_aux_dev() on reset

Issuing a reset when the driver is loaded without RDMA support, will
results in a crash as it attempts to remove RDMA's non-existent auxbus
device:
echo 1 &gt; /sys/class/net/&lt;if&gt;/device/reset

BUG: kernel NULL pointer dereference, address: 0000000000000008
...
RIP: 0010:ice_unplug_aux_dev+0x29/0x70 [ice]
...
Call Trace:
&lt;TASK&gt;
ice_prepare_for_reset+0x77/0x260 [ice]
pci_dev_save_and_disable+0x2c/0x70
pci_reset_function+0x88/0x130
reset_store+0x5a/0xa0
kernfs_fop_write_iter+0x15e/0x210
vfs_write+0x273/0x520
ksys_write+0x6b/0xe0
do_syscall_64+0x79/0x3b0
entry_SYSCALL_64_after_hwframe+0x76/0x7e

ice_unplug_aux_dev() checks pf-&gt;cdev_info-&gt;adev for NULL pointer, but
pf-&gt;cdev_info will also be NULL, leading to the deref in the trace above.

Introduce a flag to be set when the creation of the auxbus device is
successful, to avoid multiple NULL pointer checks in ice_unplug_aux_dev().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39814/">CVE-2025-39814 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39814">CVE-2025-39814 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249895">SUSE bug 1249895</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39816</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39816" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39816" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39816" ref_url="https://www.suse.com/security/cve/CVE-2025-39816" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

io_uring/kbuf: always use READ_ONCE() to read ring provided buffer lengths

Since the buffers are mapped from userspace, it is prudent to use
READ_ONCE() to read the value into a local variable, and use that for
any other actions taken. Having a stable read of the buffer length
avoids worrying about it changing after checking, or being read multiple
times.

Similarly, the buffer may well change in between it being picked and
being committed. Ensure the looping for incremental ring buffer commit
stops if it hits a zero sized buffer, as no further progress can be made
at that point.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39816/">CVE-2025-39816 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39816">CVE-2025-39816 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249906">SUSE bug 1249906</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39817</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39817" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39817" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39817" ref_url="https://www.suse.com/security/cve/CVE-2025-39817" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:18281" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002120.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19102" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002136.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3685" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

efivarfs: Fix slab-out-of-bounds in efivarfs_d_compare

Observed on kernel 6.6 (present on master as well):

  BUG: KASAN: slab-out-of-bounds in memcmp+0x98/0xd0
  Call trace:
   kasan_check_range+0xe8/0x190
   __asan_loadN+0x1c/0x28
   memcmp+0x98/0xd0
   efivarfs_d_compare+0x68/0xd8
   __d_lookup_rcu_op_compare+0x178/0x218
   __d_lookup_rcu+0x1f8/0x228
   d_alloc_parallel+0x150/0x648
   lookup_open.isra.0+0x5f0/0x8d0
   open_last_lookups+0x264/0x828
   path_openat+0x130/0x3f8
   do_filp_open+0x114/0x248
   do_sys_openat2+0x340/0x3c0
   __arm64_sys_openat+0x120/0x1a0

If dentry-&gt;d_name.len &lt; EFI_VARIABLE_GUID_LEN , 'guid' can become
negative, leadings to oob. The issue can be triggered by parallel
lookups using invalid filename:

  T1			T2
  lookup_open
   -&gt;lookup
    simple_lookup
     d_add
     // invalid dentry is added to hash list

			lookup_open
			 d_alloc_parallel
			  __d_lookup_rcu
			   __d_lookup_rcu_op_compare
			    hlist_bl_for_each_entry_rcu
			    // invalid dentry can be retrieved
			     -&gt;d_compare
			      efivarfs_d_compare
			      // oob

Fix it by checking 'guid' before cmp.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39817/">CVE-2025-39817 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39817">CVE-2025-39817 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249998">SUSE bug 1249998</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39819</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39819" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39819" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39819" ref_url="https://www.suse.com/security/cve/CVE-2025-39819" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:19105" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs/smb: Fix inconsistent refcnt update

A possible inconsistent update of refcount was identified in `smb2_compound_op`.
Such inconsistent update could lead to possible resource leaks.

Why it is a possible bug:
1. In the comment section of the function, it clearly states that the
reference to `cfile` should be dropped after calling this function.
2. Every control flow path would check and drop the reference to
`cfile`, except the patched one.
3. Existing callers would not handle refcount update of `cfile` if
-ENOMEM is returned.

To fix the bug, an extra goto label "out" is added, to make sure that the
cleanup logic would always be respected. As the problem is caused by the
allocation failure of `vars`, the cleanup logic between label "finished"
and "out" can be safely ignored. According to the definition of function
`is_replayable_error`, the error code of "-ENOMEM" is not recoverable.
Therefore, the replay logic also gets ignored.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39819/">CVE-2025-39819 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39819">CVE-2025-39819 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250176">SUSE bug 1250176</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539822" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39822</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39822" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39822" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39822" ref_url="https://www.suse.com/security/cve/CVE-2025-39822" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

io_uring/kbuf: fix signedness in this_len calculation

When importing and using buffers, buf-&gt;len is considered unsigned.
However, buf-&gt;len is converted to signed int when committing. This can
lead to unexpected behavior if the buffer is large enough to be
interpreted as a negative value. Make min_t calculation unsigned.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39822/">CVE-2025-39822 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39822">CVE-2025-39822 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250034">SUSE bug 1250034</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539823" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39823</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39823" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39823" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39823" ref_url="https://www.suse.com/security/cve/CVE-2025-39823" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03626-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042188.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: x86: use array_index_nospec with indices that come from guest

min and dest_id are guest-controlled indices. Using array_index_nospec()
after the bounds checks clamps these values to mitigate speculative execution
side-channels.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39823/">CVE-2025-39823 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39823">CVE-2025-39823 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250002">SUSE bug 1250002</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539824" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39824</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39824" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39824" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39824" ref_url="https://www.suse.com/security/cve/CVE-2025-39824" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: asus: fix UAF via HID_CLAIMED_INPUT validation

After hid_hw_start() is called hidinput_connect() will eventually be
called to set up the device with the input layer since the
HID_CONNECT_DEFAULT connect mask is used. During hidinput_connect()
all input and output reports are processed and corresponding hid_inputs
are allocated and configured via hidinput_configure_usages(). This
process involves slot tagging report fields and configuring usages
by setting relevant bits in the capability bitmaps. However it is possible
that the capability bitmaps are not set at all leading to the subsequent
hidinput_has_been_populated() check to fail leading to the freeing of the
hid_input and the underlying input device.

This becomes problematic because a malicious HID device like a
ASUS ROG N-Key keyboard can trigger the above scenario via a
specially crafted descriptor which then leads to a user-after-free
when the name of the freed input device is written to later on after
hid_hw_start(). Below, report 93 intentionally utilises the
HID_UP_UNDEFINED Usage Page which is skipped during usage
configuration, leading to the frees.

0x05, 0x0D,        // Usage Page (Digitizer)
0x09, 0x05,        // Usage (Touch Pad)
0xA1, 0x01,        // Collection (Application)
0x85, 0x0D,        //   Report ID (13)
0x06, 0x00, 0xFF,  //   Usage Page (Vendor Defined 0xFF00)
0x09, 0xC5,        //   Usage (0xC5)
0x15, 0x00,        //   Logical Minimum (0)
0x26, 0xFF, 0x00,  //   Logical Maximum (255)
0x75, 0x08,        //   Report Size (8)
0x95, 0x04,        //   Report Count (4)
0xB1, 0x02,        //   Feature (Data,Var,Abs)
0x85, 0x5D,        //   Report ID (93)
0x06, 0x00, 0x00,  //   Usage Page (Undefined)
0x09, 0x01,        //   Usage (0x01)
0x15, 0x00,        //   Logical Minimum (0)
0x26, 0xFF, 0x00,  //   Logical Maximum (255)
0x75, 0x08,        //   Report Size (8)
0x95, 0x1B,        //   Report Count (27)
0x81, 0x02,        //   Input (Data,Var,Abs)
0xC0,              // End Collection

Below is the KASAN splat after triggering the UAF:

[   21.672709] ==================================================================
[   21.673700] BUG: KASAN: slab-use-after-free in asus_probe+0xeeb/0xf80
[   21.673700] Write of size 8 at addr ffff88810a0ac000 by task kworker/1:2/54
[   21.673700]
[   21.673700] CPU: 1 UID: 0 PID: 54 Comm: kworker/1:2 Not tainted 6.16.0-rc4-g9773391cf4dd-dirty #36 PREEMPT(voluntary)
[   21.673700] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014
[   21.673700] Call Trace:
[   21.673700]  &lt;TASK&gt;
[   21.673700]  dump_stack_lvl+0x5f/0x80
[   21.673700]  print_report+0xd1/0x660
[   21.673700]  kasan_report+0xe5/0x120
[   21.673700]  __asan_report_store8_noabort+0x1b/0x30
[   21.673700]  asus_probe+0xeeb/0xf80
[   21.673700]  hid_device_probe+0x2ee/0x700
[   21.673700]  really_probe+0x1c6/0x6b0
[   21.673700]  __driver_probe_device+0x24f/0x310
[   21.673700]  driver_probe_device+0x4e/0x220
[...]
[   21.673700]
[   21.673700] Allocated by task 54:
[   21.673700]  kasan_save_stack+0x3d/0x60
[   21.673700]  kasan_save_track+0x18/0x40
[   21.673700]  kasan_save_alloc_info+0x3b/0x50
[   21.673700]  __kasan_kmalloc+0x9c/0xa0
[   21.673700]  __kmalloc_cache_noprof+0x139/0x340
[   21.673700]  input_allocate_device+0x44/0x370
[   21.673700]  hidinput_connect+0xcb6/0x2630
[   21.673700]  hid_connect+0xf74/0x1d60
[   21.673700]  hid_hw_start+0x8c/0x110
[   21.673700]  asus_probe+0x5a3/0xf80
[   21.673700]  hid_device_probe+0x2ee/0x700
[   21.673700]  really_probe+0x1c6/0x6b0
[   21.673700]  __driver_probe_device+0x24f/0x310
[   21.673700]  driver_probe_device+0x4e/0x220
[...]
[   21.673700]
[   21.673700] Freed by task 54:
[   21.673700]  kasan_save_stack+0x3d/0x60
[   21.673700]  kasan_save_track+0x18/0x40
[   21.673700]  kasan_save_free_info+0x3f/0x60
[   21.673700]  __kasan_slab_free+0x3c/0x50
[   21.673700]  kfre
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39824/">CVE-2025-39824 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39824">CVE-2025-39824 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250007">SUSE bug 1250007</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539825" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39825</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39825" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39825" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39825" ref_url="https://www.suse.com/security/cve/CVE-2025-39825" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:22388" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix race with concurrent opens in rename(2)

Besides sending the rename request to the server, the rename process
also involves closing any deferred close, waiting for outstanding I/O
to complete as well as marking all existing open handles as deleted to
prevent them from deferring closes, which increases the race window
for potential concurrent opens on the target file.

Fix this by unhashing the dentry in advance to prevent any concurrent
opens on the target.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39825/">CVE-2025-39825 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39825">CVE-2025-39825 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250179">SUSE bug 1250179</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539826" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39826</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39826" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39826" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39826" ref_url="https://www.suse.com/security/cve/CVE-2025-39826" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: rose: convert 'use' field to refcount_t

The 'use' field in struct rose_neigh is used as a reference counter but
lacks atomicity. This can lead to race conditions where a rose_neigh
structure is freed while still being referenced by other code paths.

For example, when rose_neigh-&gt;use becomes zero during an ioctl operation
via rose_rt_ioctl(), the structure may be removed while its timer is
still active, potentially causing use-after-free issues.

This patch changes the type of 'use' from unsigned short to refcount_t and
updates all code paths to use rose_neigh_hold() and rose_neigh_put() which
operate reference counts atomically.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39826/">CVE-2025-39826 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39826">CVE-2025-39826 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250203">SUSE bug 1250203</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252713">SUSE bug 1252713</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539827" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39827</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39827" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39827" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39827" ref_url="https://www.suse.com/security/cve/CVE-2025-39827" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: rose: include node references in rose_neigh refcount

Current implementation maintains two separate reference counting
mechanisms: the 'count' field in struct rose_neigh tracks references from
rose_node structures, while the 'use' field (now refcount_t) tracks
references from rose_sock.

This patch merges these two reference counting systems using 'use' field
for proper reference management. Specifically, this patch adds incrementing
and decrementing of rose_neigh-&gt;use when rose_neigh-&gt;count is incremented
or decremented.

This patch also modifies rose_rt_free(), rose_rt_device_down() and
rose_clear_route() to properly release references to rose_neigh objects
before freeing a rose_node through rose_remove_node().

These changes ensure rose_neigh structures are properly freed only when
all references, including those from rose_node structures, are released.
As a result, this resolves a slab-use-after-free issue reported by Syzbot.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39827/">CVE-2025-39827 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39827">CVE-2025-39827 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250204">SUSE bug 1250204</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252714">SUSE bug 1252714</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539828" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39828</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39828" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39828" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39828" ref_url="https://www.suse.com/security/cve/CVE-2025-39828" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

atm: atmtcp: Prevent arbitrary write in atmtcp_recv_control().

syzbot reported the splat below. [0]

When atmtcp_v_open() or atmtcp_v_close() is called via connect()
or close(), atmtcp_send_control() is called to send an in-kernel
special message.

The message has ATMTCP_HDR_MAGIC in atmtcp_control.hdr.length.
Also, a pointer of struct atm_vcc is set to atmtcp_control.vcc.

The notable thing is struct atmtcp_control is uAPI but has a
space for an in-kernel pointer.

  struct atmtcp_control {
  	struct atmtcp_hdr hdr;	/* must be first */
  ...
  	atm_kptr_t vcc;		/* both directions */
  ...
  } __ATM_API_ALIGN;

  typedef struct { unsigned char _[8]; } __ATM_API_ALIGN atm_kptr_t;

The special message is processed in atmtcp_recv_control() called
from atmtcp_c_send().

atmtcp_c_send() is vcc-&gt;dev-&gt;ops-&gt;send() and called from 2 paths:

  1. .ndo_start_xmit() (vcc-&gt;send() == atm_send_aal0())
  2. vcc_sendmsg()

The problem is sendmsg() does not validate the message length and
userspace can abuse atmtcp_recv_control() to overwrite any kptr
by atmtcp_control.

Let's add a new -&gt;pre_send() hook to validate messages from sendmsg().

[0]:
Oops: general protection fault, probably for non-canonical address 0xdffffc00200000ab: 0000 [#1] SMP KASAN PTI
KASAN: probably user-memory-access in range [0x0000000100000558-0x000000010000055f]
CPU: 0 UID: 0 PID: 5865 Comm: syz-executor331 Not tainted 6.17.0-rc1-syzkaller-00215-gbab3ce404553 #0 PREEMPT(full)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025
RIP: 0010:atmtcp_recv_control drivers/atm/atmtcp.c:93 [inline]
RIP: 0010:atmtcp_c_send+0x1da/0x950 drivers/atm/atmtcp.c:297
Code: 4d 8d 75 1a 4c 89 f0 48 c1 e8 03 42 0f b6 04 20 84 c0 0f 85 15 06 00 00 41 0f b7 1e 4d 8d b7 60 05 00 00 4c 89 f0 48 c1 e8 03 &lt;42&gt; 0f b6 04 20 84 c0 0f 85 13 06 00 00 66 41 89 1e 4d 8d 75 1c 4c
RSP: 0018:ffffc90003f5f810 EFLAGS: 00010203
RAX: 00000000200000ab RBX: 0000000000000000 RCX: 0000000000000000
RDX: ffff88802a510000 RSI: 00000000ffffffff RDI: ffff888030a6068c
RBP: ffff88802699fb40 R08: ffff888030a606eb R09: 1ffff1100614c0dd
R10: dffffc0000000000 R11: ffffffff8718fc40 R12: dffffc0000000000
R13: ffff888030a60680 R14: 000000010000055f R15: 00000000ffffffff
FS:  00007f8d7e9236c0(0000) GS:ffff888125c1c000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000000000045ad50 CR3: 0000000075bde000 CR4: 00000000003526f0
Call Trace:
 &lt;TASK&gt;
 vcc_sendmsg+0xa10/0xc60 net/atm/common.c:645
 sock_sendmsg_nosec net/socket.c:714 [inline]
 __sock_sendmsg+0x219/0x270 net/socket.c:729
 ____sys_sendmsg+0x505/0x830 net/socket.c:2614
 ___sys_sendmsg+0x21f/0x2a0 net/socket.c:2668
 __sys_sendmsg net/socket.c:2700 [inline]
 __do_sys_sendmsg net/socket.c:2705 [inline]
 __se_sys_sendmsg net/socket.c:2703 [inline]
 __x64_sys_sendmsg+0x19b/0x260 net/socket.c:2703
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f8d7e96a4a9
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 51 18 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f8d7e923198 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
RAX: ffffffffffffffda RBX: 00007f8d7e9f4308 RCX: 00007f8d7e96a4a9
RDX: 0000000000000000 RSI: 0000200000000240 RDI: 0000000000000005
RBP: 00007f8d7e9f4300 R08: 65732f636f72702f R09: 65732f636f72702f
R10: 65732f636f72702f R11: 0000000000000246 R12: 00007f8d7e9c10ac
R13: 00007f8d7e9231a0 R14: 0000200000000200 R15: 0000200000000250
 &lt;/TASK&gt;
Modules linked in:
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39828/">CVE-2025-39828 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39828">CVE-2025-39828 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250205">SUSE bug 1250205</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539829" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39829</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39829" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39829" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39829" ref_url="https://www.suse.com/security/cve/CVE-2025-39829" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

trace/fgraph: Fix the warning caused by missing unregister notifier

This warning was triggered during testing on v6.16:

notifier callback ftrace_suspend_notifier_call already registered
WARNING: CPU: 2 PID: 86 at kernel/notifier.c:23 notifier_chain_register+0x44/0xb0
...
Call Trace:
 &lt;TASK&gt;
 blocking_notifier_chain_register+0x34/0x60
 register_ftrace_graph+0x330/0x410
 ftrace_profile_write+0x1e9/0x340
 vfs_write+0xf8/0x420
 ? filp_flush+0x8a/0xa0
 ? filp_close+0x1f/0x30
 ? do_dup2+0xaf/0x160
 ksys_write+0x65/0xe0
 do_syscall_64+0xa4/0x260
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

When writing to the function_profile_enabled interface, the notifier was
not unregistered after start_graph_tracing failed, causing a warning the
next time function_profile_enabled was written.

Fixed by adding unregister_pm_notifier in the exception path.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39829/">CVE-2025-39829 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39829">CVE-2025-39829 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250082">SUSE bug 1250082</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539830" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39830</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39830" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39830" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39830" ref_url="https://www.suse.com/security/cve/CVE-2025-39830" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: HWS, Fix memory leak in hws_pool_buddy_init error path

In the error path of hws_pool_buddy_init(), the buddy allocator cleanup
doesn't free the allocator structure itself, causing a memory leak.

Add the missing kfree() to properly release all allocated memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39830/">CVE-2025-39830 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39830">CVE-2025-39830 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249974">SUSE bug 1249974</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539831" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39831</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39831" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39831" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39831" ref_url="https://www.suse.com/security/cve/CVE-2025-39831" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fbnic: Move phylink resume out of service_task and into open/close

The fbnic driver was presenting with the following locking assert coming
out of a PM resume:
[   42.208116][  T164] RTNL: assertion failed at drivers/net/phy/phylink.c (2611)
[   42.208492][  T164] WARNING: CPU: 1 PID: 164 at drivers/net/phy/phylink.c:2611 phylink_resume+0x190/0x1e0
[   42.208872][  T164] Modules linked in:
[   42.209140][  T164] CPU: 1 UID: 0 PID: 164 Comm: bash Not tainted 6.17.0-rc2-virtme #134 PREEMPT(full)
[   42.209496][  T164] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.17.0-5.fc42 04/01/2014
[   42.209861][  T164] RIP: 0010:phylink_resume+0x190/0x1e0
[   42.210057][  T164] Code: 83 e5 01 0f 85 b0 fe ff ff c6 05 1c cd 3e 02 01 90 ba 33 0a 00 00 48 c7 c6 20 3a 1d a5 48 c7 c7 e0 3e 1d a5 e8 21 b8 90 fe 90 &lt;0f&gt; 0b 90 90 e9 86 fe ff ff e8 42 ea 1f ff e9 e2 fe ff ff 48 89 ef
[   42.210708][  T164] RSP: 0018:ffffc90000affbd8 EFLAGS: 00010296
[   42.210983][  T164] RAX: 0000000000000000 RBX: ffff8880078d8400 RCX: 0000000000000000
[   42.211235][  T164] RDX: 0000000000000000 RSI: 1ffffffff4f10938 RDI: 0000000000000001
[   42.211466][  T164] RBP: 0000000000000000 R08: ffffffffa2ae79ea R09: fffffbfff4b3eb84
[   42.211707][  T164] R10: 0000000000000003 R11: 0000000000000000 R12: ffff888007ad8000
[   42.211997][  T164] R13: 0000000000000002 R14: ffff888006a18800 R15: ffffffffa34c59e0
[   42.212234][  T164] FS:  00007f0dc8e39740(0000) GS:ffff88808f51f000(0000) knlGS:0000000000000000
[   42.212505][  T164] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   42.212704][  T164] CR2: 00007f0dc8e9fe10 CR3: 000000000b56d003 CR4: 0000000000772ef0
[   42.213227][  T164] PKRU: 55555554
[   42.213366][  T164] Call Trace:
[   42.213483][  T164]  &lt;TASK&gt;
[   42.213565][  T164]  __fbnic_pm_attach.isra.0+0x8e/0xa0
[   42.213725][  T164]  pci_reset_function+0x116/0x1d0
[   42.213895][  T164]  reset_store+0xa0/0x100
[   42.214025][  T164]  ? pci_dev_reset_attr_is_visible+0x50/0x50
[   42.214221][  T164]  ? sysfs_file_kobj+0xc1/0x1e0
[   42.214374][  T164]  ? sysfs_kf_write+0x65/0x160
[   42.214526][  T164]  kernfs_fop_write_iter+0x2f8/0x4c0
[   42.214677][  T164]  ? kernfs_vma_page_mkwrite+0x1f0/0x1f0
[   42.214836][  T164]  new_sync_write+0x308/0x6f0
[   42.214987][  T164]  ? __lock_acquire+0x34c/0x740
[   42.215135][  T164]  ? new_sync_read+0x6f0/0x6f0
[   42.215288][  T164]  ? lock_acquire.part.0+0xbc/0x260
[   42.215440][  T164]  ? ksys_write+0xff/0x200
[   42.215590][  T164]  ? perf_trace_sched_switch+0x6d0/0x6d0
[   42.215742][  T164]  vfs_write+0x65e/0xbb0
[   42.215876][  T164]  ksys_write+0xff/0x200
[   42.215994][  T164]  ? __ia32_sys_read+0xc0/0xc0
[   42.216141][  T164]  ? do_user_addr_fault+0x269/0x9f0
[   42.216292][  T164]  ? rcu_is_watching+0x15/0xd0
[   42.216442][  T164]  do_syscall_64+0xbb/0x360
[   42.216591][  T164]  entry_SYSCALL_64_after_hwframe+0x4b/0x53
[   42.216784][  T164] RIP: 0033:0x7f0dc8ea9986

A bit of digging showed that we were invoking the phylink_resume as a part
of the fbnic_up path when we were enabling the service task while not
holding the RTNL lock. We should be enabling this sooner as a part of the
ndo_open path and then just letting the service task come online later.
This will help to enforce the correct locking and brings the phylink
interface online at the same time as the network interface, instead of at a
later time.

I tested this on QEMU to verify this was working by putting the system to
sleep using "echo mem &gt; /sys/power/state" to put the system to sleep in the
guest and then using the command "system_wakeup" in the QEMU monitor.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39831/">CVE-2025-39831 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39831">CVE-2025-39831 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249977">SUSE bug 1249977</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539832" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39832</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39832" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39832" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39832" ref_url="https://www.suse.com/security/cve/CVE-2025-39832" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: Fix lockdep assertion on sync reset unload event

Fix lockdep assertion triggered during sync reset unload event. When the
sync reset flow is initiated using the devlink reload fw_activate
option, the PF already holds the devlink lock while handling unload
event. In this case, delegate sync reset unload event handling back to
the devlink callback process to avoid double-locking and resolve the
lockdep warning.

Kernel log:
WARNING: CPU: 9 PID: 1578 at devl_assert_locked+0x31/0x40
[...]
Call Trace:
&lt;TASK&gt;
 mlx5_unload_one_devl_locked+0x2c/0xc0 [mlx5_core]
 mlx5_sync_reset_unload_event+0xaf/0x2f0 [mlx5_core]
 process_one_work+0x222/0x640
 worker_thread+0x199/0x350
 kthread+0x10b/0x230
 ? __pfx_worker_thread+0x10/0x10
 ? __pfx_kthread+0x10/0x10
 ret_from_fork+0x8e/0x100
 ? __pfx_kthread+0x10/0x10
 ret_from_fork_asm+0x1a/0x30
&lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39832/">CVE-2025-39832 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39832">CVE-2025-39832 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249901">SUSE bug 1249901</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539833" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39833</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39833" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39833" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39833" ref_url="https://www.suse.com/security/cve/CVE-2025-39833" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mISDN: hfcpci: Fix warning when deleting uninitialized timer

With CONFIG_DEBUG_OBJECTS_TIMERS unloading hfcpci module leads
to the following splat:

[  250.215892] ODEBUG: assert_init not available (active state 0) object: ffffffffc01a3dc0 object type: timer_list hint: 0x0
[  250.217520] WARNING: CPU: 0 PID: 233 at lib/debugobjects.c:612 debug_print_object+0x1b6/0x2c0
[  250.218775] Modules linked in: hfcpci(-) mISDN_core
[  250.219537] CPU: 0 UID: 0 PID: 233 Comm: rmmod Not tainted 6.17.0-rc2-g6f713187ac98 #2 PREEMPT(voluntary)
[  250.220940] Hardware name: QEMU Ubuntu 24.04 PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
[  250.222377] RIP: 0010:debug_print_object+0x1b6/0x2c0
[  250.223131] Code: fc ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 75 4f 41 56 48 8b 14 dd a0 4e 01 9f 48 89 ee 48 c7 c7 20 46 01 9f e8 cb 84d
[  250.225805] RSP: 0018:ffff888015ea7c08 EFLAGS: 00010286
[  250.226608] RAX: 0000000000000000 RBX: 0000000000000005 RCX: ffffffff9be93a95
[  250.227708] RDX: 1ffff1100d945138 RSI: 0000000000000008 RDI: ffff88806ca289c0
[  250.228993] RBP: ffffffff9f014a00 R08: 0000000000000001 R09: ffffed1002bd4f39
[  250.230043] R10: ffff888015ea79cf R11: 0000000000000001 R12: 0000000000000001
[  250.231185] R13: ffffffff9eea0520 R14: 0000000000000000 R15: ffff888015ea7cc8
[  250.232454] FS:  00007f3208f01540(0000) GS:ffff8880caf5a000(0000) knlGS:0000000000000000
[  250.233851] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  250.234856] CR2: 00007f32090a7421 CR3: 0000000004d63000 CR4: 00000000000006f0
[  250.236117] Call Trace:
[  250.236599]  &lt;TASK&gt;
[  250.236967]  ? trace_irq_enable.constprop.0+0xd4/0x130
[  250.237920]  debug_object_assert_init+0x1f6/0x310
[  250.238762]  ? __pfx_debug_object_assert_init+0x10/0x10
[  250.239658]  ? __lock_acquire+0xdea/0x1c70
[  250.240369]  __try_to_del_timer_sync+0x69/0x140
[  250.241172]  ? __pfx___try_to_del_timer_sync+0x10/0x10
[  250.242058]  ? __timer_delete_sync+0xc6/0x120
[  250.242842]  ? lock_acquire+0x30/0x80
[  250.243474]  ? __timer_delete_sync+0xc6/0x120
[  250.244262]  __timer_delete_sync+0x98/0x120
[  250.245015]  HFC_cleanup+0x10/0x20 [hfcpci]
[  250.245704]  __do_sys_delete_module+0x348/0x510
[  250.246461]  ? __pfx___do_sys_delete_module+0x10/0x10
[  250.247338]  do_syscall_64+0xc1/0x360
[  250.247924]  entry_SYSCALL_64_after_hwframe+0x77/0x7f

Fix this by initializing hfc_tl timer with DEFINE_TIMER macro.
Also, use mod_timer instead of manual timeout update.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39833/">CVE-2025-39833 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39833">CVE-2025-39833 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250028">SUSE bug 1250028</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539834" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39834</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39834" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39834" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39834" ref_url="https://www.suse.com/security/cve/CVE-2025-39834" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: HWS, Fix memory leak in hws_action_get_shared_stc_nic error flow

When an invalid stc_type is provided, the function allocates memory for
shared_stc but jumps to unlock_and_out without freeing it, causing a
memory leak.

Fix by jumping to free_shared_stc label instead to ensure proper cleanup.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39834/">CVE-2025-39834 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39834">CVE-2025-39834 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250021">SUSE bug 1250021</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39835</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39835" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39835" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39835" ref_url="https://www.suse.com/security/cve/CVE-2025-39835" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xfs: do not propagate ENODATA disk errors into xattr code

ENODATA (aka ENOATTR) has a very specific meaning in the xfs xattr code;
namely, that the requested attribute name could not be found.

However, a medium error from disk may also return ENODATA. At best,
this medium error may escape to userspace as "attribute not found"
when in fact it's an IO (disk) error.

At worst, we may oops in xfs_attr_leaf_get() when we do:

	error = xfs_attr_leaf_hasname(args, &amp;bp);
	if (error == -ENOATTR)  {
		xfs_trans_brelse(args-&gt;trans, bp);
		return error;
	}

because an ENODATA/ENOATTR error from disk leaves us with a null bp,
and the xfs_trans_brelse will then null-deref it.

As discussed on the list, we really need to modify the lower level
IO functions to trap all disk errors and ensure that we don't let
unique errors like this leak up into higher xfs functions - many
like this should be remapped to EIO.

However, this patch directly addresses a reported bug in the xattr
code, and should be safe to backport to stable kernels. A larger-scope
patch to handle more unique errors at lower levels can follow later.

(Note, prior to 07120f1abdff we did not oops, but we did return the
wrong error code to userspace.)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39835/">CVE-2025-39835 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39835">CVE-2025-39835 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250025">SUSE bug 1250025</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39836</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39836" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39836" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39836" ref_url="https://www.suse.com/security/cve/CVE-2025-39836" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

efi: stmm: Fix incorrect buffer allocation method

The communication buffer allocated by setup_mm_hdr() is later on passed
to tee_shm_register_kernel_buf(). The latter expects those buffers to be
contiguous pages, but setup_mm_hdr() just uses kmalloc(). That can cause
various corruptions or BUGs, specifically since commit 9aec2fb0fd5e
("slab: allocate frozen pages"), though it was broken before as well.

Fix this by using alloc_pages_exact() instead of kmalloc().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39836/">CVE-2025-39836 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39836">CVE-2025-39836 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249904">SUSE bug 1249904</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539838" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39838</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39838" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39838" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39838" ref_url="https://www.suse.com/security/cve/CVE-2025-39838" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cifs: prevent NULL pointer dereference in UTF16 conversion

There can be a NULL pointer dereference bug here. NULL is passed to
__cifs_sfu_make_node without checks, which passes it unchecked to
cifs_strndup_to_utf16, which in turn passes it to
cifs_local_to_utf16_bytes where '*from' is dereferenced, causing a crash.

This patch adds a check for NULL 'src' in cifs_strndup_to_utf16 and
returns NULL early to prevent dereferencing NULL pointer.

Found by Linux Verification Center (linuxtesting.org) with SVACE
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39838/">CVE-2025-39838 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39838">CVE-2025-39838 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250365">SUSE bug 1250365</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539839" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39839</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39839" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39839" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39839" ref_url="https://www.suse.com/security/cve/CVE-2025-39839" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

batman-adv: fix OOB read/write in network-coding decode

batadv_nc_skb_decode_packet() trusts coded_len and checks only against
skb-&gt;len. XOR starts at sizeof(struct batadv_unicast_packet), reducing
payload headroom, and the source skb length is not verified, allowing an
out-of-bounds read and a small out-of-bounds write.

Validate that coded_len fits within the payload area of both destination
and source sk_buffs before XORing.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39839/">CVE-2025-39839 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39839">CVE-2025-39839 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250291">SUSE bug 1250291</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539841" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39841</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39841" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39841" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39841" ref_url="https://www.suse.com/security/cve/CVE-2025-39841" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:18281" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002120.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19102" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: lpfc: Fix buffer free/clear order in deferred receive path

Fix a use-after-free window by correcting the buffer release sequence in
the deferred receive path. The code freed the RQ buffer first and only
then cleared the context pointer under the lock. Concurrent paths (e.g.,
ABTS and the repost path) also inspect and release the same pointer under
the lock, so the old order could lead to double-free/UAF.

Note that the repost path already uses the correct pattern: detach the
pointer under the lock, then free it after dropping the lock. The
deferred path should do the same.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39841/">CVE-2025-39841 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39841">CVE-2025-39841 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250274">SUSE bug 1250274</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539842" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39842</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39842" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39842" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39842" ref_url="https://www.suse.com/security/cve/CVE-2025-39842" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ocfs2: prevent release journal inode after journal shutdown

Before calling ocfs2_delete_osb(), ocfs2_journal_shutdown() has already
been executed in ocfs2_dismount_volume(), so osb-&gt;journal must be NULL. 
Therefore, the following calltrace will inevitably fail when it reaches
jbd2_journal_release_jbd_inode().

ocfs2_dismount_volume()-&gt;
  ocfs2_delete_osb()-&gt;
    ocfs2_free_slot_info()-&gt;
      __ocfs2_free_slot_info()-&gt;
        evict()-&gt;
          ocfs2_evict_inode()-&gt;
            ocfs2_clear_inode()-&gt;
	      jbd2_journal_release_jbd_inode(osb-&gt;journal-&gt;j_journal,

Adding osb-&gt;journal checks will prevent null-ptr-deref during the above
execution path.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39842/">CVE-2025-39842 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39842">CVE-2025-39842 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250267">SUSE bug 1250267</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39844</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39844" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39844" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39844" ref_url="https://www.suse.com/security/cve/CVE-2025-39844" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm: move page table sync declarations to linux/pgtable.h

During our internal testing, we started observing intermittent boot
failures when the machine uses 4-level paging and has a large amount of
persistent memory:

  BUG: unable to handle page fault for address: ffffe70000000034
  #PF: supervisor write access in kernel mode
  #PF: error_code(0x0002) - not-present page
  PGD 0 P4D 0 
  Oops: 0002 [#1] SMP NOPTI
  RIP: 0010:__init_single_page+0x9/0x6d
  Call Trace:
   &lt;TASK&gt;
   __init_zone_device_page+0x17/0x5d
   memmap_init_zone_device+0x154/0x1bb
   pagemap_range+0x2e0/0x40f
   memremap_pages+0x10b/0x2f0
   devm_memremap_pages+0x1e/0x60
   dev_dax_probe+0xce/0x2ec [device_dax]
   dax_bus_probe+0x6d/0xc9
   [... snip ...]
   &lt;/TASK&gt;

It turns out that the kernel panics while initializing vmemmap (struct
page array) when the vmemmap region spans two PGD entries, because the new
PGD entry is only installed in init_mm.pgd, but not in the page tables of
other tasks.

And looking at __populate_section_memmap():
  if (vmemmap_can_optimize(altmap, pgmap))                                
          // does not sync top level page tables
          r = vmemmap_populate_compound_pages(pfn, start, end, nid, pgmap);
  else                                                                    
          // sync top level page tables in x86
          r = vmemmap_populate(start, end, nid, altmap);

In the normal path, vmemmap_populate() in arch/x86/mm/init_64.c
synchronizes the top level page table (See commit 9b861528a801 ("x86-64,
mem: Update all PGDs for direct mapping and vmemmap mapping changes")) so
that all tasks in the system can see the new vmemmap area.

However, when vmemmap_can_optimize() returns true, the optimized path
skips synchronization of top-level page tables.  This is because
vmemmap_populate_compound_pages() is implemented in core MM code, which
does not handle synchronization of the top-level page tables.  Instead,
the core MM has historically relied on each architecture to perform this
synchronization manually.

We're not the first party to encounter a crash caused by not-sync'd top
level page tables: earlier this year, Gwan-gyeong Mun attempted to address
the issue [1] [2] after hitting a kernel panic when x86 code accessed the
vmemmap area before the corresponding top-level entries were synced.  At
that time, the issue was believed to be triggered only when struct page
was enlarged for debugging purposes, and the patch did not get further
updates.

It turns out that current approach of relying on each arch to handle the
page table sync manually is fragile because 1) it's easy to forget to sync
the top level page table, and 2) it's also easy to overlook that the
kernel should not access the vmemmap and direct mapping areas before the
sync.

# The solution: Make page table sync more code robust and harder to miss

To address this, Dave Hansen suggested [3] [4] introducing
{pgd,p4d}_populate_kernel() for updating kernel portion of the page tables
and allow each architecture to explicitly perform synchronization when
installing top-level entries.  With this approach, we no longer need to
worry about missing the sync step, reducing the risk of future
regressions.

The new interface reuses existing ARCH_PAGE_TABLE_SYNC_MASK,
PGTBL_P*D_MODIFIED and arch_sync_kernel_mappings() facility used by
vmalloc and ioremap to synchronize page tables.

pgd_populate_kernel() looks like this:
static inline void pgd_populate_kernel(unsigned long addr, pgd_t *pgd,
                                       p4d_t *p4d)
{
        pgd_populate(&amp;init_mm, pgd, p4d);
        if (ARCH_PAGE_TABLE_SYNC_MASK &amp; PGTBL_PGD_MODIFIED)
                arch_sync_kernel_mappings(addr, addr);
}

It is worth noting that vmalloc() and apply_to_range() carefully
synchronizes page tables by calling p*d_alloc_track() and
arch_sync_kernel_mappings(), and thus they are not affected by
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39844/">CVE-2025-39844 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39844">CVE-2025-39844 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250268">SUSE bug 1250268</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539845" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39845</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39845" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39845" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39845" ref_url="https://www.suse.com/security/cve/CVE-2025-39845" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/mm/64: define ARCH_PAGE_TABLE_SYNC_MASK and arch_sync_kernel_mappings()

Define ARCH_PAGE_TABLE_SYNC_MASK and arch_sync_kernel_mappings() to ensure
page tables are properly synchronized when calling p*d_populate_kernel().

For 5-level paging, synchronization is performed via
pgd_populate_kernel().  In 4-level paging, pgd_populate() is a no-op, so
synchronization is instead performed at the P4D level via
p4d_populate_kernel().

This fixes intermittent boot failures on systems using 4-level paging and
a large amount of persistent memory:

  BUG: unable to handle page fault for address: ffffe70000000034
  #PF: supervisor write access in kernel mode
  #PF: error_code(0x0002) - not-present page
  PGD 0 P4D 0
  Oops: 0002 [#1] SMP NOPTI
  RIP: 0010:__init_single_page+0x9/0x6d
  Call Trace:
   &lt;TASK&gt;
   __init_zone_device_page+0x17/0x5d
   memmap_init_zone_device+0x154/0x1bb
   pagemap_range+0x2e0/0x40f
   memremap_pages+0x10b/0x2f0
   devm_memremap_pages+0x1e/0x60
   dev_dax_probe+0xce/0x2ec [device_dax]
   dax_bus_probe+0x6d/0xc9
   [... snip ...]
   &lt;/TASK&gt;

It also fixes a crash in vmemmap_set_pmd() caused by accessing vmemmap
before sync_global_pgds() [1]:

  BUG: unable to handle page fault for address: ffffeb3ff1200000
  #PF: supervisor write access in kernel mode
  #PF: error_code(0x0002) - not-present page
  PGD 0 P4D 0
  Oops: Oops: 0002 [#1] PREEMPT SMP NOPTI
  Tainted: [W]=WARN
  RIP: 0010:vmemmap_set_pmd+0xff/0x230
   &lt;TASK&gt;
   vmemmap_populate_hugepages+0x176/0x180
   vmemmap_populate+0x34/0x80
   __populate_section_memmap+0x41/0x90
   sparse_add_section+0x121/0x3e0
   __add_pages+0xba/0x150
   add_pages+0x1d/0x70
   memremap_pages+0x3dc/0x810
   devm_memremap_pages+0x1c/0x60
   xe_devm_add+0x8b/0x100 [xe]
   xe_tile_init_noalloc+0x6a/0x70 [xe]
   xe_device_probe+0x48c/0x740 [xe]
   [... snip ...]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39845/">CVE-2025-39845 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39845">CVE-2025-39845 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250262">SUSE bug 1250262</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539847" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39847</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39847" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39847" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39847" ref_url="https://www.suse.com/security/cve/CVE-2025-39847" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ppp: fix memory leak in pad_compress_skb

If alloc_skb() fails in pad_compress_skb(), it returns NULL without
releasing the old skb. The caller does:

    skb = pad_compress_skb(ppp, skb);
    if (!skb)
        goto drop;

drop:
    kfree_skb(skb);

When pad_compress_skb() returns NULL, the reference to the old skb is
lost and kfree_skb(skb) ends up doing nothing, leading to a memory leak.

Align pad_compress_skb() semantics with realloc(): only free the old
skb if allocation and compression succeed.  At the call site, use the
new_skb variable so the original skb is not lost when pad_compress_skb()
fails.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39847/">CVE-2025-39847 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39847">CVE-2025-39847 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250292">SUSE bug 1250292</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539848" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39848</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39848" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39848" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39848" ref_url="https://www.suse.com/security/cve/CVE-2025-39848" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ax25: properly unshare skbs in ax25_kiss_rcv()

Bernard Pidoux reported a regression apparently caused by commit
c353e8983e0d ("net: introduce per netns packet chains").

skb-&gt;dev becomes NULL and we crash in __netif_receive_skb_core().

Before above commit, different kind of bugs or corruptions could happen
without a major crash.

But the root cause is that ax25_kiss_rcv() can queue/mangle input skb
without checking if this skb is shared or not.

Many thanks to Bernard Pidoux for his help, diagnosis and tests.

We had a similar issue years ago fixed with commit 7aaed57c5c28
("phonet: properly unshare skbs in phonet_rcv()").
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39848/">CVE-2025-39848 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39848">CVE-2025-39848 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250298">SUSE bug 1250298</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539849" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39849</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39849" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39849" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39849" ref_url="https://www.suse.com/security/cve/CVE-2025-39849" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:18281" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002120.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19102" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: cfg80211: sme: cap SSID length in __cfg80211_connect_result()

If the ssid-&gt;datalen is more than IEEE80211_MAX_SSID_LEN (32) it would
lead to memory corruption so add some bounds checking.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39849/">CVE-2025-39849 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39849">CVE-2025-39849 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250266">SUSE bug 1250266</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539850" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39850</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39850" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39850" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39850" ref_url="https://www.suse.com/security/cve/CVE-2025-39850" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vxlan: Fix NPD in {arp,neigh}_reduce() when using nexthop objects

When the "proxy" option is enabled on a VXLAN device, the device will
suppress ARP requests and IPv6 Neighbor Solicitation messages if it is
able to reply on behalf of the remote host. That is, if a matching and
valid neighbor entry is configured on the VXLAN device whose MAC address
is not behind the "any" remote (0.0.0.0 / ::).

The code currently assumes that the FDB entry for the neighbor's MAC
address points to a valid remote destination, but this is incorrect if
the entry is associated with an FDB nexthop group. This can result in a
NPD [1][3] which can be reproduced using [2][4].

Fix by checking that the remote destination exists before dereferencing
it.

[1]
BUG: kernel NULL pointer dereference, address: 0000000000000000
[...]
CPU: 4 UID: 0 PID: 365 Comm: arping Not tainted 6.17.0-rc2-virtme-g2a89cb21162c #2 PREEMPT(voluntary)
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.17.0-4.fc41 04/01/2014
RIP: 0010:vxlan_xmit+0xb58/0x15f0
[...]
Call Trace:
 &lt;TASK&gt;
 dev_hard_start_xmit+0x5d/0x1c0
 __dev_queue_xmit+0x246/0xfd0
 packet_sendmsg+0x113a/0x1850
 __sock_sendmsg+0x38/0x70
 __sys_sendto+0x126/0x180
 __x64_sys_sendto+0x24/0x30
 do_syscall_64+0xa4/0x260
 entry_SYSCALL_64_after_hwframe+0x4b/0x53

[2]
 #!/bin/bash

 ip address add 192.0.2.1/32 dev lo

 ip nexthop add id 1 via 192.0.2.2 fdb
 ip nexthop add id 10 group 1 fdb

 ip link add name vx0 up type vxlan id 10010 local 192.0.2.1 dstport 4789 proxy

 ip neigh add 192.0.2.3 lladdr 00:11:22:33:44:55 nud perm dev vx0

 bridge fdb add 00:11:22:33:44:55 dev vx0 self static nhid 10

 arping -b -c 1 -s 192.0.2.1 -I vx0 192.0.2.3

[3]
BUG: kernel NULL pointer dereference, address: 0000000000000000
[...]
CPU: 13 UID: 0 PID: 372 Comm: ndisc6 Not tainted 6.17.0-rc2-virtmne-g6ee90cb26014 #3 PREEMPT(voluntary)
Hardware name: QEMU Standard PC (i440FX + PIIX, 1v996), BIOS 1.17.0-4.fc41 04/01/2x014
RIP: 0010:vxlan_xmit+0x803/0x1600
[...]
Call Trace:
 &lt;TASK&gt;
 dev_hard_start_xmit+0x5d/0x1c0
 __dev_queue_xmit+0x246/0xfd0
 ip6_finish_output2+0x210/0x6c0
 ip6_finish_output+0x1af/0x2b0
 ip6_mr_output+0x92/0x3e0
 ip6_send_skb+0x30/0x90
 rawv6_sendmsg+0xe6e/0x12e0
 __sock_sendmsg+0x38/0x70
 __sys_sendto+0x126/0x180
 __x64_sys_sendto+0x24/0x30
 do_syscall_64+0xa4/0x260
 entry_SYSCALL_64_after_hwframe+0x4b/0x53
RIP: 0033:0x7f383422ec77

[4]
 #!/bin/bash

 ip address add 2001:db8:1::1/128 dev lo

 ip nexthop add id 1 via 2001:db8:1::1 fdb
 ip nexthop add id 10 group 1 fdb

 ip link add name vx0 up type vxlan id 10010 local 2001:db8:1::1 dstport 4789 proxy

 ip neigh add 2001:db8:1::3 lladdr 00:11:22:33:44:55 nud perm dev vx0

 bridge fdb add 00:11:22:33:44:55 dev vx0 self static nhid 10

 ndisc6 -r 1 -s 2001:db8:1::1 -w 1 2001:db8:1::3 vx0
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39850/">CVE-2025-39850 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39850">CVE-2025-39850 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250276">SUSE bug 1250276</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539851" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39851</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39851" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39851" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39851" ref_url="https://www.suse.com/security/cve/CVE-2025-39851" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vxlan: Fix NPD when refreshing an FDB entry with a nexthop object

VXLAN FDB entries can point to either a remote destination or an FDB
nexthop group. The latter is usually used in EVPN deployments where
learning is disabled.

However, when learning is enabled, an incoming packet might try to
refresh an FDB entry that points to an FDB nexthop group and therefore
does not have a remote. Such packets should be dropped, but they are
only dropped after dereferencing the non-existent remote, resulting in a
NPD [1] which can be reproduced using [2].

Fix by dropping such packets earlier. Remove the misleading comment from
first_remote_rcu().

[1]
BUG: kernel NULL pointer dereference, address: 0000000000000000
[...]
CPU: 13 UID: 0 PID: 361 Comm: mausezahn Not tainted 6.17.0-rc1-virtme-g9f6b606b6b37 #1 PREEMPT(voluntary)
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.17.0-4.fc41 04/01/2014
RIP: 0010:vxlan_snoop+0x98/0x1e0
[...]
Call Trace:
 &lt;TASK&gt;
 vxlan_encap_bypass+0x209/0x240
 encap_bypass_if_local+0xb1/0x100
 vxlan_xmit_one+0x1375/0x17e0
 vxlan_xmit+0x6b4/0x15f0
 dev_hard_start_xmit+0x5d/0x1c0
 __dev_queue_xmit+0x246/0xfd0
 packet_sendmsg+0x113a/0x1850
 __sock_sendmsg+0x38/0x70
 __sys_sendto+0x126/0x180
 __x64_sys_sendto+0x24/0x30
 do_syscall_64+0xa4/0x260
 entry_SYSCALL_64_after_hwframe+0x4b/0x53

[2]
 #!/bin/bash

 ip address add 192.0.2.1/32 dev lo
 ip address add 192.0.2.2/32 dev lo

 ip nexthop add id 1 via 192.0.2.3 fdb
 ip nexthop add id 10 group 1 fdb

 ip link add name vx0 up type vxlan id 10010 local 192.0.2.1 dstport 12345 localbypass
 ip link add name vx1 up type vxlan id 10020 local 192.0.2.2 dstport 54321 learning

 bridge fdb add 00:11:22:33:44:55 dev vx0 self static dst 192.0.2.2 port 54321 vni 10020
 bridge fdb add 00:aa:bb:cc:dd:ee dev vx1 self static nhid 10

 mausezahn vx0 -a 00:aa:bb:cc:dd:ee -b 00:11:22:33:44:55 -c 1 -q
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39851/">CVE-2025-39851 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39851">CVE-2025-39851 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250296">SUSE bug 1250296</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539852" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39852</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39852" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39852" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39852" ref_url="https://www.suse.com/security/cve/CVE-2025-39852" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/tcp: Fix socket memory leak in TCP-AO failure handling for IPv6

When tcp_ao_copy_all_matching() fails in tcp_v6_syn_recv_sock() it just
exits the function. This ends up causing a memory-leak:

unreferenced object 0xffff0000281a8200 (size 2496):
  comm "softirq", pid 0, jiffies 4295174684
  hex dump (first 32 bytes):
    7f 00 00 06 7f 00 00 06 00 00 00 00 cb a8 88 13  ................
    0a 00 03 61 00 00 00 00 00 00 00 00 00 00 00 00  ...a............
  backtrace (crc 5ebdbe15):
    kmemleak_alloc+0x44/0xe0
    kmem_cache_alloc_noprof+0x248/0x470
    sk_prot_alloc+0x48/0x120
    sk_clone_lock+0x38/0x3b0
    inet_csk_clone_lock+0x34/0x150
    tcp_create_openreq_child+0x3c/0x4a8
    tcp_v6_syn_recv_sock+0x1c0/0x620
    tcp_check_req+0x588/0x790
    tcp_v6_rcv+0x5d0/0xc18
    ip6_protocol_deliver_rcu+0x2d8/0x4c0
    ip6_input_finish+0x74/0x148
    ip6_input+0x50/0x118
    ip6_sublist_rcv+0x2fc/0x3b0
    ipv6_list_rcv+0x114/0x170
    __netif_receive_skb_list_core+0x16c/0x200
    netif_receive_skb_list_internal+0x1f0/0x2d0

This is because in tcp_v6_syn_recv_sock (and the IPv4 counterpart), when
exiting upon error, inet_csk_prepare_forced_close() and tcp_done() need
to be called. They make sure the newsk will end up being correctly
free'd.

tcp_v4_syn_recv_sock() makes this very clear by having the put_and_exit
label that takes care of things. So, this patch here makes sure
tcp_v4_syn_recv_sock and tcp_v6_syn_recv_sock have similar
error-handling and thus fixes the leak for TCP-AO.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39852/">CVE-2025-39852 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39852">CVE-2025-39852 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250258">SUSE bug 1250258</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539853" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39853</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39853" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39853" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39853" ref_url="https://www.suse.com/security/cve/CVE-2025-39853" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i40e: Fix potential invalid access when MAC list is empty

list_first_entry() never returns NULL - if the list is empty, it still
returns a pointer to an invalid object, leading to potential invalid
memory access when dereferenced.

Fix this by using list_first_entry_or_null instead of list_first_entry.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39853/">CVE-2025-39853 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39853">CVE-2025-39853 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250275">SUSE bug 1250275</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539854" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39854</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39854" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39854" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39854" ref_url="https://www.suse.com/security/cve/CVE-2025-39854" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: fix NULL access of tx-&gt;in_use in ice_ll_ts_intr

Recent versions of the E810 firmware have support for an extra interrupt to
handle report of the "low latency" Tx timestamps coming from the
specialized low latency firmware interface. Instead of polling the
registers, software can wait until the low latency interrupt is fired.

This logic makes use of the Tx timestamp tracking structure, ice_ptp_tx, as
it uses the same "ready" bitmap to track which Tx timestamps complete.

Unfortunately, the ice_ll_ts_intr() function does not check if the
tracker is initialized before its first access. This results in NULL
dereference or use-after-free bugs similar to the issues fixed in the
ice_ptp_ts_irq() function.

Fix this by only checking the in_use bitmap (and other fields) if the
tracker is marked as initialized. The reset flow will clear the init field
under lock before it tears the tracker down, thus preventing any
use-after-free or NULL access.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39854/">CVE-2025-39854 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39854">CVE-2025-39854 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250297">SUSE bug 1250297</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539857" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39857</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39857" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39857" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39857" ref_url="https://www.suse.com/security/cve/CVE-2025-39857" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/smc: fix one NULL pointer dereference in smc_ib_is_sg_need_sync()

BUG: kernel NULL pointer dereference, address: 00000000000002ec
PGD 0 P4D 0
Oops: Oops: 0000 [#1] SMP PTI
CPU: 28 UID: 0 PID: 343 Comm: kworker/28:1 Kdump: loaded Tainted: G        OE       6.17.0-rc2+ #9 NONE
Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.15.0-1 04/01/2014
Workqueue: smc_hs_wq smc_listen_work [smc]
RIP: 0010:smc_ib_is_sg_need_sync+0x9e/0xd0 [smc]
...
Call Trace:
 &lt;TASK&gt;
 smcr_buf_map_link+0x211/0x2a0 [smc]
 __smc_buf_create+0x522/0x970 [smc]
 smc_buf_create+0x3a/0x110 [smc]
 smc_find_rdma_v2_device_serv+0x18f/0x240 [smc]
 ? smc_vlan_by_tcpsk+0x7e/0xe0 [smc]
 smc_listen_find_device+0x1dd/0x2b0 [smc]
 smc_listen_work+0x30f/0x580 [smc]
 process_one_work+0x18c/0x340
 worker_thread+0x242/0x360
 kthread+0xe7/0x220
 ret_from_fork+0x13a/0x160
 ret_from_fork_asm+0x1a/0x30
 &lt;/TASK&gt;

If the software RoCE device is used, ibdev-&gt;dma_device is a null pointer.
As a result, the problem occurs. Null pointer detection is added to
prevent problems.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39857/">CVE-2025-39857 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39857">CVE-2025-39857 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250251">SUSE bug 1250251</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539859" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39859</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39859" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39859" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39859" ref_url="https://www.suse.com/security/cve/CVE-2025-39859" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ptp: ocp: fix use-after-free bugs causing by ptp_ocp_watchdog

The ptp_ocp_detach() only shuts down the watchdog timer if it is
pending. However, if the timer handler is already running, the
timer_delete_sync() is not called. This leads to race conditions
where the devlink that contains the ptp_ocp is deallocated while
the timer handler is still accessing it, resulting in use-after-free
bugs. The following details one of the race scenarios.

(thread 1)                           | (thread 2)
ptp_ocp_remove()                     |
  ptp_ocp_detach()                   | ptp_ocp_watchdog()
    if (timer_pending(&amp;bp-&gt;watchdog))|   bp = timer_container_of()
      timer_delete_sync()            |
                                     |
  devlink_free(devlink) //free       |
                                     |   bp-&gt; //use

Resolve this by unconditionally calling timer_delete_sync() to ensure
the timer is reliably deactivated, preventing any access after free.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39859/">CVE-2025-39859 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39859">CVE-2025-39859 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250252">SUSE bug 1250252</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539860" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39860</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39860" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39860" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39860" ref_url="https://www.suse.com/security/cve/CVE-2025-39860" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: Fix use-after-free in l2cap_sock_cleanup_listen()

syzbot reported the splat below without a repro.

In the splat, a single thread calling bt_accept_dequeue() freed sk
and touched it after that.

The root cause would be the racy l2cap_sock_cleanup_listen() call
added by the cited commit.

bt_accept_dequeue() is called under lock_sock() except for
l2cap_sock_release().

Two threads could see the same socket during the list iteration
in bt_accept_dequeue():

  CPU1                        CPU2 (close())
  ----                        ----
  sock_hold(sk)               sock_hold(sk);
  lock_sock(sk)   &lt;-- block close()
  sock_put(sk)
  bt_accept_unlink(sk)
    sock_put(sk)  &lt;-- refcnt by bt_accept_enqueue()
  release_sock(sk)
                              lock_sock(sk)
                              sock_put(sk)
                              bt_accept_unlink(sk)
                                sock_put(sk)        &lt;-- last refcnt
                              bt_accept_unlink(sk)  &lt;-- UAF

Depending on the timing, the other thread could show up in the
"Freed by task" part.

Let's call l2cap_sock_cleanup_listen() under lock_sock() in
l2cap_sock_release().

[0]:
BUG: KASAN: slab-use-after-free in debug_spin_lock_before kernel/locking/spinlock_debug.c:86 [inline]
BUG: KASAN: slab-use-after-free in do_raw_spin_lock+0x26f/0x2b0 kernel/locking/spinlock_debug.c:115
Read of size 4 at addr ffff88803b7eb1c4 by task syz.5.3276/16995
CPU: 3 UID: 0 PID: 16995 Comm: syz.5.3276 Not tainted syzkaller #0 PREEMPT(full)
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:94 [inline]
 dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:120
 print_address_description mm/kasan/report.c:378 [inline]
 print_report+0xcd/0x630 mm/kasan/report.c:482
 kasan_report+0xe0/0x110 mm/kasan/report.c:595
 debug_spin_lock_before kernel/locking/spinlock_debug.c:86 [inline]
 do_raw_spin_lock+0x26f/0x2b0 kernel/locking/spinlock_debug.c:115
 spin_lock_bh include/linux/spinlock.h:356 [inline]
 release_sock+0x21/0x220 net/core/sock.c:3746
 bt_accept_dequeue+0x505/0x600 net/bluetooth/af_bluetooth.c:312
 l2cap_sock_cleanup_listen+0x5c/0x2a0 net/bluetooth/l2cap_sock.c:1451
 l2cap_sock_release+0x5c/0x210 net/bluetooth/l2cap_sock.c:1425
 __sock_release+0xb3/0x270 net/socket.c:649
 sock_close+0x1c/0x30 net/socket.c:1439
 __fput+0x3ff/0xb70 fs/file_table.c:468
 task_work_run+0x14d/0x240 kernel/task_work.c:227
 resume_user_mode_work include/linux/resume_user_mode.h:50 [inline]
 exit_to_user_mode_loop+0xeb/0x110 kernel/entry/common.c:43
 exit_to_user_mode_prepare include/linux/irq-entry-common.h:225 [inline]
 syscall_exit_to_user_mode_work include/linux/entry-common.h:175 [inline]
 syscall_exit_to_user_mode include/linux/entry-common.h:210 [inline]
 do_syscall_64+0x3f6/0x4c0 arch/x86/entry/syscall_64.c:100
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f2accf8ebe9
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007ffdb6cb1378 EFLAGS: 00000246 ORIG_RAX: 00000000000001b4
RAX: 0000000000000000 RBX: 00000000000426fb RCX: 00007f2accf8ebe9
RDX: 0000000000000000 RSI: 000000000000001e RDI: 0000000000000003
RBP: 00007f2acd1b7da0 R08: 0000000000000001 R09: 00000012b6cb166f
R10: 0000001b30e20000 R11: 0000000000000246 R12: 00007f2acd1b609c
R13: 00007f2acd1b6090 R14: ffffffffffffffff R15: 00007ffdb6cb1490
 &lt;/TASK&gt;

Allocated by task 5326:
 kasan_save_stack+0x33/0x60 mm/kasan/common.c:47
 kasan_save_track+0x14/0x30 mm/kasan/common.c:68
 poison_kmalloc_redzone mm/kasan/common.c:388 [inline]
 __kasan_kmalloc+0xaa/0xb0 mm/kasan/common.c:405
 kasan_kmalloc include/linux/kasan.h:260 [inline]
 __do_kmalloc_node mm/slub.c:4365 [inline]
 __kmalloc_nopro
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39860/">CVE-2025-39860 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39860">CVE-2025-39860 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250247">SUSE bug 1250247</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539861" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39861</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39861" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39861" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39861" ref_url="https://www.suse.com/security/cve/CVE-2025-39861" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: vhci: Prevent use-after-free by removing debugfs files early

Move the creation of debugfs files into a dedicated function, and ensure
they are explicitly removed during vhci_release(), before associated
data structures are freed.

Previously, debugfs files such as "force_suspend", "force_wakeup", and
others were created under hdev-&gt;debugfs but not removed in
vhci_release(). Since vhci_release() frees the backing vhci_data
structure, any access to these files after release would result in
use-after-free errors.

Although hdev-&gt;debugfs is later freed in hci_release_dev(), user can
access files after vhci_data is freed but before hdev-&gt;debugfs is
released.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39861/">CVE-2025-39861 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39861">CVE-2025-39861 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250249">SUSE bug 1250249</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539863" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39863</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39863" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39863" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39863" ref_url="https://www.suse.com/security/cve/CVE-2025-39863" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: brcmfmac: fix use-after-free when rescheduling brcmf_btcoex_info work

The brcmf_btcoex_detach() only shuts down the btcoex timer, if the
flag timer_on is false. However, the brcmf_btcoex_timerfunc(), which
runs as timer handler, sets timer_on to false. This creates critical
race conditions:

1.If brcmf_btcoex_detach() is called while brcmf_btcoex_timerfunc()
is executing, it may observe timer_on as false and skip the call to
timer_shutdown_sync().

2.The brcmf_btcoex_timerfunc() may then reschedule the brcmf_btcoex_info
worker after the cancel_work_sync() has been executed, resulting in
use-after-free bugs.

The use-after-free bugs occur in two distinct scenarios, depending on
the timing of when the brcmf_btcoex_info struct is freed relative to
the execution of its worker thread.

Scenario 1: Freed before the worker is scheduled

The brcmf_btcoex_info is deallocated before the worker is scheduled.
A race condition can occur when schedule_work(&amp;bt_local-&gt;work) is
called after the target memory has been freed. The sequence of events
is detailed below:

CPU0                           | CPU1
brcmf_btcoex_detach            | brcmf_btcoex_timerfunc
                               |   bt_local-&gt;timer_on = false;
  if (cfg-&gt;btcoex-&gt;timer_on)   |
    ...                        |
  cancel_work_sync();          |
  ...                          |
  kfree(cfg-&gt;btcoex); // FREE  |
                               |   schedule_work(&amp;bt_local-&gt;work); // USE

Scenario 2: Freed after the worker is scheduled

The brcmf_btcoex_info is freed after the worker has been scheduled
but before or during its execution. In this case, statements within
the brcmf_btcoex_handler() - such as the container_of macro and
subsequent dereferences of the brcmf_btcoex_info object will cause
a use-after-free access. The following timeline illustrates this
scenario:

CPU0                            | CPU1
brcmf_btcoex_detach             | brcmf_btcoex_timerfunc
                                |   bt_local-&gt;timer_on = false;
  if (cfg-&gt;btcoex-&gt;timer_on)    |
    ...                         |
  cancel_work_sync();           |
  ...                           |   schedule_work(); // Reschedule
                                |
  kfree(cfg-&gt;btcoex); // FREE   |   brcmf_btcoex_handler() // Worker
  /*                            |     btci = container_of(....); // USE
   The kfree() above could      |     ...
   also occur at any point      |     btci-&gt; // USE
   during the worker's execution|
   */                           |

To resolve the race conditions, drop the conditional check and call
timer_shutdown_sync() directly. It can deactivate the timer reliably,
regardless of its current state. Once stopped, the timer_on state is
then set to false.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39863/">CVE-2025-39863 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39863">CVE-2025-39863 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250281">SUSE bug 1250281</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539864" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39864</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39864" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39864" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39864" ref_url="https://www.suse.com/security/cve/CVE-2025-39864" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:19447" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002178.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22405" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: cfg80211: fix use-after-free in cmp_bss()

Following bss_free() quirk introduced in commit 776b3580178f
("cfg80211: track hidden SSID networks properly"), adjust
cfg80211_update_known_bss() to free the last beacon frame
elements only if they're not shared via the corresponding
'hidden_beacon_bss' pointer.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39864/">CVE-2025-39864 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39864">CVE-2025-39864 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250242">SUSE bug 1250242</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539865" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39865</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39865" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39865" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39865" ref_url="https://www.suse.com/security/cve/CVE-2025-39865" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tee: fix NULL pointer dereference in tee_shm_put

tee_shm_put have NULL pointer dereference:

__optee_disable_shm_cache --&gt;
	shm = reg_pair_to_ptr(...);//shm maybe return NULL
        tee_shm_free(shm); --&gt;
		tee_shm_put(shm);//crash

Add check in tee_shm_put to fix it.

panic log:
Unable to handle kernel paging request at virtual address 0000000000100cca
Mem abort info:
ESR = 0x0000000096000004
EC = 0x25: DABT (current EL), IL = 32 bits
SET = 0, FnV = 0
EA = 0, S1PTW = 0
FSC = 0x04: level 0 translation fault
Data abort info:
ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000
CM = 0, WnR = 0, TnD = 0, TagAccess = 0
GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0
user pgtable: 4k pages, 48-bit VAs, pgdp=0000002049d07000
[0000000000100cca] pgd=0000000000000000, p4d=0000000000000000
Internal error: Oops: 0000000096000004 [#1] SMP
CPU: 2 PID: 14442 Comm: systemd-sleep Tainted: P OE ------- ----
6.6.0-39-generic #38
Source Version: 938b255f6cb8817c95b0dd5c8c2944acfce94b07
Hardware name: greatwall GW-001Y1A-FTH, BIOS Great Wall BIOS V3.0
10/26/2022
pstate: 80000005 (Nzcv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : tee_shm_put+0x24/0x188
lr : tee_shm_free+0x14/0x28
sp : ffff001f98f9faf0
x29: ffff001f98f9faf0 x28: ffff0020df543cc0 x27: 0000000000000000
x26: ffff001f811344a0 x25: ffff8000818dac00 x24: ffff800082d8d048
x23: ffff001f850fcd18 x22: 0000000000000001 x21: ffff001f98f9fb88
x20: ffff001f83e76218 x19: ffff001f83e761e0 x18: 000000000000ffff
x17: 303a30303a303030 x16: 0000000000000000 x15: 0000000000000003
x14: 0000000000000001 x13: 0000000000000000 x12: 0101010101010101
x11: 0000000000000001 x10: 0000000000000001 x9 : ffff800080e08d0c
x8 : ffff001f98f9fb88 x7 : 0000000000000000 x6 : 0000000000000000
x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000000
x2 : ffff001f83e761e0 x1 : 00000000ffff001f x0 : 0000000000100cca
Call trace:
tee_shm_put+0x24/0x188
tee_shm_free+0x14/0x28
__optee_disable_shm_cache+0xa8/0x108
optee_shutdown+0x28/0x38
platform_shutdown+0x28/0x40
device_shutdown+0x144/0x2b0
kernel_power_off+0x3c/0x80
hibernate+0x35c/0x388
state_store+0x64/0x80
kobj_attr_store+0x14/0x28
sysfs_kf_write+0x48/0x60
kernfs_fop_write_iter+0x128/0x1c0
vfs_write+0x270/0x370
ksys_write+0x6c/0x100
__arm64_sys_write+0x20/0x30
invoke_syscall+0x4c/0x120
el0_svc_common.constprop.0+0x44/0xf0
do_el0_svc+0x24/0x38
el0_svc+0x24/0x88
el0t_64_sync_handler+0x134/0x150
el0t_64_sync+0x14c/0x15
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39865/">CVE-2025-39865 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39865">CVE-2025-39865 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250294">SUSE bug 1250294</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539866" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39866</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39866" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39866" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39866" ref_url="https://www.suse.com/security/cve/CVE-2025-39866" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs: writeback: fix use-after-free in __mark_inode_dirty()

An use-after-free issue occurred when __mark_inode_dirty() get the
bdi_writeback that was in the progress of switching.

CPU: 1 PID: 562 Comm: systemd-random- Not tainted 6.6.56-gb4403bd46a8e #1
......
pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : __mark_inode_dirty+0x124/0x418
lr : __mark_inode_dirty+0x118/0x418
sp : ffffffc08c9dbbc0
........
Call trace:
 __mark_inode_dirty+0x124/0x418
 generic_update_time+0x4c/0x60
 file_modified+0xcc/0xd0
 ext4_buffered_write_iter+0x58/0x124
 ext4_file_write_iter+0x54/0x704
 vfs_write+0x1c0/0x308
 ksys_write+0x74/0x10c
 __arm64_sys_write+0x1c/0x28
 invoke_syscall+0x48/0x114
 el0_svc_common.constprop.0+0xc0/0xe0
 do_el0_svc+0x1c/0x28
 el0_svc+0x40/0xe4
 el0t_64_sync_handler+0x120/0x12c
 el0t_64_sync+0x194/0x198

Root cause is:

systemd-random-seed                         kworker
----------------------------------------------------------------------
___mark_inode_dirty                     inode_switch_wbs_work_fn

  spin_lock(&amp;inode-&gt;i_lock);
  inode_attach_wb
  locked_inode_to_wb_and_lock_list
     get inode-&gt;i_wb
     spin_unlock(&amp;inode-&gt;i_lock);
     spin_lock(&amp;wb-&gt;list_lock)
  spin_lock(&amp;inode-&gt;i_lock)
  inode_io_list_move_locked
  spin_unlock(&amp;wb-&gt;list_lock)
  spin_unlock(&amp;inode-&gt;i_lock)
                                    spin_lock(&amp;old_wb-&gt;list_lock)
                                      inode_do_switch_wbs
                                        spin_lock(&amp;inode-&gt;i_lock)
                                        inode-&gt;i_wb = new_wb
                                        spin_unlock(&amp;inode-&gt;i_lock)
                                    spin_unlock(&amp;old_wb-&gt;list_lock)
                                    wb_put_many(old_wb, nr_switched)
                                      cgwb_release
                                      old wb released
  wb_wakeup_delayed() accesses wb,
  then trigger the use-after-free
  issue

Fix this race condition by holding inode spinlock until
wb_wakeup_delayed() finished.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39866/">CVE-2025-39866 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39866">CVE-2025-39866 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250455">SUSE bug 1250455</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031708" comment="cluster-md-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031709" comment="cluster-md-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031710" comment="cluster-md-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031711" comment="dlm-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031712" comment="dlm-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031713" comment="dlm-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031714" comment="dtb-allwinner-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031715" comment="dtb-altera-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031716" comment="dtb-amazon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031717" comment="dtb-amd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031718" comment="dtb-amlogic-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031719" comment="dtb-apm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031720" comment="dtb-apple-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031721" comment="dtb-arm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031722" comment="dtb-broadcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031723" comment="dtb-cavium-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031724" comment="dtb-exynos-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031725" comment="dtb-freescale-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031726" comment="dtb-hisilicon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031727" comment="dtb-lg-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031728" comment="dtb-marvell-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031729" comment="dtb-mediatek-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031730" comment="dtb-nvidia-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031731" comment="dtb-qcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031732" comment="dtb-renesas-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031733" comment="dtb-rockchip-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031734" comment="dtb-socionext-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031735" comment="dtb-sprd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031736" comment="dtb-xilinx-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031737" comment="gfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031738" comment="gfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031739" comment="gfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031742" comment="kernel-64kb-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031743" comment="kernel-64kb-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031747" comment="kernel-default-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031748" comment="kernel-default-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031750" comment="kernel-docs-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031751" comment="kernel-docs-html-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031752" comment="kernel-kvmsmall-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031754" comment="kernel-kvmsmall-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031756" comment="kernel-obs-build-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031757" comment="kernel-obs-qa-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031760" comment="kernel-rt-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031761" comment="kernel-rt-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031762" comment="kernel-rt-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031764" comment="kernel-source-vanilla-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031765" comment="kernel-syms-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031766" comment="kernel-zfcpdump-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031767" comment="kselftests-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031768" comment="kselftests-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031769" comment="kselftests-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031770" comment="ocfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031771" comment="ocfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031772" comment="ocfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539869" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39869</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39869" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39869" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39869" ref_url="https://www.suse.com/security/cve/CVE-2025-39869" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03628-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3761-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dmaengine: ti: edma: Fix memory allocation size for queue_priority_map

Fix a critical memory allocation bug in edma_setup_from_hw() where
queue_priority_map was allocated with insufficient memory. The code
declared queue_priority_map as s8 (*)[2] (pointer to array of 2 s8),
but allocated memory using sizeof(s8) instead of the correct size.

This caused out-of-bounds memory writes when accessing:
  queue_priority_map[i][0] = i;
  queue_priority_map[i][1] = i;

The bug manifested as kernel crashes with "Oops - undefined instruction"
on ARM platforms (BeagleBoard-X15) during EDMA driver probe, as the
memory corruption triggered kernel hardening features on Clang.

Change the allocation to use sizeof(*queue_priority_map) which
automatically gets the correct size for the 2D array structure.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39869/">CVE-2025-39869 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39869">CVE-2025-39869 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250406">SUSE bug 1250406</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539870" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39870</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39870" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39870" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39870" ref_url="https://www.suse.com/security/cve/CVE-2025-39870" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dmaengine: idxd: Fix double free in idxd_setup_wqs()

The clean up in idxd_setup_wqs() has had a couple bugs because the error
handling is a bit subtle.  It's simpler to just re-write it in a cleaner
way.  The issues here are:

1) If "idxd-&gt;max_wqs" is &lt;= 0 then we call put_device(conf_dev) when
   "conf_dev" hasn't been initialized.
2) If kzalloc_node() fails then again "conf_dev" is invalid.  It's
   either uninitialized or it points to the "conf_dev" from the
   previous iteration so it leads to a double free.

It's better to free partial loop iterations within the loop and then
the unwinding at the end can handle whole loop iterations.  I also
renamed the labels to describe what the goto does and not where the goto
was located.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39870/">CVE-2025-39870 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39870">CVE-2025-39870 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250402">SUSE bug 1250402</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539871" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39871</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39871" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39871" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39871" ref_url="https://www.suse.com/security/cve/CVE-2025-39871" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dmaengine: idxd: Remove improper idxd_free

The call to idxd_free() introduces a duplicate put_device() leading to a
reference count underflow:
refcount_t: underflow; use-after-free.
WARNING: CPU: 15 PID: 4428 at lib/refcount.c:28 refcount_warn_saturate+0xbe/0x110
...
Call Trace:
 &lt;TASK&gt;
  idxd_remove+0xe4/0x120 [idxd]
  pci_device_remove+0x3f/0xb0
  device_release_driver_internal+0x197/0x200
  driver_detach+0x48/0x90
  bus_remove_driver+0x74/0xf0
  pci_unregister_driver+0x2e/0xb0
  idxd_exit_module+0x34/0x7a0 [idxd]
  __do_sys_delete_module.constprop.0+0x183/0x280
  do_syscall_64+0x54/0xd70
  entry_SYSCALL_64_after_hwframe+0x76/0x7e

The idxd_unregister_devices() which is invoked at the very beginning of
idxd_remove(), already takes care of the necessary put_device() through the
following call path:
idxd_unregister_devices() -&gt; device_unregister() -&gt; put_device()

In addition, when CONFIG_DEBUG_KOBJECT_RELEASE is enabled, put_device() may
trigger asynchronous cleanup via schedule_delayed_work(). If idxd_free() is
called immediately after, it can result in a use-after-free.

Remove the improper idxd_free() to avoid both the refcount underflow and
potential memory corruption during module unload.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39871/">CVE-2025-39871 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39871">CVE-2025-39871 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250377">SUSE bug 1250377</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539873" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39873</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39873" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39873" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39873" ref_url="https://www.suse.com/security/cve/CVE-2025-39873" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: xilinx_can: xcan_write_frame(): fix use-after-free of transmitted SKB

can_put_echo_skb() takes ownership of the SKB and it may be freed
during or after the call.

However, xilinx_can xcan_write_frame() keeps using SKB after the call.

Fix that by only calling can_put_echo_skb() after the code is done
touching the SKB.

The tx_lock is held for the entire xcan_write_frame() execution and
also on the can_get_echo_skb() side so the order of operations does not
matter.

An earlier fix commit 3d3c817c3a40 ("can: xilinx_can: Fix usage of skb
memory") did not move the can_put_echo_skb() call far enough.

[mkl: add "commit" in front of sha1 in patch description]
[mkl: fix indention]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39873/">CVE-2025-39873 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39873">CVE-2025-39873 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250371">SUSE bug 1250371</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539875" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39875</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39875" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39875" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39875" ref_url="https://www.suse.com/security/cve/CVE-2025-39875" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

igb: Fix NULL pointer dereference in ethtool loopback test

The igb driver currently causes a NULL pointer dereference when executing
the ethtool loopback test. This occurs because there is no associated
q_vector for the test ring when it is set up, as interrupts are typically
not added to the test rings.

Since commit 5ef44b3cb43b removed the napi_id assignment in
__xdp_rxq_info_reg(), there is no longer a need to pass a napi_id to it.
Therefore, simply use 0 as the last parameter.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39875/">CVE-2025-39875 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39875">CVE-2025-39875 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250398">SUSE bug 1250398</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539876" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39876</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39876" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39876" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39876" ref_url="https://www.suse.com/security/cve/CVE-2025-39876" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: fec: Fix possible NPD in fec_enet_phy_reset_after_clk_enable()

The function of_phy_find_device may return NULL, so we need to take
care before dereferencing phy_dev.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39876/">CVE-2025-39876 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39876">CVE-2025-39876 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250400">SUSE bug 1250400</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031708" comment="cluster-md-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031709" comment="cluster-md-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031710" comment="cluster-md-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031711" comment="dlm-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031712" comment="dlm-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031713" comment="dlm-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031714" comment="dtb-allwinner-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031715" comment="dtb-altera-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031716" comment="dtb-amazon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031717" comment="dtb-amd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031718" comment="dtb-amlogic-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031719" comment="dtb-apm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031720" comment="dtb-apple-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031721" comment="dtb-arm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031722" comment="dtb-broadcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031723" comment="dtb-cavium-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031724" comment="dtb-exynos-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031725" comment="dtb-freescale-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031726" comment="dtb-hisilicon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031727" comment="dtb-lg-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031728" comment="dtb-marvell-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031729" comment="dtb-mediatek-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031730" comment="dtb-nvidia-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031731" comment="dtb-qcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031732" comment="dtb-renesas-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031733" comment="dtb-rockchip-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031734" comment="dtb-socionext-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031735" comment="dtb-sprd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031736" comment="dtb-xilinx-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031737" comment="gfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031738" comment="gfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031739" comment="gfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031742" comment="kernel-64kb-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031743" comment="kernel-64kb-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031747" comment="kernel-default-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031748" comment="kernel-default-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031750" comment="kernel-docs-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031751" comment="kernel-docs-html-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031752" comment="kernel-kvmsmall-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031754" comment="kernel-kvmsmall-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031756" comment="kernel-obs-build-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031757" comment="kernel-obs-qa-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031760" comment="kernel-rt-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031761" comment="kernel-rt-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031762" comment="kernel-rt-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031764" comment="kernel-source-vanilla-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031765" comment="kernel-syms-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031766" comment="kernel-zfcpdump-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031767" comment="kselftests-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031768" comment="kselftests-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031769" comment="kselftests-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031770" comment="ocfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031771" comment="ocfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031772" comment="ocfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539877" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39877</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39877" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39877" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39877" ref_url="https://www.suse.com/security/cve/CVE-2025-39877" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/damon/sysfs: fix use-after-free in state_show()

state_show() reads kdamond-&gt;damon_ctx without holding damon_sysfs_lock. 
This allows a use-after-free race:

CPU 0                         CPU 1
-----                         -----
state_show()                  damon_sysfs_turn_damon_on()
ctx = kdamond-&gt;damon_ctx;     mutex_lock(&amp;damon_sysfs_lock);
                              damon_destroy_ctx(kdamond-&gt;damon_ctx);
                              kdamond-&gt;damon_ctx = NULL;
                              mutex_unlock(&amp;damon_sysfs_lock);
damon_is_running(ctx);        /* ctx is freed */
mutex_lock(&amp;ctx-&gt;kdamond_lock); /* UAF */

(The race can also occur with damon_sysfs_kdamonds_rm_dirs() and
damon_sysfs_kdamond_release(), which free or replace the context under
damon_sysfs_lock.)

Fix by taking damon_sysfs_lock before dereferencing the context, mirroring
the locking used in pid_show().

The bug has existed since state_show() first accessed kdamond-&gt;damon_ctx.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39877/">CVE-2025-39877 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39877">CVE-2025-39877 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250408">SUSE bug 1250408</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539880" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39880</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39880" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39880" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39880" ref_url="https://www.suse.com/security/cve/CVE-2025-39880" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

libceph: fix invalid accesses to ceph_connection_v1_info

There is a place where generic code in messenger.c is reading and
another place where it is writing to con-&gt;v1 union member without
checking that the union member is active (i.e. msgr1 is in use).

On 64-bit systems, con-&gt;v1.auth_retry overlaps with con-&gt;v2.out_iter,
so such a read is almost guaranteed to return a bogus value instead of
0 when msgr2 is in use.  This ends up being fairly benign because the
side effect is just the invalidation of the authorizer and successive
fetching of new tickets.

con-&gt;v1.connect_seq overlaps with con-&gt;v2.conn_bufs and the fact that
it's being written to can cause more serious consequences, but luckily
it's not something that happens often.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39880/">CVE-2025-39880 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39880">CVE-2025-39880 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250388">SUSE bug 1250388</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539881" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39881</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39881" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39881" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39881" ref_url="https://www.suse.com/security/cve/CVE-2025-39881" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:21469" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

kernfs: Fix UAF in polling when open file is released

A use-after-free (UAF) vulnerability was identified in the PSI (Pressure
Stall Information) monitoring mechanism:

BUG: KASAN: slab-use-after-free in psi_trigger_poll+0x3c/0x140
Read of size 8 at addr ffff3de3d50bd308 by task systemd/1

psi_trigger_poll+0x3c/0x140
cgroup_pressure_poll+0x70/0xa0
cgroup_file_poll+0x8c/0x100
kernfs_fop_poll+0x11c/0x1c0
ep_item_poll.isra.0+0x188/0x2c0

Allocated by task 1:
cgroup_file_open+0x88/0x388
kernfs_fop_open+0x73c/0xaf0
do_dentry_open+0x5fc/0x1200
vfs_open+0xa0/0x3f0
do_open+0x7e8/0xd08
path_openat+0x2fc/0x6b0
do_filp_open+0x174/0x368

Freed by task 8462:
cgroup_file_release+0x130/0x1f8
kernfs_drain_open_files+0x17c/0x440
kernfs_drain+0x2dc/0x360
kernfs_show+0x1b8/0x288
cgroup_file_show+0x150/0x268
cgroup_pressure_write+0x1dc/0x340
cgroup_file_write+0x274/0x548

Reproduction Steps:
1. Open test/cpu.pressure and establish epoll monitoring
2. Disable monitoring: echo 0 &gt; test/cgroup.pressure
3. Re-enable monitoring: echo 1 &gt; test/cgroup.pressure

The race condition occurs because:
1. When cgroup.pressure is disabled (echo 0 &gt; cgroup.pressure), it:
   - Releases PSI triggers via cgroup_file_release()
   - Frees of-&gt;priv through kernfs_drain_open_files()
2. While epoll still holds reference to the file and continues polling
3. Re-enabling (echo 1 &gt; cgroup.pressure) accesses freed of-&gt;priv

epolling			disable/enable cgroup.pressure
fd=open(cpu.pressure)
while(1)
...
epoll_wait
kernfs_fop_poll
kernfs_get_active = true	echo 0 &gt; cgroup.pressure
...				cgroup_file_show
				kernfs_show
				// inactive kn
				kernfs_drain_open_files
				cft-&gt;release(of);
				kfree(ctx);
				...
kernfs_get_active = false
				echo 1 &gt; cgroup.pressure
				kernfs_show
				kernfs_activate_one(kn);
kernfs_fop_poll
kernfs_get_active = true
cgroup_file_poll
psi_trigger_poll
// UAF
...
end: close(fd)

To address this issue, introduce kernfs_get_active_of() for kernfs open
files to obtain active references. This function will fail if the open file
has been released. Replace kernfs_get_active() with kernfs_get_active_of()
to prevent further operations on released file descriptors.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39881/">CVE-2025-39881 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39881">CVE-2025-39881 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250379">SUSE bug 1250379</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031708" comment="cluster-md-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031709" comment="cluster-md-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031710" comment="cluster-md-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031711" comment="dlm-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031712" comment="dlm-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031713" comment="dlm-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031714" comment="dtb-allwinner-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031715" comment="dtb-altera-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031716" comment="dtb-amazon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031717" comment="dtb-amd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031718" comment="dtb-amlogic-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031719" comment="dtb-apm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031720" comment="dtb-apple-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031721" comment="dtb-arm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031722" comment="dtb-broadcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031723" comment="dtb-cavium-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031724" comment="dtb-exynos-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031725" comment="dtb-freescale-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031726" comment="dtb-hisilicon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031727" comment="dtb-lg-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031728" comment="dtb-marvell-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031729" comment="dtb-mediatek-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031730" comment="dtb-nvidia-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031731" comment="dtb-qcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031732" comment="dtb-renesas-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031733" comment="dtb-rockchip-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031734" comment="dtb-socionext-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031735" comment="dtb-sprd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031736" comment="dtb-xilinx-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031737" comment="gfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031738" comment="gfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031739" comment="gfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031742" comment="kernel-64kb-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031743" comment="kernel-64kb-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031747" comment="kernel-default-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031748" comment="kernel-default-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031750" comment="kernel-docs-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031751" comment="kernel-docs-html-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031752" comment="kernel-kvmsmall-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031754" comment="kernel-kvmsmall-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031756" comment="kernel-obs-build-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031757" comment="kernel-obs-qa-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031760" comment="kernel-rt-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031761" comment="kernel-rt-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031762" comment="kernel-rt-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031764" comment="kernel-source-vanilla-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031765" comment="kernel-syms-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031766" comment="kernel-zfcpdump-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031767" comment="kselftests-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031768" comment="kselftests-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031769" comment="kselftests-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031770" comment="ocfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031771" comment="ocfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031772" comment="ocfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539882" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39882</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39882" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39882" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39882" ref_url="https://www.suse.com/security/cve/CVE-2025-39882" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/mediatek: fix potential OF node use-after-free

The for_each_child_of_node() helper drops the reference it takes to each
node as it iterates over children and an explicit of_node_put() is only
needed when exiting the loop early.

Drop the recently introduced bogus additional reference count decrement
at each iteration that could potentially lead to a use-after-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39882/">CVE-2025-39882 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39882">CVE-2025-39882 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250389">SUSE bug 1250389</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539884" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39884</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39884" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39884" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39884" ref_url="https://www.suse.com/security/cve/CVE-2025-39884" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix subvolume deletion lockup caused by inodes xarray race

There is a race condition between inode eviction and inode caching that
can cause a live struct btrfs_inode to be missing from the root-&gt;inodes
xarray. Specifically, there is a window during evict() between the inode
being unhashed and deleted from the xarray. If btrfs_iget() is called
for the same inode in that window, it will be recreated and inserted
into the xarray, but then eviction will delete the new entry, leaving
nothing in the xarray:

Thread 1                          Thread 2
---------------------------------------------------------------
evict()
  remove_inode_hash()
                                  btrfs_iget_path()
                                    btrfs_iget_locked()
                                    btrfs_read_locked_inode()
                                      btrfs_add_inode_to_root()
  destroy_inode()
    btrfs_destroy_inode()
      btrfs_del_inode_from_root()
        __xa_erase

In turn, this can cause issues for subvolume deletion. Specifically, if
an inode is in this lost state, and all other inodes are evicted, then
btrfs_del_inode_from_root() will call btrfs_add_dead_root() prematurely.
If the lost inode has a delayed_node attached to it, then when
btrfs_clean_one_deleted_snapshot() calls btrfs_kill_all_delayed_nodes(),
it will loop forever because the delayed_nodes xarray will never become
empty (unless memory pressure forces the inode out). We saw this
manifest as soft lockups in production.

Fix it by only deleting the xarray entry if it matches the given inode
(using __xa_cmpxchg()).
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39884/">CVE-2025-39884 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39884">CVE-2025-39884 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250386">SUSE bug 1250386</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539885" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39885</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39885" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39885" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39885" ref_url="https://www.suse.com/security/cve/CVE-2025-39885" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ocfs2: fix recursive semaphore deadlock in fiemap call

syzbot detected a OCFS2 hang due to a recursive semaphore on a
FS_IOC_FIEMAP of the extent list on a specially crafted mmap file.

context_switch kernel/sched/core.c:5357 [inline]
   __schedule+0x1798/0x4cc0 kernel/sched/core.c:6961
   __schedule_loop kernel/sched/core.c:7043 [inline]
   schedule+0x165/0x360 kernel/sched/core.c:7058
   schedule_preempt_disabled+0x13/0x30 kernel/sched/core.c:7115
   rwsem_down_write_slowpath+0x872/0xfe0 kernel/locking/rwsem.c:1185
   __down_write_common kernel/locking/rwsem.c:1317 [inline]
   __down_write kernel/locking/rwsem.c:1326 [inline]
   down_write+0x1ab/0x1f0 kernel/locking/rwsem.c:1591
   ocfs2_page_mkwrite+0x2ff/0xc40 fs/ocfs2/mmap.c:142
   do_page_mkwrite+0x14d/0x310 mm/memory.c:3361
   wp_page_shared mm/memory.c:3762 [inline]
   do_wp_page+0x268d/0x5800 mm/memory.c:3981
   handle_pte_fault mm/memory.c:6068 [inline]
   __handle_mm_fault+0x1033/0x5440 mm/memory.c:6195
   handle_mm_fault+0x40a/0x8e0 mm/memory.c:6364
   do_user_addr_fault+0x764/0x1390 arch/x86/mm/fault.c:1387
   handle_page_fault arch/x86/mm/fault.c:1476 [inline]
   exc_page_fault+0x76/0xf0 arch/x86/mm/fault.c:1532
   asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:623
RIP: 0010:copy_user_generic arch/x86/include/asm/uaccess_64.h:126 [inline]
RIP: 0010:raw_copy_to_user arch/x86/include/asm/uaccess_64.h:147 [inline]
RIP: 0010:_inline_copy_to_user include/linux/uaccess.h:197 [inline]
RIP: 0010:_copy_to_user+0x85/0xb0 lib/usercopy.c:26
Code: e8 00 bc f7 fc 4d 39 fc 72 3d 4d 39 ec 77 38 e8 91 b9 f7 fc 4c 89
f7 89 de e8 47 25 5b fd 0f 01 cb 4c 89 ff 48 89 d9 4c 89 f6 &lt;f3&gt; a4 0f
1f 00 48 89 cb 0f 01 ca 48 89 d8 5b 41 5c 41 5d 41 5e 41
RSP: 0018:ffffc9000403f950 EFLAGS: 00050256
RAX: ffffffff84c7f101 RBX: 0000000000000038 RCX: 0000000000000038
RDX: 0000000000000000 RSI: ffffc9000403f9e0 RDI: 0000200000000060
RBP: ffffc9000403fa90 R08: ffffc9000403fa17 R09: 1ffff92000807f42
R10: dffffc0000000000 R11: fffff52000807f43 R12: 0000200000000098
R13: 00007ffffffff000 R14: ffffc9000403f9e0 R15: 0000200000000060
   copy_to_user include/linux/uaccess.h:225 [inline]
   fiemap_fill_next_extent+0x1c0/0x390 fs/ioctl.c:145
   ocfs2_fiemap+0x888/0xc90 fs/ocfs2/extent_map.c:806
   ioctl_fiemap fs/ioctl.c:220 [inline]
   do_vfs_ioctl+0x1173/0x1430 fs/ioctl.c:532
   __do_sys_ioctl fs/ioctl.c:596 [inline]
   __se_sys_ioctl+0x82/0x170 fs/ioctl.c:584
   do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
   do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94
   entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f5f13850fd9
RSP: 002b:00007ffe3b3518b8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 0000200000000000 RCX: 00007f5f13850fd9
RDX: 0000200000000040 RSI: 00000000c020660b RDI: 0000000000000004
RBP: 6165627472616568 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 00007ffe3b3518f0
R13: 00007ffe3b351b18 R14: 431bde82d7b634db R15: 00007f5f1389a03b

ocfs2_fiemap() takes a read lock of the ip_alloc_sem semaphore (since
v2.6.22-527-g7307de80510a) and calls fiemap_fill_next_extent() to read the
extent list of this running mmap executable.  The user supplied buffer to
hold the fiemap information page faults calling ocfs2_page_mkwrite() which
will take a write lock (since v2.6.27-38-g00dc417fa3e7) of the same
semaphore.  This recursive semaphore will hold filesystem locks and causes
a hang of the fileystem.

The ip_alloc_sem protects the inode extent list and size.  Release the
read semphore before calling fiemap_fill_next_extent() in ocfs2_fiemap()
and ocfs2_fiemap_inline().  This does an unnecessary semaphore lock/unlock
on the last extent but simplifies the error path.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39885/">CVE-2025-39885 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39885">CVE-2025-39885 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250407">SUSE bug 1250407</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539889" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39889</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39889" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39889" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39889" ref_url="https://www.suse.com/security/cve/CVE-2025-39889" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: l2cap: Check encryption key size on incoming connection

This is required for passing GAP/SEC/SEM/BI-04-C PTS test case:
  Security Mode 4 Level 4, Responder - Invalid Encryption Key Size
  - 128 bit

This tests the security key with size from 1 to 15 bytes while the
Security Mode 4 Level 4 requests 16 bytes key size.

Currently PTS fails with the following logs:
- expected:Connection Response:
    Code: [3 (0x03)] Code
    Identifier: (lt)WildCard: Exists(gt)
    Length: [8 (0x0008)]
    Destination CID: (lt)WildCard: Exists(gt)
    Source CID: [64 (0x0040)]
    Result: [3 (0x0003)] Connection refused - Security block
    Status: (lt)WildCard: Exists(gt),
but received:Connection Response:
    Code: [3 (0x03)] Code
    Identifier: [1 (0x01)]
    Length: [8 (0x0008)]
    Destination CID: [64 (0x0040)]
    Source CID: [64 (0x0040)]
    Result: [0 (0x0000)] Connection Successful
    Status: [0 (0x0000)] No further information available

And HCI logs:
&lt; HCI Command: Read Encrypti.. (0x05|0x0008) plen 2
        Handle: 14 Address: 00:1B:DC:F2:24:10 (Vencer Co., Ltd.)
&gt; HCI Event: Command Complete (0x0e) plen 7
      Read Encryption Key Size (0x05|0x0008) ncmd 1
        Status: Success (0x00)
        Handle: 14 Address: 00:1B:DC:F2:24:10 (Vencer Co., Ltd.)
        Key size: 7
&gt; ACL Data RX: Handle 14 flags 0x02 dlen 12
      L2CAP: Connection Request (0x02) ident 1 len 4
        PSM: 4097 (0x1001)
        Source CID: 64
&lt; ACL Data TX: Handle 14 flags 0x00 dlen 16
      L2CAP: Connection Response (0x03) ident 1 len 8
        Destination CID: 64
        Source CID: 64
        Result: Connection successful (0x0000)
        Status: No further information available (0x0000)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39889/">CVE-2025-39889 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39889">CVE-2025-39889 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249833">SUSE bug 1249833</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539890" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39890</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39890" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39890" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39890" ref_url="https://www.suse.com/security/cve/CVE-2025-39890" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath12k: fix memory leak in ath12k_service_ready_ext_event

Currently, in ath12k_service_ready_ext_event(), svc_rdy_ext.mac_phy_caps
is not freed in the failure case, causing a memory leak. The following
trace is observed in kmemleak:

unreferenced object 0xffff8b3eb5789c00 (size 1024):
 comm "softirq", pid 0, jiffies 4294942577
 hex dump (first 32 bytes):
   00 00 00 00 01 00 00 00 00 00 00 00 7b 00 00 10  ............{...
   01 00 00 00 00 00 00 00 01 00 00 00 1f 38 00 00  .............8..
 backtrace (crc 44e1c357):
   __kmalloc_noprof+0x30b/0x410
   ath12k_wmi_mac_phy_caps_parse+0x84/0x100 [ath12k]
   ath12k_wmi_tlv_iter+0x5e/0x140 [ath12k]
   ath12k_wmi_svc_rdy_ext_parse+0x308/0x4c0 [ath12k]
   ath12k_wmi_tlv_iter+0x5e/0x140 [ath12k]
   ath12k_service_ready_ext_event.isra.0+0x44/0xd0 [ath12k]
   ath12k_wmi_op_rx+0x2eb/0xd70 [ath12k]
   ath12k_htc_rx_completion_handler+0x1f4/0x330 [ath12k]
   ath12k_ce_recv_process_cb+0x218/0x300 [ath12k]
   ath12k_pci_ce_workqueue+0x1b/0x30 [ath12k]
   process_one_work+0x219/0x680
   bh_worker+0x198/0x1f0
   tasklet_action+0x13/0x30
   handle_softirqs+0xca/0x460
   __irq_exit_rcu+0xbe/0x110
   irq_exit_rcu+0x9/0x30

Free svc_rdy_ext.mac_phy_caps in the error case to fix this memory leak.

Tested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.4.1-00199-QCAHKSWPL_SILICONZ-1
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-31"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39890/">CVE-2025-39890 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39890">CVE-2025-39890 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250334">SUSE bug 1250334</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250488">SUSE bug 1250488</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539891" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39891</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39891" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39891" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39891" ref_url="https://www.suse.com/security/cve/CVE-2025-39891" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mwifiex: Initialize the chan_stats array to zero

The adapter-&gt;chan_stats[] array is initialized in
mwifiex_init_channel_scan_gap() with vmalloc(), which doesn't zero out
memory.  The array is filled in mwifiex_update_chan_statistics()
and then the user can query the data in mwifiex_cfg80211_dump_survey().

There are two potential issues here.  What if the user calls
mwifiex_cfg80211_dump_survey() before the data has been filled in.
Also the mwifiex_update_chan_statistics() function doesn't necessarily
initialize the whole array.  Since the array was not initialized at
the start that could result in an information leak.

Also this array is pretty small.  It's a maximum of 900 bytes so it's
more appropriate to use kcalloc() instead vmalloc().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39891/">CVE-2025-39891 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39891">CVE-2025-39891 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250712">SUSE bug 1250712</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539895" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39895</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39895" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39895" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39895" ref_url="https://www.suse.com/security/cve/CVE-2025-39895" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sched: Fix sched_numa_find_nth_cpu() if mask offline

sched_numa_find_nth_cpu() uses a bsearch to look for the 'closest'
CPU in sched_domains_numa_masks and given cpus mask. However they
might not intersect if all CPUs in the cpus mask are offline. bsearch
will return NULL in that case, bail out instead of dereferencing a
bogus pointer.

The previous behaviour lead to this bug when using maxcpus=4 on an
rk3399 (LLLLbb) (i.e. booting with all big CPUs offline):

[    1.422922] Unable to handle kernel paging request at virtual address ffffff8000000000
[    1.423635] Mem abort info:
[    1.423889]   ESR = 0x0000000096000006
[    1.424227]   EC = 0x25: DABT (current EL), IL = 32 bits
[    1.424715]   SET = 0, FnV = 0
[    1.424995]   EA = 0, S1PTW = 0
[    1.425279]   FSC = 0x06: level 2 translation fault
[    1.425735] Data abort info:
[    1.425998]   ISV = 0, ISS = 0x00000006, ISS2 = 0x00000000
[    1.426499]   CM = 0, WnR = 0, TnD = 0, TagAccess = 0
[    1.426952]   GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0
[    1.427428] swapper pgtable: 4k pages, 39-bit VAs, pgdp=0000000004a9f000
[    1.428038] [ffffff8000000000] pgd=18000000f7fff403, p4d=18000000f7fff403, pud=18000000f7fff403, pmd=0000000000000000
[    1.429014] Internal error: Oops: 0000000096000006 [#1]  SMP
[    1.429525] Modules linked in:
[    1.429813] CPU: 3 UID: 0 PID: 1 Comm: swapper/0 Not tainted 6.17.0-rc4-dirty #343 PREEMPT
[    1.430559] Hardware name: Pine64 RockPro64 v2.1 (DT)
[    1.431012] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[    1.431634] pc : sched_numa_find_nth_cpu+0x2a0/0x488
[    1.432094] lr : sched_numa_find_nth_cpu+0x284/0x488
[    1.432543] sp : ffffffc084e1b960
[    1.432843] x29: ffffffc084e1b960 x28: ffffff80078a8800 x27: ffffffc0846eb1d0
[    1.433495] x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000000
[    1.434144] x23: 0000000000000000 x22: fffffffffff7f093 x21: ffffffc081de6378
[    1.434792] x20: 0000000000000000 x19: 0000000ffff7f093 x18: 00000000ffffffff
[    1.435441] x17: 3030303866666666 x16: 66663d736b73616d x15: ffffffc104e1b5b7
[    1.436091] x14: 0000000000000000 x13: ffffffc084712860 x12: 0000000000000372
[    1.436739] x11: 0000000000000126 x10: ffffffc08476a860 x9 : ffffffc084712860
[    1.437389] x8 : 00000000ffffefff x7 : ffffffc08476a860 x6 : 0000000000000000
[    1.438036] x5 : 000000000000bff4 x4 : 0000000000000000 x3 : 0000000000000000
[    1.438683] x2 : 0000000000000000 x1 : ffffffc0846eb000 x0 : ffffff8000407b68
[    1.439332] Call trace:
[    1.439559]  sched_numa_find_nth_cpu+0x2a0/0x488 (P)
[    1.440016]  smp_call_function_any+0xc8/0xd0
[    1.440416]  armv8_pmu_init+0x58/0x27c
[    1.440770]  armv8_cortex_a72_pmu_init+0x20/0x2c
[    1.441199]  arm_pmu_device_probe+0x1e4/0x5e8
[    1.441603]  armv8_pmu_device_probe+0x1c/0x28
[    1.442007]  platform_probe+0x5c/0xac
[    1.442347]  really_probe+0xbc/0x298
[    1.442683]  __driver_probe_device+0x78/0x12c
[    1.443087]  driver_probe_device+0xdc/0x160
[    1.443475]  __driver_attach+0x94/0x19c
[    1.443833]  bus_for_each_dev+0x74/0xd4
[    1.444190]  driver_attach+0x24/0x30
[    1.444525]  bus_add_driver+0xe4/0x208
[    1.444874]  driver_register+0x60/0x128
[    1.445233]  __platform_driver_register+0x24/0x30
[    1.445662]  armv8_pmu_driver_init+0x28/0x4c
[    1.446059]  do_one_initcall+0x44/0x25c
[    1.446416]  kernel_init_freeable+0x1dc/0x3bc
[    1.446820]  kernel_init+0x20/0x1d8
[    1.447151]  ret_from_fork+0x10/0x20
[    1.447493] Code: 90022e21 f000e5f5 910de2b5 2a1703e2 (f8767803)
[    1.448040] ---[ end trace 0000000000000000 ]---
[    1.448483] note: swapper/0[1] exited with preempt_count 1
[    1.449047] Kernel panic - not syncing: Attempted to kill init! exitcode=0x0000000b
[    1.449741] SMP: stopping secondary CPUs
[    1.450105] Kernel Offset: disabled
[    1.450419] CPU features: 0x000000,00080000,20002001,0400421b
[    
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39895/">CVE-2025-39895 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39895">CVE-2025-39895 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250721">SUSE bug 1250721</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031708" comment="cluster-md-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031709" comment="cluster-md-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031710" comment="cluster-md-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031711" comment="dlm-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031712" comment="dlm-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031713" comment="dlm-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031714" comment="dtb-allwinner-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031715" comment="dtb-altera-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031716" comment="dtb-amazon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031717" comment="dtb-amd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031718" comment="dtb-amlogic-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031719" comment="dtb-apm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031720" comment="dtb-apple-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031721" comment="dtb-arm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031722" comment="dtb-broadcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031723" comment="dtb-cavium-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031724" comment="dtb-exynos-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031725" comment="dtb-freescale-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031726" comment="dtb-hisilicon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031727" comment="dtb-lg-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031728" comment="dtb-marvell-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031729" comment="dtb-mediatek-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031730" comment="dtb-nvidia-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031731" comment="dtb-qcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031732" comment="dtb-renesas-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031733" comment="dtb-rockchip-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031734" comment="dtb-socionext-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031735" comment="dtb-sprd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031736" comment="dtb-xilinx-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031737" comment="gfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031738" comment="gfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031739" comment="gfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031742" comment="kernel-64kb-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031743" comment="kernel-64kb-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031747" comment="kernel-default-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031748" comment="kernel-default-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031750" comment="kernel-docs-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031751" comment="kernel-docs-html-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031752" comment="kernel-kvmsmall-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031754" comment="kernel-kvmsmall-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031756" comment="kernel-obs-build-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031757" comment="kernel-obs-qa-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031760" comment="kernel-rt-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031761" comment="kernel-rt-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031762" comment="kernel-rt-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031764" comment="kernel-source-vanilla-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031765" comment="kernel-syms-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031766" comment="kernel-zfcpdump-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031767" comment="kselftests-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031768" comment="kselftests-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031769" comment="kselftests-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031770" comment="ocfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031771" comment="ocfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031772" comment="ocfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539896" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39896</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39896" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39896" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39896" ref_url="https://www.suse.com/security/cve/CVE-2025-39896" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

accel/ivpu: Prevent recovery work from being queued during device removal

Use disable_work_sync() instead of cancel_work_sync() in ivpu_dev_fini()
to ensure that no new recovery work items can be queued after device
removal has started. Previously, recovery work could be scheduled even
after canceling existing work, potentially leading to use-after-free
bugs if recovery accessed freed resources.

Rename ivpu_pm_cancel_recovery() to ivpu_pm_disable_recovery() to better
reflect its new behavior.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39896/">CVE-2025-39896 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39896">CVE-2025-39896 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250716">SUSE bug 1250716</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250717">SUSE bug 1250717</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539897" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39897</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39897" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39897" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39897" ref_url="https://www.suse.com/security/cve/CVE-2025-39897" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: xilinx: axienet: Add error handling for RX metadata pointer retrieval

Add proper error checking for dmaengine_desc_get_metadata_ptr() which
can return an error pointer and lead to potential crashes or undefined
behaviour if the pointer retrieval fails.

Properly handle the error by unmapping DMA buffer, freeing the skb and
returning early to prevent further processing with invalid data.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39897/">CVE-2025-39897 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39897">CVE-2025-39897 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250746">SUSE bug 1250746</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539898" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39898</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39898" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39898" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39898" ref_url="https://www.suse.com/security/cve/CVE-2025-39898" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:21933" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002295.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22388" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002268.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22405" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003120.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1581" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39898/">CVE-2025-39898 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39898">CVE-2025-39898 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247374">SUSE bug 1247374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250742">SUSE bug 1250742</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250744">SUSE bug 1250744</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253291">SUSE bug 1253291</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539899" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39899</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39899" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39899" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39899" ref_url="https://www.suse.com/security/cve/CVE-2025-39899" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/userfaultfd: fix kmap_local LIFO ordering for CONFIG_HIGHPTE

With CONFIG_HIGHPTE on 32-bit ARM, move_pages_pte() maps PTE pages using
kmap_local_page(), which requires unmapping in Last-In-First-Out order.

The current code maps dst_pte first, then src_pte, but unmaps them in the
same order (dst_pte, src_pte), violating the LIFO requirement.  This
causes the warning in kunmap_local_indexed():

  WARNING: CPU: 0 PID: 604 at mm/highmem.c:622 kunmap_local_indexed+0x178/0x17c
  addr \!= __fix_to_virt(FIX_KMAP_BEGIN + idx)

Fix this by reversing the unmap order to respect LIFO ordering.

This issue follows the same pattern as similar fixes:
- commit eca6828403b8 ("crypto: skcipher - fix mismatch between mapping and unmapping order")
- commit 8cf57c6df818 ("nilfs2: eliminate staggered calls to kunmap in nilfs_rename")

Both of which addressed the same fundamental requirement that kmap_local
operations must follow LIFO ordering.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39899/">CVE-2025-39899 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39899">CVE-2025-39899 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250739">SUSE bug 1250739</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539900" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39900</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39900" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39900" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39900" ref_url="https://www.suse.com/security/cve/CVE-2025-39900" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net_sched: gen_estimator: fix est_timer() vs CONFIG_PREEMPT_RT=y

syzbot reported a WARNING in est_timer() [1]

Problem here is that with CONFIG_PREEMPT_RT=y, timer callbacks
can be preempted.

Adopt preempt_disable_nested()/preempt_enable_nested() to fix this.

[1]
 WARNING: CPU: 0 PID: 16 at ./include/linux/seqlock.h:221 __seqprop_assert include/linux/seqlock.h:221 [inline]
 WARNING: CPU: 0 PID: 16 at ./include/linux/seqlock.h:221 est_timer+0x6dc/0x9f0 net/core/gen_estimator.c:93
Modules linked in:
CPU: 0 UID: 0 PID: 16 Comm: ktimers/0 Not tainted syzkaller #0 PREEMPT_{RT,(full)}
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025
 RIP: 0010:__seqprop_assert include/linux/seqlock.h:221 [inline]
 RIP: 0010:est_timer+0x6dc/0x9f0 net/core/gen_estimator.c:93
Call Trace:
 &lt;TASK&gt;
  call_timer_fn+0x17e/0x5f0 kernel/time/timer.c:1747
  expire_timers kernel/time/timer.c:1798 [inline]
  __run_timers kernel/time/timer.c:2372 [inline]
  __run_timer_base+0x648/0x970 kernel/time/timer.c:2384
  run_timer_base kernel/time/timer.c:2393 [inline]
  run_timer_softirq+0xb7/0x180 kernel/time/timer.c:2403
  handle_softirqs+0x22c/0x710 kernel/softirq.c:579
  __do_softirq kernel/softirq.c:613 [inline]
  run_ktimerd+0xcf/0x190 kernel/softirq.c:1043
  smpboot_thread_fn+0x53f/0xa60 kernel/smpboot.c:160
  kthread+0x70e/0x8a0 kernel/kthread.c:463
  ret_from_fork+0x3fc/0x770 arch/x86/kernel/process.c:148
  ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
 &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39900/">CVE-2025-39900 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39900">CVE-2025-39900 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250758">SUSE bug 1250758</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539902" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39902</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39902" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39902" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39902" ref_url="https://www.suse.com/security/cve/CVE-2025-39902" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/slub: avoid accessing metadata when pointer is invalid in object_err()

object_err() reports details of an object for further debugging, such as
the freelist pointer, redzone, etc. However, if the pointer is invalid,
attempting to access object metadata can lead to a crash since it does
not point to a valid object.

One known path to the crash is when alloc_consistency_checks()
determines the pointer to the allocated object is invalid because of a
freelist corruption, and calls object_err() to report it. The debug code
should report and handle the corruption gracefully and not crash in the
process.

In case the pointer is NULL or check_valid_pointer() returns false for
the pointer, only print the pointer value and skip accessing metadata.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39902/">CVE-2025-39902 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39902">CVE-2025-39902 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250702">SUSE bug 1250702</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539903" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39903</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39903" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39903" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39903" ref_url="https://www.suse.com/security/cve/CVE-2025-39903" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

of_numa: fix uninitialized memory nodes causing kernel panic

When there are memory-only nodes (nodes without CPUs), these nodes are not
properly initialized, causing kernel panic during boot.

of_numa_init
	of_numa_parse_cpu_nodes
		node_set(nid, numa_nodes_parsed);
	of_numa_parse_memory_nodes

In of_numa_parse_cpu_nodes, numa_nodes_parsed gets updated only for nodes
containing CPUs.  Memory-only nodes should have been updated in
of_numa_parse_memory_nodes, but they weren't.

Subsequently, when free_area_init() attempts to access NODE_DATA() for
these uninitialized memory nodes, the kernel panics due to NULL pointer
dereference.

This can be reproduced on ARM64 QEMU with 1 CPU and 2 memory nodes:

qemu-system-aarch64 \
-cpu host -nographic \
-m 4G -smp 1 \
-machine virt,accel=kvm,gic-version=3,iommu=smmuv3 \
-object memory-backend-ram,size=2G,id=mem0 \
-object memory-backend-ram,size=2G,id=mem1 \
-numa node,nodeid=0,memdev=mem0 \
-numa node,nodeid=1,memdev=mem1 \
-kernel $IMAGE \
-hda $DISK \
-append "console=ttyAMA0 root=/dev/vda rw earlycon"

[    0.000000] Booting Linux on physical CPU 0x0000000000 [0x481fd010]
[    0.000000] Linux version 6.17.0-rc1-00001-gabb4b3daf18c-dirty (yintirui@local) (gcc (GCC) 12.3.1, GNU ld (GNU Binutils) 2.41) #52 SMP PREEMPT Mon Aug 18 09:49:40 CST 2025
[    0.000000] KASLR enabled
[    0.000000] random: crng init done
[    0.000000] Machine model: linux,dummy-virt
[    0.000000] efi: UEFI not found.
[    0.000000] earlycon: pl11 at MMIO 0x0000000009000000 (options '')
[    0.000000] printk: legacy bootconsole [pl11] enabled
[    0.000000] OF: reserved mem: Reserved memory: No reserved-memory node in the DT
[    0.000000] NODE_DATA(0) allocated [mem 0xbfffd9c0-0xbfffffff]
[    0.000000] node 1 must be removed before remove section 23
[    0.000000] Zone ranges:
[    0.000000]   DMA      [mem 0x0000000040000000-0x00000000ffffffff]
[    0.000000]   DMA32    empty
[    0.000000]   Normal   [mem 0x0000000100000000-0x000000013fffffff]
[    0.000000] Movable zone start for each node
[    0.000000] Early memory node ranges
[    0.000000]   node   0: [mem 0x0000000040000000-0x00000000bfffffff]
[    0.000000]   node   1: [mem 0x00000000c0000000-0x000000013fffffff]
[    0.000000] Initmem setup node 0 [mem 0x0000000040000000-0x00000000bfffffff]
[    0.000000] Unable to handle kernel NULL pointer dereference at virtual address 00000000000000a0
[    0.000000] Mem abort info:
[    0.000000]   ESR = 0x0000000096000004
[    0.000000]   EC = 0x25: DABT (current EL), IL = 32 bits
[    0.000000]   SET = 0, FnV = 0
[    0.000000]   EA = 0, S1PTW = 0
[    0.000000]   FSC = 0x04: level 0 translation fault
[    0.000000] Data abort info:
[    0.000000]   ISV = 0, ISS = 0x00000004, ISS2 = 0x00000000
[    0.000000]   CM = 0, WnR = 0, TnD = 0, TagAccess = 0
[    0.000000]   GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0
[    0.000000] [00000000000000a0] user address but active_mm is swapper
[    0.000000] Internal error: Oops: 0000000096000004 [#1]  SMP
[    0.000000] Modules linked in:
[    0.000000] CPU: 0 UID: 0 PID: 0 Comm: swapper Not tainted 6.17.0-rc1-00001-g760c6dabf762-dirty #54 PREEMPT
[    0.000000] Hardware name: linux,dummy-virt (DT)
[    0.000000] pstate: 800000c5 (Nzcv daIF -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[    0.000000] pc : free_area_init+0x50c/0xf9c
[    0.000000] lr : free_area_init+0x5c0/0xf9c
[    0.000000] sp : ffffa02ca0f33c00
[    0.000000] x29: ffffa02ca0f33cb0 x28: 0000000000000000 x27: 0000000000000000
[    0.000000] x26: 4ec4ec4ec4ec4ec5 x25: 00000000000c0000 x24: 00000000000c0000
[    0.000000] x23: 0000000000040000 x22: 0000000000000000 x21: ffffa02ca0f3b368
[    0.000000] x20: ffffa02ca14c7b98 x19: 0000000000000000 x18: 0000000000000002
[    0.000000] x17: 000000000000cacc x16: 0000000000000001 x15: 0000000000000001
[    0.000000] x14: 0000000080000000 x13: 0000000000000018 x12: 0000000000000002
[    0.0
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39903/">CVE-2025-39903 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39903">CVE-2025-39903 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250749">SUSE bug 1250749</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031708" comment="cluster-md-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031709" comment="cluster-md-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031710" comment="cluster-md-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031711" comment="dlm-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031712" comment="dlm-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031713" comment="dlm-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031714" comment="dtb-allwinner-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031715" comment="dtb-altera-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031716" comment="dtb-amazon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031717" comment="dtb-amd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031718" comment="dtb-amlogic-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031719" comment="dtb-apm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031720" comment="dtb-apple-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031721" comment="dtb-arm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031722" comment="dtb-broadcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031723" comment="dtb-cavium-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031724" comment="dtb-exynos-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031725" comment="dtb-freescale-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031726" comment="dtb-hisilicon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031727" comment="dtb-lg-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031728" comment="dtb-marvell-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031729" comment="dtb-mediatek-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031730" comment="dtb-nvidia-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031731" comment="dtb-qcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031732" comment="dtb-renesas-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031733" comment="dtb-rockchip-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031734" comment="dtb-socionext-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031735" comment="dtb-sprd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031736" comment="dtb-xilinx-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031737" comment="gfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031738" comment="gfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031739" comment="gfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031742" comment="kernel-64kb-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031743" comment="kernel-64kb-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031747" comment="kernel-default-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031748" comment="kernel-default-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031750" comment="kernel-docs-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031751" comment="kernel-docs-html-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031752" comment="kernel-kvmsmall-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031754" comment="kernel-kvmsmall-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031756" comment="kernel-obs-build-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031757" comment="kernel-obs-qa-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031760" comment="kernel-rt-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031761" comment="kernel-rt-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031762" comment="kernel-rt-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031764" comment="kernel-source-vanilla-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031765" comment="kernel-syms-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031766" comment="kernel-zfcpdump-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031767" comment="kselftests-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031768" comment="kselftests-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031769" comment="kselftests-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031770" comment="ocfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031771" comment="ocfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031772" comment="ocfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539907" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39907</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39907" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39907" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39907" ref_url="https://www.suse.com/security/cve/CVE-2025-39907" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mtd: rawnand: stm32_fmc2: avoid overlapping mappings on ECC buffer

Avoid below overlapping mappings by using a contiguous
non-cacheable buffer.

[    4.077708] DMA-API: stm32_fmc2_nfc 48810000.nand-controller: cacheline tracking EEXIST,
overlapping mappings aren't supported
[    4.089103] WARNING: CPU: 1 PID: 44 at kernel/dma/debug.c:568 add_dma_entry+0x23c/0x300
[    4.097071] Modules linked in:
[    4.100101] CPU: 1 PID: 44 Comm: kworker/u4:2 Not tainted 6.1.82 #1
[    4.106346] Hardware name: STMicroelectronics STM32MP257F VALID1 SNOR / MB1704 (LPDDR4 Power discrete) + MB1703 + MB1708 (SNOR MB1730) (DT)
[    4.118824] Workqueue: events_unbound deferred_probe_work_func
[    4.124674] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[    4.131624] pc : add_dma_entry+0x23c/0x300
[    4.135658] lr : add_dma_entry+0x23c/0x300
[    4.139792] sp : ffff800009dbb490
[    4.143016] x29: ffff800009dbb4a0 x28: 0000000004008022 x27: ffff8000098a6000
[    4.150174] x26: 0000000000000000 x25: ffff8000099e7000 x24: ffff8000099e7de8
[    4.157231] x23: 00000000ffffffff x22: 0000000000000000 x21: ffff8000098a6a20
[    4.164388] x20: ffff000080964180 x19: ffff800009819ba0 x18: 0000000000000006
[    4.171545] x17: 6361727420656e69 x16: 6c6568636163203a x15: 72656c6c6f72746e
[    4.178602] x14: 6f632d646e616e2e x13: ffff800009832f58 x12: 00000000000004ec
[    4.185759] x11: 00000000000001a4 x10: ffff80000988af58 x9 : ffff800009832f58
[    4.192916] x8 : 00000000ffffefff x7 : ffff80000988af58 x6 : 80000000fffff000
[    4.199972] x5 : 000000000000bff4 x4 : 0000000000000000 x3 : 0000000000000000
[    4.207128] x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff0000812d2c40
[    4.214185] Call trace:
[    4.216605]  add_dma_entry+0x23c/0x300
[    4.220338]  debug_dma_map_sg+0x198/0x350
[    4.224373]  __dma_map_sg_attrs+0xa0/0x110
[    4.228411]  dma_map_sg_attrs+0x10/0x2c
[    4.232247]  stm32_fmc2_nfc_xfer.isra.0+0x1c8/0x3fc
[    4.237088]  stm32_fmc2_nfc_seq_read_page+0xc8/0x174
[    4.242127]  nand_read_oob+0x1d4/0x8e0
[    4.245861]  mtd_read_oob_std+0x58/0x84
[    4.249596]  mtd_read_oob+0x90/0x150
[    4.253231]  mtd_read+0x68/0xac
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39907/">CVE-2025-39907 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39907">CVE-2025-39907 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250713">SUSE bug 1250713</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539909" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39909</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39909" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39909" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39909" ref_url="https://www.suse.com/security/cve/CVE-2025-39909" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/damon/lru_sort: avoid divide-by-zero in damon_lru_sort_apply_parameters()

Patch series "mm/damon: avoid divide-by-zero in DAMON module's parameters
application".

DAMON's RECLAIM and LRU_SORT modules perform no validation on
user-configured parameters during application, which may lead to
division-by-zero errors.

Avoid the divide-by-zero by adding validation checks when DAMON modules
attempt to apply the parameters.


This patch (of 2):

During the calculation of 'hot_thres' and 'cold_thres', either
'sample_interval' or 'aggr_interval' is used as the divisor, which may
lead to division-by-zero errors.  Fix it by directly returning -EINVAL
when such a case occurs.  Additionally, since 'aggr_interval' is already
required to be set no smaller than 'sample_interval' in damon_set_attrs(),
only the case where 'sample_interval' is zero needs to be checked.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39909/">CVE-2025-39909 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39909">CVE-2025-39909 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250711">SUSE bug 1250711</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539911" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39911</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39911" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39911" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39911" ref_url="https://www.suse.com/security/cve/CVE-2025-39911" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i40e: fix IRQ freeing in i40e_vsi_request_irq_msix error path

If request_irq() in i40e_vsi_request_irq_msix() fails in an iteration
later than the first, the error path wants to free the IRQs requested
so far. However, it uses the wrong dev_id argument for free_irq(), so
it does not free the IRQs correctly and instead triggers the warning:

 Trying to free already-free IRQ 173
 WARNING: CPU: 25 PID: 1091 at kernel/irq/manage.c:1829 __free_irq+0x192/0x2c0
 Modules linked in: i40e(+) [...]
 CPU: 25 UID: 0 PID: 1091 Comm: NetworkManager Not tainted 6.17.0-rc1+ #1 PREEMPT(lazy)
 Hardware name: [...]
 RIP: 0010:__free_irq+0x192/0x2c0
 [...]
 Call Trace:
  &lt;TASK&gt;
  free_irq+0x32/0x70
  i40e_vsi_request_irq_msix.cold+0x63/0x8b [i40e]
  i40e_vsi_request_irq+0x79/0x80 [i40e]
  i40e_vsi_open+0x21f/0x2f0 [i40e]
  i40e_open+0x63/0x130 [i40e]
  __dev_open+0xfc/0x210
  __dev_change_flags+0x1fc/0x240
  netif_change_flags+0x27/0x70
  do_setlink.isra.0+0x341/0xc70
  rtnl_newlink+0x468/0x860
  rtnetlink_rcv_msg+0x375/0x450
  netlink_rcv_skb+0x5c/0x110
  netlink_unicast+0x288/0x3c0
  netlink_sendmsg+0x20d/0x430
  ____sys_sendmsg+0x3a2/0x3d0
  ___sys_sendmsg+0x99/0xe0
  __sys_sendmsg+0x8a/0xf0
  do_syscall_64+0x82/0x2c0
  entry_SYSCALL_64_after_hwframe+0x76/0x7e
  [...]
  &lt;/TASK&gt;
 ---[ end trace 0000000000000000 ]---

Use the same dev_id for free_irq() as for request_irq().

I tested this with inserting code to fail intentionally.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39911/">CVE-2025-39911 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39911">CVE-2025-39911 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250704">SUSE bug 1250704</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031708" comment="cluster-md-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031709" comment="cluster-md-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031710" comment="cluster-md-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031711" comment="dlm-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031712" comment="dlm-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031713" comment="dlm-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031714" comment="dtb-allwinner-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031715" comment="dtb-altera-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031716" comment="dtb-amazon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031717" comment="dtb-amd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031718" comment="dtb-amlogic-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031719" comment="dtb-apm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031720" comment="dtb-apple-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031721" comment="dtb-arm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031722" comment="dtb-broadcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031723" comment="dtb-cavium-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031724" comment="dtb-exynos-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031725" comment="dtb-freescale-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031726" comment="dtb-hisilicon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031727" comment="dtb-lg-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031728" comment="dtb-marvell-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031729" comment="dtb-mediatek-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031730" comment="dtb-nvidia-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031731" comment="dtb-qcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031732" comment="dtb-renesas-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031733" comment="dtb-rockchip-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031734" comment="dtb-socionext-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031735" comment="dtb-sprd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031736" comment="dtb-xilinx-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031737" comment="gfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031738" comment="gfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031739" comment="gfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031742" comment="kernel-64kb-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031743" comment="kernel-64kb-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031747" comment="kernel-default-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031748" comment="kernel-default-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031750" comment="kernel-docs-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031751" comment="kernel-docs-html-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031752" comment="kernel-kvmsmall-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031754" comment="kernel-kvmsmall-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031756" comment="kernel-obs-build-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031757" comment="kernel-obs-qa-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031760" comment="kernel-rt-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031761" comment="kernel-rt-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031762" comment="kernel-rt-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031764" comment="kernel-source-vanilla-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031765" comment="kernel-syms-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031766" comment="kernel-zfcpdump-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031767" comment="kselftests-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031768" comment="kselftests-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031769" comment="kselftests-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031770" comment="ocfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031771" comment="ocfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031772" comment="ocfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539913" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39913</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39913" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39913" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39913" ref_url="https://www.suse.com/security/cve/CVE-2025-39913" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate psock-&gt;cork.

syzbot reported the splat below. [0]

The repro does the following:

  1. Load a sk_msg prog that calls bpf_msg_cork_bytes(msg, cork_bytes)
  2. Attach the prog to a SOCKMAP
  3. Add a socket to the SOCKMAP
  4. Activate fault injection
  5. Send data less than cork_bytes

At 5., the data is carried over to the next sendmsg() as it is
smaller than the cork_bytes specified by bpf_msg_cork_bytes().

Then, tcp_bpf_send_verdict() tries to allocate psock-&gt;cork to hold
the data, but this fails silently due to fault injection + __GFP_NOWARN.

If the allocation fails, we need to revert the sk-&gt;sk_forward_alloc
change done by sk_msg_alloc().

Let's call sk_msg_free() when tcp_bpf_send_verdict fails to allocate
psock-&gt;cork.

The "*copied" also needs to be updated such that a proper error can
be returned to the caller, sendmsg. It fails to allocate psock-&gt;cork.
Nothing has been corked so far, so this patch simply sets "*copied"
to 0.

[0]:
WARNING: net/ipv4/af_inet.c:156 at inet_sock_destruct+0x623/0x730 net/ipv4/af_inet.c:156, CPU#1: syz-executor/5983
Modules linked in:
CPU: 1 UID: 0 PID: 5983 Comm: syz-executor Not tainted syzkaller #0 PREEMPT(full)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025
RIP: 0010:inet_sock_destruct+0x623/0x730 net/ipv4/af_inet.c:156
Code: 0f 0b 90 e9 62 fe ff ff e8 7a db b5 f7 90 0f 0b 90 e9 95 fe ff ff e8 6c db b5 f7 90 0f 0b 90 e9 bb fe ff ff e8 5e db b5 f7 90 &lt;0f&gt; 0b 90 e9 e1 fe ff ff 89 f9 80 e1 07 80 c1 03 38 c1 0f 8c 9f fc
RSP: 0018:ffffc90000a08b48 EFLAGS: 00010246
RAX: ffffffff8a09d0b2 RBX: dffffc0000000000 RCX: ffff888024a23c80
RDX: 0000000000000100 RSI: 0000000000000fff RDI: 0000000000000000
RBP: 0000000000000fff R08: ffff88807e07c627 R09: 1ffff1100fc0f8c4
R10: dffffc0000000000 R11: ffffed100fc0f8c5 R12: ffff88807e07c380
R13: dffffc0000000000 R14: ffff88807e07c60c R15: 1ffff1100fc0f872
FS:  00005555604c4500(0000) GS:ffff888125af1000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00005555604df5c8 CR3: 0000000032b06000 CR4: 00000000003526f0
Call Trace:
 &lt;IRQ&gt;
 __sk_destruct+0x86/0x660 net/core/sock.c:2339
 rcu_do_batch kernel/rcu/tree.c:2605 [inline]
 rcu_core+0xca8/0x1770 kernel/rcu/tree.c:2861
 handle_softirqs+0x286/0x870 kernel/softirq.c:579
 __do_softirq kernel/softirq.c:613 [inline]
 invoke_softirq kernel/softirq.c:453 [inline]
 __irq_exit_rcu+0xca/0x1f0 kernel/softirq.c:680
 irq_exit_rcu+0x9/0x30 kernel/softirq.c:696
 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1052 [inline]
 sysvec_apic_timer_interrupt+0xa6/0xc0 arch/x86/kernel/apic/apic.c:1052
 &lt;/IRQ&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39913/">CVE-2025-39913 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39913">CVE-2025-39913 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250705">SUSE bug 1250705</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539916" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39916</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39916" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39916" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39916" ref_url="https://www.suse.com/security/cve/CVE-2025-39916" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/damon/reclaim: avoid divide-by-zero in damon_reclaim_apply_parameters()

When creating a new scheme of DAMON_RECLAIM, the calculation of
'min_age_region' uses 'aggr_interval' as the divisor, which may lead to
division-by-zero errors.  Fix it by directly returning -EINVAL when such a
case occurs.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39916/">CVE-2025-39916 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39916">CVE-2025-39916 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250719">SUSE bug 1250719</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539917" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39917</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39917" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39917" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39917" ref_url="https://www.suse.com/security/cve/CVE-2025-39917" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix out-of-bounds dynptr write in bpf_crypto_crypt

Stanislav reported that in bpf_crypto_crypt() the destination dynptr's
size is not validated to be at least as large as the source dynptr's
size before calling into the crypto backend with 'len = src_len'. This
can result in an OOB write when the destination is smaller than the
source.

Concretely, in mentioned function, psrc and pdst are both linear
buffers fetched from each dynptr:

  psrc = __bpf_dynptr_data(src, src_len);
  [...]
  pdst = __bpf_dynptr_data_rw(dst, dst_len);
  [...]
  err = decrypt ?
        ctx-&gt;type-&gt;decrypt(ctx-&gt;tfm, psrc, pdst, src_len, piv) :
        ctx-&gt;type-&gt;encrypt(ctx-&gt;tfm, psrc, pdst, src_len, piv);

The crypto backend expects pdst to be large enough with a src_len length
that can be written. Add an additional src_len &gt; dst_len check and bail
out if it's the case. Note that these kfuncs are accessible under root
privileges only.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39917/">CVE-2025-39917 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39917">CVE-2025-39917 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250723">SUSE bug 1250723</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539918" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39918</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39918" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39918" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39918" ref_url="https://www.suse.com/security/cve/CVE-2025-39918" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:22405" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mt76: fix linked list corruption

Never leave scheduled wcid entries on the temporary on-stack list
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39918/">CVE-2025-39918 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39918">CVE-2025-39918 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250729">SUSE bug 1250729</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39922</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39922" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39922" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39922" ref_url="https://www.suse.com/security/cve/CVE-2025-39922" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ixgbe: fix incorrect map used in eee linkmode

incorrectly used ixgbe_lp_map in loops intended to populate the
supported and advertised EEE linkmode bitmaps based on ixgbe_ls_map.
This results in incorrect bit setting and potential out-of-bounds
access, since ixgbe_lp_map and ixgbe_ls_map have different sizes
and purposes.

ixgbe_lp_map[i] -&gt; ixgbe_ls_map[i]

Use ixgbe_ls_map for supported and advertised linkmodes, and keep
ixgbe_lp_map usage only for link partner (lp_advertised) mapping.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39922/">CVE-2025-39922 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39922">CVE-2025-39922 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250722">SUSE bug 1250722</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539923" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39923</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39923" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39923" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39923" ref_url="https://www.suse.com/security/cve/CVE-2025-39923" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dmaengine: qcom: bam_dma: Fix DT error handling for num-channels/ees

When we don't have a clock specified in the device tree, we have no way to
ensure the BAM is on. This is often the case for remotely-controlled or
remotely-powered BAM instances. In this case, we need to read num-channels
from the DT to have all the necessary information to complete probing.

However, at the moment invalid device trees without clock and without
num-channels still continue probing, because the error handling is missing
return statements. The driver will then later try to read the number of
channels from the registers. This is unsafe, because it relies on boot
firmware and lucky timing to succeed. Unfortunately, the lack of proper
error handling here has been abused for several Qualcomm SoCs upstream,
causing early boot crashes in several situations [1, 2].

Avoid these early crashes by erroring out when any of the required DT
properties are missing. Note that this will break some of the existing DTs
upstream (mainly BAM instances related to the crypto engine). However,
clearly these DTs have never been tested properly, since the error in the
kernel log was just ignored. It's safer to disable the crypto engine for
these broken DTBs.

[1]: https://lore.kernel.org/r/CY01EKQVWE36.B9X5TDXAREPF@fairphone.com/
[2]: https://lore.kernel.org/r/20230626145959.646747-1-krzysztof.kozlowski@linaro.org/
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39923/">CVE-2025-39923 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39923">CVE-2025-39923 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250741">SUSE bug 1250741</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539925" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39925</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39925" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39925" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39925" ref_url="https://www.suse.com/security/cve/CVE-2025-39925" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:22865" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: j1939: implement NETDEV_UNREGISTER notification handler

syzbot is reporting

  unregister_netdevice: waiting for vcan0 to become free. Usage count = 2

problem, for j1939 protocol did not have NETDEV_UNREGISTER notification
handler for undoing changes made by j1939_sk_bind().

Commit 25fe97cb7620 ("can: j1939: move j1939_priv_put() into sk_destruct
callback") expects that a call to j1939_priv_put() can be unconditionally
delayed until j1939_sk_sock_destruct() is called. But we need to call
j1939_priv_put() against an extra ref held by j1939_sk_bind() call
(as a part of undoing changes made by j1939_sk_bind()) as soon as
NETDEV_UNREGISTER notification fires (i.e. before j1939_sk_sock_destruct()
is called via j1939_sk_release()). Otherwise, the extra ref on "struct
j1939_priv" held by j1939_sk_bind() call prevents "struct net_device" from
dropping the usage count to 1; making it impossible for
unregister_netdevice() to continue.

[mkl: remove space in front of label]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39925/">CVE-2025-39925 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39925">CVE-2025-39925 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250736">SUSE bug 1250736</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539926" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39926</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39926" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39926" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39926" ref_url="https://www.suse.com/security/cve/CVE-2025-39926" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

genetlink: fix genl_bind() invoking bind() after -EPERM

Per family bind/unbind callbacks were introduced to allow families
to track multicast group consumer presence, e.g. to start or stop
producing events depending on listeners.

However, in genl_bind() the bind() callback was invoked even if
capability checks failed and ret was set to -EPERM. This means that
callbacks could run on behalf of unauthorized callers while the
syscall still returned failure to user space.

Fix this by only invoking bind() after "if (ret) break;" check
i.e. after permission checks have succeeded.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39926/">CVE-2025-39926 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39926">CVE-2025-39926 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250737">SUSE bug 1250737</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539927" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39927</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39927" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39927" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39927" ref_url="https://www.suse.com/security/cve/CVE-2025-39927" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ceph: fix race condition validating r_parent before applying state

Add validation to ensure the cached parent directory inode matches the
directory info in MDS replies. This prevents client-side race conditions
where concurrent operations (e.g. rename) cause r_parent to become stale
between request initiation and reply processing, which could lead to
applying state changes to incorrect directory inodes.

[ idryomov: folded a kerneldoc fixup and a follow-up fix from Alex to
  move CEPH_CAP_PIN reference when r_parent is updated:

  When the parent directory lock is not held, req-&gt;r_parent can become
  stale and is updated to point to the correct inode.  However, the
  associated CEPH_CAP_PIN reference was not being adjusted.  The
  CEPH_CAP_PIN is a reference on an inode that is tracked for
  accounting purposes.  Moving this pin is important to keep the
  accounting balanced. When the pin was not moved from the old parent
  to the new one, it created two problems: The reference on the old,
  stale parent was never released, causing a reference leak.
  A reference for the new parent was never acquired, creating the risk
  of a reference underflow later in ceph_mdsc_release_request().  This
  patch corrects the logic by releasing the pin from the old parent and
  acquiring it for the new parent when r_parent is switched.  This
  ensures reference accounting stays balanced. ]
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39927/">CVE-2025-39927 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39927">CVE-2025-39927 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250738">SUSE bug 1250738</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539931" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39931</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39931" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39931" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39931" ref_url="https://www.suse.com/security/cve/CVE-2025-39931" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: af_alg - Set merge to zero early in af_alg_sendmsg

If an error causes af_alg_sendmsg to abort, ctx-&gt;merge may contain
a garbage value from the previous loop.  This may then trigger a
crash on the next entry into af_alg_sendmsg when it attempts to do
a merge that can't be done.

Fix this by setting ctx-&gt;merge to zero near the start of the loop.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39931/">CVE-2025-39931 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39931">CVE-2025-39931 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251100">SUSE bug 1251100</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39934</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39934" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39934" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39934" ref_url="https://www.suse.com/security/cve/CVE-2025-39934" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm: bridge: anx7625: Fix NULL pointer dereference with early IRQ

If the interrupt occurs before resource initialization is complete, the
interrupt handler/worker may access uninitialized data such as the I2C
tcpc_client device, potentially leading to NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39934/">CVE-2025-39934 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39934">CVE-2025-39934 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251146">SUSE bug 1251146</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539937" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39937</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39937" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39937" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39937" ref_url="https://www.suse.com/security/cve/CVE-2025-39937" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: rfkill: gpio: Fix crash due to dereferencering uninitialized pointer

Since commit 7d5e9737efda ("net: rfkill: gpio: get the name and type from
device property") rfkill_find_type() gets called with the possibly
uninitialized "const char *type_name;" local variable.

On x86 systems when rfkill-gpio binds to a "BCM4752" or "LNV4752"
acpi_device, the rfkill-&gt;type is set based on the ACPI acpi_device_id:

        rfkill-&gt;type = (unsigned)id-&gt;driver_data;

and there is no "type" property so device_property_read_string() will fail
and leave type_name uninitialized, leading to a potential crash.

rfkill_find_type() does accept a NULL pointer, fix the potential crash
by initializing type_name to NULL.

Note likely sofar this has not been caught because:

1. Not many x86 machines actually have a "BCM4752"/"LNV4752" acpi_device
2. The stack happened to contain NULL where type_name is stored
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39937/">CVE-2025-39937 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39937">CVE-2025-39937 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251143">SUSE bug 1251143</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539938" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39938</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39938" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39938" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39938" ref_url="https://www.suse.com/security/cve/CVE-2025-39938" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: qcom: q6apm-lpass-dais: Fix NULL pointer dereference if source graph failed

If earlier opening of source graph fails (e.g. ADSP rejects due to
incorrect audioreach topology), the graph is closed and
"dai_data-&gt;graph[dai-&gt;id]" is assigned NULL.  Preparing the DAI for sink
graph continues though and next call to q6apm_lpass_dai_prepare()
receives dai_data-&gt;graph[dai-&gt;id]=NULL leading to NULL pointer
exception:

  qcom-apm gprsvc:service:2:1: Error (1) Processing 0x01001002 cmd
  qcom-apm gprsvc:service:2:1: DSP returned error[1001002] 1
  q6apm-lpass-dais 30000000.remoteproc:glink-edge:gpr:service@1:bedais: fail to start APM port 78
  q6apm-lpass-dais 30000000.remoteproc:glink-edge:gpr:service@1:bedais: ASoC: error at snd_soc_pcm_dai_prepare on TX_CODEC_DMA_TX_3: -22
  Unable to handle kernel NULL pointer dereference at virtual address 00000000000000a8
  ...
  Call trace:
   q6apm_graph_media_format_pcm+0x48/0x120 (P)
   q6apm_lpass_dai_prepare+0x110/0x1b4
   snd_soc_pcm_dai_prepare+0x74/0x108
   __soc_pcm_prepare+0x44/0x160
   dpcm_be_dai_prepare+0x124/0x1c0
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39938/">CVE-2025-39938 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39938">CVE-2025-39938 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251134">SUSE bug 1251134</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539944" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39944</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39944" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39944" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39944" ref_url="https://www.suse.com/security/cve/CVE-2025-39944" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

octeontx2-pf: Fix use-after-free bugs in otx2_sync_tstamp()

The original code relies on cancel_delayed_work() in otx2_ptp_destroy(),
which does not ensure that the delayed work item synctstamp_work has fully
completed if it was already running. This leads to use-after-free scenarios
where otx2_ptp is deallocated by otx2_ptp_destroy(), while synctstamp_work
remains active and attempts to dereference otx2_ptp in otx2_sync_tstamp().
Furthermore, the synctstamp_work is cyclic, the likelihood of triggering
the bug is nonnegligible.

A typical race condition is illustrated below:

CPU 0 (cleanup)           | CPU 1 (delayed work callback)
otx2_remove()             |
  otx2_ptp_destroy()      | otx2_sync_tstamp()
    cancel_delayed_work() |
    kfree(ptp)            |
                          |   ptp = container_of(...); //UAF
                          |   ptp-&gt; //UAF

This is confirmed by a KASAN report:

BUG: KASAN: slab-use-after-free in __run_timer_base.part.0+0x7d7/0x8c0
Write of size 8 at addr ffff88800aa09a18 by task bash/136
...
Call Trace:
 &lt;IRQ&gt;
 dump_stack_lvl+0x55/0x70
 print_report+0xcf/0x610
 ? __run_timer_base.part.0+0x7d7/0x8c0
 kasan_report+0xb8/0xf0
 ? __run_timer_base.part.0+0x7d7/0x8c0
 __run_timer_base.part.0+0x7d7/0x8c0
 ? __pfx___run_timer_base.part.0+0x10/0x10
 ? __pfx_read_tsc+0x10/0x10
 ? ktime_get+0x60/0x140
 ? lapic_next_event+0x11/0x20
 ? clockevents_program_event+0x1d4/0x2a0
 run_timer_softirq+0xd1/0x190
 handle_softirqs+0x16a/0x550
 irq_exit_rcu+0xaf/0xe0
 sysvec_apic_timer_interrupt+0x70/0x80
 &lt;/IRQ&gt;
...
Allocated by task 1:
 kasan_save_stack+0x24/0x50
 kasan_save_track+0x14/0x30
 __kasan_kmalloc+0x7f/0x90
 otx2_ptp_init+0xb1/0x860
 otx2_probe+0x4eb/0xc30
 local_pci_probe+0xdc/0x190
 pci_device_probe+0x2fe/0x470
 really_probe+0x1ca/0x5c0
 __driver_probe_device+0x248/0x310
 driver_probe_device+0x44/0x120
 __driver_attach+0xd2/0x310
 bus_for_each_dev+0xed/0x170
 bus_add_driver+0x208/0x500
 driver_register+0x132/0x460
 do_one_initcall+0x89/0x300
 kernel_init_freeable+0x40d/0x720
 kernel_init+0x1a/0x150
 ret_from_fork+0x10c/0x1a0
 ret_from_fork_asm+0x1a/0x30

Freed by task 136:
 kasan_save_stack+0x24/0x50
 kasan_save_track+0x14/0x30
 kasan_save_free_info+0x3a/0x60
 __kasan_slab_free+0x3f/0x50
 kfree+0x137/0x370
 otx2_ptp_destroy+0x38/0x80
 otx2_remove+0x10d/0x4c0
 pci_device_remove+0xa6/0x1d0
 device_release_driver_internal+0xf8/0x210
 pci_stop_bus_device+0x105/0x150
 pci_stop_and_remove_bus_device_locked+0x15/0x30
 remove_store+0xcc/0xe0
 kernfs_fop_write_iter+0x2c3/0x440
 vfs_write+0x871/0xd70
 ksys_write+0xee/0x1c0
 do_syscall_64+0xac/0x280
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
...

Replace cancel_delayed_work() with cancel_delayed_work_sync() to ensure
that the delayed work item is properly canceled before the otx2_ptp is
deallocated.

This bug was initially identified through static analysis. To reproduce
and test it, I simulated the OcteonTX2 PCI device in QEMU and introduced
artificial delays within the otx2_sync_tstamp() function to increase the
likelihood of triggering the bug.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39944/">CVE-2025-39944 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39944">CVE-2025-39944 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251120">SUSE bug 1251120</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539945" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39945</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39945" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39945" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39945" ref_url="https://www.suse.com/security/cve/CVE-2025-39945" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cnic: Fix use-after-free bugs in cnic_delete_task

The original code uses cancel_delayed_work() in cnic_cm_stop_bnx2x_hw(),
which does not guarantee that the delayed work item 'delete_task' has
fully completed if it was already running. Additionally, the delayed work
item is cyclic, the flush_workqueue() in cnic_cm_stop_bnx2x_hw() only
blocks and waits for work items that were already queued to the
workqueue prior to its invocation. Any work items submitted after
flush_workqueue() is called are not included in the set of tasks that the
flush operation awaits. This means that after the cyclic work items have
finished executing, a delayed work item may still exist in the workqueue.
This leads to use-after-free scenarios where the cnic_dev is deallocated
by cnic_free_dev(), while delete_task remains active and attempt to
dereference cnic_dev in cnic_delete_task().

A typical race condition is illustrated below:

CPU 0 (cleanup)              | CPU 1 (delayed work callback)
cnic_netdev_event()          |
  cnic_stop_hw()             | cnic_delete_task()
    cnic_cm_stop_bnx2x_hw()  | ...
      cancel_delayed_work()  | /* the queue_delayed_work()
      flush_workqueue()      |    executes after flush_workqueue()*/
                             | queue_delayed_work()
  cnic_free_dev(dev)//free   | cnic_delete_task() //new instance
                             |   dev = cp-&gt;dev; //use

Replace cancel_delayed_work() with cancel_delayed_work_sync() to ensure
that the cyclic delayed work item is properly canceled and that any
ongoing execution of the work item completes before the cnic_dev is
deallocated. Furthermore, since cancel_delayed_work_sync() uses
__flush_work(work, true) to synchronously wait for any currently
executing instance of the work item to finish, the flush_workqueue()
becomes redundant and should be removed.

This bug was identified through static analysis. To reproduce the issue
and validate the fix, I simulated the cnic PCI device in QEMU and
introduced intentional delays - such as inserting calls to ssleep()
within the cnic_delete_task() function - to increase the likelihood
of triggering the bug.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39945/">CVE-2025-39945 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39945">CVE-2025-39945 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251230">SUSE bug 1251230</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539946" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39946</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39946" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39946" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39946" ref_url="https://www.suse.com/security/cve/CVE-2025-39946" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tls: make sure to abort the stream if headers are bogus

Normally we wait for the socket to buffer up the whole record
before we service it. If the socket has a tiny buffer, however,
we read out the data sooner, to prevent connection stalls.
Make sure that we abort the connection when we find out late
that the record is actually invalid. Retrying the parsing is
fine in itself but since we copy some more data each time
before we parse we can overflow the allocated skb space.

Constructing a scenario in which we're under pressure without
enough data in the socket to parse the length upfront is quite
hard. syzbot figured out a way to do this by serving us the header
in small OOB sends, and then filling in the recvbuf with a large
normal send.

Make sure that tls_rx_msg_size() aborts strp, if we reach
an invalid record there's really no way to recover.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39946/">CVE-2025-39946 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39946">CVE-2025-39946 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251114">SUSE bug 1251114</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539947" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39947</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39947" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39947" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39947" ref_url="https://www.suse.com/security/cve/CVE-2025-39947" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: Harden uplink netdev access against device unbind

The function mlx5_uplink_netdev_get() gets the uplink netdevice
pointer from mdev-&gt;mlx5e_res.uplink_netdev. However, the netdevice can
be removed and its pointer cleared when unbound from the mlx5_core.eth
driver. This results in a NULL pointer, causing a kernel panic.

 BUG: unable to handle page fault for address: 0000000000001300
 at RIP: 0010:mlx5e_vport_rep_load+0x22a/0x270 [mlx5_core]
 Call Trace:
  &lt;TASK&gt;
  mlx5_esw_offloads_rep_load+0x68/0xe0 [mlx5_core]
  esw_offloads_enable+0x593/0x910 [mlx5_core]
  mlx5_eswitch_enable_locked+0x341/0x420 [mlx5_core]
  mlx5_devlink_eswitch_mode_set+0x17e/0x3a0 [mlx5_core]
  devlink_nl_eswitch_set_doit+0x60/0xd0
  genl_family_rcv_msg_doit+0xe0/0x130
  genl_rcv_msg+0x183/0x290
  netlink_rcv_skb+0x4b/0xf0
  genl_rcv+0x24/0x40
  netlink_unicast+0x255/0x380
  netlink_sendmsg+0x1f3/0x420
  __sock_sendmsg+0x38/0x60
  __sys_sendto+0x119/0x180
  do_syscall_64+0x53/0x1d0
  entry_SYSCALL_64_after_hwframe+0x4b/0x53

Ensure the pointer is valid before use by checking it for NULL. If it
is valid, immediately call netdev_hold() to take a reference, and
preventing the netdevice from being freed while it is in use.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39947/">CVE-2025-39947 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39947">CVE-2025-39947 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251232">SUSE bug 1251232</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031708" comment="cluster-md-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031709" comment="cluster-md-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031710" comment="cluster-md-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031711" comment="dlm-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031712" comment="dlm-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031713" comment="dlm-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031714" comment="dtb-allwinner-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031715" comment="dtb-altera-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031716" comment="dtb-amazon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031717" comment="dtb-amd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031718" comment="dtb-amlogic-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031719" comment="dtb-apm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031720" comment="dtb-apple-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031721" comment="dtb-arm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031722" comment="dtb-broadcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031723" comment="dtb-cavium-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031724" comment="dtb-exynos-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031725" comment="dtb-freescale-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031726" comment="dtb-hisilicon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031727" comment="dtb-lg-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031728" comment="dtb-marvell-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031729" comment="dtb-mediatek-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031730" comment="dtb-nvidia-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031731" comment="dtb-qcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031732" comment="dtb-renesas-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031733" comment="dtb-rockchip-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031734" comment="dtb-socionext-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031735" comment="dtb-sprd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031736" comment="dtb-xilinx-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031737" comment="gfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031738" comment="gfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031739" comment="gfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031742" comment="kernel-64kb-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031743" comment="kernel-64kb-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031747" comment="kernel-default-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031748" comment="kernel-default-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031750" comment="kernel-docs-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031751" comment="kernel-docs-html-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031752" comment="kernel-kvmsmall-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031754" comment="kernel-kvmsmall-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031756" comment="kernel-obs-build-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031757" comment="kernel-obs-qa-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031760" comment="kernel-rt-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031761" comment="kernel-rt-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031762" comment="kernel-rt-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031764" comment="kernel-source-vanilla-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031765" comment="kernel-syms-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031766" comment="kernel-zfcpdump-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031767" comment="kselftests-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031768" comment="kselftests-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031769" comment="kselftests-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031770" comment="ocfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031771" comment="ocfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031772" comment="ocfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539948" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39948</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39948" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39948" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39948" ref_url="https://www.suse.com/security/cve/CVE-2025-39948" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: fix Rx page leak on multi-buffer frames

The ice_put_rx_mbuf() function handles calling ice_put_rx_buf() for each
buffer in the current frame. This function was introduced as part of
handling multi-buffer XDP support in the ice driver.

It works by iterating over the buffers from first_desc up to 1 plus the
total number of fragments in the frame, cached from before the XDP program
was executed.

If the hardware posts a descriptor with a size of 0, the logic used in
ice_put_rx_mbuf() breaks. Such descriptors get skipped and don't get added
as fragments in ice_add_xdp_frag. Since the buffer isn't counted as a
fragment, we do not iterate over it in ice_put_rx_mbuf(), and thus we don't
call ice_put_rx_buf().

Because we don't call ice_put_rx_buf(), we don't attempt to re-use the
page or free it. This leaves a stale page in the ring, as we don't
increment next_to_alloc.

The ice_reuse_rx_page() assumes that the next_to_alloc has been incremented
properly, and that it always points to a buffer with a NULL page. Since
this function doesn't check, it will happily recycle a page over the top
of the next_to_alloc buffer, losing track of the old page.

Note that this leak only occurs for multi-buffer frames. The
ice_put_rx_mbuf() function always handles at least one buffer, so a
single-buffer frame will always get handled correctly. It is not clear
precisely why the hardware hands us descriptors with a size of 0 sometimes,
but it happens somewhat regularly with "jumbo frames" used by 9K MTU.

To fix ice_put_rx_mbuf(), we need to make sure to call ice_put_rx_buf() on
all buffers between first_desc and next_to_clean. Borrow the logic of a
similar function in i40e used for this same purpose. Use the same logic
also in ice_get_pgcnts().

Instead of iterating over just the number of fragments, use a loop which
iterates until the current index reaches to the next_to_clean element just
past the current frame. Unlike i40e, the ice_put_rx_mbuf() function does
call ice_put_rx_buf() on the last buffer of the frame indicating the end of
packet.

For non-linear (multi-buffer) frames, we need to take care when adjusting
the pagecnt_bias. An XDP program might release fragments from the tail of
the frame, in which case that fragment page is already released. Only
update the pagecnt_bias for the first descriptor and fragments still
remaining post-XDP program. Take care to only access the shared info for
fragmented buffers, as this avoids a significant cache miss.

The xdp_xmit value only needs to be updated if an XDP program is run, and
only once per packet. Drop the xdp_xmit pointer argument from
ice_put_rx_mbuf(). Instead, set xdp_xmit in the ice_clean_rx_irq() function
directly. This avoids needing to pass the argument and avoids an extra
bit-wise OR for each buffer in the frame.

Move the increment of the ntc local variable to ensure its updated *before*
all calls to ice_get_pgcnts() or ice_put_rx_mbuf(), as the loop logic
requires the index of the element just after the current frame.

Now that we use an index pointer in the ring to identify the packet, we no
longer need to track or cache the number of fragments in the rx_ring.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="5.3/CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39948/">CVE-2025-39948 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39948">CVE-2025-39948 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251233">SUSE bug 1251233</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031708" comment="cluster-md-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031709" comment="cluster-md-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031710" comment="cluster-md-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031711" comment="dlm-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031712" comment="dlm-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031713" comment="dlm-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031714" comment="dtb-allwinner-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031715" comment="dtb-altera-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031716" comment="dtb-amazon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031717" comment="dtb-amd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031718" comment="dtb-amlogic-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031719" comment="dtb-apm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031720" comment="dtb-apple-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031721" comment="dtb-arm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031722" comment="dtb-broadcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031723" comment="dtb-cavium-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031724" comment="dtb-exynos-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031725" comment="dtb-freescale-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031726" comment="dtb-hisilicon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031727" comment="dtb-lg-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031728" comment="dtb-marvell-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031729" comment="dtb-mediatek-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031730" comment="dtb-nvidia-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031731" comment="dtb-qcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031732" comment="dtb-renesas-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031733" comment="dtb-rockchip-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031734" comment="dtb-socionext-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031735" comment="dtb-sprd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031736" comment="dtb-xilinx-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031737" comment="gfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031738" comment="gfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031739" comment="gfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031742" comment="kernel-64kb-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031743" comment="kernel-64kb-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031747" comment="kernel-default-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031748" comment="kernel-default-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031750" comment="kernel-docs-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031751" comment="kernel-docs-html-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031752" comment="kernel-kvmsmall-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031754" comment="kernel-kvmsmall-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031756" comment="kernel-obs-build-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031757" comment="kernel-obs-qa-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031760" comment="kernel-rt-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031761" comment="kernel-rt-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031762" comment="kernel-rt-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031764" comment="kernel-source-vanilla-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031765" comment="kernel-syms-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031766" comment="kernel-zfcpdump-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031767" comment="kselftests-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031768" comment="kselftests-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031769" comment="kselftests-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031770" comment="ocfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031771" comment="ocfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031772" comment="ocfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539949" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39949</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39949" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39949" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39949" ref_url="https://www.suse.com/security/cve/CVE-2025-39949" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

qed: Don't collect too many protection override GRC elements

In the protection override dump path, the firmware can return far too
many GRC elements, resulting in attempting to write past the end of the
previously-kmalloc'ed dump buffer.

This will result in a kernel panic with reason:

 BUG: unable to handle kernel paging request at ADDRESS

where "ADDRESS" is just past the end of the protection override dump
buffer. The start address of the buffer is:
 p_hwfn-&gt;cdev-&gt;dbg_features[DBG_FEATURE_PROTECTION_OVERRIDE].dump_buf
and the size of the buffer is buf_size in the same data structure.

The panic can be arrived at from either the qede Ethernet driver path:

    [exception RIP: qed_grc_dump_addr_range+0x108]
 qed_protection_override_dump at ffffffffc02662ed [qed]
 qed_dbg_protection_override_dump at ffffffffc0267792 [qed]
 qed_dbg_feature at ffffffffc026aa8f [qed]
 qed_dbg_all_data at ffffffffc026b211 [qed]
 qed_fw_fatal_reporter_dump at ffffffffc027298a [qed]
 devlink_health_do_dump at ffffffff82497f61
 devlink_health_report at ffffffff8249cf29
 qed_report_fatal_error at ffffffffc0272baf [qed]
 qede_sp_task at ffffffffc045ed32 [qede]
 process_one_work at ffffffff81d19783

or the qedf storage driver path:

    [exception RIP: qed_grc_dump_addr_range+0x108]
 qed_protection_override_dump at ffffffffc068b2ed [qed]
 qed_dbg_protection_override_dump at ffffffffc068c792 [qed]
 qed_dbg_feature at ffffffffc068fa8f [qed]
 qed_dbg_all_data at ffffffffc0690211 [qed]
 qed_fw_fatal_reporter_dump at ffffffffc069798a [qed]
 devlink_health_do_dump at ffffffff8aa95e51
 devlink_health_report at ffffffff8aa9ae19
 qed_report_fatal_error at ffffffffc0697baf [qed]
 qed_hw_err_notify at ffffffffc06d32d7 [qed]
 qed_spq_post at ffffffffc06b1011 [qed]
 qed_fcoe_destroy_conn at ffffffffc06b2e91 [qed]
 qedf_cleanup_fcport at ffffffffc05e7597 [qedf]
 qedf_rport_event_handler at ffffffffc05e7bf7 [qedf]
 fc_rport_work at ffffffffc02da715 [libfc]
 process_one_work at ffffffff8a319663

Resolve this by clamping the firmware's return value to the maximum
number of legal elements the firmware should return.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39949/">CVE-2025-39949 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39949">CVE-2025-39949 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251177">SUSE bug 1251177</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031708" comment="cluster-md-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031709" comment="cluster-md-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031710" comment="cluster-md-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031711" comment="dlm-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031712" comment="dlm-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031713" comment="dlm-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031714" comment="dtb-allwinner-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031715" comment="dtb-altera-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031716" comment="dtb-amazon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031717" comment="dtb-amd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031718" comment="dtb-amlogic-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031719" comment="dtb-apm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031720" comment="dtb-apple-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031721" comment="dtb-arm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031722" comment="dtb-broadcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031723" comment="dtb-cavium-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031724" comment="dtb-exynos-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031725" comment="dtb-freescale-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031726" comment="dtb-hisilicon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031727" comment="dtb-lg-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031728" comment="dtb-marvell-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031729" comment="dtb-mediatek-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031730" comment="dtb-nvidia-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031731" comment="dtb-qcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031732" comment="dtb-renesas-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031733" comment="dtb-rockchip-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031734" comment="dtb-socionext-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031735" comment="dtb-sprd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031736" comment="dtb-xilinx-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031737" comment="gfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031738" comment="gfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031739" comment="gfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031742" comment="kernel-64kb-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031743" comment="kernel-64kb-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031747" comment="kernel-default-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031748" comment="kernel-default-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031750" comment="kernel-docs-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031751" comment="kernel-docs-html-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031752" comment="kernel-kvmsmall-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031754" comment="kernel-kvmsmall-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031756" comment="kernel-obs-build-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031757" comment="kernel-obs-qa-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031760" comment="kernel-rt-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031761" comment="kernel-rt-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031762" comment="kernel-rt-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031764" comment="kernel-source-vanilla-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031765" comment="kernel-syms-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031766" comment="kernel-zfcpdump-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031767" comment="kselftests-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031768" comment="kselftests-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031769" comment="kselftests-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031770" comment="ocfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031771" comment="ocfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031772" comment="ocfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539950" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39950</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39950" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39950" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39950" ref_url="https://www.suse.com/security/cve/CVE-2025-39950" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/tcp: Fix a NULL pointer dereference when using TCP-AO with TCP_REPAIR

A NULL pointer dereference can occur in tcp_ao_finish_connect() during a
connect() system call on a socket with a TCP-AO key added and TCP_REPAIR
enabled.

The function is called with skb being NULL and attempts to dereference it
on tcp_hdr(skb)-&gt;seq without a prior skb validation.

Fix this by checking if skb is NULL before dereferencing it.

The commentary is taken from bpf_skops_established(), which is also called
in the same flow. Unlike the function being patched,
bpf_skops_established() validates the skb before dereferencing it.

int main(void){
	struct sockaddr_in sockaddr;
	struct tcp_ao_add tcp_ao;
	int sk;
	int one = 1;

	memset(&amp;sockaddr,'\0',sizeof(sockaddr));
	memset(&amp;tcp_ao,'\0',sizeof(tcp_ao));

	sk = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP);

	sockaddr.sin_family = AF_INET;

	memcpy(tcp_ao.alg_name,"cmac(aes128)",12);
	memcpy(tcp_ao.key,"ABCDEFGHABCDEFGH",16);
	tcp_ao.keylen = 16;

	memcpy(&amp;tcp_ao.addr,&amp;sockaddr,sizeof(sockaddr));

	setsockopt(sk, IPPROTO_TCP, TCP_AO_ADD_KEY, &amp;tcp_ao,
	sizeof(tcp_ao));
	setsockopt(sk, IPPROTO_TCP, TCP_REPAIR, &amp;one, sizeof(one));

	sockaddr.sin_family = AF_INET;
	sockaddr.sin_port = htobe16(123);

	inet_aton("127.0.0.1", &amp;sockaddr.sin_addr);

	connect(sk,(struct sockaddr *)&amp;sockaddr,sizeof(sockaddr));

return 0;
}

$ gcc tcp-ao-nullptr.c -o tcp-ao-nullptr -Wall
$ unshare -Urn

BUG: kernel NULL pointer dereference, address: 00000000000000b6
PGD 1f648d067 P4D 1f648d067 PUD 1982e8067 PMD 0
Oops: Oops: 0000 [#1] SMP NOPTI
Hardware name: VMware, Inc. VMware Virtual Platform/440BX Desktop
Reference Platform, BIOS 6.00 11/12/2020
RIP: 0010:tcp_ao_finish_connect (net/ipv4/tcp_ao.c:1182)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39950/">CVE-2025-39950 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39950">CVE-2025-39950 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251176">SUSE bug 1251176</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031708" comment="cluster-md-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031709" comment="cluster-md-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031710" comment="cluster-md-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031711" comment="dlm-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031712" comment="dlm-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031713" comment="dlm-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031714" comment="dtb-allwinner-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031715" comment="dtb-altera-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031716" comment="dtb-amazon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031717" comment="dtb-amd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031718" comment="dtb-amlogic-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031719" comment="dtb-apm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031720" comment="dtb-apple-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031721" comment="dtb-arm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031722" comment="dtb-broadcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031723" comment="dtb-cavium-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031724" comment="dtb-exynos-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031725" comment="dtb-freescale-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031726" comment="dtb-hisilicon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031727" comment="dtb-lg-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031728" comment="dtb-marvell-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031729" comment="dtb-mediatek-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031730" comment="dtb-nvidia-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031731" comment="dtb-qcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031732" comment="dtb-renesas-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031733" comment="dtb-rockchip-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031734" comment="dtb-socionext-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031735" comment="dtb-sprd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031736" comment="dtb-xilinx-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031737" comment="gfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031738" comment="gfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031739" comment="gfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031742" comment="kernel-64kb-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031743" comment="kernel-64kb-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031747" comment="kernel-default-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031748" comment="kernel-default-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031750" comment="kernel-docs-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031751" comment="kernel-docs-html-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031752" comment="kernel-kvmsmall-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031754" comment="kernel-kvmsmall-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031756" comment="kernel-obs-build-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031757" comment="kernel-obs-qa-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031760" comment="kernel-rt-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031761" comment="kernel-rt-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031762" comment="kernel-rt-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031764" comment="kernel-source-vanilla-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031765" comment="kernel-syms-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031766" comment="kernel-zfcpdump-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031767" comment="kselftests-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031768" comment="kselftests-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031769" comment="kselftests-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031770" comment="ocfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031771" comment="ocfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031772" comment="ocfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539952" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39952</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39952" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39952" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39952" ref_url="https://www.suse.com/security/cve/CVE-2025-39952" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: wilc1000: avoid buffer overflow in WID string configuration

Fix the following copy overflow warning identified by Smatch checker.

 drivers/net/wireless/microchip/wilc1000/wlan_cfg.c:184 wilc_wlan_parse_response_frame()
        error: '__memcpy()' 'cfg-&gt;s[i]-&gt;str' copy overflow (512 vs 65537)

This patch introduces size check before accessing the memory buffer.
The checks are base on the WID type of received data from the firmware.
For WID string configuration, the size limit is determined by individual
element size in 'struct wilc_cfg_str_vals' that is maintained in 'len' field
of 'struct wilc_cfg_str'.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39952/">CVE-2025-39952 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39952">CVE-2025-39952 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251216">SUSE bug 1251216</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539955" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39955</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39955" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39955" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39955" ref_url="https://www.suse.com/security/cve/CVE-2025-39955" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:22388" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002268.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22405" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003120.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23947" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tcp: Clear tcp_sk(sk)-&gt;fastopen_rsk in tcp_disconnect().

syzbot reported the splat below where a socket had tcp_sk(sk)-&gt;fastopen_rsk
in the TCP_ESTABLISHED state. [0]

syzbot reused the server-side TCP Fast Open socket as a new client before
the TFO socket completes 3WHS:

  1. accept()
  2. connect(AF_UNSPEC)
  3. connect() to another destination

As of accept(), sk-&gt;sk_state is TCP_SYN_RECV, and tcp_disconnect() changes
it to TCP_CLOSE and makes connect() possible, which restarts timers.

Since tcp_disconnect() forgot to clear tcp_sk(sk)-&gt;fastopen_rsk, the
retransmit timer triggered the warning and the intended packet was not
retransmitted.

Let's call reqsk_fastopen_remove() in tcp_disconnect().

[0]:
WARNING: CPU: 2 PID: 0 at net/ipv4/tcp_timer.c:542 tcp_retransmit_timer (net/ipv4/tcp_timer.c:542 (discriminator 7))
Modules linked in:
CPU: 2 UID: 0 PID: 0 Comm: swapper/2 Not tainted 6.17.0-rc5-g201825fb4278 #62 PREEMPT(voluntary)
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
RIP: 0010:tcp_retransmit_timer (net/ipv4/tcp_timer.c:542 (discriminator 7))
Code: 41 55 41 54 55 53 48 8b af b8 08 00 00 48 89 fb 48 85 ed 0f 84 55 01 00 00 0f b6 47 12 3c 03 74 0c 0f b6 47 12 3c 04 74 04 90 &lt;0f&gt; 0b 90 48 8b 85 c0 00 00 00 48 89 ef 48 8b 40 30 e8 6a 4f 06 3e
RSP: 0018:ffffc900002f8d40 EFLAGS: 00010293
RAX: 0000000000000002 RBX: ffff888106911400 RCX: 0000000000000017
RDX: 0000000002517619 RSI: ffffffff83764080 RDI: ffff888106911400
RBP: ffff888106d5c000 R08: 0000000000000001 R09: ffffc900002f8de8
R10: 00000000000000c2 R11: ffffc900002f8ff8 R12: ffff888106911540
R13: ffff888106911480 R14: ffff888106911840 R15: ffffc900002f8de0
FS:  0000000000000000(0000) GS:ffff88907b768000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f8044d69d90 CR3: 0000000002c30003 CR4: 0000000000370ef0
Call Trace:
 &lt;IRQ&gt;
 tcp_write_timer (net/ipv4/tcp_timer.c:738)
 call_timer_fn (kernel/time/timer.c:1747)
 __run_timers (kernel/time/timer.c:1799 kernel/time/timer.c:2372)
 timer_expire_remote (kernel/time/timer.c:2385 kernel/time/timer.c:2376 kernel/time/timer.c:2135)
 tmigr_handle_remote_up (kernel/time/timer_migration.c:944 kernel/time/timer_migration.c:1035)
 __walk_groups.isra.0 (kernel/time/timer_migration.c:533 (discriminator 1))
 tmigr_handle_remote (kernel/time/timer_migration.c:1096)
 handle_softirqs (./arch/x86/include/asm/jump_label.h:36 ./include/trace/events/irq.h:142 kernel/softirq.c:580)
 irq_exit_rcu (kernel/softirq.c:614 kernel/softirq.c:453 kernel/softirq.c:680 kernel/softirq.c:696)
 sysvec_apic_timer_interrupt (arch/x86/kernel/apic/apic.c:1050 (discriminator 35) arch/x86/kernel/apic/apic.c:1050 (discriminator 35))
 &lt;/IRQ&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39955/">CVE-2025-39955 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39955">CVE-2025-39955 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251804">SUSE bug 1251804</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031708" comment="cluster-md-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031709" comment="cluster-md-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031710" comment="cluster-md-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031711" comment="dlm-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031712" comment="dlm-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031713" comment="dlm-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031714" comment="dtb-allwinner-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031715" comment="dtb-altera-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031716" comment="dtb-amazon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031717" comment="dtb-amd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031718" comment="dtb-amlogic-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031719" comment="dtb-apm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031720" comment="dtb-apple-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031721" comment="dtb-arm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031722" comment="dtb-broadcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031723" comment="dtb-cavium-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031724" comment="dtb-exynos-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031725" comment="dtb-freescale-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031726" comment="dtb-hisilicon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031727" comment="dtb-lg-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031728" comment="dtb-marvell-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031729" comment="dtb-mediatek-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031730" comment="dtb-nvidia-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031731" comment="dtb-qcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031732" comment="dtb-renesas-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031733" comment="dtb-rockchip-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031734" comment="dtb-socionext-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031735" comment="dtb-sprd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031736" comment="dtb-xilinx-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031737" comment="gfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031738" comment="gfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031739" comment="gfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031742" comment="kernel-64kb-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031743" comment="kernel-64kb-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031747" comment="kernel-default-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031748" comment="kernel-default-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031750" comment="kernel-docs-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031751" comment="kernel-docs-html-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031752" comment="kernel-kvmsmall-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031754" comment="kernel-kvmsmall-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031756" comment="kernel-obs-build-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031757" comment="kernel-obs-qa-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031760" comment="kernel-rt-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031761" comment="kernel-rt-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031762" comment="kernel-rt-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031764" comment="kernel-source-vanilla-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031765" comment="kernel-syms-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031766" comment="kernel-zfcpdump-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031767" comment="kselftests-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031768" comment="kselftests-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031769" comment="kselftests-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031770" comment="ocfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031771" comment="ocfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031772" comment="ocfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539956" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39956</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39956" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39956" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39956" ref_url="https://www.suse.com/security/cve/CVE-2025-39956" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

igc: don't fail igc_probe() on LED setup error

When igc_led_setup() fails, igc_probe() fails and triggers kernel panic
in free_netdev() since unregister_netdev() is not called. [1]
This behavior can be tested using fault-injection framework, especially
the failslab feature. [2]

Since LED support is not mandatory, treat LED setup failures as
non-fatal and continue probe with a warning message, consequently
avoiding the kernel panic.

[1]
 kernel BUG at net/core/dev.c:12047!
 Oops: invalid opcode: 0000 [#1] SMP NOPTI
 CPU: 0 UID: 0 PID: 937 Comm: repro-igc-led-e Not tainted 6.17.0-rc4-enjuk-tnguy-00865-gc4940196ab02 #64 PREEMPT(voluntary)
 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
 RIP: 0010:free_netdev+0x278/0x2b0
 [...]
 Call Trace:
  &lt;TASK&gt;
  igc_probe+0x370/0x910
  local_pci_probe+0x3a/0x80
  pci_device_probe+0xd1/0x200
 [...]

[2]
 #!/bin/bash -ex

 FAILSLAB_PATH=/sys/kernel/debug/failslab/
 DEVICE=0000:00:05.0
 START_ADDR=$(grep " igc_led_setup" /proc/kallsyms \
         | awk '{printf("0x%s", $1)}')
 END_ADDR=$(printf "0x%x" $((START_ADDR + 0x100)))

 echo $START_ADDR &gt; $FAILSLAB_PATH/require-start
 echo $END_ADDR &gt; $FAILSLAB_PATH/require-end
 echo 1 &gt; $FAILSLAB_PATH/times
 echo 100 &gt; $FAILSLAB_PATH/probability
 echo N &gt; $FAILSLAB_PATH/ignore-gfp-wait

 echo $DEVICE &gt; /sys/bus/pci/drivers/igc/bind
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39956/">CVE-2025-39956 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39956">CVE-2025-39956 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251809">SUSE bug 1251809</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031708" comment="cluster-md-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031709" comment="cluster-md-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031710" comment="cluster-md-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031711" comment="dlm-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031712" comment="dlm-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031713" comment="dlm-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031714" comment="dtb-allwinner-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031715" comment="dtb-altera-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031716" comment="dtb-amazon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031717" comment="dtb-amd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031718" comment="dtb-amlogic-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031719" comment="dtb-apm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031720" comment="dtb-apple-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031721" comment="dtb-arm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031722" comment="dtb-broadcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031723" comment="dtb-cavium-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031724" comment="dtb-exynos-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031725" comment="dtb-freescale-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031726" comment="dtb-hisilicon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031727" comment="dtb-lg-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031728" comment="dtb-marvell-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031729" comment="dtb-mediatek-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031730" comment="dtb-nvidia-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031731" comment="dtb-qcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031732" comment="dtb-renesas-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031733" comment="dtb-rockchip-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031734" comment="dtb-socionext-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031735" comment="dtb-sprd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031736" comment="dtb-xilinx-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031737" comment="gfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031738" comment="gfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031739" comment="gfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031742" comment="kernel-64kb-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031743" comment="kernel-64kb-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031747" comment="kernel-default-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031748" comment="kernel-default-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031750" comment="kernel-docs-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031751" comment="kernel-docs-html-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031752" comment="kernel-kvmsmall-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031754" comment="kernel-kvmsmall-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031756" comment="kernel-obs-build-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031757" comment="kernel-obs-qa-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031760" comment="kernel-rt-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031761" comment="kernel-rt-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031762" comment="kernel-rt-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031764" comment="kernel-source-vanilla-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031765" comment="kernel-syms-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031766" comment="kernel-zfcpdump-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031767" comment="kselftests-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031768" comment="kselftests-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031769" comment="kselftests-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031770" comment="ocfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031771" comment="ocfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031772" comment="ocfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539957" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39957</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39957" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39957" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39957" ref_url="https://www.suse.com/security/cve/CVE-2025-39957" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mac80211: increase scan_ies_len for S1G

Currently the S1G capability element is not taken into account
for the scan_ies_len, which leads to a buffer length validation
failure in ieee80211_prep_hw_scan() and subsequent WARN in
__ieee80211_start_scan(). This prevents hw scanning from functioning.
To fix ensure we accommodate for the S1G capability length.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39957/">CVE-2025-39957 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39957">CVE-2025-39957 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251810">SUSE bug 1251810</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39961</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39961" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39961" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39961" ref_url="https://www.suse.com/security/cve/CVE-2025-39961" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommu/amd/pgtbl: Fix possible race while increase page table level

The AMD IOMMU host page table implementation supports dynamic page table levels
(up to 6 levels), starting with a 3-level configuration that expands based on
IOVA address. The kernel maintains a root pointer and current page table level
to enable proper page table walks in alloc_pte()/fetch_pte() operations.

The IOMMU IOVA allocator initially starts with 32-bit address and onces its
exhuasted it switches to 64-bit address (max address is determined based
on IOMMU and device DMA capability). To support larger IOVA, AMD IOMMU
driver increases page table level.

But in unmap path (iommu_v1_unmap_pages()), fetch_pte() reads
pgtable-&gt;[root/mode] without lock. So its possible that in exteme corner case,
when increase_address_space() is updating pgtable-&gt;[root/mode], fetch_pte()
reads wrong page table level (pgtable-&gt;mode). It does compare the value with
level encoded in page table and returns NULL. This will result is
iommu_unmap ops to fail and upper layer may retry/log WARN_ON.

CPU 0                                         CPU 1
------                                       ------
map pages                                    unmap pages
alloc_pte() -&gt; increase_address_space()      iommu_v1_unmap_pages() -&gt; fetch_pte()
  pgtable-&gt;root = pte (new root value)
                                             READ pgtable-&gt;[mode/root]
					       Reads new root, old mode
  Updates mode (pgtable-&gt;mode += 1)

Since Page table level updates are infrequent and already synchronized with a
spinlock, implement seqcount to enable lock-free read operations on the read path.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39961/">CVE-2025-39961 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39961">CVE-2025-39961 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251817">SUSE bug 1251817</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539963" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39963</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39963" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39963" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39963" ref_url="https://www.suse.com/security/cve/CVE-2025-39963" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

io_uring: fix incorrect io_kiocb reference in io_link_skb

In io_link_skb function, there is a bug where prev_notif is incorrectly
assigned using 'nd' instead of 'prev_nd'. This causes the context
validation check to compare the current notification with itself instead
of comparing it with the previous notification.

Fix by using the correct prev_nd parameter when obtaining prev_notif.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-03-07"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39963/">CVE-2025-39963 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39963">CVE-2025-39963 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251819">SUSE bug 1251819</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1251982">SUSE bug 1251982</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031708" comment="cluster-md-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031709" comment="cluster-md-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031710" comment="cluster-md-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031711" comment="dlm-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031712" comment="dlm-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031713" comment="dlm-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031714" comment="dtb-allwinner-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031715" comment="dtb-altera-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031716" comment="dtb-amazon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031717" comment="dtb-amd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031718" comment="dtb-amlogic-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031719" comment="dtb-apm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031720" comment="dtb-apple-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031721" comment="dtb-arm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031722" comment="dtb-broadcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031723" comment="dtb-cavium-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031724" comment="dtb-exynos-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031725" comment="dtb-freescale-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031726" comment="dtb-hisilicon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031727" comment="dtb-lg-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031728" comment="dtb-marvell-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031729" comment="dtb-mediatek-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031730" comment="dtb-nvidia-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031731" comment="dtb-qcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031732" comment="dtb-renesas-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031733" comment="dtb-rockchip-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031734" comment="dtb-socionext-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031735" comment="dtb-sprd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031736" comment="dtb-xilinx-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031737" comment="gfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031738" comment="gfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031739" comment="gfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031742" comment="kernel-64kb-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031743" comment="kernel-64kb-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031747" comment="kernel-default-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031748" comment="kernel-default-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031750" comment="kernel-docs-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031751" comment="kernel-docs-html-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031752" comment="kernel-kvmsmall-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031754" comment="kernel-kvmsmall-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031756" comment="kernel-obs-build-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031757" comment="kernel-obs-qa-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031760" comment="kernel-rt-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031761" comment="kernel-rt-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031762" comment="kernel-rt-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031764" comment="kernel-source-vanilla-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031765" comment="kernel-syms-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031766" comment="kernel-zfcpdump-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031767" comment="kselftests-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031768" comment="kselftests-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031769" comment="kselftests-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031770" comment="ocfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031771" comment="ocfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031772" comment="ocfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539964" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39964</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39964" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39964" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39964" ref_url="https://www.suse.com/security/cve/CVE-2025-39964" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: af_alg - Disallow concurrent writes in af_alg_sendmsg

Issuing two writes to the same af_alg socket is bogus as the
data will be interleaved in an unpredictable fashion.  Furthermore,
concurrent writes may create inconsistencies in the internal
socket state.

Disallow this by adding a new ctx-&gt;write field that indiciates
exclusive ownership for writing.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39964/">CVE-2025-39964 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39964">CVE-2025-39964 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251966">SUSE bug 1251966</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539965" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39965</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39965" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39965" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39965" ref_url="https://www.suse.com/security/cve/CVE-2025-39965" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xfrm: xfrm_alloc_spi shouldn't use 0 as SPI

x-&gt;id.spi == 0 means "no SPI assigned", but since commit
94f39804d891 ("xfrm: Duplicate SPI Handling"), we now create states
and add them to the byspi list with this value.

__xfrm_state_delete doesn't remove those states from the byspi list,
since they shouldn't be there, and this shows up as a UAF the next
time we go through the byspi list.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39965/">CVE-2025-39965 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39965">CVE-2025-39965 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251967">SUSE bug 1251967</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031708" comment="cluster-md-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031709" comment="cluster-md-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031710" comment="cluster-md-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031711" comment="dlm-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031712" comment="dlm-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031713" comment="dlm-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031714" comment="dtb-allwinner-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031715" comment="dtb-altera-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031716" comment="dtb-amazon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031717" comment="dtb-amd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031718" comment="dtb-amlogic-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031719" comment="dtb-apm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031720" comment="dtb-apple-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031721" comment="dtb-arm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031722" comment="dtb-broadcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031723" comment="dtb-cavium-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031724" comment="dtb-exynos-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031725" comment="dtb-freescale-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031726" comment="dtb-hisilicon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031727" comment="dtb-lg-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031728" comment="dtb-marvell-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031729" comment="dtb-mediatek-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031730" comment="dtb-nvidia-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031731" comment="dtb-qcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031732" comment="dtb-renesas-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031733" comment="dtb-rockchip-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031734" comment="dtb-socionext-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031735" comment="dtb-sprd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031736" comment="dtb-xilinx-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031737" comment="gfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031738" comment="gfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031739" comment="gfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031742" comment="kernel-64kb-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031743" comment="kernel-64kb-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031747" comment="kernel-default-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031748" comment="kernel-default-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031750" comment="kernel-docs-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031751" comment="kernel-docs-html-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031752" comment="kernel-kvmsmall-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031754" comment="kernel-kvmsmall-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031756" comment="kernel-obs-build-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031757" comment="kernel-obs-qa-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031760" comment="kernel-rt-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031761" comment="kernel-rt-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031762" comment="kernel-rt-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031764" comment="kernel-source-vanilla-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031765" comment="kernel-syms-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031766" comment="kernel-zfcpdump-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031767" comment="kselftests-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031768" comment="kselftests-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031769" comment="kselftests-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031770" comment="ocfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031771" comment="ocfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031772" comment="ocfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539967" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39967</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39967" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39967" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39967" ref_url="https://www.suse.com/security/cve/CVE-2025-39967" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fbcon: fix integer overflow in fbcon_do_set_font

Fix integer overflow vulnerabilities in fbcon_do_set_font() where font
size calculations could overflow when handling user-controlled font
parameters.

The vulnerabilities occur when:
1. CALC_FONTSZ(h, pitch, charcount) performs h * pith * charcount
   multiplication with user-controlled values that can overflow.
2. FONT_EXTRA_WORDS * sizeof(int) + size addition can also overflow
3. This results in smaller allocations than expected, leading to buffer
   overflows during font data copying.

Add explicit overflow checking using check_mul_overflow() and
check_add_overflow() kernel helpers to safety validate all size
calculations before allocation.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39967/">CVE-2025-39967 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-39967">CVE-2025-39967 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252033">SUSE bug 1252033</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031708" comment="cluster-md-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031709" comment="cluster-md-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031710" comment="cluster-md-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031711" comment="dlm-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031712" comment="dlm-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031713" comment="dlm-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031714" comment="dtb-allwinner-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031715" comment="dtb-altera-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031716" comment="dtb-amazon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031717" comment="dtb-amd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031718" comment="dtb-amlogic-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031719" comment="dtb-apm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031720" comment="dtb-apple-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031721" comment="dtb-arm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031722" comment="dtb-broadcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031723" comment="dtb-cavium-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031724" comment="dtb-exynos-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031725" comment="dtb-freescale-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031726" comment="dtb-hisilicon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031727" comment="dtb-lg-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031728" comment="dtb-marvell-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031729" comment="dtb-mediatek-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031730" comment="dtb-nvidia-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031731" comment="dtb-qcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031732" comment="dtb-renesas-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031733" comment="dtb-rockchip-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031734" comment="dtb-socionext-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031735" comment="dtb-sprd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031736" comment="dtb-xilinx-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031737" comment="gfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031738" comment="gfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031739" comment="gfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031742" comment="kernel-64kb-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031743" comment="kernel-64kb-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031747" comment="kernel-default-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031748" comment="kernel-default-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031750" comment="kernel-docs-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031751" comment="kernel-docs-html-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031752" comment="kernel-kvmsmall-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031754" comment="kernel-kvmsmall-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031756" comment="kernel-obs-build-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031757" comment="kernel-obs-qa-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031760" comment="kernel-rt-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031761" comment="kernel-rt-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031762" comment="kernel-rt-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031764" comment="kernel-source-vanilla-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031765" comment="kernel-syms-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031766" comment="kernel-zfcpdump-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031767" comment="kselftests-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031768" comment="kselftests-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031769" comment="kselftests-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031770" comment="ocfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031771" comment="ocfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031772" comment="ocfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539968" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39968</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39968" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39968" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39968" ref_url="https://www.suse.com/security/cve/CVE-2025-39968" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i40e: add max boundary check for VF filters

There is no check for max filters that VF can request. Add it.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-03-06"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39968/">CVE-2025-39968 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39968">CVE-2025-39968 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252047">SUSE bug 1252047</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031708" comment="cluster-md-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031709" comment="cluster-md-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031710" comment="cluster-md-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031711" comment="dlm-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031712" comment="dlm-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031713" comment="dlm-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031714" comment="dtb-allwinner-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031715" comment="dtb-altera-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031716" comment="dtb-amazon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031717" comment="dtb-amd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031718" comment="dtb-amlogic-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031719" comment="dtb-apm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031720" comment="dtb-apple-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031721" comment="dtb-arm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031722" comment="dtb-broadcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031723" comment="dtb-cavium-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031724" comment="dtb-exynos-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031725" comment="dtb-freescale-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031726" comment="dtb-hisilicon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031727" comment="dtb-lg-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031728" comment="dtb-marvell-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031729" comment="dtb-mediatek-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031730" comment="dtb-nvidia-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031731" comment="dtb-qcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031732" comment="dtb-renesas-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031733" comment="dtb-rockchip-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031734" comment="dtb-socionext-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031735" comment="dtb-sprd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031736" comment="dtb-xilinx-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031737" comment="gfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031738" comment="gfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031739" comment="gfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031742" comment="kernel-64kb-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031743" comment="kernel-64kb-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031747" comment="kernel-default-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031748" comment="kernel-default-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031750" comment="kernel-docs-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031751" comment="kernel-docs-html-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031752" comment="kernel-kvmsmall-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031754" comment="kernel-kvmsmall-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031756" comment="kernel-obs-build-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031757" comment="kernel-obs-qa-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031760" comment="kernel-rt-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031761" comment="kernel-rt-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031762" comment="kernel-rt-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031764" comment="kernel-source-vanilla-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031765" comment="kernel-syms-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031766" comment="kernel-zfcpdump-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031767" comment="kselftests-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031768" comment="kselftests-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031769" comment="kselftests-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031770" comment="ocfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031771" comment="ocfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031772" comment="ocfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539969" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39969</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39969" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39969" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39969" ref_url="https://www.suse.com/security/cve/CVE-2025-39969" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i40e: fix validation of VF state in get resources

VF state I40E_VF_STATE_ACTIVE is not the only state in which
VF is actually active so it should not be used to determine
if a VF is allowed to obtain resources.

Use I40E_VF_STATE_RESOURCES_LOADED that is set only in
i40e_vc_get_vf_resources_msg() and cleared during reset.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39969/">CVE-2025-39969 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39969">CVE-2025-39969 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252044">SUSE bug 1252044</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031708" comment="cluster-md-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031709" comment="cluster-md-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031710" comment="cluster-md-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031711" comment="dlm-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031712" comment="dlm-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031713" comment="dlm-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031714" comment="dtb-allwinner-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031715" comment="dtb-altera-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031716" comment="dtb-amazon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031717" comment="dtb-amd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031718" comment="dtb-amlogic-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031719" comment="dtb-apm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031720" comment="dtb-apple-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031721" comment="dtb-arm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031722" comment="dtb-broadcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031723" comment="dtb-cavium-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031724" comment="dtb-exynos-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031725" comment="dtb-freescale-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031726" comment="dtb-hisilicon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031727" comment="dtb-lg-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031728" comment="dtb-marvell-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031729" comment="dtb-mediatek-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031730" comment="dtb-nvidia-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031731" comment="dtb-qcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031732" comment="dtb-renesas-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031733" comment="dtb-rockchip-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031734" comment="dtb-socionext-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031735" comment="dtb-sprd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031736" comment="dtb-xilinx-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031737" comment="gfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031738" comment="gfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031739" comment="gfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031742" comment="kernel-64kb-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031743" comment="kernel-64kb-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031747" comment="kernel-default-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031748" comment="kernel-default-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031750" comment="kernel-docs-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031751" comment="kernel-docs-html-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031752" comment="kernel-kvmsmall-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031754" comment="kernel-kvmsmall-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031756" comment="kernel-obs-build-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031757" comment="kernel-obs-qa-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031760" comment="kernel-rt-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031761" comment="kernel-rt-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031762" comment="kernel-rt-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031764" comment="kernel-source-vanilla-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031765" comment="kernel-syms-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031766" comment="kernel-zfcpdump-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031767" comment="kselftests-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031768" comment="kselftests-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031769" comment="kselftests-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031770" comment="ocfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031771" comment="ocfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031772" comment="ocfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39970</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39970" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39970" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39970" ref_url="https://www.suse.com/security/cve/CVE-2025-39970" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i40e: fix input validation logic for action_meta

Fix condition to check 'greater or equal' to prevent OOB dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39970/">CVE-2025-39970 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39970">CVE-2025-39970 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252051">SUSE bug 1252051</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031708" comment="cluster-md-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031709" comment="cluster-md-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031710" comment="cluster-md-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031711" comment="dlm-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031712" comment="dlm-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031713" comment="dlm-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031714" comment="dtb-allwinner-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031715" comment="dtb-altera-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031716" comment="dtb-amazon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031717" comment="dtb-amd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031718" comment="dtb-amlogic-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031719" comment="dtb-apm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031720" comment="dtb-apple-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031721" comment="dtb-arm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031722" comment="dtb-broadcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031723" comment="dtb-cavium-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031724" comment="dtb-exynos-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031725" comment="dtb-freescale-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031726" comment="dtb-hisilicon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031727" comment="dtb-lg-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031728" comment="dtb-marvell-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031729" comment="dtb-mediatek-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031730" comment="dtb-nvidia-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031731" comment="dtb-qcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031732" comment="dtb-renesas-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031733" comment="dtb-rockchip-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031734" comment="dtb-socionext-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031735" comment="dtb-sprd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031736" comment="dtb-xilinx-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031737" comment="gfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031738" comment="gfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031739" comment="gfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031742" comment="kernel-64kb-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031743" comment="kernel-64kb-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031747" comment="kernel-default-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031748" comment="kernel-default-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031750" comment="kernel-docs-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031751" comment="kernel-docs-html-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031752" comment="kernel-kvmsmall-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031754" comment="kernel-kvmsmall-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031756" comment="kernel-obs-build-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031757" comment="kernel-obs-qa-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031760" comment="kernel-rt-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031761" comment="kernel-rt-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031762" comment="kernel-rt-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031764" comment="kernel-source-vanilla-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031765" comment="kernel-syms-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031766" comment="kernel-zfcpdump-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031767" comment="kselftests-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031768" comment="kselftests-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031769" comment="kselftests-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031770" comment="ocfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031771" comment="ocfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031772" comment="ocfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539971" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39971</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39971" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39971" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39971" ref_url="https://www.suse.com/security/cve/CVE-2025-39971" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:21469" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003115.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21917" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002256.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21933" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002295.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1581" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002478.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i40e: fix idx validation in config queues msg

Ensure idx is within range of active/initialized TCs when iterating over
vf-&gt;ch[idx] in i40e_vc_config_queues_msg().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39971/">CVE-2025-39971 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39971">CVE-2025-39971 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252052">SUSE bug 1252052</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031708" comment="cluster-md-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031709" comment="cluster-md-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031710" comment="cluster-md-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031711" comment="dlm-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031712" comment="dlm-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031713" comment="dlm-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031714" comment="dtb-allwinner-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031715" comment="dtb-altera-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031716" comment="dtb-amazon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031717" comment="dtb-amd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031718" comment="dtb-amlogic-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031719" comment="dtb-apm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031720" comment="dtb-apple-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031721" comment="dtb-arm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031722" comment="dtb-broadcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031723" comment="dtb-cavium-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031724" comment="dtb-exynos-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031725" comment="dtb-freescale-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031726" comment="dtb-hisilicon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031727" comment="dtb-lg-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031728" comment="dtb-marvell-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031729" comment="dtb-mediatek-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031730" comment="dtb-nvidia-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031731" comment="dtb-qcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031732" comment="dtb-renesas-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031733" comment="dtb-rockchip-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031734" comment="dtb-socionext-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031735" comment="dtb-sprd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031736" comment="dtb-xilinx-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031737" comment="gfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031738" comment="gfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031739" comment="gfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031742" comment="kernel-64kb-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031743" comment="kernel-64kb-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031747" comment="kernel-default-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031748" comment="kernel-default-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031750" comment="kernel-docs-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031751" comment="kernel-docs-html-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031752" comment="kernel-kvmsmall-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031754" comment="kernel-kvmsmall-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031756" comment="kernel-obs-build-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031757" comment="kernel-obs-qa-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031760" comment="kernel-rt-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031761" comment="kernel-rt-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031762" comment="kernel-rt-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031764" comment="kernel-source-vanilla-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031765" comment="kernel-syms-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031766" comment="kernel-zfcpdump-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031767" comment="kselftests-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031768" comment="kselftests-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031769" comment="kselftests-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031770" comment="ocfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031771" comment="ocfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031772" comment="ocfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539972" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39972</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39972" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39972" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39972" ref_url="https://www.suse.com/security/cve/CVE-2025-39972" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i40e: fix idx validation in i40e_validate_queue_map

Ensure idx is within range of active/initialized TCs when iterating over
vf-&gt;ch[idx] in i40e_validate_queue_map().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39972/">CVE-2025-39972 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39972">CVE-2025-39972 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252039">SUSE bug 1252039</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031708" comment="cluster-md-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031709" comment="cluster-md-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031710" comment="cluster-md-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031711" comment="dlm-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031712" comment="dlm-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031713" comment="dlm-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031714" comment="dtb-allwinner-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031715" comment="dtb-altera-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031716" comment="dtb-amazon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031717" comment="dtb-amd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031718" comment="dtb-amlogic-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031719" comment="dtb-apm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031720" comment="dtb-apple-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031721" comment="dtb-arm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031722" comment="dtb-broadcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031723" comment="dtb-cavium-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031724" comment="dtb-exynos-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031725" comment="dtb-freescale-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031726" comment="dtb-hisilicon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031727" comment="dtb-lg-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031728" comment="dtb-marvell-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031729" comment="dtb-mediatek-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031730" comment="dtb-nvidia-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031731" comment="dtb-qcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031732" comment="dtb-renesas-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031733" comment="dtb-rockchip-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031734" comment="dtb-socionext-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031735" comment="dtb-sprd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031736" comment="dtb-xilinx-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031737" comment="gfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031738" comment="gfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031739" comment="gfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031742" comment="kernel-64kb-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031743" comment="kernel-64kb-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031747" comment="kernel-default-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031748" comment="kernel-default-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031750" comment="kernel-docs-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031751" comment="kernel-docs-html-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031752" comment="kernel-kvmsmall-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031754" comment="kernel-kvmsmall-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031756" comment="kernel-obs-build-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031757" comment="kernel-obs-qa-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031760" comment="kernel-rt-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031761" comment="kernel-rt-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031762" comment="kernel-rt-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031764" comment="kernel-source-vanilla-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031765" comment="kernel-syms-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031766" comment="kernel-zfcpdump-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031767" comment="kselftests-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031768" comment="kselftests-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031769" comment="kselftests-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031770" comment="ocfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031771" comment="ocfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031772" comment="ocfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39973</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39973" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39973" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39973" ref_url="https://www.suse.com/security/cve/CVE-2025-39973" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:21469" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4315-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1188-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1212-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1221-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1222-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1236-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1239-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1242-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1244-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1248-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1259-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1263-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1268-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045421.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1269-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1271-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1278-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1280-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045412.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1283-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045410.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1285-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1287-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1297-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1298-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21007-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21053-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21054-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21055-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21056-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21057-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21058-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21059-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21060-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21061-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21073-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21074-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21075-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21076-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21077-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21078-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21079-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21080-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21083-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21084-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21085-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21086-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21087-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21088-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21089-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21090-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21091-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045433.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i40e: add validation for ring_len param

The `ring_len` parameter provided by the virtual function (VF)
is assigned directly to the hardware memory context (HMC) without
any validation.

To address this, introduce an upper boundary check for both Tx and Rx
queue lengths. The maximum number of descriptors supported by the
hardware is 8k-32.
Additionally, enforce alignment constraints: Tx rings must be a multiple
of 8, and Rx rings must be a multiple of 32.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39973/">CVE-2025-39973 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39973">CVE-2025-39973 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247374">SUSE bug 1247374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252035">SUSE bug 1252035</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252036">SUSE bug 1252036</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031708" comment="cluster-md-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031709" comment="cluster-md-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031710" comment="cluster-md-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031711" comment="dlm-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031712" comment="dlm-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031713" comment="dlm-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031714" comment="dtb-allwinner-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031715" comment="dtb-altera-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031716" comment="dtb-amazon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031717" comment="dtb-amd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031718" comment="dtb-amlogic-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031719" comment="dtb-apm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031720" comment="dtb-apple-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031721" comment="dtb-arm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031722" comment="dtb-broadcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031723" comment="dtb-cavium-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031724" comment="dtb-exynos-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031725" comment="dtb-freescale-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031726" comment="dtb-hisilicon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031727" comment="dtb-lg-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031728" comment="dtb-marvell-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031729" comment="dtb-mediatek-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031730" comment="dtb-nvidia-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031731" comment="dtb-qcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031732" comment="dtb-renesas-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031733" comment="dtb-rockchip-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031734" comment="dtb-socionext-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031735" comment="dtb-sprd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031736" comment="dtb-xilinx-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031737" comment="gfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031738" comment="gfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031739" comment="gfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031742" comment="kernel-64kb-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031743" comment="kernel-64kb-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031747" comment="kernel-default-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031748" comment="kernel-default-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031750" comment="kernel-docs-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031751" comment="kernel-docs-html-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031752" comment="kernel-kvmsmall-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031754" comment="kernel-kvmsmall-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031756" comment="kernel-obs-build-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031757" comment="kernel-obs-qa-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031760" comment="kernel-rt-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031761" comment="kernel-rt-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031762" comment="kernel-rt-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031764" comment="kernel-source-vanilla-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031765" comment="kernel-syms-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031766" comment="kernel-zfcpdump-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031767" comment="kselftests-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031768" comment="kselftests-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031769" comment="kselftests-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031770" comment="ocfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031771" comment="ocfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031772" comment="ocfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539977" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39977</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39977" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39977" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39977" ref_url="https://www.suse.com/security/cve/CVE-2025-39977" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

futex: Prevent use-after-free during requeue-PI

syzbot managed to trigger the following race:

   T1                               T2

 futex_wait_requeue_pi()
   futex_do_wait()
     schedule()
                               futex_requeue()
                                 futex_proxy_trylock_atomic()
                                   futex_requeue_pi_prepare()
                                   requeue_pi_wake_futex()
                                     futex_requeue_pi_complete()
                                      /* preempt */

         * timeout/ signal wakes T1 *

   futex_requeue_pi_wakeup_sync() // Q_REQUEUE_PI_LOCKED
   futex_hash_put()
  // back to userland, on stack futex_q is garbage

                                      /* back */
                                     wake_up_state(q-&gt;task, TASK_NORMAL);

In this scenario futex_wait_requeue_pi() is able to leave without using
futex_q::lock_ptr for synchronization.

This can be prevented by reading futex_q::task before updating the
futex_q::requeue_state. A reference on the task_struct is not needed
because requeue_pi_wake_futex() is invoked with a spinlock_t held which
implies a RCU read section.

Even if T1 terminates immediately after, the task_struct will remain valid
during T2's wake_up_state().  A READ_ONCE on futex_q::task before
futex_requeue_pi_complete() is enough because it ensures that the variable
is read before the state is updated.

Read futex_q::task before updating the requeue state, use it for the
following wakeup.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39977/">CVE-2025-39977 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39977">CVE-2025-39977 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252046">SUSE bug 1252046</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252048">SUSE bug 1252048</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539978" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39978</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39978" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39978" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39978" ref_url="https://www.suse.com/security/cve/CVE-2025-39978" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

octeontx2-pf: Fix potential use after free in otx2_tc_add_flow()

This code calls kfree_rcu(new_node, rcu) and then dereferences "new_node"
and then dereferences it on the next line.  Two lines later, we take
a mutex so I don't think this is an RCU safe region.  Re-order it to do
the dereferences before queuing up the free.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-03-06"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39978/">CVE-2025-39978 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39978">CVE-2025-39978 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252069">SUSE bug 1252069</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252071">SUSE bug 1252071</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031708" comment="cluster-md-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031709" comment="cluster-md-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031710" comment="cluster-md-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031711" comment="dlm-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031712" comment="dlm-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031713" comment="dlm-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031714" comment="dtb-allwinner-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031715" comment="dtb-altera-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031716" comment="dtb-amazon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031717" comment="dtb-amd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031718" comment="dtb-amlogic-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031719" comment="dtb-apm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031720" comment="dtb-apple-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031721" comment="dtb-arm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031722" comment="dtb-broadcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031723" comment="dtb-cavium-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031724" comment="dtb-exynos-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031725" comment="dtb-freescale-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031726" comment="dtb-hisilicon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031727" comment="dtb-lg-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031728" comment="dtb-marvell-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031729" comment="dtb-mediatek-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031730" comment="dtb-nvidia-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031731" comment="dtb-qcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031732" comment="dtb-renesas-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031733" comment="dtb-rockchip-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031734" comment="dtb-socionext-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031735" comment="dtb-sprd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031736" comment="dtb-xilinx-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031737" comment="gfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031738" comment="gfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031739" comment="gfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031742" comment="kernel-64kb-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031743" comment="kernel-64kb-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031747" comment="kernel-default-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031748" comment="kernel-default-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031750" comment="kernel-docs-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031751" comment="kernel-docs-html-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031752" comment="kernel-kvmsmall-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031754" comment="kernel-kvmsmall-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031756" comment="kernel-obs-build-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031757" comment="kernel-obs-qa-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031760" comment="kernel-rt-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031761" comment="kernel-rt-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031762" comment="kernel-rt-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031764" comment="kernel-source-vanilla-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031765" comment="kernel-syms-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031766" comment="kernel-zfcpdump-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031767" comment="kselftests-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031768" comment="kselftests-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031769" comment="kselftests-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031770" comment="ocfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031771" comment="ocfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031772" comment="ocfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539979" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39979</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39979" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39979" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39979" ref_url="https://www.suse.com/security/cve/CVE-2025-39979" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:22865" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: fs, fix UAF in flow counter release

Fix a kernel trace [1] caused by releasing an HWS action of a local flow
counter in mlx5_cmd_hws_delete_fte(), where the HWS action refcount and
mutex were not initialized and the counter struct could already be freed
when deleting the rule.

Fix it by adding the missing initializations and adding refcount for the
local flow counter struct.

[1] Kernel log:
 Call Trace:
  &lt;TASK&gt;
  dump_stack_lvl+0x34/0x48
  mlx5_fs_put_hws_action.part.0.cold+0x21/0x94 [mlx5_core]
  mlx5_fc_put_hws_action+0x96/0xad [mlx5_core]
  mlx5_fs_destroy_fs_actions+0x8b/0x152 [mlx5_core]
  mlx5_cmd_hws_delete_fte+0x5a/0xa0 [mlx5_core]
  del_hw_fte+0x1ce/0x260 [mlx5_core]
  mlx5_del_flow_rules+0x12d/0x240 [mlx5_core]
  ? ttwu_queue_wakelist+0xf4/0x110
  mlx5_ib_destroy_flow+0x103/0x1b0 [mlx5_ib]
  uverbs_free_flow+0x20/0x50 [ib_uverbs]
  destroy_hw_idr_uobject+0x1b/0x50 [ib_uverbs]
  uverbs_destroy_uobject+0x34/0x1a0 [ib_uverbs]
  uobj_destroy+0x3c/0x80 [ib_uverbs]
  ib_uverbs_run_method+0x23e/0x360 [ib_uverbs]
  ? uverbs_finalize_object+0x60/0x60 [ib_uverbs]
  ib_uverbs_cmd_verbs+0x14f/0x2c0 [ib_uverbs]
  ? do_tty_write+0x1a9/0x270
  ? file_tty_write.constprop.0+0x98/0xc0
  ? new_sync_write+0xfc/0x190
  ib_uverbs_ioctl+0xd7/0x160 [ib_uverbs]
  __x64_sys_ioctl+0x87/0xc0
  do_syscall_64+0x59/0x90
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39979/">CVE-2025-39979 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39979">CVE-2025-39979 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252067">SUSE bug 1252067</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252068">SUSE bug 1252068</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031708" comment="cluster-md-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031709" comment="cluster-md-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031710" comment="cluster-md-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031711" comment="dlm-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031712" comment="dlm-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031713" comment="dlm-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031714" comment="dtb-allwinner-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031715" comment="dtb-altera-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031716" comment="dtb-amazon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031717" comment="dtb-amd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031718" comment="dtb-amlogic-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031719" comment="dtb-apm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031720" comment="dtb-apple-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031721" comment="dtb-arm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031722" comment="dtb-broadcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031723" comment="dtb-cavium-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031724" comment="dtb-exynos-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031725" comment="dtb-freescale-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031726" comment="dtb-hisilicon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031727" comment="dtb-lg-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031728" comment="dtb-marvell-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031729" comment="dtb-mediatek-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031730" comment="dtb-nvidia-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031731" comment="dtb-qcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031732" comment="dtb-renesas-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031733" comment="dtb-rockchip-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031734" comment="dtb-socionext-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031735" comment="dtb-sprd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031736" comment="dtb-xilinx-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031737" comment="gfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031738" comment="gfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031739" comment="gfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031742" comment="kernel-64kb-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031743" comment="kernel-64kb-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031747" comment="kernel-default-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031748" comment="kernel-default-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031750" comment="kernel-docs-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031751" comment="kernel-docs-html-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031752" comment="kernel-kvmsmall-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031754" comment="kernel-kvmsmall-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031756" comment="kernel-obs-build-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031757" comment="kernel-obs-qa-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031760" comment="kernel-rt-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031761" comment="kernel-rt-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031762" comment="kernel-rt-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031764" comment="kernel-source-vanilla-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031765" comment="kernel-syms-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031766" comment="kernel-zfcpdump-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031767" comment="kselftests-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031768" comment="kselftests-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031769" comment="kselftests-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031770" comment="ocfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031771" comment="ocfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031772" comment="ocfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539980" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39980</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39980" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39980" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39980" ref_url="https://www.suse.com/security/cve/CVE-2025-39980" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nexthop: Forbid FDB status change while nexthop is in a group

The kernel forbids the creation of non-FDB nexthop groups with FDB
nexthops:

 # ip nexthop add id 1 via 192.0.2.1 fdb
 # ip nexthop add id 2 group 1
 Error: Non FDB nexthop group cannot have fdb nexthops.

And vice versa:

 # ip nexthop add id 3 via 192.0.2.2 dev dummy1
 # ip nexthop add id 4 group 3 fdb
 Error: FDB nexthop group can only have fdb nexthops.

However, as long as no routes are pointing to a non-FDB nexthop group,
the kernel allows changing the type of a nexthop from FDB to non-FDB and
vice versa:

 # ip nexthop add id 5 via 192.0.2.2 dev dummy1
 # ip nexthop add id 6 group 5
 # ip nexthop replace id 5 via 192.0.2.2 fdb
 # echo $?
 0

This configuration is invalid and can result in a NPD [1] since FDB
nexthops are not associated with a nexthop device:

 # ip route add 198.51.100.1/32 nhid 6
 # ping 198.51.100.1

Fix by preventing nexthop FDB status change while the nexthop is in a
group:

 # ip nexthop add id 7 via 192.0.2.2 dev dummy1
 # ip nexthop add id 8 group 7
 # ip nexthop replace id 7 via 192.0.2.2 fdb
 Error: Cannot change nexthop FDB status while in a group.

[1]
BUG: kernel NULL pointer dereference, address: 00000000000003c0
[...]
Oops: Oops: 0000 [#1] SMP
CPU: 6 UID: 0 PID: 367 Comm: ping Not tainted 6.17.0-rc6-virtme-gb65678cacc03 #1 PREEMPT(voluntary)
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.17.0-4.fc41 04/01/2014
RIP: 0010:fib_lookup_good_nhc+0x1e/0x80
[...]
Call Trace:
 &lt;TASK&gt;
 fib_table_lookup+0x541/0x650
 ip_route_output_key_hash_rcu+0x2ea/0x970
 ip_route_output_key_hash+0x55/0x80
 __ip4_datagram_connect+0x250/0x330
 udp_connect+0x2b/0x60
 __sys_connect+0x9c/0xd0
 __x64_sys_connect+0x18/0x20
 do_syscall_64+0xa4/0x2a0
 entry_SYSCALL_64_after_hwframe+0x4b/0x53
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39980/">CVE-2025-39980 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39980">CVE-2025-39980 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252063">SUSE bug 1252063</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39981</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39981" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39981" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39981" ref_url="https://www.suse.com/security/cve/CVE-2025-39981" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:22405" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: MGMT: Fix possible UAFs

This attemps to fix possible UAFs caused by struct mgmt_pending being
freed while still being processed like in the following trace, in order
to fix mgmt_pending_valid is introduce and use to check if the
mgmt_pending hasn't been removed from the pending list, on the complete
callbacks it is used to check and in addtion remove the cmd from the list
while holding mgmt_pending_lock to avoid TOCTOU problems since if the cmd
is left on the list it can still be accessed and freed.

BUG: KASAN: slab-use-after-free in mgmt_add_adv_patterns_monitor_sync+0x35/0x50 net/bluetooth/mgmt.c:5223
Read of size 8 at addr ffff8880709d4dc0 by task kworker/u11:0/55

CPU: 0 UID: 0 PID: 55 Comm: kworker/u11:0 Not tainted 6.16.4 #2 PREEMPT(full)
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1ubuntu1 04/01/2014
Workqueue: hci0 hci_cmd_sync_work
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120
 print_address_description mm/kasan/report.c:378 [inline]
 print_report+0xca/0x240 mm/kasan/report.c:482
 kasan_report+0x118/0x150 mm/kasan/report.c:595
 mgmt_add_adv_patterns_monitor_sync+0x35/0x50 net/bluetooth/mgmt.c:5223
 hci_cmd_sync_work+0x210/0x3a0 net/bluetooth/hci_sync.c:332
 process_one_work kernel/workqueue.c:3238 [inline]
 process_scheduled_works+0xade/0x17b0 kernel/workqueue.c:3321
 worker_thread+0x8a0/0xda0 kernel/workqueue.c:3402
 kthread+0x711/0x8a0 kernel/kthread.c:464
 ret_from_fork+0x3fc/0x770 arch/x86/kernel/process.c:148
 ret_from_fork_asm+0x1a/0x30 home/kwqcheii/source/fuzzing/kernel/kasan/linux-6.16.4/arch/x86/entry/entry_64.S:245
 &lt;/TASK&gt;

Allocated by task 12210:
 kasan_save_stack mm/kasan/common.c:47 [inline]
 kasan_save_track+0x3e/0x80 mm/kasan/common.c:68
 poison_kmalloc_redzone mm/kasan/common.c:377 [inline]
 __kasan_kmalloc+0x93/0xb0 mm/kasan/common.c:394
 kasan_kmalloc include/linux/kasan.h:260 [inline]
 __kmalloc_cache_noprof+0x230/0x3d0 mm/slub.c:4364
 kmalloc_noprof include/linux/slab.h:905 [inline]
 kzalloc_noprof include/linux/slab.h:1039 [inline]
 mgmt_pending_new+0x65/0x1e0 net/bluetooth/mgmt_util.c:269
 mgmt_pending_add+0x35/0x140 net/bluetooth/mgmt_util.c:296
 __add_adv_patterns_monitor+0x130/0x200 net/bluetooth/mgmt.c:5247
 add_adv_patterns_monitor+0x214/0x360 net/bluetooth/mgmt.c:5364
 hci_mgmt_cmd+0x9c9/0xef0 net/bluetooth/hci_sock.c:1719
 hci_sock_sendmsg+0x6ca/0xef0 net/bluetooth/hci_sock.c:1839
 sock_sendmsg_nosec net/socket.c:714 [inline]
 __sock_sendmsg+0x219/0x270 net/socket.c:729
 sock_write_iter+0x258/0x330 net/socket.c:1133
 new_sync_write fs/read_write.c:593 [inline]
 vfs_write+0x5c9/0xb30 fs/read_write.c:686
 ksys_write+0x145/0x250 fs/read_write.c:738
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

Freed by task 12221:
 kasan_save_stack mm/kasan/common.c:47 [inline]
 kasan_save_track+0x3e/0x80 mm/kasan/common.c:68
 kasan_save_free_info+0x46/0x50 mm/kasan/generic.c:576
 poison_slab_object mm/kasan/common.c:247 [inline]
 __kasan_slab_free+0x62/0x70 mm/kasan/common.c:264
 kasan_slab_free include/linux/kasan.h:233 [inline]
 slab_free_hook mm/slub.c:2381 [inline]
 slab_free mm/slub.c:4648 [inline]
 kfree+0x18e/0x440 mm/slub.c:4847
 mgmt_pending_free net/bluetooth/mgmt_util.c:311 [inline]
 mgmt_pending_foreach+0x30d/0x380 net/bluetooth/mgmt_util.c:257
 __mgmt_power_off+0x169/0x350 net/bluetooth/mgmt.c:9444
 hci_dev_close_sync+0x754/0x1330 net/bluetooth/hci_sync.c:5290
 hci_dev_do_close net/bluetooth/hci_core.c:501 [inline]
 hci_dev_close+0x108/0x200 net/bluetooth/hci_core.c:526
 sock_do_ioctl+0xd9/0x300 net/socket.c:1192
 sock_ioctl+0x576/0x790 net/socket.c:1313
 vfs_ioctl fs/ioctl.c:51 [inline]
 __do_sys_ioctl fs/ioctl.c:907 [inline]
 __se_sys_ioctl+0xf9/0x170 fs/ioctl.c:893
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xf
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39981/">CVE-2025-39981 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39981">CVE-2025-39981 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252060">SUSE bug 1252060</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252061">SUSE bug 1252061</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031708" comment="cluster-md-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031709" comment="cluster-md-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031710" comment="cluster-md-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031711" comment="dlm-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031712" comment="dlm-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031713" comment="dlm-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031714" comment="dtb-allwinner-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031715" comment="dtb-altera-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031716" comment="dtb-amazon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031717" comment="dtb-amd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031718" comment="dtb-amlogic-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031719" comment="dtb-apm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031720" comment="dtb-apple-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031721" comment="dtb-arm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031722" comment="dtb-broadcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031723" comment="dtb-cavium-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031724" comment="dtb-exynos-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031725" comment="dtb-freescale-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031726" comment="dtb-hisilicon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031727" comment="dtb-lg-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031728" comment="dtb-marvell-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031729" comment="dtb-mediatek-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031730" comment="dtb-nvidia-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031731" comment="dtb-qcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031732" comment="dtb-renesas-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031733" comment="dtb-rockchip-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031734" comment="dtb-socionext-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031735" comment="dtb-sprd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031736" comment="dtb-xilinx-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031737" comment="gfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031738" comment="gfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031739" comment="gfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031742" comment="kernel-64kb-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031743" comment="kernel-64kb-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031747" comment="kernel-default-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031748" comment="kernel-default-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031750" comment="kernel-docs-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031751" comment="kernel-docs-html-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031752" comment="kernel-kvmsmall-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031754" comment="kernel-kvmsmall-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031756" comment="kernel-obs-build-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031757" comment="kernel-obs-qa-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031760" comment="kernel-rt-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031761" comment="kernel-rt-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031762" comment="kernel-rt-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031764" comment="kernel-source-vanilla-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031765" comment="kernel-syms-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031766" comment="kernel-zfcpdump-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031767" comment="kselftests-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031768" comment="kselftests-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031769" comment="kselftests-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031770" comment="ocfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031771" comment="ocfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031772" comment="ocfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539982" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39982</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39982" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39982" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39982" ref_url="https://www.suse.com/security/cve/CVE-2025-39982" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:21469" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: hci_event: Fix UAF in hci_acl_create_conn_sync

This fixes the following UFA in hci_acl_create_conn_sync where a
connection still pending is command submission (conn-&gt;state == BT_OPEN)
maybe freed, also since this also can happen with the likes of
hci_le_create_conn_sync fix it as well:

BUG: KASAN: slab-use-after-free in hci_acl_create_conn_sync+0x5ef/0x790 net/bluetooth/hci_sync.c:6861
Write of size 2 at addr ffff88805ffcc038 by task kworker/u11:2/9541

CPU: 1 UID: 0 PID: 9541 Comm: kworker/u11:2 Not tainted 6.16.0-rc7 #3 PREEMPT(full)
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.10.2-1ubuntu1 04/01/2014
Workqueue: hci3 hci_cmd_sync_work
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120
 print_address_description mm/kasan/report.c:378 [inline]
 print_report+0xca/0x230 mm/kasan/report.c:480
 kasan_report+0x118/0x150 mm/kasan/report.c:593
 hci_acl_create_conn_sync+0x5ef/0x790 net/bluetooth/hci_sync.c:6861
 hci_cmd_sync_work+0x210/0x3a0 net/bluetooth/hci_sync.c:332
 process_one_work kernel/workqueue.c:3238 [inline]
 process_scheduled_works+0xae1/0x17b0 kernel/workqueue.c:3321
 worker_thread+0x8a0/0xda0 kernel/workqueue.c:3402
 kthread+0x70e/0x8a0 kernel/kthread.c:464
 ret_from_fork+0x3fc/0x770 arch/x86/kernel/process.c:148
 ret_from_fork_asm+0x1a/0x30 home/kwqcheii/source/fuzzing/kernel/kasan/linux-6.16-rc7/arch/x86/entry/entry_64.S:245
 &lt;/TASK&gt;

Allocated by task 123736:
 kasan_save_stack mm/kasan/common.c:47 [inline]
 kasan_save_track+0x3e/0x80 mm/kasan/common.c:68
 poison_kmalloc_redzone mm/kasan/common.c:377 [inline]
 __kasan_kmalloc+0x93/0xb0 mm/kasan/common.c:394
 kasan_kmalloc include/linux/kasan.h:260 [inline]
 __kmalloc_cache_noprof+0x230/0x3d0 mm/slub.c:4359
 kmalloc_noprof include/linux/slab.h:905 [inline]
 kzalloc_noprof include/linux/slab.h:1039 [inline]
 __hci_conn_add+0x233/0x1b30 net/bluetooth/hci_conn.c:939
 hci_conn_add_unset net/bluetooth/hci_conn.c:1051 [inline]
 hci_connect_acl+0x16c/0x4e0 net/bluetooth/hci_conn.c:1634
 pair_device+0x418/0xa70 net/bluetooth/mgmt.c:3556
 hci_mgmt_cmd+0x9c9/0xef0 net/bluetooth/hci_sock.c:1719
 hci_sock_sendmsg+0x6ca/0xef0 net/bluetooth/hci_sock.c:1839
 sock_sendmsg_nosec net/socket.c:712 [inline]
 __sock_sendmsg+0x219/0x270 net/socket.c:727
 sock_write_iter+0x258/0x330 net/socket.c:1131
 new_sync_write fs/read_write.c:593 [inline]
 vfs_write+0x54b/0xa90 fs/read_write.c:686
 ksys_write+0x145/0x250 fs/read_write.c:738
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

Freed by task 103680:
 kasan_save_stack mm/kasan/common.c:47 [inline]
 kasan_save_track+0x3e/0x80 mm/kasan/common.c:68
 kasan_save_free_info+0x46/0x50 mm/kasan/generic.c:576
 poison_slab_object mm/kasan/common.c:247 [inline]
 __kasan_slab_free+0x62/0x70 mm/kasan/common.c:264
 kasan_slab_free include/linux/kasan.h:233 [inline]
 slab_free_hook mm/slub.c:2381 [inline]
 slab_free mm/slub.c:4643 [inline]
 kfree+0x18e/0x440 mm/slub.c:4842
 device_release+0x9c/0x1c0
 kobject_cleanup lib/kobject.c:689 [inline]
 kobject_release lib/kobject.c:720 [inline]
 kref_put include/linux/kref.h:65 [inline]
 kobject_put+0x22b/0x480 lib/kobject.c:737
 hci_conn_cleanup net/bluetooth/hci_conn.c:175 [inline]
 hci_conn_del+0x8ff/0xcb0 net/bluetooth/hci_conn.c:1173
 hci_conn_complete_evt+0x3c7/0x1040 net/bluetooth/hci_event.c:3199
 hci_event_func net/bluetooth/hci_event.c:7477 [inline]
 hci_event_packet+0x7e0/0x1200 net/bluetooth/hci_event.c:7531
 hci_rx_work+0x46a/0xe80 net/bluetooth/hci_core.c:4070
 process_one_work kernel/workqueue.c:3238 [inline]
 process_scheduled_works+0xae1/0x17b0 kernel/workqueue.c:3321
 worker_thread+0x8a0/0xda0 kernel/workqueue.c:3402
 kthread+0x70e/0x8a0 kernel/kthread.c:464
 ret_from_fork+0x3fc/0x770 arch/x86/kernel/process.c:148
 ret_from_fork_asm+0x1a/0x30 home/kwqcheii/sour
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39982/">CVE-2025-39982 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39982">CVE-2025-39982 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252083">SUSE bug 1252083</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031708" comment="cluster-md-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031709" comment="cluster-md-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031710" comment="cluster-md-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031711" comment="dlm-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031712" comment="dlm-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031713" comment="dlm-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031714" comment="dtb-allwinner-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031715" comment="dtb-altera-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031716" comment="dtb-amazon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031717" comment="dtb-amd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031718" comment="dtb-amlogic-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031719" comment="dtb-apm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031720" comment="dtb-apple-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031721" comment="dtb-arm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031722" comment="dtb-broadcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031723" comment="dtb-cavium-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031724" comment="dtb-exynos-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031725" comment="dtb-freescale-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031726" comment="dtb-hisilicon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031727" comment="dtb-lg-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031728" comment="dtb-marvell-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031729" comment="dtb-mediatek-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031730" comment="dtb-nvidia-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031731" comment="dtb-qcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031732" comment="dtb-renesas-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031733" comment="dtb-rockchip-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031734" comment="dtb-socionext-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031735" comment="dtb-sprd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031736" comment="dtb-xilinx-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031737" comment="gfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031738" comment="gfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031739" comment="gfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031742" comment="kernel-64kb-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031743" comment="kernel-64kb-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031747" comment="kernel-default-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031748" comment="kernel-default-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031750" comment="kernel-docs-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031751" comment="kernel-docs-html-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031752" comment="kernel-kvmsmall-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031754" comment="kernel-kvmsmall-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031756" comment="kernel-obs-build-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031757" comment="kernel-obs-qa-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031760" comment="kernel-rt-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031761" comment="kernel-rt-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031762" comment="kernel-rt-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031764" comment="kernel-source-vanilla-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031765" comment="kernel-syms-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031766" comment="kernel-zfcpdump-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031767" comment="kselftests-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031768" comment="kselftests-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031769" comment="kselftests-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031770" comment="ocfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031771" comment="ocfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031772" comment="ocfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539984" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39984</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39984" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39984" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39984" ref_url="https://www.suse.com/security/cve/CVE-2025-39984" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: tun: Update napi-&gt;skb after XDP process

The syzbot report a UAF issue:

  BUG: KASAN: slab-use-after-free in skb_reset_mac_header include/linux/skbuff.h:3150 [inline]
  BUG: KASAN: slab-use-after-free in napi_frags_skb net/core/gro.c:723 [inline]
  BUG: KASAN: slab-use-after-free in napi_gro_frags+0x6e/0x1030 net/core/gro.c:758
  Read of size 8 at addr ffff88802ef22c18 by task syz.0.17/6079
  CPU: 0 UID: 0 PID: 6079 Comm: syz.0.17 Not tainted syzkaller #0 PREEMPT(full)
  Call Trace:
   &lt;TASK&gt;
   dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120
   print_address_description mm/kasan/report.c:378 [inline]
   print_report+0xca/0x240 mm/kasan/report.c:482
   kasan_report+0x118/0x150 mm/kasan/report.c:595
   skb_reset_mac_header include/linux/skbuff.h:3150 [inline]
   napi_frags_skb net/core/gro.c:723 [inline]
   napi_gro_frags+0x6e/0x1030 net/core/gro.c:758
   tun_get_user+0x28cb/0x3e20 drivers/net/tun.c:1920
   tun_chr_write_iter+0x113/0x200 drivers/net/tun.c:1996
   new_sync_write fs/read_write.c:593 [inline]
   vfs_write+0x5c9/0xb30 fs/read_write.c:686
   ksys_write+0x145/0x250 fs/read_write.c:738
   do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
   do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94
   entry_SYSCALL_64_after_hwframe+0x77/0x7f
   &lt;/TASK&gt;

  Allocated by task 6079:
   kasan_save_stack mm/kasan/common.c:47 [inline]
   kasan_save_track+0x3e/0x80 mm/kasan/common.c:68
   unpoison_slab_object mm/kasan/common.c:330 [inline]
   __kasan_mempool_unpoison_object+0xa0/0x170 mm/kasan/common.c:558
   kasan_mempool_unpoison_object include/linux/kasan.h:388 [inline]
   napi_skb_cache_get+0x37b/0x6d0 net/core/skbuff.c:295
   __alloc_skb+0x11e/0x2d0 net/core/skbuff.c:657
   napi_alloc_skb+0x84/0x7d0 net/core/skbuff.c:811
   napi_get_frags+0x69/0x140 net/core/gro.c:673
   tun_napi_alloc_frags drivers/net/tun.c:1404 [inline]
   tun_get_user+0x77c/0x3e20 drivers/net/tun.c:1784
   tun_chr_write_iter+0x113/0x200 drivers/net/tun.c:1996
   new_sync_write fs/read_write.c:593 [inline]
   vfs_write+0x5c9/0xb30 fs/read_write.c:686
   ksys_write+0x145/0x250 fs/read_write.c:738
   do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
   do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94
   entry_SYSCALL_64_after_hwframe+0x77/0x7f

  Freed by task 6079:
   kasan_save_stack mm/kasan/common.c:47 [inline]
   kasan_save_track+0x3e/0x80 mm/kasan/common.c:68
   kasan_save_free_info+0x46/0x50 mm/kasan/generic.c:576
   poison_slab_object mm/kasan/common.c:243 [inline]
   __kasan_slab_free+0x5b/0x80 mm/kasan/common.c:275
   kasan_slab_free include/linux/kasan.h:233 [inline]
   slab_free_hook mm/slub.c:2422 [inline]
   slab_free mm/slub.c:4695 [inline]
   kmem_cache_free+0x18f/0x400 mm/slub.c:4797
   skb_pp_cow_data+0xdd8/0x13e0 net/core/skbuff.c:969
   netif_skb_check_for_xdp net/core/dev.c:5390 [inline]
   netif_receive_generic_xdp net/core/dev.c:5431 [inline]
   do_xdp_generic+0x699/0x11a0 net/core/dev.c:5499
   tun_get_user+0x2523/0x3e20 drivers/net/tun.c:1872
   tun_chr_write_iter+0x113/0x200 drivers/net/tun.c:1996
   new_sync_write fs/read_write.c:593 [inline]
   vfs_write+0x5c9/0xb30 fs/read_write.c:686
   ksys_write+0x145/0x250 fs/read_write.c:738
   do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
   do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94
   entry_SYSCALL_64_after_hwframe+0x77/0x7f

After commit e6d5dbdd20aa ("xdp: add multi-buff support for xdp running in
generic mode"), the original skb may be freed in skb_pp_cow_data() when
XDP program was attached, which was allocated in tun_napi_alloc_frags().
However, the napi-&gt;skb still point to the original skb, update it after
XDP process.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39984/">CVE-2025-39984 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39984">CVE-2025-39984 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252081">SUSE bug 1252081</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031708" comment="cluster-md-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031709" comment="cluster-md-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031710" comment="cluster-md-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031711" comment="dlm-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031712" comment="dlm-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031713" comment="dlm-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031714" comment="dtb-allwinner-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031715" comment="dtb-altera-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031716" comment="dtb-amazon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031717" comment="dtb-amd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031718" comment="dtb-amlogic-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031719" comment="dtb-apm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031720" comment="dtb-apple-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031721" comment="dtb-arm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031722" comment="dtb-broadcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031723" comment="dtb-cavium-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031724" comment="dtb-exynos-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031725" comment="dtb-freescale-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031726" comment="dtb-hisilicon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031727" comment="dtb-lg-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031728" comment="dtb-marvell-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031729" comment="dtb-mediatek-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031730" comment="dtb-nvidia-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031731" comment="dtb-qcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031732" comment="dtb-renesas-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031733" comment="dtb-rockchip-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031734" comment="dtb-socionext-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031735" comment="dtb-sprd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031736" comment="dtb-xilinx-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031737" comment="gfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031738" comment="gfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031739" comment="gfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031742" comment="kernel-64kb-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031743" comment="kernel-64kb-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031747" comment="kernel-default-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031748" comment="kernel-default-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031750" comment="kernel-docs-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031751" comment="kernel-docs-html-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031752" comment="kernel-kvmsmall-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031754" comment="kernel-kvmsmall-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031756" comment="kernel-obs-build-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031757" comment="kernel-obs-qa-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031760" comment="kernel-rt-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031761" comment="kernel-rt-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031762" comment="kernel-rt-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031764" comment="kernel-source-vanilla-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031765" comment="kernel-syms-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031766" comment="kernel-zfcpdump-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031767" comment="kselftests-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031768" comment="kselftests-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031769" comment="kselftests-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031770" comment="ocfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031771" comment="ocfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031772" comment="ocfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39985</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39985" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39985" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39985" ref_url="https://www.suse.com/security/cve/CVE-2025-39985" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: mcba_usb: populate ndo_change_mtu() to prevent buffer overflow

Sending an PF_PACKET allows to bypass the CAN framework logic and to
directly reach the xmit() function of a CAN driver. The only check
which is performed by the PF_PACKET framework is to make sure that
skb-&gt;len fits the interface's MTU.

Unfortunately, because the mcba_usb driver does not populate its
net_device_ops-&gt;ndo_change_mtu(), it is possible for an attacker to
configure an invalid MTU by doing, for example:

  $ ip link set can0 mtu 9999

After doing so, the attacker could open a PF_PACKET socket using the
ETH_P_CANXL protocol:

	socket(PF_PACKET, SOCK_RAW, htons(ETH_P_CANXL))

to inject a malicious CAN XL frames. For example:

	struct canxl_frame frame = {
		.flags = 0xff,
		.len = 2048,
	};

The CAN drivers' xmit() function are calling can_dev_dropped_skb() to
check that the skb is valid, unfortunately under above conditions, the
malicious packet is able to go through can_dev_dropped_skb() checks:

  1. the skb-&gt;protocol is set to ETH_P_CANXL which is valid (the
     function does not check the actual device capabilities).

  2. the length is a valid CAN XL length.

And so, mcba_usb_start_xmit() receives a CAN XL frame which it is not
able to correctly handle and will thus misinterpret it as a CAN frame.

This can result in a buffer overflow. The driver will consume cf-&gt;len
as-is with no further checks on these lines:

	usb_msg.dlc = cf-&gt;len;

	memcpy(usb_msg.data, cf-&gt;data, usb_msg.dlc);

Here, cf-&gt;len corresponds to the flags field of the CAN XL frame. In
our previous example, we set canxl_frame-&gt;flags to 0xff. Because the
maximum expected length is 8, a buffer overflow of 247 bytes occurs!

Populate net_device_ops-&gt;ndo_change_mtu() to ensure that the
interface's MTU can not be set to anything bigger than CAN_MTU. By
fixing the root cause, this prevents the buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39985/">CVE-2025-39985 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39985">CVE-2025-39985 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252082">SUSE bug 1252082</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031708" comment="cluster-md-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031709" comment="cluster-md-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031710" comment="cluster-md-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031711" comment="dlm-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031712" comment="dlm-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031713" comment="dlm-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031714" comment="dtb-allwinner-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031715" comment="dtb-altera-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031716" comment="dtb-amazon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031717" comment="dtb-amd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031718" comment="dtb-amlogic-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031719" comment="dtb-apm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031720" comment="dtb-apple-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031721" comment="dtb-arm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031722" comment="dtb-broadcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031723" comment="dtb-cavium-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031724" comment="dtb-exynos-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031725" comment="dtb-freescale-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031726" comment="dtb-hisilicon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031727" comment="dtb-lg-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031728" comment="dtb-marvell-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031729" comment="dtb-mediatek-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031730" comment="dtb-nvidia-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031731" comment="dtb-qcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031732" comment="dtb-renesas-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031733" comment="dtb-rockchip-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031734" comment="dtb-socionext-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031735" comment="dtb-sprd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031736" comment="dtb-xilinx-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031737" comment="gfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031738" comment="gfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031739" comment="gfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031742" comment="kernel-64kb-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031743" comment="kernel-64kb-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031747" comment="kernel-default-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031748" comment="kernel-default-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031750" comment="kernel-docs-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031751" comment="kernel-docs-html-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031752" comment="kernel-kvmsmall-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031754" comment="kernel-kvmsmall-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031756" comment="kernel-obs-build-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031757" comment="kernel-obs-qa-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031760" comment="kernel-rt-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031761" comment="kernel-rt-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031762" comment="kernel-rt-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031764" comment="kernel-source-vanilla-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031765" comment="kernel-syms-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031766" comment="kernel-zfcpdump-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031767" comment="kselftests-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031768" comment="kselftests-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031769" comment="kselftests-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031770" comment="ocfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031771" comment="ocfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031772" comment="ocfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539986" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39986</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39986" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39986" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39986" ref_url="https://www.suse.com/security/cve/CVE-2025-39986" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: sun4i_can: populate ndo_change_mtu() to prevent buffer overflow

Sending an PF_PACKET allows to bypass the CAN framework logic and to
directly reach the xmit() function of a CAN driver. The only check
which is performed by the PF_PACKET framework is to make sure that
skb-&gt;len fits the interface's MTU.

Unfortunately, because the sun4i_can driver does not populate its
net_device_ops-&gt;ndo_change_mtu(), it is possible for an attacker to
configure an invalid MTU by doing, for example:

  $ ip link set can0 mtu 9999

After doing so, the attacker could open a PF_PACKET socket using the
ETH_P_CANXL protocol:

	socket(PF_PACKET, SOCK_RAW, htons(ETH_P_CANXL))

to inject a malicious CAN XL frames. For example:

	struct canxl_frame frame = {
		.flags = 0xff,
		.len = 2048,
	};

The CAN drivers' xmit() function are calling can_dev_dropped_skb() to
check that the skb is valid, unfortunately under above conditions, the
malicious packet is able to go through can_dev_dropped_skb() checks:

  1. the skb-&gt;protocol is set to ETH_P_CANXL which is valid (the
     function does not check the actual device capabilities).

  2. the length is a valid CAN XL length.

And so, sun4ican_start_xmit() receives a CAN XL frame which it is not
able to correctly handle and will thus misinterpret it as a CAN frame.

This can result in a buffer overflow. The driver will consume cf-&gt;len
as-is with no further checks on this line:

	dlc = cf-&gt;len;

Here, cf-&gt;len corresponds to the flags field of the CAN XL frame. In
our previous example, we set canxl_frame-&gt;flags to 0xff. Because the
maximum expected length is 8, a buffer overflow of 247 bytes occurs a
couple line below when doing:

	for (i = 0; i &lt; dlc; i++)
		writel(cf-&gt;data[i], priv-&gt;base + (dreg + i * 4));

Populate net_device_ops-&gt;ndo_change_mtu() to ensure that the
interface's MTU can not be set to anything bigger than CAN_MTU. By
fixing the root cause, this prevents the buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39986/">CVE-2025-39986 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39986">CVE-2025-39986 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252078">SUSE bug 1252078</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031708" comment="cluster-md-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031709" comment="cluster-md-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031710" comment="cluster-md-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031711" comment="dlm-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031712" comment="dlm-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031713" comment="dlm-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031714" comment="dtb-allwinner-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031715" comment="dtb-altera-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031716" comment="dtb-amazon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031717" comment="dtb-amd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031718" comment="dtb-amlogic-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031719" comment="dtb-apm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031720" comment="dtb-apple-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031721" comment="dtb-arm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031722" comment="dtb-broadcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031723" comment="dtb-cavium-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031724" comment="dtb-exynos-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031725" comment="dtb-freescale-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031726" comment="dtb-hisilicon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031727" comment="dtb-lg-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031728" comment="dtb-marvell-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031729" comment="dtb-mediatek-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031730" comment="dtb-nvidia-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031731" comment="dtb-qcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031732" comment="dtb-renesas-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031733" comment="dtb-rockchip-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031734" comment="dtb-socionext-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031735" comment="dtb-sprd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031736" comment="dtb-xilinx-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031737" comment="gfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031738" comment="gfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031739" comment="gfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031742" comment="kernel-64kb-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031743" comment="kernel-64kb-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031747" comment="kernel-default-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031748" comment="kernel-default-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031750" comment="kernel-docs-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031751" comment="kernel-docs-html-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031752" comment="kernel-kvmsmall-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031754" comment="kernel-kvmsmall-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031756" comment="kernel-obs-build-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031757" comment="kernel-obs-qa-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031760" comment="kernel-rt-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031761" comment="kernel-rt-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031762" comment="kernel-rt-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031764" comment="kernel-source-vanilla-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031765" comment="kernel-syms-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031766" comment="kernel-zfcpdump-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031767" comment="kselftests-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031768" comment="kselftests-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031769" comment="kselftests-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031770" comment="ocfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031771" comment="ocfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031772" comment="ocfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539987" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39987</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39987" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39987" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39987" ref_url="https://www.suse.com/security/cve/CVE-2025-39987" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: hi311x: populate ndo_change_mtu() to prevent buffer overflow

Sending an PF_PACKET allows to bypass the CAN framework logic and to
directly reach the xmit() function of a CAN driver. The only check
which is performed by the PF_PACKET framework is to make sure that
skb-&gt;len fits the interface's MTU.

Unfortunately, because the sun4i_can driver does not populate its
net_device_ops-&gt;ndo_change_mtu(), it is possible for an attacker to
configure an invalid MTU by doing, for example:

  $ ip link set can0 mtu 9999

After doing so, the attacker could open a PF_PACKET socket using the
ETH_P_CANXL protocol:

	socket(PF_PACKET, SOCK_RAW, htons(ETH_P_CANXL))

to inject a malicious CAN XL frames. For example:

	struct canxl_frame frame = {
		.flags = 0xff,
		.len = 2048,
	};

The CAN drivers' xmit() function are calling can_dev_dropped_skb() to
check that the skb is valid, unfortunately under above conditions, the
malicious packet is able to go through can_dev_dropped_skb() checks:

  1. the skb-&gt;protocol is set to ETH_P_CANXL which is valid (the
     function does not check the actual device capabilities).

  2. the length is a valid CAN XL length.

And so, hi3110_hard_start_xmit() receives a CAN XL frame which it is
not able to correctly handle and will thus misinterpret it as a CAN
frame. The driver will consume frame-&gt;len as-is with no further
checks.

This can result in a buffer overflow later on in hi3110_hw_tx() on
this line:

	memcpy(buf + HI3110_FIFO_EXT_DATA_OFF,
	       frame-&gt;data, frame-&gt;len);

Here, frame-&gt;len corresponds to the flags field of the CAN XL frame.
In our previous example, we set canxl_frame-&gt;flags to 0xff. Because
the maximum expected length is 8, a buffer overflow of 247 bytes
occurs!

Populate net_device_ops-&gt;ndo_change_mtu() to ensure that the
interface's MTU can not be set to anything bigger than CAN_MTU. By
fixing the root cause, this prevents the buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39987/">CVE-2025-39987 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39987">CVE-2025-39987 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252079">SUSE bug 1252079</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031708" comment="cluster-md-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031709" comment="cluster-md-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031710" comment="cluster-md-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031711" comment="dlm-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031712" comment="dlm-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031713" comment="dlm-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031714" comment="dtb-allwinner-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031715" comment="dtb-altera-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031716" comment="dtb-amazon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031717" comment="dtb-amd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031718" comment="dtb-amlogic-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031719" comment="dtb-apm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031720" comment="dtb-apple-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031721" comment="dtb-arm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031722" comment="dtb-broadcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031723" comment="dtb-cavium-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031724" comment="dtb-exynos-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031725" comment="dtb-freescale-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031726" comment="dtb-hisilicon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031727" comment="dtb-lg-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031728" comment="dtb-marvell-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031729" comment="dtb-mediatek-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031730" comment="dtb-nvidia-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031731" comment="dtb-qcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031732" comment="dtb-renesas-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031733" comment="dtb-rockchip-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031734" comment="dtb-socionext-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031735" comment="dtb-sprd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031736" comment="dtb-xilinx-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031737" comment="gfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031738" comment="gfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031739" comment="gfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031742" comment="kernel-64kb-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031743" comment="kernel-64kb-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031747" comment="kernel-default-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031748" comment="kernel-default-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031750" comment="kernel-docs-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031751" comment="kernel-docs-html-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031752" comment="kernel-kvmsmall-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031754" comment="kernel-kvmsmall-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031756" comment="kernel-obs-build-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031757" comment="kernel-obs-qa-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031760" comment="kernel-rt-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031761" comment="kernel-rt-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031762" comment="kernel-rt-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031764" comment="kernel-source-vanilla-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031765" comment="kernel-syms-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031766" comment="kernel-zfcpdump-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031767" comment="kselftests-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031768" comment="kselftests-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031769" comment="kselftests-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031770" comment="ocfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031771" comment="ocfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031772" comment="ocfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539988" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39988</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39988" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39988" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39988" ref_url="https://www.suse.com/security/cve/CVE-2025-39988" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: etas_es58x: populate ndo_change_mtu() to prevent buffer overflow

Sending an PF_PACKET allows to bypass the CAN framework logic and to
directly reach the xmit() function of a CAN driver. The only check
which is performed by the PF_PACKET framework is to make sure that
skb-&gt;len fits the interface's MTU.

Unfortunately, because the etas_es58x driver does not populate its
net_device_ops-&gt;ndo_change_mtu(), it is possible for an attacker to
configure an invalid MTU by doing, for example:

  $ ip link set can0 mtu 9999

After doing so, the attacker could open a PF_PACKET socket using the
ETH_P_CANXL protocol:

	socket(PF_PACKET, SOCK_RAW, htons(ETH_P_CANXL));

to inject a malicious CAN XL frames. For example:

	struct canxl_frame frame = {
		.flags = 0xff,
		.len = 2048,
	};

The CAN drivers' xmit() function are calling can_dev_dropped_skb() to
check that the skb is valid, unfortunately under above conditions, the
malicious packet is able to go through can_dev_dropped_skb() checks:

  1. the skb-&gt;protocol is set to ETH_P_CANXL which is valid (the
     function does not check the actual device capabilities).

  2. the length is a valid CAN XL length.

And so, es58x_start_xmit() receives a CAN XL frame which it is not
able to correctly handle and will thus misinterpret it as a CAN(FD)
frame.

This can result in a buffer overflow. For example, using the es581.4
variant, the frame will be dispatched to es581_4_tx_can_msg(), go
through the last check at the beginning of this function:

	if (can_is_canfd_skb(skb))
		return -EMSGSIZE;

and reach this line:

	memcpy(tx_can_msg-&gt;data, cf-&gt;data, cf-&gt;len);

Here, cf-&gt;len corresponds to the flags field of the CAN XL frame. In
our previous example, we set canxl_frame-&gt;flags to 0xff. Because the
maximum expected length is 8, a buffer overflow of 247 bytes occurs!

Populate net_device_ops-&gt;ndo_change_mtu() to ensure that the
interface's MTU can not be set to anything bigger than CAN_MTU or
CANFD_MTU (depending on the device capabilities). By fixing the root
cause, this prevents the buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39988/">CVE-2025-39988 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39988">CVE-2025-39988 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252074">SUSE bug 1252074</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031708" comment="cluster-md-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031709" comment="cluster-md-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031710" comment="cluster-md-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031711" comment="dlm-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031712" comment="dlm-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031713" comment="dlm-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031714" comment="dtb-allwinner-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031715" comment="dtb-altera-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031716" comment="dtb-amazon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031717" comment="dtb-amd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031718" comment="dtb-amlogic-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031719" comment="dtb-apm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031720" comment="dtb-apple-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031721" comment="dtb-arm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031722" comment="dtb-broadcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031723" comment="dtb-cavium-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031724" comment="dtb-exynos-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031725" comment="dtb-freescale-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031726" comment="dtb-hisilicon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031727" comment="dtb-lg-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031728" comment="dtb-marvell-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031729" comment="dtb-mediatek-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031730" comment="dtb-nvidia-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031731" comment="dtb-qcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031732" comment="dtb-renesas-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031733" comment="dtb-rockchip-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031734" comment="dtb-socionext-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031735" comment="dtb-sprd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031736" comment="dtb-xilinx-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031737" comment="gfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031738" comment="gfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031739" comment="gfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031742" comment="kernel-64kb-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031743" comment="kernel-64kb-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031747" comment="kernel-default-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031748" comment="kernel-default-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031750" comment="kernel-docs-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031751" comment="kernel-docs-html-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031752" comment="kernel-kvmsmall-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031754" comment="kernel-kvmsmall-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031756" comment="kernel-obs-build-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031757" comment="kernel-obs-qa-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031760" comment="kernel-rt-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031761" comment="kernel-rt-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031762" comment="kernel-rt-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031764" comment="kernel-source-vanilla-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031765" comment="kernel-syms-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031766" comment="kernel-zfcpdump-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031767" comment="kselftests-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031768" comment="kselftests-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031769" comment="kselftests-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031770" comment="ocfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031771" comment="ocfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031772" comment="ocfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539990" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39990</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39990" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39990" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39990" ref_url="https://www.suse.com/security/cve/CVE-2025-39990" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Check the helper function is valid in get_helper_proto

kernel test robot reported verifier bug [1] where the helper func
pointer could be NULL due to disabled config option.

As Alexei suggested we could check on that in get_helper_proto
directly. Marking tail_call helper func with BPF_PTR_POISON,
because it is unused by design.

  [1] https://lore.kernel.org/oe-lkp/202507160818.68358831-lkp@intel.com
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-39990/">CVE-2025-39990 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39990">CVE-2025-39990 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252054">SUSE bug 1252054</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539991" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39991</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39991" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39991" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39991" ref_url="https://www.suse.com/security/cve/CVE-2025-39991" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath11k: fix NULL dereference in ath11k_qmi_m3_load()

If ab-&gt;fw.m3_data points to data, then fw pointer remains null.
Further, if m3_mem is not allocated, then fw is dereferenced to be
passed to ath11k_err function.

Replace fw-&gt;size by m3_len.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39991/">CVE-2025-39991 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39991">CVE-2025-39991 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252075">SUSE bug 1252075</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031708" comment="cluster-md-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031709" comment="cluster-md-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031710" comment="cluster-md-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031711" comment="dlm-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031712" comment="dlm-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031713" comment="dlm-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031714" comment="dtb-allwinner-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031715" comment="dtb-altera-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031716" comment="dtb-amazon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031717" comment="dtb-amd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031718" comment="dtb-amlogic-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031719" comment="dtb-apm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031720" comment="dtb-apple-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031721" comment="dtb-arm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031722" comment="dtb-broadcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031723" comment="dtb-cavium-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031724" comment="dtb-exynos-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031725" comment="dtb-freescale-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031726" comment="dtb-hisilicon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031727" comment="dtb-lg-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031728" comment="dtb-marvell-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031729" comment="dtb-mediatek-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031730" comment="dtb-nvidia-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031731" comment="dtb-qcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031732" comment="dtb-renesas-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031733" comment="dtb-rockchip-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031734" comment="dtb-socionext-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031735" comment="dtb-sprd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031736" comment="dtb-xilinx-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031737" comment="gfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031738" comment="gfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031739" comment="gfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031742" comment="kernel-64kb-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031743" comment="kernel-64kb-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031747" comment="kernel-default-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031748" comment="kernel-default-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031750" comment="kernel-docs-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031751" comment="kernel-docs-html-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031752" comment="kernel-kvmsmall-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031754" comment="kernel-kvmsmall-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031756" comment="kernel-obs-build-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031757" comment="kernel-obs-qa-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031760" comment="kernel-rt-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031761" comment="kernel-rt-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031762" comment="kernel-rt-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031764" comment="kernel-source-vanilla-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031765" comment="kernel-syms-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031766" comment="kernel-zfcpdump-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031767" comment="kselftests-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031768" comment="kselftests-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031769" comment="kselftests-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031770" comment="ocfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031771" comment="ocfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031772" comment="ocfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539992" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39992</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39992" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39992" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39992" ref_url="https://www.suse.com/security/cve/CVE-2025-39992" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm: swap: check for stable address space before operating on the VMA

It is possible to hit a zero entry while traversing the vmas in unuse_mm()
called from swapoff path and accessing it causes the OOPS:

Unable to handle kernel NULL pointer dereference at virtual address
0000000000000446--&gt; Loading the memory from offset 0x40 on the
XA_ZERO_ENTRY as address.
Mem abort info:
  ESR = 0x0000000096000005
  EC = 0x25: DABT (current EL), IL = 32 bits
  SET = 0, FnV = 0
  EA = 0, S1PTW = 0
  FSC = 0x05: level 1 translation fault

The issue is manifested from the below race between the fork() on a
process and swapoff:
fork(dup_mmap())			swapoff(unuse_mm)
---------------                         -----------------
1) Identical mtree is built using
   __mt_dup().

2) copy_pte_range()--&gt;
	copy_nonpresent_pte():
       The dst mm is added into the
    mmlist to be visible to the
    swapoff operation.

3) Fatal signal is sent to the parent
process(which is the current during the
fork) thus skip the duplication of the
vmas and mark the vma range with
XA_ZERO_ENTRY as a marker for this process
that helps during exit_mmap().

				     4) swapoff is tried on the
					'mm' added to the 'mmlist' as
					part of the 2.

				     5) unuse_mm(), that iterates
					through the vma's of this 'mm'
					will hit the non-NULL zero entry
					and operating on this zero entry
					as a vma is resulting into the
					oops.

The proper fix would be around not exposing this partially-valid tree to
others when droping the mmap lock, which is being solved with [1].  A
simpler solution would be checking for MMF_UNSTABLE, as it is set if
mm_struct is not fully initialized in dup_mmap().

Thanks to Liam/Lorenzo/David for all the suggestions in fixing this
issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39992/">CVE-2025-39992 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39992">CVE-2025-39992 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252076">SUSE bug 1252076</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031708" comment="cluster-md-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031709" comment="cluster-md-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031710" comment="cluster-md-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031711" comment="dlm-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031712" comment="dlm-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031713" comment="dlm-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031714" comment="dtb-allwinner-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031715" comment="dtb-altera-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031716" comment="dtb-amazon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031717" comment="dtb-amd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031718" comment="dtb-amlogic-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031719" comment="dtb-apm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031720" comment="dtb-apple-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031721" comment="dtb-arm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031722" comment="dtb-broadcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031723" comment="dtb-cavium-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031724" comment="dtb-exynos-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031725" comment="dtb-freescale-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031726" comment="dtb-hisilicon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031727" comment="dtb-lg-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031728" comment="dtb-marvell-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031729" comment="dtb-mediatek-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031730" comment="dtb-nvidia-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031731" comment="dtb-qcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031732" comment="dtb-renesas-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031733" comment="dtb-rockchip-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031734" comment="dtb-socionext-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031735" comment="dtb-sprd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031736" comment="dtb-xilinx-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031737" comment="gfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031738" comment="gfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031739" comment="gfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031742" comment="kernel-64kb-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031743" comment="kernel-64kb-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031747" comment="kernel-default-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031748" comment="kernel-default-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031750" comment="kernel-docs-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031751" comment="kernel-docs-html-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031752" comment="kernel-kvmsmall-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031754" comment="kernel-kvmsmall-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031756" comment="kernel-obs-build-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031757" comment="kernel-obs-qa-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031760" comment="kernel-rt-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031761" comment="kernel-rt-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031762" comment="kernel-rt-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031764" comment="kernel-source-vanilla-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031765" comment="kernel-syms-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031766" comment="kernel-zfcpdump-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031767" comment="kselftests-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031768" comment="kselftests-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031769" comment="kselftests-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031770" comment="ocfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031771" comment="ocfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031772" comment="ocfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539993" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39993</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39993" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39993" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39993" ref_url="https://www.suse.com/security/cve/CVE-2025-39993" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3685" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: rc: fix races with imon_disconnect()

Syzbot reports a KASAN issue as below:
BUG: KASAN: use-after-free in __create_pipe include/linux/usb.h:1945 [inline]
BUG: KASAN: use-after-free in send_packet+0xa2d/0xbc0 drivers/media/rc/imon.c:627
Read of size 4 at addr ffff8880256fb000 by task syz-executor314/4465

CPU: 2 PID: 4465 Comm: syz-executor314 Not tainted 6.0.0-rc1-syzkaller #0
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.14.0-2 04/01/2014
Call Trace:
 &lt;TASK&gt;
__dump_stack lib/dump_stack.c:88 [inline]
dump_stack_lvl+0xcd/0x134 lib/dump_stack.c:106
print_address_description mm/kasan/report.c:317 [inline]
print_report.cold+0x2ba/0x6e9 mm/kasan/report.c:433
kasan_report+0xb1/0x1e0 mm/kasan/report.c:495
__create_pipe include/linux/usb.h:1945 [inline]
send_packet+0xa2d/0xbc0 drivers/media/rc/imon.c:627
vfd_write+0x2d9/0x550 drivers/media/rc/imon.c:991
vfs_write+0x2d7/0xdd0 fs/read_write.c:576
ksys_write+0x127/0x250 fs/read_write.c:631
do_syscall_x64 arch/x86/entry/common.c:50 [inline]
do_syscall_64+0x35/0xb0 arch/x86/entry/common.c:80
entry_SYSCALL_64_after_hwframe+0x63/0xcd

The iMON driver improperly releases the usb_device reference in
imon_disconnect without coordinating with active users of the
device.

Specifically, the fields usbdev_intf0 and usbdev_intf1 are not
protected by the users counter (ictx-&gt;users). During probe,
imon_init_intf0 or imon_init_intf1 increments the usb_device
reference count depending on the interface. However, during
disconnect, usb_put_dev is called unconditionally, regardless of
actual usage.

As a result, if vfd_write or other operations are still in
progress after disconnect, this can lead to a use-after-free of
the usb_device pointer.

Thread 1 vfd_write                      Thread 2 imon_disconnect
                                        ...
                                        if
                                          usb_put_dev(ictx-&gt;usbdev_intf0)
                                        else
                                          usb_put_dev(ictx-&gt;usbdev_intf1)
...
while
  send_packet
    if
      pipe = usb_sndintpipe(
        ictx-&gt;usbdev_intf0) UAF
    else
      pipe = usb_sndctrlpipe(
        ictx-&gt;usbdev_intf0, 0) UAF

Guard access to usbdev_intf0 and usbdev_intf1 after disconnect by
checking ictx-&gt;disconnected in all writer paths. Add early return
with -ENODEV in send_packet(), vfd_write(), lcd_write() and
display_open() if the device is no longer present.

Set and read ictx-&gt;disconnected under ictx-&gt;lock to ensure memory
synchronization. Acquire the lock in imon_disconnect() before setting
the flag to synchronize with any ongoing operations.

Ensure writers exit early and safely after disconnect before the USB
core proceeds with cleanup.

Found by Linux Verification Center (linuxtesting.org) with Syzkaller.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-03-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39993/">CVE-2025-39993 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39993">CVE-2025-39993 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252070">SUSE bug 1252070</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031708" comment="cluster-md-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031709" comment="cluster-md-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031710" comment="cluster-md-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031711" comment="dlm-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031712" comment="dlm-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031713" comment="dlm-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031714" comment="dtb-allwinner-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031715" comment="dtb-altera-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031716" comment="dtb-amazon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031717" comment="dtb-amd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031718" comment="dtb-amlogic-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031719" comment="dtb-apm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031720" comment="dtb-apple-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031721" comment="dtb-arm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031722" comment="dtb-broadcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031723" comment="dtb-cavium-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031724" comment="dtb-exynos-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031725" comment="dtb-freescale-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031726" comment="dtb-hisilicon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031727" comment="dtb-lg-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031728" comment="dtb-marvell-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031729" comment="dtb-mediatek-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031730" comment="dtb-nvidia-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031731" comment="dtb-qcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031732" comment="dtb-renesas-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031733" comment="dtb-rockchip-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031734" comment="dtb-socionext-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031735" comment="dtb-sprd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031736" comment="dtb-xilinx-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031737" comment="gfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031738" comment="gfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031739" comment="gfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031742" comment="kernel-64kb-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031743" comment="kernel-64kb-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031747" comment="kernel-default-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031748" comment="kernel-default-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031750" comment="kernel-docs-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031751" comment="kernel-docs-html-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031752" comment="kernel-kvmsmall-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031754" comment="kernel-kvmsmall-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031756" comment="kernel-obs-build-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031757" comment="kernel-obs-qa-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031760" comment="kernel-rt-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031761" comment="kernel-rt-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031762" comment="kernel-rt-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031764" comment="kernel-source-vanilla-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031765" comment="kernel-syms-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031766" comment="kernel-zfcpdump-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031767" comment="kselftests-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031768" comment="kselftests-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031769" comment="kselftests-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031770" comment="ocfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031771" comment="ocfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031772" comment="ocfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539994" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39994</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39994" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39994" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39994" ref_url="https://www.suse.com/security/cve/CVE-2025-39994" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: tuner: xc5000: Fix use-after-free in xc5000_release

The original code uses cancel_delayed_work() in xc5000_release(), which
does not guarantee that the delayed work item timer_sleep has fully
completed if it was already running. This leads to use-after-free scenarios
where xc5000_release() may free the xc5000_priv while timer_sleep is still
active and attempts to dereference the xc5000_priv.

A typical race condition is illustrated below:

CPU 0 (release thread)                 | CPU 1 (delayed work callback)
xc5000_release()                       | xc5000_do_timer_sleep()
  cancel_delayed_work()                |
  hybrid_tuner_release_state(priv)     |
    kfree(priv)                        |
                                       |   priv = container_of() // UAF

Replace cancel_delayed_work() with cancel_delayed_work_sync() to ensure
that the timer_sleep is properly canceled before the xc5000_priv memory
is deallocated.

A deadlock concern was considered: xc5000_release() is called in a process
context and is not holding any locks that the timer_sleep work item might
also need. Therefore, the use of the _sync() variant is safe here.

This bug was initially identified through static analysis.

[hverkuil: fix typo in Subject: tunner -&gt; tuner]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39994/">CVE-2025-39994 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39994">CVE-2025-39994 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252072">SUSE bug 1252072</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031708" comment="cluster-md-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031709" comment="cluster-md-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031710" comment="cluster-md-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031711" comment="dlm-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031712" comment="dlm-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031713" comment="dlm-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031714" comment="dtb-allwinner-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031715" comment="dtb-altera-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031716" comment="dtb-amazon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031717" comment="dtb-amd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031718" comment="dtb-amlogic-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031719" comment="dtb-apm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031720" comment="dtb-apple-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031721" comment="dtb-arm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031722" comment="dtb-broadcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031723" comment="dtb-cavium-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031724" comment="dtb-exynos-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031725" comment="dtb-freescale-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031726" comment="dtb-hisilicon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031727" comment="dtb-lg-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031728" comment="dtb-marvell-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031729" comment="dtb-mediatek-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031730" comment="dtb-nvidia-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031731" comment="dtb-qcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031732" comment="dtb-renesas-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031733" comment="dtb-rockchip-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031734" comment="dtb-socionext-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031735" comment="dtb-sprd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031736" comment="dtb-xilinx-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031737" comment="gfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031738" comment="gfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031739" comment="gfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031742" comment="kernel-64kb-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031743" comment="kernel-64kb-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031747" comment="kernel-default-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031748" comment="kernel-default-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031750" comment="kernel-docs-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031751" comment="kernel-docs-html-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031752" comment="kernel-kvmsmall-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031754" comment="kernel-kvmsmall-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031756" comment="kernel-obs-build-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031757" comment="kernel-obs-qa-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031760" comment="kernel-rt-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031761" comment="kernel-rt-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031762" comment="kernel-rt-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031764" comment="kernel-source-vanilla-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031765" comment="kernel-syms-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031766" comment="kernel-zfcpdump-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031767" comment="kselftests-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031768" comment="kselftests-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031769" comment="kselftests-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031770" comment="ocfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031771" comment="ocfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031772" comment="ocfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539995" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39995</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39995" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39995" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39995" ref_url="https://www.suse.com/security/cve/CVE-2025-39995" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: i2c: tc358743: Fix use-after-free bugs caused by orphan timer in probe

The state-&gt;timer is a cyclic timer that schedules work_i2c_poll and
delayed_work_enable_hotplug, while rearming itself. Using timer_delete()
fails to guarantee the timer isn't still running when destroyed, similarly
cancel_delayed_work() cannot ensure delayed_work_enable_hotplug has
terminated if already executing. During probe failure after timer
initialization, these may continue running as orphans and reference the
already-freed tc358743_state object through tc358743_irq_poll_timer.

The following is the trace captured by KASAN.

BUG: KASAN: slab-use-after-free in __run_timer_base.part.0+0x7d7/0x8c0
Write of size 8 at addr ffff88800ded83c8 by task swapper/1/0
...
Call Trace:
 &lt;IRQ&gt;
 dump_stack_lvl+0x55/0x70
 print_report+0xcf/0x610
 ? __pfx_sched_balance_find_src_group+0x10/0x10
 ? __run_timer_base.part.0+0x7d7/0x8c0
 kasan_report+0xb8/0xf0
 ? __run_timer_base.part.0+0x7d7/0x8c0
 __run_timer_base.part.0+0x7d7/0x8c0
 ? rcu_sched_clock_irq+0xb06/0x27d0
 ? __pfx___run_timer_base.part.0+0x10/0x10
 ? try_to_wake_up+0xb15/0x1960
 ? tmigr_update_events+0x280/0x740
 ? _raw_spin_lock_irq+0x80/0xe0
 ? __pfx__raw_spin_lock_irq+0x10/0x10
 tmigr_handle_remote_up+0x603/0x7e0
 ? __pfx_tmigr_handle_remote_up+0x10/0x10
 ? sched_balance_trigger+0x98/0x9f0
 ? sched_tick+0x221/0x5a0
 ? _raw_spin_lock_irq+0x80/0xe0
 ? __pfx__raw_spin_lock_irq+0x10/0x10
 ? tick_nohz_handler+0x339/0x440
 ? __pfx_tmigr_handle_remote_up+0x10/0x10
 __walk_groups.isra.0+0x42/0x150
 tmigr_handle_remote+0x1f4/0x2e0
 ? __pfx_tmigr_handle_remote+0x10/0x10
 ? ktime_get+0x60/0x140
 ? lapic_next_event+0x11/0x20
 ? clockevents_program_event+0x1d4/0x2a0
 ? hrtimer_interrupt+0x322/0x780
 handle_softirqs+0x16a/0x550
 irq_exit_rcu+0xaf/0xe0
 sysvec_apic_timer_interrupt+0x70/0x80
 &lt;/IRQ&gt;
...

Allocated by task 141:
 kasan_save_stack+0x24/0x50
 kasan_save_track+0x14/0x30
 __kasan_kmalloc+0x7f/0x90
 __kmalloc_node_track_caller_noprof+0x198/0x430
 devm_kmalloc+0x7b/0x1e0
 tc358743_probe+0xb7/0x610  i2c_device_probe+0x51d/0x880
 really_probe+0x1ca/0x5c0
 __driver_probe_device+0x248/0x310
 driver_probe_device+0x44/0x120
 __device_attach_driver+0x174/0x220
 bus_for_each_drv+0x100/0x190
 __device_attach+0x206/0x370
 bus_probe_device+0x123/0x170
 device_add+0xd25/0x1470
 i2c_new_client_device+0x7a0/0xcd0
 do_one_initcall+0x89/0x300
 do_init_module+0x29d/0x7f0
 load_module+0x4f48/0x69e0
 init_module_from_file+0xe4/0x150
 idempotent_init_module+0x320/0x670
 __x64_sys_finit_module+0xbd/0x120
 do_syscall_64+0xac/0x280
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

Freed by task 141:
 kasan_save_stack+0x24/0x50
 kasan_save_track+0x14/0x30
 kasan_save_free_info+0x3a/0x60
 __kasan_slab_free+0x3f/0x50
 kfree+0x137/0x370
 release_nodes+0xa4/0x100
 devres_release_group+0x1b2/0x380
 i2c_device_probe+0x694/0x880
 really_probe+0x1ca/0x5c0
 __driver_probe_device+0x248/0x310
 driver_probe_device+0x44/0x120
 __device_attach_driver+0x174/0x220
 bus_for_each_drv+0x100/0x190
 __device_attach+0x206/0x370
 bus_probe_device+0x123/0x170
 device_add+0xd25/0x1470
 i2c_new_client_device+0x7a0/0xcd0
 do_one_initcall+0x89/0x300
 do_init_module+0x29d/0x7f0
 load_module+0x4f48/0x69e0
 init_module_from_file+0xe4/0x150
 idempotent_init_module+0x320/0x670
 __x64_sys_finit_module+0xbd/0x120
 do_syscall_64+0xac/0x280
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
...

Replace timer_delete() with timer_delete_sync() and cancel_delayed_work()
with cancel_delayed_work_sync() to ensure proper termination of timer and
work items before resource cleanup.

This bug was initially identified through static analysis. For reproduction
and testing, I created a functional emulation of the tc358743 device via a
kernel module and introduced faults through the debugfs interface.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39995/">CVE-2025-39995 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39995">CVE-2025-39995 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252064">SUSE bug 1252064</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031708" comment="cluster-md-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031709" comment="cluster-md-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031710" comment="cluster-md-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031711" comment="dlm-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031712" comment="dlm-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031713" comment="dlm-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031714" comment="dtb-allwinner-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031715" comment="dtb-altera-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031716" comment="dtb-amazon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031717" comment="dtb-amd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031718" comment="dtb-amlogic-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031719" comment="dtb-apm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031720" comment="dtb-apple-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031721" comment="dtb-arm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031722" comment="dtb-broadcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031723" comment="dtb-cavium-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031724" comment="dtb-exynos-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031725" comment="dtb-freescale-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031726" comment="dtb-hisilicon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031727" comment="dtb-lg-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031728" comment="dtb-marvell-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031729" comment="dtb-mediatek-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031730" comment="dtb-nvidia-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031731" comment="dtb-qcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031732" comment="dtb-renesas-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031733" comment="dtb-rockchip-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031734" comment="dtb-socionext-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031735" comment="dtb-sprd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031736" comment="dtb-xilinx-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031737" comment="gfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031738" comment="gfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031739" comment="gfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031742" comment="kernel-64kb-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031743" comment="kernel-64kb-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031747" comment="kernel-default-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031748" comment="kernel-default-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031750" comment="kernel-docs-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031751" comment="kernel-docs-html-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031752" comment="kernel-kvmsmall-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031754" comment="kernel-kvmsmall-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031756" comment="kernel-obs-build-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031757" comment="kernel-obs-qa-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031760" comment="kernel-rt-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031761" comment="kernel-rt-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031762" comment="kernel-rt-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031764" comment="kernel-source-vanilla-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031765" comment="kernel-syms-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031766" comment="kernel-zfcpdump-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031767" comment="kselftests-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031768" comment="kselftests-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031769" comment="kselftests-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031770" comment="ocfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031771" comment="ocfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031772" comment="ocfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539996" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39996</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39996" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39996" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39996" ref_url="https://www.suse.com/security/cve/CVE-2025-39996" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: b2c2: Fix use-after-free causing by irq_check_work in flexcop_pci_remove

The original code uses cancel_delayed_work() in flexcop_pci_remove(), which
does not guarantee that the delayed work item irq_check_work has fully
completed if it was already running. This leads to use-after-free scenarios
where flexcop_pci_remove() may free the flexcop_device while irq_check_work
is still active and attempts to dereference the device.

A typical race condition is illustrated below:

CPU 0 (remove)                         | CPU 1 (delayed work callback)
flexcop_pci_remove()                   | flexcop_pci_irq_check_work()
  cancel_delayed_work()                |
  flexcop_device_kfree(fc_pci-&gt;fc_dev) |
                                       |   fc = fc_pci-&gt;fc_dev; // UAF

This is confirmed by a KASAN report:

==================================================================
BUG: KASAN: slab-use-after-free in __run_timer_base.part.0+0x7d7/0x8c0
Write of size 8 at addr ffff8880093aa8c8 by task bash/135
...
Call Trace:
 &lt;IRQ&gt;
 dump_stack_lvl+0x55/0x70
 print_report+0xcf/0x610
 ? __run_timer_base.part.0+0x7d7/0x8c0
 kasan_report+0xb8/0xf0
 ? __run_timer_base.part.0+0x7d7/0x8c0
 __run_timer_base.part.0+0x7d7/0x8c0
 ? __pfx___run_timer_base.part.0+0x10/0x10
 ? __pfx_read_tsc+0x10/0x10
 ? ktime_get+0x60/0x140
 ? lapic_next_event+0x11/0x20
 ? clockevents_program_event+0x1d4/0x2a0
 run_timer_softirq+0xd1/0x190
 handle_softirqs+0x16a/0x550
 irq_exit_rcu+0xaf/0xe0
 sysvec_apic_timer_interrupt+0x70/0x80
 &lt;/IRQ&gt;
...

Allocated by task 1:
 kasan_save_stack+0x24/0x50
 kasan_save_track+0x14/0x30
 __kasan_kmalloc+0x7f/0x90
 __kmalloc_noprof+0x1be/0x460
 flexcop_device_kmalloc+0x54/0xe0
 flexcop_pci_probe+0x1f/0x9d0
 local_pci_probe+0xdc/0x190
 pci_device_probe+0x2fe/0x470
 really_probe+0x1ca/0x5c0
 __driver_probe_device+0x248/0x310
 driver_probe_device+0x44/0x120
 __driver_attach+0xd2/0x310
 bus_for_each_dev+0xed/0x170
 bus_add_driver+0x208/0x500
 driver_register+0x132/0x460
 do_one_initcall+0x89/0x300
 kernel_init_freeable+0x40d/0x720
 kernel_init+0x1a/0x150
 ret_from_fork+0x10c/0x1a0
 ret_from_fork_asm+0x1a/0x30

Freed by task 135:
 kasan_save_stack+0x24/0x50
 kasan_save_track+0x14/0x30
 kasan_save_free_info+0x3a/0x60
 __kasan_slab_free+0x3f/0x50
 kfree+0x137/0x370
 flexcop_device_kfree+0x32/0x50
 pci_device_remove+0xa6/0x1d0
 device_release_driver_internal+0xf8/0x210
 pci_stop_bus_device+0x105/0x150
 pci_stop_and_remove_bus_device_locked+0x15/0x30
 remove_store+0xcc/0xe0
 kernfs_fop_write_iter+0x2c3/0x440
 vfs_write+0x871/0xd70
 ksys_write+0xee/0x1c0
 do_syscall_64+0xac/0x280
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
...

Replace cancel_delayed_work() with cancel_delayed_work_sync() to ensure
that the delayed work item is properly canceled and any executing delayed
work has finished before the device memory is deallocated.

This bug was initially identified through static analysis. To reproduce
and test it, I simulated the B2C2 FlexCop PCI device in QEMU and introduced
artificial delays within the flexcop_pci_irq_check_work() function to
increase the likelihood of triggering the bug.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39996/">CVE-2025-39996 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39996">CVE-2025-39996 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252065">SUSE bug 1252065</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031708" comment="cluster-md-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031709" comment="cluster-md-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031710" comment="cluster-md-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031711" comment="dlm-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031712" comment="dlm-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031713" comment="dlm-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031714" comment="dtb-allwinner-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031715" comment="dtb-altera-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031716" comment="dtb-amazon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031717" comment="dtb-amd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031718" comment="dtb-amlogic-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031719" comment="dtb-apm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031720" comment="dtb-apple-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031721" comment="dtb-arm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031722" comment="dtb-broadcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031723" comment="dtb-cavium-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031724" comment="dtb-exynos-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031725" comment="dtb-freescale-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031726" comment="dtb-hisilicon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031727" comment="dtb-lg-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031728" comment="dtb-marvell-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031729" comment="dtb-mediatek-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031730" comment="dtb-nvidia-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031731" comment="dtb-qcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031732" comment="dtb-renesas-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031733" comment="dtb-rockchip-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031734" comment="dtb-socionext-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031735" comment="dtb-sprd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031736" comment="dtb-xilinx-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031737" comment="gfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031738" comment="gfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031739" comment="gfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031742" comment="kernel-64kb-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031743" comment="kernel-64kb-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031747" comment="kernel-default-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031748" comment="kernel-default-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031750" comment="kernel-docs-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031751" comment="kernel-docs-html-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031752" comment="kernel-kvmsmall-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031754" comment="kernel-kvmsmall-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031756" comment="kernel-obs-build-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031757" comment="kernel-obs-qa-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031760" comment="kernel-rt-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031761" comment="kernel-rt-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031762" comment="kernel-rt-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031764" comment="kernel-source-vanilla-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031765" comment="kernel-syms-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031766" comment="kernel-zfcpdump-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031767" comment="kselftests-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031768" comment="kselftests-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031769" comment="kselftests-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031770" comment="ocfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031771" comment="ocfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031772" comment="ocfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202539997" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-39997</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-39997" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-39997" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-39997" ref_url="https://www.suse.com/security/cve/CVE-2025-39997" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: usb-audio: fix race condition to UAF in snd_usbmidi_free

The previous commit 0718a78f6a9f ("ALSA: usb-audio: Kill timer properly at
removal") patched a UAF issue caused by the error timer.

However, because the error timer kill added in this patch occurs after the
endpoint delete, a race condition to UAF still occurs, albeit rarely.

Additionally, since kill-cleanup for urb is also missing, freed memory can
be accessed in interrupt context related to urb, which can cause UAF.

Therefore, to prevent this, error timer and urb must be killed before
freeing the heap memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-39997/">CVE-2025-39997 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-39997">CVE-2025-39997 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252056">SUSE bug 1252056</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031708" comment="cluster-md-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031709" comment="cluster-md-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031710" comment="cluster-md-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031711" comment="dlm-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031712" comment="dlm-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031713" comment="dlm-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031714" comment="dtb-allwinner-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031715" comment="dtb-altera-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031716" comment="dtb-amazon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031717" comment="dtb-amd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031718" comment="dtb-amlogic-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031719" comment="dtb-apm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031720" comment="dtb-apple-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031721" comment="dtb-arm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031722" comment="dtb-broadcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031723" comment="dtb-cavium-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031724" comment="dtb-exynos-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031725" comment="dtb-freescale-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031726" comment="dtb-hisilicon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031727" comment="dtb-lg-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031728" comment="dtb-marvell-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031729" comment="dtb-mediatek-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031730" comment="dtb-nvidia-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031731" comment="dtb-qcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031732" comment="dtb-renesas-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031733" comment="dtb-rockchip-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031734" comment="dtb-socionext-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031735" comment="dtb-sprd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031736" comment="dtb-xilinx-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031737" comment="gfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031738" comment="gfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031739" comment="gfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031742" comment="kernel-64kb-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031743" comment="kernel-64kb-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031747" comment="kernel-default-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031748" comment="kernel-default-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031750" comment="kernel-docs-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031751" comment="kernel-docs-html-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031752" comment="kernel-kvmsmall-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031754" comment="kernel-kvmsmall-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031756" comment="kernel-obs-build-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031757" comment="kernel-obs-qa-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031760" comment="kernel-rt-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031761" comment="kernel-rt-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031762" comment="kernel-rt-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031764" comment="kernel-source-vanilla-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031765" comment="kernel-syms-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031766" comment="kernel-zfcpdump-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031767" comment="kselftests-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031768" comment="kselftests-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031769" comment="kselftests-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031770" comment="ocfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031771" comment="ocfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031772" comment="ocfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40000</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40000" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40000" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40000" ref_url="https://www.suse.com/security/cve/CVE-2025-40000" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: rtw89: fix use-after-free in rtw89_core_tx_kick_off_and_wait()

There is a bug observed when rtw89_core_tx_kick_off_and_wait() tries to
access already freed skb_data:

 BUG: KFENCE: use-after-free write in rtw89_core_tx_kick_off_and_wait drivers/net/wireless/realtek/rtw89/core.c:1110

 CPU: 6 UID: 0 PID: 41377 Comm: kworker/u64:24 Not tainted  6.17.0-rc1+ #1 PREEMPT(lazy)
 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS edk2-20250523-14.fc42 05/23/2025
 Workqueue: events_unbound cfg80211_wiphy_work [cfg80211]

 Use-after-free write at 0x0000000020309d9d (in kfence-#251):
 rtw89_core_tx_kick_off_and_wait drivers/net/wireless/realtek/rtw89/core.c:1110
 rtw89_core_scan_complete drivers/net/wireless/realtek/rtw89/core.c:5338
 rtw89_hw_scan_complete_cb drivers/net/wireless/realtek/rtw89/fw.c:7979
 rtw89_chanctx_proceed_cb drivers/net/wireless/realtek/rtw89/chan.c:3165
 rtw89_chanctx_proceed drivers/net/wireless/realtek/rtw89/chan.h:141
 rtw89_hw_scan_complete drivers/net/wireless/realtek/rtw89/fw.c:8012
 rtw89_mac_c2h_scanofld_rsp drivers/net/wireless/realtek/rtw89/mac.c:5059
 rtw89_fw_c2h_work drivers/net/wireless/realtek/rtw89/fw.c:6758
 process_one_work kernel/workqueue.c:3241
 worker_thread kernel/workqueue.c:3400
 kthread kernel/kthread.c:463
 ret_from_fork arch/x86/kernel/process.c:154
 ret_from_fork_asm arch/x86/entry/entry_64.S:258

 kfence-#251: 0x0000000056e2393d-0x000000009943cb62, size=232, cache=skbuff_head_cache

 allocated by task 41377 on cpu 6 at 77869.159548s (0.009551s ago):
 __alloc_skb net/core/skbuff.c:659
 __netdev_alloc_skb net/core/skbuff.c:734
 ieee80211_nullfunc_get net/mac80211/tx.c:5844
 rtw89_core_send_nullfunc drivers/net/wireless/realtek/rtw89/core.c:3431
 rtw89_core_scan_complete drivers/net/wireless/realtek/rtw89/core.c:5338
 rtw89_hw_scan_complete_cb drivers/net/wireless/realtek/rtw89/fw.c:7979
 rtw89_chanctx_proceed_cb drivers/net/wireless/realtek/rtw89/chan.c:3165
 rtw89_chanctx_proceed drivers/net/wireless/realtek/rtw89/chan.c:3194
 rtw89_hw_scan_complete drivers/net/wireless/realtek/rtw89/fw.c:8012
 rtw89_mac_c2h_scanofld_rsp drivers/net/wireless/realtek/rtw89/mac.c:5059
 rtw89_fw_c2h_work drivers/net/wireless/realtek/rtw89/fw.c:6758
 process_one_work kernel/workqueue.c:3241
 worker_thread kernel/workqueue.c:3400
 kthread kernel/kthread.c:463
 ret_from_fork arch/x86/kernel/process.c:154
 ret_from_fork_asm arch/x86/entry/entry_64.S:258

 freed by task 1045 on cpu 9 at 77869.168393s (0.001557s ago):
 ieee80211_tx_status_skb net/mac80211/status.c:1117
 rtw89_pci_release_txwd_skb drivers/net/wireless/realtek/rtw89/pci.c:564
 rtw89_pci_release_tx_skbs.isra.0 drivers/net/wireless/realtek/rtw89/pci.c:651
 rtw89_pci_release_tx drivers/net/wireless/realtek/rtw89/pci.c:676
 rtw89_pci_napi_poll drivers/net/wireless/realtek/rtw89/pci.c:4238
 __napi_poll net/core/dev.c:7495
 net_rx_action net/core/dev.c:7557 net/core/dev.c:7684
 handle_softirqs kernel/softirq.c:580
 do_softirq.part.0 kernel/softirq.c:480
 __local_bh_enable_ip kernel/softirq.c:407
 rtw89_pci_interrupt_threadfn drivers/net/wireless/realtek/rtw89/pci.c:927
 irq_thread_fn kernel/irq/manage.c:1133
 irq_thread kernel/irq/manage.c:1257
 kthread kernel/kthread.c:463
 ret_from_fork arch/x86/kernel/process.c:154
 ret_from_fork_asm arch/x86/entry/entry_64.S:258

It is a consequence of a race between the waiting and the signaling side
of the completion:

            Waiting thread                            Completing thread

rtw89_core_tx_kick_off_and_wait()
  rcu_assign_pointer(skb_data-&gt;wait, wait)
  /* start waiting */
  wait_for_completion_timeout()
                                                rtw89_pci_tx_status()
                                                  rtw89_core_tx_wait_complete()
                                                    rcu_read_lock()
                                                    /* signals completion and
   
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40000/">CVE-2025-40000 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40000">CVE-2025-40000 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252062">SUSE bug 1252062</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031708" comment="cluster-md-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031709" comment="cluster-md-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031710" comment="cluster-md-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031711" comment="dlm-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031712" comment="dlm-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031713" comment="dlm-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031714" comment="dtb-allwinner-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031715" comment="dtb-altera-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031716" comment="dtb-amazon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031717" comment="dtb-amd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031718" comment="dtb-amlogic-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031719" comment="dtb-apm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031720" comment="dtb-apple-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031721" comment="dtb-arm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031722" comment="dtb-broadcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031723" comment="dtb-cavium-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031724" comment="dtb-exynos-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031725" comment="dtb-freescale-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031726" comment="dtb-hisilicon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031727" comment="dtb-lg-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031728" comment="dtb-marvell-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031729" comment="dtb-mediatek-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031730" comment="dtb-nvidia-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031731" comment="dtb-qcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031732" comment="dtb-renesas-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031733" comment="dtb-rockchip-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031734" comment="dtb-socionext-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031735" comment="dtb-sprd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031736" comment="dtb-xilinx-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031737" comment="gfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031738" comment="gfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031739" comment="gfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031742" comment="kernel-64kb-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031743" comment="kernel-64kb-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031747" comment="kernel-default-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031748" comment="kernel-default-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031750" comment="kernel-docs-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031751" comment="kernel-docs-html-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031752" comment="kernel-kvmsmall-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031754" comment="kernel-kvmsmall-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031756" comment="kernel-obs-build-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031757" comment="kernel-obs-qa-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031760" comment="kernel-rt-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031761" comment="kernel-rt-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031762" comment="kernel-rt-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031764" comment="kernel-source-vanilla-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031765" comment="kernel-syms-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031766" comment="kernel-zfcpdump-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031767" comment="kselftests-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031768" comment="kselftests-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031769" comment="kselftests-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031770" comment="ocfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031771" comment="ocfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031772" comment="ocfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540001" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40001</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40001" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40001" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40001" ref_url="https://www.suse.com/security/cve/CVE-2025-40001" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: mvsas: Fix use-after-free bugs in mvs_work_queue

During the detaching of Marvell's SAS/SATA controller, the original code
calls cancel_delayed_work() in mvs_free() to cancel the delayed work
item mwq-&gt;work_q. However, if mwq-&gt;work_q is already running, the
cancel_delayed_work() may fail to cancel it. This can lead to
use-after-free scenarios where mvs_free() frees the mvs_info while
mvs_work_queue() is still executing and attempts to access the
already-freed mvs_info.

A typical race condition is illustrated below:

CPU 0 (remove)            | CPU 1 (delayed work callback)
mvs_pci_remove()          |
  mvs_free()              | mvs_work_queue()
    cancel_delayed_work() |
      kfree(mvi)          |
                          |   mvi-&gt; // UAF

Replace cancel_delayed_work() with cancel_delayed_work_sync() to ensure
that the delayed work item is properly canceled and any executing
delayed work item completes before the mvs_info is deallocated.

This bug was found by static analysis.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40001/">CVE-2025-40001 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40001">CVE-2025-40001 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252303">SUSE bug 1252303</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540003" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40003</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40003" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40003" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40003" ref_url="https://www.suse.com/security/cve/CVE-2025-40003" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: mscc: ocelot: Fix use-after-free caused by cyclic delayed work

The origin code calls cancel_delayed_work() in ocelot_stats_deinit()
to cancel the cyclic delayed work item ocelot-&gt;stats_work. However,
cancel_delayed_work() may fail to cancel the work item if it is already
executing. While destroy_workqueue() does wait for all pending work items
in the work queue to complete before destroying the work queue, it cannot
prevent the delayed work item from being rescheduled within the
ocelot_check_stats_work() function. This limitation exists because the
delayed work item is only enqueued into the work queue after its timer
expires. Before the timer expiration, destroy_workqueue() has no visibility
of this pending work item. Once the work queue appears empty,
destroy_workqueue() proceeds with destruction. When the timer eventually
expires, the delayed work item gets queued again, leading to the following
warning:

workqueue: cannot queue ocelot_check_stats_work on wq ocelot-switch-stats
WARNING: CPU: 2 PID: 0 at kernel/workqueue.c:2255 __queue_work+0x875/0xaf0
...
RIP: 0010:__queue_work+0x875/0xaf0
...
RSP: 0018:ffff88806d108b10 EFLAGS: 00010086
RAX: 0000000000000000 RBX: 0000000000000101 RCX: 0000000000000027
RDX: 0000000000000027 RSI: 0000000000000004 RDI: ffff88806d123e88
RBP: ffffffff813c3170 R08: 0000000000000000 R09: ffffed100da247d2
R10: ffffed100da247d1 R11: ffff88806d123e8b R12: ffff88800c00f000
R13: ffff88800d7285c0 R14: ffff88806d0a5580 R15: ffff88800d7285a0
FS:  0000000000000000(0000) GS:ffff8880e5725000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007fe18e45ea10 CR3: 0000000005e6c000 CR4: 00000000000006f0
Call Trace:
 &lt;IRQ&gt;
 ? kasan_report+0xc6/0xf0
 ? __pfx_delayed_work_timer_fn+0x10/0x10
 ? __pfx_delayed_work_timer_fn+0x10/0x10
 call_timer_fn+0x25/0x1c0
 __run_timer_base.part.0+0x3be/0x8c0
 ? __pfx_delayed_work_timer_fn+0x10/0x10
 ? rcu_sched_clock_irq+0xb06/0x27d0
 ? __pfx___run_timer_base.part.0+0x10/0x10
 ? try_to_wake_up+0xb15/0x1960
 ? _raw_spin_lock_irq+0x80/0xe0
 ? __pfx__raw_spin_lock_irq+0x10/0x10
 tmigr_handle_remote_up+0x603/0x7e0
 ? __pfx_tmigr_handle_remote_up+0x10/0x10
 ? sched_balance_trigger+0x1c0/0x9f0
 ? sched_tick+0x221/0x5a0
 ? _raw_spin_lock_irq+0x80/0xe0
 ? __pfx__raw_spin_lock_irq+0x10/0x10
 ? tick_nohz_handler+0x339/0x440
 ? __pfx_tmigr_handle_remote_up+0x10/0x10
 __walk_groups.isra.0+0x42/0x150
 tmigr_handle_remote+0x1f4/0x2e0
 ? __pfx_tmigr_handle_remote+0x10/0x10
 ? ktime_get+0x60/0x140
 ? lapic_next_event+0x11/0x20
 ? clockevents_program_event+0x1d4/0x2a0
 ? hrtimer_interrupt+0x322/0x780
 handle_softirqs+0x16a/0x550
 irq_exit_rcu+0xaf/0xe0
 sysvec_apic_timer_interrupt+0x70/0x80
 &lt;/IRQ&gt;
...

The following diagram reveals the cause of the above warning:

CPU 0 (remove)             | CPU 1 (delayed work callback)
mscc_ocelot_remove()       |
  ocelot_deinit()          | ocelot_check_stats_work()
    ocelot_stats_deinit()  |
      cancel_delayed_work()|   ...
                           |   queue_delayed_work()
      destroy_workqueue()  | (wait a time)
                           | __queue_work() //UAF

The above scenario actually constitutes a UAF vulnerability.

The ocelot_stats_deinit() is only invoked when initialization
failure or resource destruction, so we must ensure that any
delayed work items cannot be rescheduled.

Replace cancel_delayed_work() with disable_delayed_work_sync()
to guarantee proper cancellation of the delayed work item and
ensure completion of any currently executing work before the
workqueue is deallocated.

A deadlock concern was considered: ocelot_stats_deinit() is called
in a process context and is not holding any locks that the delayed
work item might also need. Therefore, the use of the _sync() variant
is safe here.

This bug was identified through static analysis. To reproduce the
issue and validate the fix, I simulated ocelot-swit
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40003/">CVE-2025-40003 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40003">CVE-2025-40003 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252301">SUSE bug 1252301</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540005" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40005</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40005" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40005" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40005" ref_url="https://www.suse.com/security/cve/CVE-2025-40005" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

spi: cadence-quadspi: Implement refcount to handle unbind during busy

driver support indirect read and indirect write operation with
assumption no force device removal(unbind) operation. However
force device removal(removal) is still available to root superuser.

Unbinding driver during operation causes kernel crash. This changes
ensure driver able to handle such operation for indirect read and
indirect write by implementing refcount to track attached devices
to the controller and gracefully wait and until attached devices
remove operation completed before proceed with removal operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40005/">CVE-2025-40005 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-40005">CVE-2025-40005 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252349">SUSE bug 1252349</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031708" comment="cluster-md-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031709" comment="cluster-md-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031710" comment="cluster-md-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031711" comment="dlm-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031712" comment="dlm-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031713" comment="dlm-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031714" comment="dtb-allwinner-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031715" comment="dtb-altera-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031716" comment="dtb-amazon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031717" comment="dtb-amd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031718" comment="dtb-amlogic-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031719" comment="dtb-apm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031720" comment="dtb-apple-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031721" comment="dtb-arm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031722" comment="dtb-broadcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031723" comment="dtb-cavium-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031724" comment="dtb-exynos-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031725" comment="dtb-freescale-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031726" comment="dtb-hisilicon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031727" comment="dtb-lg-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031728" comment="dtb-marvell-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031729" comment="dtb-mediatek-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031730" comment="dtb-nvidia-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031731" comment="dtb-qcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031732" comment="dtb-renesas-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031733" comment="dtb-rockchip-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031734" comment="dtb-socionext-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031735" comment="dtb-sprd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031736" comment="dtb-xilinx-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031737" comment="gfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031738" comment="gfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031739" comment="gfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031742" comment="kernel-64kb-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031743" comment="kernel-64kb-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031747" comment="kernel-default-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031748" comment="kernel-default-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031750" comment="kernel-docs-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031751" comment="kernel-docs-html-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031752" comment="kernel-kvmsmall-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031754" comment="kernel-kvmsmall-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031756" comment="kernel-obs-build-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031757" comment="kernel-obs-qa-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031760" comment="kernel-rt-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031761" comment="kernel-rt-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031762" comment="kernel-rt-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031764" comment="kernel-source-vanilla-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031765" comment="kernel-syms-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031766" comment="kernel-zfcpdump-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031767" comment="kselftests-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031768" comment="kselftests-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031769" comment="kselftests-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031770" comment="ocfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031771" comment="ocfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031772" comment="ocfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540006" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40006</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40006" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40006" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40006" ref_url="https://www.suse.com/security/cve/CVE-2025-40006" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/hugetlb: fix folio is still mapped when deleted

Migration may be raced with fallocating hole.  remove_inode_single_folio
will unmap the folio if the folio is still mapped.  However, it's called
without folio lock.  If the folio is migrated and the mapped pte has been
converted to migration entry, folio_mapped() returns false, and won't
unmap it.  Due to extra refcount held by remove_inode_single_folio,
migration fails, restores migration entry to normal pte, and the folio is
mapped again.  As a result, we triggered BUG in filemap_unaccount_folio.

The log is as follows:
 BUG: Bad page cache in process hugetlb  pfn:156c00
 page: refcount:515 mapcount:0 mapping:0000000099fef6e1 index:0x0 pfn:0x156c00
 head: order:9 mapcount:1 entire_mapcount:1 nr_pages_mapped:0 pincount:0
 aops:hugetlbfs_aops ino:dcc dentry name(?):"my_hugepage_file"
 flags: 0x17ffffc00000c1(locked|waiters|head|node=0|zone=2|lastcpupid=0x1fffff)
 page_type: f4(hugetlb)
 page dumped because: still mapped when deleted
 CPU: 1 UID: 0 PID: 395 Comm: hugetlb Not tainted 6.17.0-rc5-00044-g7aac71907bde-dirty #484 NONE
 Hardware name: QEMU Ubuntu 24.04 PC (i440FX + PIIX, 1996), BIOS 0.0.0 02/06/2015
 Call Trace:
  &lt;TASK&gt;
  dump_stack_lvl+0x4f/0x70
  filemap_unaccount_folio+0xc4/0x1c0
  __filemap_remove_folio+0x38/0x1c0
  filemap_remove_folio+0x41/0xd0
  remove_inode_hugepages+0x142/0x250
  hugetlbfs_fallocate+0x471/0x5a0
  vfs_fallocate+0x149/0x380

Hold folio lock before checking if the folio is mapped to avold race with
migration.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40006/">CVE-2025-40006 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40006">CVE-2025-40006 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252342">SUSE bug 1252342</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540009" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40009</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40009" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40009" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40009" ref_url="https://www.suse.com/security/cve/CVE-2025-40009" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs/proc/task_mmu: check p-&gt;vec_buf for NULL

When the PAGEMAP_SCAN ioctl is invoked with vec_len = 0 reaches
pagemap_scan_backout_range(), kernel panics with null-ptr-deref:

[   44.936808] Oops: general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] SMP DEBUG_PAGEALLOC KASAN NOPTI
[   44.937797] KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]
[   44.938391] CPU: 1 UID: 0 PID: 2480 Comm: reproducer Not tainted 6.17.0-rc6 #22 PREEMPT(none)
[   44.939062] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014
[   44.939935] RIP: 0010:pagemap_scan_thp_entry.isra.0+0x741/0xa80

&lt;snip registers, unreliable trace&gt;

[   44.946828] Call Trace:
[   44.947030]  &lt;TASK&gt;
[   44.949219]  pagemap_scan_pmd_entry+0xec/0xfa0
[   44.952593]  walk_pmd_range.isra.0+0x302/0x910
[   44.954069]  walk_pud_range.isra.0+0x419/0x790
[   44.954427]  walk_p4d_range+0x41e/0x620
[   44.954743]  walk_pgd_range+0x31e/0x630
[   44.955057]  __walk_page_range+0x160/0x670
[   44.956883]  walk_page_range_mm+0x408/0x980
[   44.958677]  walk_page_range+0x66/0x90
[   44.958984]  do_pagemap_scan+0x28d/0x9c0
[   44.961833]  do_pagemap_cmd+0x59/0x80
[   44.962484]  __x64_sys_ioctl+0x18d/0x210
[   44.962804]  do_syscall_64+0x5b/0x290
[   44.963111]  entry_SYSCALL_64_after_hwframe+0x76/0x7e

vec_len = 0 in pagemap_scan_init_bounce_buffer() means no buffers are
allocated and p-&gt;vec_buf remains set to NULL.

This breaks an assumption made later in pagemap_scan_backout_range(), that
page_region is always allocated for p-&gt;vec_buf_index.

Fix it by explicitly checking p-&gt;vec_buf for NULL before dereferencing.

Other sites that might run into same deref-issue are already (directly or
transitively) protected by checking p-&gt;vec_buf.

Note:
From PAGEMAP_SCAN man page, it seems vec_len = 0 is valid when no output
is requested and it's only the side effects caller is interested in,
hence it passes check in pagemap_scan_get_args().

This issue was found by syzkaller.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40009/">CVE-2025-40009 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40009">CVE-2025-40009 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252333">SUSE bug 1252333</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031708" comment="cluster-md-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031709" comment="cluster-md-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031710" comment="cluster-md-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031711" comment="dlm-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031712" comment="dlm-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031713" comment="dlm-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031714" comment="dtb-allwinner-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031715" comment="dtb-altera-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031716" comment="dtb-amazon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031717" comment="dtb-amd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031718" comment="dtb-amlogic-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031719" comment="dtb-apm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031720" comment="dtb-apple-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031721" comment="dtb-arm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031722" comment="dtb-broadcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031723" comment="dtb-cavium-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031724" comment="dtb-exynos-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031725" comment="dtb-freescale-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031726" comment="dtb-hisilicon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031727" comment="dtb-lg-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031728" comment="dtb-marvell-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031729" comment="dtb-mediatek-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031730" comment="dtb-nvidia-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031731" comment="dtb-qcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031732" comment="dtb-renesas-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031733" comment="dtb-rockchip-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031734" comment="dtb-socionext-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031735" comment="dtb-sprd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031736" comment="dtb-xilinx-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031737" comment="gfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031738" comment="gfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031739" comment="gfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031742" comment="kernel-64kb-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031743" comment="kernel-64kb-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031747" comment="kernel-default-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031748" comment="kernel-default-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031750" comment="kernel-docs-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031751" comment="kernel-docs-html-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031752" comment="kernel-kvmsmall-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031754" comment="kernel-kvmsmall-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031756" comment="kernel-obs-build-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031757" comment="kernel-obs-qa-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031760" comment="kernel-rt-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031761" comment="kernel-rt-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031762" comment="kernel-rt-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031764" comment="kernel-source-vanilla-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031765" comment="kernel-syms-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031766" comment="kernel-zfcpdump-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031767" comment="kselftests-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031768" comment="kselftests-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031769" comment="kselftests-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031770" comment="ocfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031771" comment="ocfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031772" comment="ocfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540011" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40011</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40011" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40011" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40011" ref_url="https://www.suse.com/security/cve/CVE-2025-40011" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/gma500: Fix null dereference in hdmi teardown

pci_set_drvdata sets the value of pdev-&gt;driver_data to NULL,
after which the driver_data obtained from the same dev is
dereferenced in oaktrail_hdmi_i2c_exit, and the i2c_dev is
extracted from it. To prevent this, swap these calls.

Found by Linux Verification Center (linuxtesting.org) with Svacer.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40011/">CVE-2025-40011 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40011">CVE-2025-40011 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252336">SUSE bug 1252336</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031708" comment="cluster-md-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031709" comment="cluster-md-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031710" comment="cluster-md-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031711" comment="dlm-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031712" comment="dlm-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031713" comment="dlm-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031714" comment="dtb-allwinner-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031715" comment="dtb-altera-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031716" comment="dtb-amazon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031717" comment="dtb-amd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031718" comment="dtb-amlogic-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031719" comment="dtb-apm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031720" comment="dtb-apple-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031721" comment="dtb-arm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031722" comment="dtb-broadcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031723" comment="dtb-cavium-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031724" comment="dtb-exynos-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031725" comment="dtb-freescale-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031726" comment="dtb-hisilicon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031727" comment="dtb-lg-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031728" comment="dtb-marvell-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031729" comment="dtb-mediatek-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031730" comment="dtb-nvidia-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031731" comment="dtb-qcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031732" comment="dtb-renesas-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031733" comment="dtb-rockchip-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031734" comment="dtb-socionext-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031735" comment="dtb-sprd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031736" comment="dtb-xilinx-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031737" comment="gfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031738" comment="gfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031739" comment="gfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031742" comment="kernel-64kb-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031743" comment="kernel-64kb-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031747" comment="kernel-default-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031748" comment="kernel-default-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031750" comment="kernel-docs-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031751" comment="kernel-docs-html-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031752" comment="kernel-kvmsmall-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031754" comment="kernel-kvmsmall-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031756" comment="kernel-obs-build-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031757" comment="kernel-obs-qa-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031760" comment="kernel-rt-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031761" comment="kernel-rt-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031762" comment="kernel-rt-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031764" comment="kernel-source-vanilla-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031765" comment="kernel-syms-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031766" comment="kernel-zfcpdump-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031767" comment="kselftests-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031768" comment="kselftests-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031769" comment="kselftests-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031770" comment="ocfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031771" comment="ocfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031772" comment="ocfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540012" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40012</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40012" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40012" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40012" ref_url="https://www.suse.com/security/cve/CVE-2025-40012" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/smc: fix warning in smc_rx_splice() when calling get_page()

smc_lo_register_dmb() allocates DMB buffers with kzalloc(), which are
later passed to get_page() in smc_rx_splice(). Since kmalloc memory is
not page-backed, this triggers WARN_ON_ONCE() in get_page() and prevents
holding a refcount on the buffer. This can lead to use-after-free if
the memory is released before splice_to_pipe() completes.

Use folio_alloc() instead, ensuring DMBs are page-backed and safe for
get_page().

WARNING: CPU: 18 PID: 12152 at ./include/linux/mm.h:1330 smc_rx_splice+0xaf8/0xe20 [smc]
CPU: 18 UID: 0 PID: 12152 Comm: smcapp Kdump: loaded Not tainted 6.17.0-rc3-11705-g9cf4672ecfee #10 NONE
Hardware name: IBM 3931 A01 704 (z/VM 7.4.0)
Krnl PSW : 0704e00180000000 000793161032696c (smc_rx_splice+0xafc/0xe20 [smc])
           R:0 T:1 IO:1 EX:1 Key:0 M:1 W:0 P:0 AS:3 CC:2 PM:0 RI:0 EA:3
Krnl GPRS: 0000000000000000 001cee80007d3001 00077400000000f8 0000000000000005
           0000000000000001 001cee80007d3006 0007740000001000 001c000000000000
           000000009b0c99e0 0000000000001000 001c0000000000f8 001c000000000000
           000003ffcc6f7c88 0007740003e98000 0007931600000005 000792969b2ff7b8
Krnl Code: 0007931610326960: af000000		mc	0,0
           0007931610326964: a7f4ff43		brc	15,00079316103267ea
          #0007931610326968: af000000		mc	0,0
          &gt;000793161032696c: a7f4ff3f		brc	15,00079316103267ea
           0007931610326970: e320f1000004	lg	%r2,256(%r15)
           0007931610326976: c0e53fd1b5f5	brasl	%r14,000793168fd5d560
           000793161032697c: a7f4fbb5		brc	15,00079316103260e6
           0007931610326980: b904002b		lgr	%r2,%r11
Call Trace:
 smc_rx_splice+0xafc/0xe20 [smc]
 smc_rx_splice+0x756/0xe20 [smc])
 smc_rx_recvmsg+0xa74/0xe00 [smc]
 smc_splice_read+0x1ce/0x3b0 [smc]
 sock_splice_read+0xa2/0xf0
 do_splice_read+0x198/0x240
 splice_file_to_pipe+0x7e/0x110
 do_splice+0x59e/0xde0
 __do_splice+0x11a/0x2d0
 __s390x_sys_splice+0x140/0x1f0
 __do_syscall+0x122/0x280
 system_call+0x6e/0x90
Last Breaking-Event-Address:
smc_rx_splice+0x960/0xe20 [smc]
---[ end trace 0000000000000000 ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40012/">CVE-2025-40012 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40012">CVE-2025-40012 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252330">SUSE bug 1252330</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031708" comment="cluster-md-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031709" comment="cluster-md-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031710" comment="cluster-md-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031711" comment="dlm-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031712" comment="dlm-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031713" comment="dlm-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031714" comment="dtb-allwinner-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031715" comment="dtb-altera-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031716" comment="dtb-amazon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031717" comment="dtb-amd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031718" comment="dtb-amlogic-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031719" comment="dtb-apm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031720" comment="dtb-apple-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031721" comment="dtb-arm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031722" comment="dtb-broadcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031723" comment="dtb-cavium-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031724" comment="dtb-exynos-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031725" comment="dtb-freescale-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031726" comment="dtb-hisilicon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031727" comment="dtb-lg-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031728" comment="dtb-marvell-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031729" comment="dtb-mediatek-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031730" comment="dtb-nvidia-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031731" comment="dtb-qcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031732" comment="dtb-renesas-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031733" comment="dtb-rockchip-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031734" comment="dtb-socionext-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031735" comment="dtb-sprd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031736" comment="dtb-xilinx-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031737" comment="gfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031738" comment="gfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031739" comment="gfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031742" comment="kernel-64kb-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031743" comment="kernel-64kb-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031747" comment="kernel-default-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031748" comment="kernel-default-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031750" comment="kernel-docs-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031751" comment="kernel-docs-html-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031752" comment="kernel-kvmsmall-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031754" comment="kernel-kvmsmall-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031756" comment="kernel-obs-build-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031757" comment="kernel-obs-qa-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031760" comment="kernel-rt-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031761" comment="kernel-rt-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031762" comment="kernel-rt-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031764" comment="kernel-source-vanilla-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031765" comment="kernel-syms-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031766" comment="kernel-zfcpdump-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031767" comment="kselftests-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031768" comment="kselftests-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031769" comment="kselftests-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031770" comment="ocfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031771" comment="ocfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031772" comment="ocfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540013" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40013</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40013" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40013" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40013" ref_url="https://www.suse.com/security/cve/CVE-2025-40013" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: qcom: audioreach: fix potential null pointer dereference

It is possible that the topology parsing function
audioreach_widget_load_module_common() could return NULL or an error
pointer. Add missing NULL check so that we do not dereference it.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40013/">CVE-2025-40013 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40013">CVE-2025-40013 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252348">SUSE bug 1252348</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031708" comment="cluster-md-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031709" comment="cluster-md-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031710" comment="cluster-md-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031711" comment="dlm-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031712" comment="dlm-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031713" comment="dlm-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031714" comment="dtb-allwinner-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031715" comment="dtb-altera-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031716" comment="dtb-amazon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031717" comment="dtb-amd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031718" comment="dtb-amlogic-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031719" comment="dtb-apm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031720" comment="dtb-apple-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031721" comment="dtb-arm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031722" comment="dtb-broadcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031723" comment="dtb-cavium-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031724" comment="dtb-exynos-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031725" comment="dtb-freescale-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031726" comment="dtb-hisilicon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031727" comment="dtb-lg-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031728" comment="dtb-marvell-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031729" comment="dtb-mediatek-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031730" comment="dtb-nvidia-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031731" comment="dtb-qcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031732" comment="dtb-renesas-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031733" comment="dtb-rockchip-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031734" comment="dtb-socionext-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031735" comment="dtb-sprd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031736" comment="dtb-xilinx-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031737" comment="gfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031738" comment="gfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031739" comment="gfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031742" comment="kernel-64kb-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031743" comment="kernel-64kb-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031747" comment="kernel-default-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031748" comment="kernel-default-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031750" comment="kernel-docs-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031751" comment="kernel-docs-html-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031752" comment="kernel-kvmsmall-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031754" comment="kernel-kvmsmall-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031756" comment="kernel-obs-build-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031757" comment="kernel-obs-qa-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031760" comment="kernel-rt-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031761" comment="kernel-rt-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031762" comment="kernel-rt-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031764" comment="kernel-source-vanilla-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031765" comment="kernel-syms-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031766" comment="kernel-zfcpdump-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031767" comment="kselftests-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031768" comment="kselftests-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031769" comment="kselftests-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031770" comment="ocfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031771" comment="ocfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031772" comment="ocfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540016" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40016</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40016" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40016" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40016" ref_url="https://www.suse.com/security/cve/CVE-2025-40016" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: uvcvideo: Mark invalid entities with id UVC_INVALID_ENTITY_ID

Per UVC 1.1+ specification 3.7.2, units and terminals must have a non-zero
unique ID.

```
Each Unit and Terminal within the video function is assigned a unique
identification number, the Unit ID (UID) or Terminal ID (TID), contained in
the bUnitID or bTerminalID field of the descriptor. The value 0x00 is
reserved for undefined ID,
```

If we add a new entity with id 0 or a duplicated ID, it will be marked
as UVC_INVALID_ENTITY_ID.

In a previous attempt commit 3dd075fe8ebb ("media: uvcvideo: Require
entities to have a non-zero unique ID"), we ignored all the invalid units,
this broke a lot of non-compatible cameras. Hopefully we are more lucky
this time.

This also prevents some syzkaller reproducers from triggering warnings due
to a chain of entities referring to themselves. In one particular case, an
Output Unit is connected to an Input Unit, both with the same ID of 1. But
when looking up for the source ID of the Output Unit, that same entity is
found instead of the input entity, which leads to such warnings.

In another case, a backward chain was considered finished as the source ID
was 0. Later on, that entity was found, but its pads were not valid.

Here is a sample stack trace for one of those cases.

[   20.650953] usb 1-1: new high-speed USB device number 2 using dummy_hcd
[   20.830206] usb 1-1: Using ep0 maxpacket: 8
[   20.833501] usb 1-1: config 0 descriptor??
[   21.038518] usb 1-1: string descriptor 0 read error: -71
[   21.038893] usb 1-1: Found UVC 0.00 device &lt;unnamed&gt; (2833:0201)
[   21.039299] uvcvideo 1-1:0.0: Entity type for entity Output 1 was not initialized!
[   21.041583] uvcvideo 1-1:0.0: Entity type for entity Input 1 was not initialized!
[   21.042218] ------------[ cut here ]------------
[   21.042536] WARNING: CPU: 0 PID: 9 at drivers/media/mc/mc-entity.c:1147 media_create_pad_link+0x2c4/0x2e0
[   21.043195] Modules linked in:
[   21.043535] CPU: 0 UID: 0 PID: 9 Comm: kworker/0:1 Not tainted 6.11.0-rc7-00030-g3480e43aeccf #444
[   21.044101] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.15.0-1 04/01/2014
[   21.044639] Workqueue: usb_hub_wq hub_event
[   21.045100] RIP: 0010:media_create_pad_link+0x2c4/0x2e0
[   21.045508] Code: fe e8 20 01 00 00 b8 f4 ff ff ff 48 83 c4 30 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc 0f 0b eb e9 0f 0b eb 0a 0f 0b eb 06 &lt;0f&gt; 0b eb 02 0f 0b b8 ea ff ff ff eb d4 66 2e 0f 1f 84 00 00 00 00
[   21.046801] RSP: 0018:ffffc9000004b318 EFLAGS: 00010246
[   21.047227] RAX: ffff888004e5d458 RBX: 0000000000000000 RCX: ffffffff818fccf1
[   21.047719] RDX: 000000000000007b RSI: 0000000000000000 RDI: ffff888004313290
[   21.048241] RBP: ffff888004313290 R08: 0001ffffffffffff R09: 0000000000000000
[   21.048701] R10: 0000000000000013 R11: 0001888004313290 R12: 0000000000000003
[   21.049138] R13: ffff888004313080 R14: ffff888004313080 R15: 0000000000000000
[   21.049648] FS:  0000000000000000(0000) GS:ffff88803ec00000(0000) knlGS:0000000000000000
[   21.050271] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   21.050688] CR2: 0000592cc27635b0 CR3: 000000000431c000 CR4: 0000000000750ef0
[   21.051136] PKRU: 55555554
[   21.051331] Call Trace:
[   21.051480]  &lt;TASK&gt;
[   21.051611]  ? __warn+0xc4/0x210
[   21.051861]  ? media_create_pad_link+0x2c4/0x2e0
[   21.052252]  ? report_bug+0x11b/0x1a0
[   21.052540]  ? trace_hardirqs_on+0x31/0x40
[   21.052901]  ? handle_bug+0x3d/0x70
[   21.053197]  ? exc_invalid_op+0x1a/0x50
[   21.053511]  ? asm_exc_invalid_op+0x1a/0x20
[   21.053924]  ? media_create_pad_link+0x91/0x2e0
[   21.054364]  ? media_create_pad_link+0x2c4/0x2e0
[   21.054834]  ? media_create_pad_link+0x91/0x2e0
[   21.055131]  ? _raw_spin_unlock+0x1e/0x40
[   21.055441]  ? __v4l2_device_register_subdev+0x202/0x210
[   21.055837]  uvc_mc_register_entities+0x358/0x400
[   21.056144]  uvc_register_chains+0x1
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-03-06"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40016/">CVE-2025-40016 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40016">CVE-2025-40016 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252346">SUSE bug 1252346</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031708" comment="cluster-md-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031709" comment="cluster-md-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031710" comment="cluster-md-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031711" comment="dlm-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031712" comment="dlm-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031713" comment="dlm-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031714" comment="dtb-allwinner-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031715" comment="dtb-altera-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031716" comment="dtb-amazon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031717" comment="dtb-amd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031718" comment="dtb-amlogic-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031719" comment="dtb-apm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031720" comment="dtb-apple-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031721" comment="dtb-arm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031722" comment="dtb-broadcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031723" comment="dtb-cavium-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031724" comment="dtb-exynos-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031725" comment="dtb-freescale-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031726" comment="dtb-hisilicon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031727" comment="dtb-lg-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031728" comment="dtb-marvell-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031729" comment="dtb-mediatek-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031730" comment="dtb-nvidia-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031731" comment="dtb-qcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031732" comment="dtb-renesas-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031733" comment="dtb-rockchip-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031734" comment="dtb-socionext-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031735" comment="dtb-sprd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031736" comment="dtb-xilinx-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031737" comment="gfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031738" comment="gfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031739" comment="gfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031742" comment="kernel-64kb-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031743" comment="kernel-64kb-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031747" comment="kernel-default-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031748" comment="kernel-default-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031750" comment="kernel-docs-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031751" comment="kernel-docs-html-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031752" comment="kernel-kvmsmall-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031754" comment="kernel-kvmsmall-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031756" comment="kernel-obs-build-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031757" comment="kernel-obs-qa-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031760" comment="kernel-rt-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031761" comment="kernel-rt-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031762" comment="kernel-rt-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031764" comment="kernel-source-vanilla-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031765" comment="kernel-syms-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031766" comment="kernel-zfcpdump-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031767" comment="kselftests-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031768" comment="kselftests-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031769" comment="kselftests-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031770" comment="ocfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031771" comment="ocfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031772" comment="ocfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540018" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40018</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40018" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40018" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40018" ref_url="https://www.suse.com/security/cve/CVE-2025-40018" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4135-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1188-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1212-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1221-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1222-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1236-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1239-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1242-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1244-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1248-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1259-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1263-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1268-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045421.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1269-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1271-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1278-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1280-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045412.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1283-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045410.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1285-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1287-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1297-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1298-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21007-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21053-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21054-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21055-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21056-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21057-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21058-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21059-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21060-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21061-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21073-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21074-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21075-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21076-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21077-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21078-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21079-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21080-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21083-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21084-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21085-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21086-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21087-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21088-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21089-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21090-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21091-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045433.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipvs: Defer ip_vs_ftp unregister during netns cleanup

On the netns cleanup path, __ip_vs_ftp_exit() may unregister ip_vs_ftp
before connections with valid cp-&gt;app pointers are flushed, leading to a
use-after-free.

Fix this by introducing a global `exiting_module` flag, set to true in
ip_vs_ftp_exit() before unregistering the pernet subsystem. In
__ip_vs_ftp_exit(), skip ip_vs_ftp unregister if called during netns
cleanup (when exiting_module is false) and defer it to
__ip_vs_cleanup_batch(), which unregisters all apps after all connections
are flushed. If called during module exit, unregister ip_vs_ftp
immediately.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40018/">CVE-2025-40018 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40018">CVE-2025-40018 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247374">SUSE bug 1247374</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252688">SUSE bug 1252688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252689">SUSE bug 1252689</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253291">SUSE bug 1253291</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031708" comment="cluster-md-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031709" comment="cluster-md-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031710" comment="cluster-md-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031711" comment="dlm-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031712" comment="dlm-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031713" comment="dlm-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031714" comment="dtb-allwinner-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031715" comment="dtb-altera-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031716" comment="dtb-amazon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031717" comment="dtb-amd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031718" comment="dtb-amlogic-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031719" comment="dtb-apm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031720" comment="dtb-apple-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031721" comment="dtb-arm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031722" comment="dtb-broadcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031723" comment="dtb-cavium-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031724" comment="dtb-exynos-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031725" comment="dtb-freescale-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031726" comment="dtb-hisilicon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031727" comment="dtb-lg-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031728" comment="dtb-marvell-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031729" comment="dtb-mediatek-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031730" comment="dtb-nvidia-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031731" comment="dtb-qcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031732" comment="dtb-renesas-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031733" comment="dtb-rockchip-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031734" comment="dtb-socionext-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031735" comment="dtb-sprd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031736" comment="dtb-xilinx-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031737" comment="gfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031738" comment="gfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031739" comment="gfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031742" comment="kernel-64kb-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031743" comment="kernel-64kb-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031747" comment="kernel-default-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031748" comment="kernel-default-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031750" comment="kernel-docs-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031751" comment="kernel-docs-html-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031752" comment="kernel-kvmsmall-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031754" comment="kernel-kvmsmall-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031756" comment="kernel-obs-build-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031757" comment="kernel-obs-qa-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031760" comment="kernel-rt-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031761" comment="kernel-rt-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031762" comment="kernel-rt-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031764" comment="kernel-source-vanilla-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031765" comment="kernel-syms-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031766" comment="kernel-zfcpdump-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031767" comment="kselftests-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031768" comment="kselftests-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031769" comment="kselftests-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031770" comment="ocfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031771" comment="ocfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031772" comment="ocfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540019" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40019</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40019" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40019" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40019" ref_url="https://www.suse.com/security/cve/CVE-2025-40019" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: essiv - Check ssize for decryption and in-place encryption

Move the ssize check to the start in essiv_aead_crypt so that
it's also checked for decryption and in-place encryption.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-03-06"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40019/">CVE-2025-40019 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40019">CVE-2025-40019 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252678">SUSE bug 1252678</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1252719">SUSE bug 1252719</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031708" comment="cluster-md-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031709" comment="cluster-md-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031710" comment="cluster-md-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031711" comment="dlm-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031712" comment="dlm-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031713" comment="dlm-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031714" comment="dtb-allwinner-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031715" comment="dtb-altera-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031716" comment="dtb-amazon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031717" comment="dtb-amd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031718" comment="dtb-amlogic-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031719" comment="dtb-apm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031720" comment="dtb-apple-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031721" comment="dtb-arm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031722" comment="dtb-broadcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031723" comment="dtb-cavium-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031724" comment="dtb-exynos-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031725" comment="dtb-freescale-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031726" comment="dtb-hisilicon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031727" comment="dtb-lg-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031728" comment="dtb-marvell-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031729" comment="dtb-mediatek-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031730" comment="dtb-nvidia-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031731" comment="dtb-qcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031732" comment="dtb-renesas-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031733" comment="dtb-rockchip-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031734" comment="dtb-socionext-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031735" comment="dtb-sprd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031736" comment="dtb-xilinx-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031737" comment="gfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031738" comment="gfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031739" comment="gfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031742" comment="kernel-64kb-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031743" comment="kernel-64kb-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031747" comment="kernel-default-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031748" comment="kernel-default-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031750" comment="kernel-docs-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031751" comment="kernel-docs-html-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031752" comment="kernel-kvmsmall-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031754" comment="kernel-kvmsmall-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031756" comment="kernel-obs-build-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031757" comment="kernel-obs-qa-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031760" comment="kernel-rt-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031761" comment="kernel-rt-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031762" comment="kernel-rt-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031764" comment="kernel-source-vanilla-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031765" comment="kernel-syms-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031766" comment="kernel-zfcpdump-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031767" comment="kselftests-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031768" comment="kselftests-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031769" comment="kselftests-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031770" comment="ocfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031771" comment="ocfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031772" comment="ocfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540020" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40020</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40020" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40020" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40020" ref_url="https://www.suse.com/security/cve/CVE-2025-40020" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: peak_usb: fix shift-out-of-bounds issue

Explicitly uses a 64-bit constant when the number of bits used for its
shifting is 32 (which is the case for PC CAN FD interfaces supported by
this driver).

[mkl: update subject, apply manually]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40020/">CVE-2025-40020 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40020">CVE-2025-40020 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252679">SUSE bug 1252679</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031708" comment="cluster-md-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031709" comment="cluster-md-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031710" comment="cluster-md-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031711" comment="dlm-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031712" comment="dlm-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031713" comment="dlm-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031714" comment="dtb-allwinner-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031715" comment="dtb-altera-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031716" comment="dtb-amazon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031717" comment="dtb-amd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031718" comment="dtb-amlogic-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031719" comment="dtb-apm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031720" comment="dtb-apple-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031721" comment="dtb-arm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031722" comment="dtb-broadcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031723" comment="dtb-cavium-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031724" comment="dtb-exynos-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031725" comment="dtb-freescale-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031726" comment="dtb-hisilicon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031727" comment="dtb-lg-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031728" comment="dtb-marvell-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031729" comment="dtb-mediatek-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031730" comment="dtb-nvidia-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031731" comment="dtb-qcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031732" comment="dtb-renesas-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031733" comment="dtb-rockchip-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031734" comment="dtb-socionext-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031735" comment="dtb-sprd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031736" comment="dtb-xilinx-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031737" comment="gfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031738" comment="gfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031739" comment="gfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031742" comment="kernel-64kb-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031743" comment="kernel-64kb-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031747" comment="kernel-default-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031748" comment="kernel-default-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031750" comment="kernel-docs-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031751" comment="kernel-docs-html-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031752" comment="kernel-kvmsmall-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031754" comment="kernel-kvmsmall-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031756" comment="kernel-obs-build-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031757" comment="kernel-obs-qa-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031760" comment="kernel-rt-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031761" comment="kernel-rt-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031762" comment="kernel-rt-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031764" comment="kernel-source-vanilla-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031765" comment="kernel-syms-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031766" comment="kernel-zfcpdump-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031767" comment="kselftests-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031768" comment="kselftests-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031769" comment="kselftests-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031770" comment="ocfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031771" comment="ocfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031772" comment="ocfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540021" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40021</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40021" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40021" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40021" ref_url="https://www.suse.com/security/cve/CVE-2025-40021" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tracing: dynevent: Add a missing lockdown check on dynevent

Since dynamic_events interface on tracefs is compatible with
kprobe_events and uprobe_events, it should also check the lockdown
status and reject if it is set.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40021/">CVE-2025-40021 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40021">CVE-2025-40021 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252681">SUSE bug 1252681</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40024</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40024" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40024" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40024" ref_url="https://www.suse.com/security/cve/CVE-2025-40024" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vhost: Take a reference on the task in struct vhost_task.

vhost_task_create() creates a task and keeps a reference to its
task_struct. That task may exit early via a signal and its task_struct
will be released.
A pending vhost_task_wake() will then attempt to wake the task and
access a task_struct which is no longer there.

Acquire a reference on the task_struct while creating the thread and
release the reference while the struct vhost_task itself is removed.
If the task exits early due to a signal, then the vhost_task_wake() will
still access a valid task_struct. The wake is safe and will be skipped
in this case.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40024/">CVE-2025-40024 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40024">CVE-2025-40024 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252686">SUSE bug 1252686</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540027" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40027</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40027" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40027" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40027" ref_url="https://www.suse.com/security/cve/CVE-2025-40027" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/9p: fix double req put in p9_fd_cancelled

Syzkaller reports a KASAN issue as below:

general protection fault, probably for non-canonical address 0xfbd59c0000000021: 0000 [#1] PREEMPT SMP KASAN NOPTI
KASAN: maybe wild-memory-access in range [0xdead000000000108-0xdead00000000010f]
CPU: 0 PID: 5083 Comm: syz-executor.2 Not tainted 6.1.134-syzkaller-00037-g855bd1d7d838 #0
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
RIP: 0010:__list_del include/linux/list.h:114 [inline]
RIP: 0010:__list_del_entry include/linux/list.h:137 [inline]
RIP: 0010:list_del include/linux/list.h:148 [inline]
RIP: 0010:p9_fd_cancelled+0xe9/0x200 net/9p/trans_fd.c:734

Call Trace:
 &lt;TASK&gt;
 p9_client_flush+0x351/0x440 net/9p/client.c:614
 p9_client_rpc+0xb6b/0xc70 net/9p/client.c:734
 p9_client_version net/9p/client.c:920 [inline]
 p9_client_create+0xb51/0x1240 net/9p/client.c:1027
 v9fs_session_init+0x1f0/0x18f0 fs/9p/v9fs.c:408
 v9fs_mount+0xba/0xcb0 fs/9p/vfs_super.c:126
 legacy_get_tree+0x108/0x220 fs/fs_context.c:632
 vfs_get_tree+0x8e/0x300 fs/super.c:1573
 do_new_mount fs/namespace.c:3056 [inline]
 path_mount+0x6a6/0x1e90 fs/namespace.c:3386
 do_mount fs/namespace.c:3399 [inline]
 __do_sys_mount fs/namespace.c:3607 [inline]
 __se_sys_mount fs/namespace.c:3584 [inline]
 __x64_sys_mount+0x283/0x300 fs/namespace.c:3584
 do_syscall_x64 arch/x86/entry/common.c:51 [inline]
 do_syscall_64+0x35/0x80 arch/x86/entry/common.c:81
 entry_SYSCALL_64_after_hwframe+0x6e/0xd8

This happens because of a race condition between:

- The 9p client sending an invalid flush request and later cleaning it up;
- The 9p client in p9_read_work() canceled all pending requests.

      Thread 1                              Thread 2
    ...
    p9_client_create()
    ...
    p9_fd_create()
    ...
    p9_conn_create()
    ...
    // start Thread 2
    INIT_WORK(&amp;m-&gt;rq, p9_read_work);
                                        p9_read_work()
    ...
    p9_client_rpc()
    ...
                                        ...
                                        p9_conn_cancel()
                                        ...
                                        spin_lock(&amp;m-&gt;req_lock);
    ...
    p9_fd_cancelled()
    ...
                                        ...
                                        spin_unlock(&amp;m-&gt;req_lock);
                                        // status rewrite
                                        p9_client_cb(m-&gt;client, req, REQ_STATUS_ERROR)
                                        // first remove
                                        list_del(&amp;req-&gt;req_list);
                                        ...

    spin_lock(&amp;m-&gt;req_lock)
    ...
    // second remove
    list_del(&amp;req-&gt;req_list);
    spin_unlock(&amp;m-&gt;req_lock)
  ...

Commit 74d6a5d56629 ("9p/trans_fd: Fix concurrency del of req_list in
p9_fd_cancelled/p9_read_work") fixes a concurrency issue in the 9p filesystem
client where the req_list could be deleted simultaneously by both
p9_read_work and p9_fd_cancelled functions, but for the case where req-&gt;status
equals REQ_STATUS_RCVD.

Update the check for req-&gt;status in p9_fd_cancelled to skip processing not
just received requests, but anything that is not SENT, as whatever
changed the state from SENT also removed the request from its list.

Found by Linux Verification Center (linuxtesting.org) with Syzkaller.

[updated the check from status == RECV || status == ERROR to status != SENT]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40027/">CVE-2025-40027 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40027">CVE-2025-40027 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252763">SUSE bug 1252763</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40029</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40029" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40029" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40029" ref_url="https://www.suse.com/security/cve/CVE-2025-40029" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bus: fsl-mc: Check return value of platform_get_resource()

platform_get_resource() returns NULL in case of failure, so check its
return value and propagate the error in order to prevent NULL pointer
dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40029/">CVE-2025-40029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40029">CVE-2025-40029 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252772">SUSE bug 1252772</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031708" comment="cluster-md-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031709" comment="cluster-md-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031710" comment="cluster-md-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031711" comment="dlm-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031712" comment="dlm-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031713" comment="dlm-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031714" comment="dtb-allwinner-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031715" comment="dtb-altera-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031716" comment="dtb-amazon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031717" comment="dtb-amd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031718" comment="dtb-amlogic-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031719" comment="dtb-apm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031720" comment="dtb-apple-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031721" comment="dtb-arm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031722" comment="dtb-broadcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031723" comment="dtb-cavium-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031724" comment="dtb-exynos-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031725" comment="dtb-freescale-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031726" comment="dtb-hisilicon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031727" comment="dtb-lg-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031728" comment="dtb-marvell-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031729" comment="dtb-mediatek-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031730" comment="dtb-nvidia-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031731" comment="dtb-qcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031732" comment="dtb-renesas-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031733" comment="dtb-rockchip-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031734" comment="dtb-socionext-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031735" comment="dtb-sprd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031736" comment="dtb-xilinx-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031737" comment="gfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031738" comment="gfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031739" comment="gfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031742" comment="kernel-64kb-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031743" comment="kernel-64kb-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031747" comment="kernel-default-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031748" comment="kernel-default-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031750" comment="kernel-docs-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031751" comment="kernel-docs-html-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031752" comment="kernel-kvmsmall-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031754" comment="kernel-kvmsmall-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031756" comment="kernel-obs-build-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031757" comment="kernel-obs-qa-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031760" comment="kernel-rt-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031761" comment="kernel-rt-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031762" comment="kernel-rt-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031764" comment="kernel-source-vanilla-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031765" comment="kernel-syms-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031766" comment="kernel-zfcpdump-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031767" comment="kselftests-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031768" comment="kselftests-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031769" comment="kselftests-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031770" comment="ocfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031771" comment="ocfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031772" comment="ocfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540030" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40030</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40030" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40030" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40030" ref_url="https://www.suse.com/security/cve/CVE-2025-40030" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pinctrl: check the return value of pinmux_ops::get_function_name()

While the API contract in docs doesn't specify it explicitly, the
generic implementation of the get_function_name() callback from struct
pinmux_ops - pinmux_generic_get_function_name() - can fail and return
NULL. This is already checked in pinmux_check_ops() so add a similar
check in pinmux_func_name_to_selector() instead of passing the returned
pointer right down to strcmp() where the NULL can get dereferenced. This
is normal operation when adding new pinfunctions.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40030/">CVE-2025-40030 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40030">CVE-2025-40030 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252773">SUSE bug 1252773</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540031" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40031</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40031" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40031" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40031" ref_url="https://www.suse.com/security/cve/CVE-2025-40031" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tee: fix register_shm_helper()

In register_shm_helper(), fix incorrect error handling for a call to
iov_iter_extract_pages(). A case is missing for when
iov_iter_extract_pages() only got some pages and return a number larger
than 0, but not the requested amount.

This fixes a possible NULL pointer dereference following a bad input from
ioctl(TEE_IOC_SHM_REGISTER) where parts of the buffer isn't mapped.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40031/">CVE-2025-40031 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40031">CVE-2025-40031 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252779">SUSE bug 1252779</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540032" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40032</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40032" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40032" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40032" ref_url="https://www.suse.com/security/cve/CVE-2025-40032" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

PCI: endpoint: pci-epf-test: Add NULL check for DMA channels before release

The fields dma_chan_tx and dma_chan_rx of the struct pci_epf_test can be
NULL even after EPF initialization. Then it is prudent to check that
they have non-NULL values before releasing the channels. Add the checks
in pci_epf_test_clean_dma_chan().

Without the checks, NULL pointer dereferences happen and they can lead
to a kernel panic in some cases:

  Unable to handle kernel NULL pointer dereference at virtual address 0000000000000050
  Call trace:
   dma_release_channel+0x2c/0x120 (P)
   pci_epf_test_epc_deinit+0x94/0xc0 [pci_epf_test]
   pci_epc_deinit_notify+0x74/0xc0
   tegra_pcie_ep_pex_rst_irq+0x250/0x5d8
   irq_thread_fn+0x34/0xb8
   irq_thread+0x18c/0x2e8
   kthread+0x14c/0x210
   ret_from_fork+0x10/0x20

[mani: trimmed the stack trace]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40032/">CVE-2025-40032 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40032">CVE-2025-40032 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252841">SUSE bug 1252841</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031708" comment="cluster-md-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031709" comment="cluster-md-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031710" comment="cluster-md-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031711" comment="dlm-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031712" comment="dlm-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031713" comment="dlm-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031714" comment="dtb-allwinner-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031715" comment="dtb-altera-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031716" comment="dtb-amazon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031717" comment="dtb-amd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031718" comment="dtb-amlogic-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031719" comment="dtb-apm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031720" comment="dtb-apple-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031721" comment="dtb-arm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031722" comment="dtb-broadcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031723" comment="dtb-cavium-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031724" comment="dtb-exynos-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031725" comment="dtb-freescale-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031726" comment="dtb-hisilicon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031727" comment="dtb-lg-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031728" comment="dtb-marvell-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031729" comment="dtb-mediatek-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031730" comment="dtb-nvidia-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031731" comment="dtb-qcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031732" comment="dtb-renesas-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031733" comment="dtb-rockchip-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031734" comment="dtb-socionext-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031735" comment="dtb-sprd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031736" comment="dtb-xilinx-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031737" comment="gfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031738" comment="gfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031739" comment="gfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031742" comment="kernel-64kb-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031743" comment="kernel-64kb-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031747" comment="kernel-default-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031748" comment="kernel-default-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031750" comment="kernel-docs-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031751" comment="kernel-docs-html-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031752" comment="kernel-kvmsmall-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031754" comment="kernel-kvmsmall-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031756" comment="kernel-obs-build-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031757" comment="kernel-obs-qa-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031760" comment="kernel-rt-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031761" comment="kernel-rt-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031762" comment="kernel-rt-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031764" comment="kernel-source-vanilla-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031765" comment="kernel-syms-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031766" comment="kernel-zfcpdump-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031767" comment="kselftests-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031768" comment="kselftests-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031769" comment="kselftests-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031770" comment="ocfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031771" comment="ocfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031772" comment="ocfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540033" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40033</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40033" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40033" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40033" ref_url="https://www.suse.com/security/cve/CVE-2025-40033" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

remoteproc: pru: Fix potential NULL pointer dereference in pru_rproc_set_ctable()

pru_rproc_set_ctable() accessed rproc-&gt;priv before the IS_ERR_OR_NULL
check, which could lead to a null pointer dereference. Move the pru
assignment, ensuring we never dereference a NULL rproc pointer.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40033/">CVE-2025-40033 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40033">CVE-2025-40033 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252824">SUSE bug 1252824</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540035" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40035</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40035" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40035" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40035" ref_url="https://www.suse.com/security/cve/CVE-2025-40035" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Input: uinput - zero-initialize uinput_ff_upload_compat to avoid info leak

Struct ff_effect_compat is embedded twice inside
uinput_ff_upload_compat, contains internal padding. In particular, there
is a hole after struct ff_replay to satisfy alignment requirements for
the following union member. Without clearing the structure,
copy_to_user() may leak stack data to userspace.

Initialize ff_up_compat to zero before filling valid fields.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40035/">CVE-2025-40035 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40035">CVE-2025-40035 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252866">SUSE bug 1252866</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031708" comment="cluster-md-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031709" comment="cluster-md-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031710" comment="cluster-md-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031711" comment="dlm-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031712" comment="dlm-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031713" comment="dlm-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031714" comment="dtb-allwinner-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031715" comment="dtb-altera-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031716" comment="dtb-amazon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031717" comment="dtb-amd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031718" comment="dtb-amlogic-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031719" comment="dtb-apm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031720" comment="dtb-apple-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031721" comment="dtb-arm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031722" comment="dtb-broadcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031723" comment="dtb-cavium-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031724" comment="dtb-exynos-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031725" comment="dtb-freescale-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031726" comment="dtb-hisilicon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031727" comment="dtb-lg-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031728" comment="dtb-marvell-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031729" comment="dtb-mediatek-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031730" comment="dtb-nvidia-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031731" comment="dtb-qcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031732" comment="dtb-renesas-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031733" comment="dtb-rockchip-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031734" comment="dtb-socionext-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031735" comment="dtb-sprd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031736" comment="dtb-xilinx-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031737" comment="gfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031738" comment="gfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031739" comment="gfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031742" comment="kernel-64kb-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031743" comment="kernel-64kb-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031747" comment="kernel-default-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031748" comment="kernel-default-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031750" comment="kernel-docs-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031751" comment="kernel-docs-html-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031752" comment="kernel-kvmsmall-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031754" comment="kernel-kvmsmall-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031756" comment="kernel-obs-build-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031757" comment="kernel-obs-qa-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031760" comment="kernel-rt-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031761" comment="kernel-rt-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031762" comment="kernel-rt-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031764" comment="kernel-source-vanilla-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031765" comment="kernel-syms-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031766" comment="kernel-zfcpdump-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031767" comment="kselftests-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031768" comment="kselftests-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031769" comment="kselftests-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031770" comment="ocfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031771" comment="ocfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031772" comment="ocfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540036" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40036</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40036" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40036" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40036" ref_url="https://www.suse.com/security/cve/CVE-2025-40036" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

misc: fastrpc: fix possible map leak in fastrpc_put_args

copy_to_user() failure would cause an early return without cleaning up
the fdlist, which has been updated by the DSP. This could lead to map
leak. Fix this by redirecting to a cleanup path on failure, ensuring
that all mapped buffers are properly released before returning.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40036/">CVE-2025-40036 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40036">CVE-2025-40036 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252865">SUSE bug 1252865</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031708" comment="cluster-md-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031709" comment="cluster-md-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031710" comment="cluster-md-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031711" comment="dlm-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031712" comment="dlm-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031713" comment="dlm-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031714" comment="dtb-allwinner-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031715" comment="dtb-altera-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031716" comment="dtb-amazon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031717" comment="dtb-amd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031718" comment="dtb-amlogic-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031719" comment="dtb-apm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031720" comment="dtb-apple-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031721" comment="dtb-arm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031722" comment="dtb-broadcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031723" comment="dtb-cavium-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031724" comment="dtb-exynos-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031725" comment="dtb-freescale-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031726" comment="dtb-hisilicon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031727" comment="dtb-lg-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031728" comment="dtb-marvell-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031729" comment="dtb-mediatek-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031730" comment="dtb-nvidia-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031731" comment="dtb-qcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031732" comment="dtb-renesas-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031733" comment="dtb-rockchip-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031734" comment="dtb-socionext-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031735" comment="dtb-sprd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031736" comment="dtb-xilinx-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031737" comment="gfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031738" comment="gfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031739" comment="gfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031742" comment="kernel-64kb-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031743" comment="kernel-64kb-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031747" comment="kernel-default-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031748" comment="kernel-default-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031750" comment="kernel-docs-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031751" comment="kernel-docs-html-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031752" comment="kernel-kvmsmall-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031754" comment="kernel-kvmsmall-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031756" comment="kernel-obs-build-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031757" comment="kernel-obs-qa-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031760" comment="kernel-rt-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031761" comment="kernel-rt-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031762" comment="kernel-rt-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031764" comment="kernel-source-vanilla-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031765" comment="kernel-syms-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031766" comment="kernel-zfcpdump-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031767" comment="kselftests-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031768" comment="kselftests-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031769" comment="kselftests-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031770" comment="ocfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031771" comment="ocfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031772" comment="ocfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540037" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40037</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40037" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40037" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40037" ref_url="https://www.suse.com/security/cve/CVE-2025-40037" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fbdev: simplefb: Fix use after free in simplefb_detach_genpds()

The pm_domain cleanup can not be devres managed as it uses struct
simplefb_par which is allocated within struct fb_info by
framebuffer_alloc(). This allocation is explicitly freed by
unregister_framebuffer() in simplefb_remove().
Devres managed cleanup runs after the device remove call and thus can no
longer access struct simplefb_par.
Call simplefb_detach_genpds() explicitly from simplefb_destroy() like
the cleanup functions for clocks and regulators.

Fixes an use after free on M2 Mac mini during
aperture_remove_conflicting_devices() using the downstream asahi kernel
with Debian's kernel config. For unknown reasons this started to
consistently dereference an invalid pointer in v6.16.3 based kernels.

[    6.736134] BUG: KASAN: slab-use-after-free in simplefb_detach_genpds+0x58/0x220
[    6.743545] Read of size 4 at addr ffff8000304743f0 by task (udev-worker)/227
[    6.750697]
[    6.752182] CPU: 6 UID: 0 PID: 227 Comm: (udev-worker) Tainted: G S                  6.16.3-asahi+ #16 PREEMPTLAZY
[    6.752186] Tainted: [S]=CPU_OUT_OF_SPEC
[    6.752187] Hardware name: Apple Mac mini (M2, 2023) (DT)
[    6.752189] Call trace:
[    6.752190]  show_stack+0x34/0x98 (C)
[    6.752194]  dump_stack_lvl+0x60/0x80
[    6.752197]  print_report+0x17c/0x4d8
[    6.752201]  kasan_report+0xb4/0x100
[    6.752206]  __asan_report_load4_noabort+0x20/0x30
[    6.752209]  simplefb_detach_genpds+0x58/0x220
[    6.752213]  devm_action_release+0x50/0x98
[    6.752216]  release_nodes+0xd0/0x2c8
[    6.752219]  devres_release_all+0xfc/0x178
[    6.752221]  device_unbind_cleanup+0x28/0x168
[    6.752224]  device_release_driver_internal+0x34c/0x470
[    6.752228]  device_release_driver+0x20/0x38
[    6.752231]  bus_remove_device+0x1b0/0x380
[    6.752234]  device_del+0x314/0x820
[    6.752238]  platform_device_del+0x3c/0x1e8
[    6.752242]  platform_device_unregister+0x20/0x50
[    6.752246]  aperture_detach_platform_device+0x1c/0x30
[    6.752250]  aperture_detach_devices+0x16c/0x290
[    6.752253]  aperture_remove_conflicting_devices+0x34/0x50
...
[    6.752343]
[    6.967409] Allocated by task 62:
[    6.970724]  kasan_save_stack+0x3c/0x70
[    6.974560]  kasan_save_track+0x20/0x40
[    6.978397]  kasan_save_alloc_info+0x40/0x58
[    6.982670]  __kasan_kmalloc+0xd4/0xd8
[    6.986420]  __kmalloc_noprof+0x194/0x540
[    6.990432]  framebuffer_alloc+0xc8/0x130
[    6.994444]  simplefb_probe+0x258/0x2378
...
[    7.054356]
[    7.055838] Freed by task 227:
[    7.058891]  kasan_save_stack+0x3c/0x70
[    7.062727]  kasan_save_track+0x20/0x40
[    7.066565]  kasan_save_free_info+0x4c/0x80
[    7.070751]  __kasan_slab_free+0x6c/0xa0
[    7.074675]  kfree+0x10c/0x380
[    7.077727]  framebuffer_release+0x5c/0x90
[    7.081826]  simplefb_destroy+0x1b4/0x2c0
[    7.085837]  put_fb_info+0x98/0x100
[    7.089326]  unregister_framebuffer+0x178/0x320
[    7.093861]  simplefb_remove+0x3c/0x60
[    7.097611]  platform_remove+0x60/0x98
[    7.101361]  device_remove+0xb8/0x160
[    7.105024]  device_release_driver_internal+0x2fc/0x470
[    7.110256]  device_release_driver+0x20/0x38
[    7.114529]  bus_remove_device+0x1b0/0x380
[    7.118628]  device_del+0x314/0x820
[    7.122116]  platform_device_del+0x3c/0x1e8
[    7.126302]  platform_device_unregister+0x20/0x50
[    7.131012]  aperture_detach_platform_device+0x1c/0x30
[    7.136157]  aperture_detach_devices+0x16c/0x290
[    7.140779]  aperture_remove_conflicting_devices+0x34/0x50
...
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40037/">CVE-2025-40037 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40037">CVE-2025-40037 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252819">SUSE bug 1252819</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031708" comment="cluster-md-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031709" comment="cluster-md-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031710" comment="cluster-md-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031711" comment="dlm-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031712" comment="dlm-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031713" comment="dlm-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031714" comment="dtb-allwinner-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031715" comment="dtb-altera-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031716" comment="dtb-amazon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031717" comment="dtb-amd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031718" comment="dtb-amlogic-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031719" comment="dtb-apm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031720" comment="dtb-apple-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031721" comment="dtb-arm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031722" comment="dtb-broadcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031723" comment="dtb-cavium-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031724" comment="dtb-exynos-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031725" comment="dtb-freescale-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031726" comment="dtb-hisilicon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031727" comment="dtb-lg-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031728" comment="dtb-marvell-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031729" comment="dtb-mediatek-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031730" comment="dtb-nvidia-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031731" comment="dtb-qcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031732" comment="dtb-renesas-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031733" comment="dtb-rockchip-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031734" comment="dtb-socionext-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031735" comment="dtb-sprd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031736" comment="dtb-xilinx-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031737" comment="gfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031738" comment="gfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031739" comment="gfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031742" comment="kernel-64kb-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031743" comment="kernel-64kb-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031747" comment="kernel-default-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031748" comment="kernel-default-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031750" comment="kernel-docs-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031751" comment="kernel-docs-html-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031752" comment="kernel-kvmsmall-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031754" comment="kernel-kvmsmall-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031756" comment="kernel-obs-build-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031757" comment="kernel-obs-qa-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031760" comment="kernel-rt-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031761" comment="kernel-rt-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031762" comment="kernel-rt-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031764" comment="kernel-source-vanilla-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031765" comment="kernel-syms-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031766" comment="kernel-zfcpdump-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031767" comment="kselftests-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031768" comment="kselftests-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031769" comment="kselftests-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031770" comment="ocfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031771" comment="ocfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031772" comment="ocfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540038" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40038</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40038" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40038" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40038" ref_url="https://www.suse.com/security/cve/CVE-2025-40038" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: SVM: Skip fastpath emulation on VM-Exit if next RIP isn't valid

Skip the WRMSR and HLT fastpaths in SVM's VM-Exit handler if the next RIP
isn't valid, e.g. because KVM is running with nrips=false.  SVM must
decode and emulate to skip the instruction if the CPU doesn't provide the
next RIP, and getting the instruction bytes to decode requires reading
guest memory.  Reading guest memory through the emulator can fault, i.e.
can sleep, which is disallowed since the fastpath handlers run with IRQs
disabled.

 BUG: sleeping function called from invalid context at ./include/linux/uaccess.h:106
 in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 32611, name: qemu
 preempt_count: 1, expected: 0
 INFO: lockdep is turned off.
 irq event stamp: 30580
 hardirqs last  enabled at (30579): [&lt;ffffffffc08b2527&gt;] vcpu_run+0x1787/0x1db0 [kvm]
 hardirqs last disabled at (30580): [&lt;ffffffffb4f62e32&gt;] __schedule+0x1e2/0xed0
 softirqs last  enabled at (30570): [&lt;ffffffffb4247a64&gt;] fpu_swap_kvm_fpstate+0x44/0x210
 softirqs last disabled at (30568): [&lt;ffffffffb4247a64&gt;] fpu_swap_kvm_fpstate+0x44/0x210
 CPU: 298 UID: 0 PID: 32611 Comm: qemu Tainted: G     U              6.16.0-smp--e6c618b51cfe-sleep #782 NONE
 Tainted: [U]=USER
 Hardware name: Google Astoria-Turin/astoria, BIOS 0.20241223.2-0 01/17/2025
 Call Trace:
  &lt;TASK&gt;
  dump_stack_lvl+0x7d/0xb0
  __might_resched+0x271/0x290
  __might_fault+0x28/0x80
  kvm_vcpu_read_guest_page+0x8d/0xc0 [kvm]
  kvm_fetch_guest_virt+0x92/0xc0 [kvm]
  __do_insn_fetch_bytes+0xf3/0x1e0 [kvm]
  x86_decode_insn+0xd1/0x1010 [kvm]
  x86_emulate_instruction+0x105/0x810 [kvm]
  __svm_skip_emulated_instruction+0xc4/0x140 [kvm_amd]
  handle_fastpath_invd+0xc4/0x1a0 [kvm]
  vcpu_run+0x11a1/0x1db0 [kvm]
  kvm_arch_vcpu_ioctl_run+0x5cc/0x730 [kvm]
  kvm_vcpu_ioctl+0x578/0x6a0 [kvm]
  __se_sys_ioctl+0x6d/0xb0
  do_syscall_64+0x8a/0x2c0
  entry_SYSCALL_64_after_hwframe+0x4b/0x53
 RIP: 0033:0x7f479d57a94b
  &lt;/TASK&gt;

Note, this is essentially a reapply of commit 5c30e8101e8d ("KVM: SVM:
Skip WRMSR fastpath on VM-Exit if next RIP isn't valid"), but with
different justification (KVM now grabs SRCU when skipping the instruction
for other reasons).
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40038/">CVE-2025-40038 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40038">CVE-2025-40038 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252817">SUSE bug 1252817</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540040" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40040</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40040" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40040" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40040" ref_url="https://www.suse.com/security/cve/CVE-2025-40040" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/ksm: fix flag-dropping behavior in ksm_madvise

syzkaller discovered the following crash: (kernel BUG)

[   44.607039] ------------[ cut here ]------------
[   44.607422] kernel BUG at mm/userfaultfd.c:2067!
[   44.608148] Oops: invalid opcode: 0000 [#1] SMP DEBUG_PAGEALLOC KASAN NOPTI
[   44.608814] CPU: 1 UID: 0 PID: 2475 Comm: reproducer Not tainted 6.16.0-rc6 #1 PREEMPT(none)
[   44.609635] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014
[   44.610695] RIP: 0010:userfaultfd_release_all+0x3a8/0x460

&lt;snip other registers, drop unreliable trace&gt;

[   44.617726] Call Trace:
[   44.617926]  &lt;TASK&gt;
[   44.619284]  userfaultfd_release+0xef/0x1b0
[   44.620976]  __fput+0x3f9/0xb60
[   44.621240]  fput_close_sync+0x110/0x210
[   44.622222]  __x64_sys_close+0x8f/0x120
[   44.622530]  do_syscall_64+0x5b/0x2f0
[   44.622840]  entry_SYSCALL_64_after_hwframe+0x76/0x7e
[   44.623244] RIP: 0033:0x7f365bb3f227

Kernel panics because it detects UFFD inconsistency during
userfaultfd_release_all().  Specifically, a VMA which has a valid pointer
to vma-&gt;vm_userfaultfd_ctx, but no UFFD flags in vma-&gt;vm_flags.

The inconsistency is caused in ksm_madvise(): when user calls madvise()
with MADV_UNMEARGEABLE on a VMA that is registered for UFFD in MINOR mode,
it accidentally clears all flags stored in the upper 32 bits of
vma-&gt;vm_flags.

Assuming x86_64 kernel build, unsigned long is 64-bit and unsigned int and
int are 32-bit wide.  This setup causes the following mishap during the &amp;=
~VM_MERGEABLE assignment.

VM_MERGEABLE is a 32-bit constant of type unsigned int, 0x8000'0000. 
After ~ is applied, it becomes 0x7fff'ffff unsigned int, which is then
promoted to unsigned long before the &amp; operation.  This promotion fills
upper 32 bits with leading 0s, as we're doing unsigned conversion (and
even for a signed conversion, this wouldn't help as the leading bit is 0).
&amp; operation thus ends up AND-ing vm_flags with 0x0000'0000'7fff'ffff
instead of intended 0xffff'ffff'7fff'ffff and hence accidentally clears
the upper 32-bits of its value.

Fix it by changing `VM_MERGEABLE` constant to unsigned long, using the
BIT() macro.

Note: other VM_* flags are not affected: This only happens to the
VM_MERGEABLE flag, as the other VM_* flags are all constants of type int
and after ~ operation, they end up with leading 1 and are thus converted
to unsigned long with leading 1s.

Note 2:
After commit 31defc3b01d9 ("userfaultfd: remove (VM_)BUG_ON()s"), this is
no longer a kernel BUG, but a WARNING at the same place:

[   45.595973] WARNING: CPU: 1 PID: 2474 at mm/userfaultfd.c:2067

but the root-cause (flag-drop) remains the same.

[akpm@linux-foundation.org: rust bindgen wasn't able to handle BIT(), from Miguel]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40040/">CVE-2025-40040 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-40040">CVE-2025-40040 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252780">SUSE bug 1252780</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031708" comment="cluster-md-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031709" comment="cluster-md-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031710" comment="cluster-md-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031711" comment="dlm-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031712" comment="dlm-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031713" comment="dlm-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031714" comment="dtb-allwinner-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031715" comment="dtb-altera-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031716" comment="dtb-amazon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031717" comment="dtb-amd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031718" comment="dtb-amlogic-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031719" comment="dtb-apm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031720" comment="dtb-apple-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031721" comment="dtb-arm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031722" comment="dtb-broadcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031723" comment="dtb-cavium-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031724" comment="dtb-exynos-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031725" comment="dtb-freescale-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031726" comment="dtb-hisilicon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031727" comment="dtb-lg-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031728" comment="dtb-marvell-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031729" comment="dtb-mediatek-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031730" comment="dtb-nvidia-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031731" comment="dtb-qcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031732" comment="dtb-renesas-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031733" comment="dtb-rockchip-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031734" comment="dtb-socionext-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031735" comment="dtb-sprd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031736" comment="dtb-xilinx-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031737" comment="gfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031738" comment="gfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031739" comment="gfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031742" comment="kernel-64kb-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031743" comment="kernel-64kb-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031747" comment="kernel-default-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031748" comment="kernel-default-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031750" comment="kernel-docs-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031751" comment="kernel-docs-html-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031752" comment="kernel-kvmsmall-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031754" comment="kernel-kvmsmall-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031756" comment="kernel-obs-build-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031757" comment="kernel-obs-qa-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031760" comment="kernel-rt-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031761" comment="kernel-rt-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031762" comment="kernel-rt-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031764" comment="kernel-source-vanilla-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031765" comment="kernel-syms-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031766" comment="kernel-zfcpdump-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031767" comment="kselftests-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031768" comment="kselftests-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031769" comment="kselftests-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031770" comment="ocfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031771" comment="ocfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031772" comment="ocfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540042" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40042</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40042" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40042" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40042" ref_url="https://www.suse.com/security/cve/CVE-2025-40042" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tracing: Fix race condition in kprobe initialization causing NULL pointer dereference

There is a critical race condition in kprobe initialization that can lead to
NULL pointer dereference and kernel crash.

[1135630.084782] Unable to handle kernel paging request at virtual address 0000710a04630000
...
[1135630.260314] pstate: 404003c9 (nZcv DAIF +PAN -UAO)
[1135630.269239] pc : kprobe_perf_func+0x30/0x260
[1135630.277643] lr : kprobe_dispatcher+0x44/0x60
[1135630.286041] sp : ffffaeff4977fa40
[1135630.293441] x29: ffffaeff4977fa40 x28: ffffaf015340e400
[1135630.302837] x27: 0000000000000000 x26: 0000000000000000
[1135630.312257] x25: ffffaf029ed108a8 x24: ffffaf015340e528
[1135630.321705] x23: ffffaeff4977fc50 x22: ffffaeff4977fc50
[1135630.331154] x21: 0000000000000000 x20: ffffaeff4977fc50
[1135630.340586] x19: ffffaf015340e400 x18: 0000000000000000
[1135630.349985] x17: 0000000000000000 x16: 0000000000000000
[1135630.359285] x15: 0000000000000000 x14: 0000000000000000
[1135630.368445] x13: 0000000000000000 x12: 0000000000000000
[1135630.377473] x11: 0000000000000000 x10: 0000000000000000
[1135630.386411] x9 : 0000000000000000 x8 : 0000000000000000
[1135630.395252] x7 : 0000000000000000 x6 : 0000000000000000
[1135630.403963] x5 : 0000000000000000 x4 : 0000000000000000
[1135630.412545] x3 : 0000710a04630000 x2 : 0000000000000006
[1135630.421021] x1 : ffffaeff4977fc50 x0 : 0000710a04630000
[1135630.429410] Call trace:
[1135630.434828]  kprobe_perf_func+0x30/0x260
[1135630.441661]  kprobe_dispatcher+0x44/0x60
[1135630.448396]  aggr_pre_handler+0x70/0xc8
[1135630.454959]  kprobe_breakpoint_handler+0x140/0x1e0
[1135630.462435]  brk_handler+0xbc/0xd8
[1135630.468437]  do_debug_exception+0x84/0x138
[1135630.475074]  el1_dbg+0x18/0x8c
[1135630.480582]  security_file_permission+0x0/0xd0
[1135630.487426]  vfs_write+0x70/0x1c0
[1135630.493059]  ksys_write+0x5c/0xc8
[1135630.498638]  __arm64_sys_write+0x24/0x30
[1135630.504821]  el0_svc_common+0x78/0x130
[1135630.510838]  el0_svc_handler+0x38/0x78
[1135630.516834]  el0_svc+0x8/0x1b0

kernel/trace/trace_kprobe.c: 1308
0xffff3df8995039ec &lt;kprobe_perf_func+0x2c&gt;:     ldr     x21, [x24,#120]
include/linux/compiler.h: 294
0xffff3df8995039f0 &lt;kprobe_perf_func+0x30&gt;:     ldr     x1, [x21,x0]

kernel/trace/trace_kprobe.c
1308: head = this_cpu_ptr(call-&gt;perf_events);
1309: if (hlist_empty(head))
1310: 	return 0;

crash&gt; struct trace_event_call -o
struct trace_event_call {
  ...
  [120] struct hlist_head *perf_events;  //(call-&gt;perf_event)
  ...
}

crash&gt; struct trace_event_call ffffaf015340e528
struct trace_event_call {
  ...
  perf_events = 0xffff0ad5fa89f088, //this value is correct, but x21 = 0
  ...
}

Race Condition Analysis:

The race occurs between kprobe activation and perf_events initialization:

  CPU0                                    CPU1
  ====                                    ====
  perf_kprobe_init
    perf_trace_event_init
      tp_event-&gt;perf_events = list;(1)
      tp_event-&gt;class-&gt;reg (2)&lt;- KPROBE ACTIVE
                                          Debug exception triggers
                                          ...
                                          kprobe_dispatcher
                                            kprobe_perf_func (tk-&gt;tp.flags &amp; TP_FLAG_PROFILE)
                                              head = this_cpu_ptr(call-&gt;perf_events)(3)
                                              (perf_events is still NULL)

Problem:
1. CPU0 executes (1) assigning tp_event-&gt;perf_events = list
2. CPU0 executes (2) enabling kprobe functionality via class-&gt;reg()
3. CPU1 triggers and reaches kprobe_dispatcher
4. CPU1 checks TP_FLAG_PROFILE - condition passes (step 2 completed)
5. CPU1 calls kprobe_perf_func() and crashes at (3) because
   call-&gt;perf_events is still NULL

CPU1 sees that kprobe functionality is enabled but does not see that
perf_events has been assigned.

Add pairing read an
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40042/">CVE-2025-40042 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40042">CVE-2025-40042 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252861">SUSE bug 1252861</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540043" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40043</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40043" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40043" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40043" ref_url="https://www.suse.com/security/cve/CVE-2025-40043" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: nfc: nci: Add parameter validation for packet data

Syzbot reported an uninitialized value bug in nci_init_req, which was
introduced by commit 5aca7966d2a7 ("Merge tag
'perf-tools-fixes-for-v6.17-2025-09-16' of
git://git.kernel.org/pub/scm/linux/kernel/git/perf/perf-tools").

This bug arises due to very limited and poor input validation
that was done at nic_valid_size(). This validation only
validates the skb-&gt;len (directly reflects size provided at the
userspace interface) with the length provided in the buffer
itself (interpreted as NCI_HEADER). This leads to the processing
of memory content at the address assuming the correct layout
per what opcode requires there. This leads to the accesses to
buffer of `skb_buff-&gt;data` which is not assigned anything yet.

Following the same silent drop of packets of invalid sizes at
`nic_valid_size()`, add validation of the data in the respective
handlers and return error values in case of failure. Release
the skb if error values are returned from handlers in
`nci_nft_packet` and effectively do a silent drop

Possible TODO: because we silently drop the packets, the
call to `nci_request` will be waiting for completion of request
and will face timeouts. These timeouts can get excessively logged
in the dmesg. A proper handling of them may require to export
`nci_request_cancel` (or propagate error handling from the
nft packets handlers).
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40043/">CVE-2025-40043 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40043">CVE-2025-40043 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252787">SUSE bug 1252787</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031708" comment="cluster-md-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031709" comment="cluster-md-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031710" comment="cluster-md-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031711" comment="dlm-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031712" comment="dlm-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031713" comment="dlm-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031714" comment="dtb-allwinner-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031715" comment="dtb-altera-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031716" comment="dtb-amazon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031717" comment="dtb-amd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031718" comment="dtb-amlogic-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031719" comment="dtb-apm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031720" comment="dtb-apple-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031721" comment="dtb-arm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031722" comment="dtb-broadcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031723" comment="dtb-cavium-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031724" comment="dtb-exynos-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031725" comment="dtb-freescale-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031726" comment="dtb-hisilicon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031727" comment="dtb-lg-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031728" comment="dtb-marvell-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031729" comment="dtb-mediatek-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031730" comment="dtb-nvidia-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031731" comment="dtb-qcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031732" comment="dtb-renesas-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031733" comment="dtb-rockchip-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031734" comment="dtb-socionext-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031735" comment="dtb-sprd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031736" comment="dtb-xilinx-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031737" comment="gfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031738" comment="gfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031739" comment="gfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031742" comment="kernel-64kb-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031743" comment="kernel-64kb-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031747" comment="kernel-default-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031748" comment="kernel-default-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031750" comment="kernel-docs-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031751" comment="kernel-docs-html-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031752" comment="kernel-kvmsmall-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031754" comment="kernel-kvmsmall-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031756" comment="kernel-obs-build-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031757" comment="kernel-obs-qa-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031760" comment="kernel-rt-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031761" comment="kernel-rt-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031762" comment="kernel-rt-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031764" comment="kernel-source-vanilla-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031765" comment="kernel-syms-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031766" comment="kernel-zfcpdump-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031767" comment="kselftests-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031768" comment="kselftests-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031769" comment="kselftests-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031770" comment="ocfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031771" comment="ocfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031772" comment="ocfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540044" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40044</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40044" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40044" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40044" ref_url="https://www.suse.com/security/cve/CVE-2025-40044" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4320-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1131-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs: udf: fix OOB read in lengthAllocDescs handling

When parsing Allocation Extent Descriptor, lengthAllocDescs comes from
on-disk data and must be validated against the block size. Crafted or
corrupted images may set lengthAllocDescs so that the total descriptor
length (sizeof(allocExtDesc) + lengthAllocDescs) exceeds the buffer,
leading udf_update_tag() to call crc_itu_t() on out-of-bounds memory and
trigger a KASAN use-after-free read.

BUG: KASAN: use-after-free in crc_itu_t+0x1d5/0x2b0 lib/crc-itu-t.c:60
Read of size 1 at addr ffff888041e7d000 by task syz-executor317/5309

CPU: 0 UID: 0 PID: 5309 Comm: syz-executor317 Not tainted 6.12.0-rc4-syzkaller-00261-g850925a8133c #0
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:94 [inline]
 dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120
 print_address_description mm/kasan/report.c:377 [inline]
 print_report+0x169/0x550 mm/kasan/report.c:488
 kasan_report+0x143/0x180 mm/kasan/report.c:601
 crc_itu_t+0x1d5/0x2b0 lib/crc-itu-t.c:60
 udf_update_tag+0x70/0x6a0 fs/udf/misc.c:261
 udf_write_aext+0x4d8/0x7b0 fs/udf/inode.c:2179
 extent_trunc+0x2f7/0x4a0 fs/udf/truncate.c:46
 udf_truncate_tail_extent+0x527/0x7e0 fs/udf/truncate.c:106
 udf_release_file+0xc1/0x120 fs/udf/file.c:185
 __fput+0x23f/0x880 fs/file_table.c:431
 task_work_run+0x24f/0x310 kernel/task_work.c:239
 exit_task_work include/linux/task_work.h:43 [inline]
 do_exit+0xa2f/0x28e0 kernel/exit.c:939
 do_group_exit+0x207/0x2c0 kernel/exit.c:1088
 __do_sys_exit_group kernel/exit.c:1099 [inline]
 __se_sys_exit_group kernel/exit.c:1097 [inline]
 __x64_sys_exit_group+0x3f/0x40 kernel/exit.c:1097
 x64_sys_call+0x2634/0x2640 arch/x86/include/generated/asm/syscalls_64.h:232
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
 &lt;/TASK&gt;

Validate the computed total length against epos-&gt;bh-&gt;b_size.

Found by Linux Verification Center (linuxtesting.org) with Syzkaller.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40044/">CVE-2025-40044 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40044">CVE-2025-40044 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252785">SUSE bug 1252785</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031708" comment="cluster-md-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031709" comment="cluster-md-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031710" comment="cluster-md-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031711" comment="dlm-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031712" comment="dlm-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031713" comment="dlm-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031714" comment="dtb-allwinner-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031715" comment="dtb-altera-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031716" comment="dtb-amazon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031717" comment="dtb-amd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031718" comment="dtb-amlogic-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031719" comment="dtb-apm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031720" comment="dtb-apple-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031721" comment="dtb-arm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031722" comment="dtb-broadcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031723" comment="dtb-cavium-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031724" comment="dtb-exynos-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031725" comment="dtb-freescale-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031726" comment="dtb-hisilicon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031727" comment="dtb-lg-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031728" comment="dtb-marvell-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031729" comment="dtb-mediatek-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031730" comment="dtb-nvidia-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031731" comment="dtb-qcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031732" comment="dtb-renesas-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031733" comment="dtb-rockchip-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031734" comment="dtb-socionext-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031735" comment="dtb-sprd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031736" comment="dtb-xilinx-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031737" comment="gfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031738" comment="gfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031739" comment="gfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031742" comment="kernel-64kb-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031743" comment="kernel-64kb-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031747" comment="kernel-default-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031748" comment="kernel-default-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031750" comment="kernel-docs-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031751" comment="kernel-docs-html-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031752" comment="kernel-kvmsmall-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031754" comment="kernel-kvmsmall-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031756" comment="kernel-obs-build-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031757" comment="kernel-obs-qa-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031760" comment="kernel-rt-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031761" comment="kernel-rt-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031762" comment="kernel-rt-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031764" comment="kernel-source-vanilla-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031765" comment="kernel-syms-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031766" comment="kernel-zfcpdump-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031767" comment="kselftests-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031768" comment="kselftests-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031769" comment="kselftests-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031770" comment="ocfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031771" comment="ocfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031772" comment="ocfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540045" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40045</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40045" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40045" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40045" ref_url="https://www.suse.com/security/cve/CVE-2025-40045" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: codecs: wcd937x: set the comp soundwire port correctly

For some reason we endup with setting soundwire port for
HPHL_COMP and HPHR_COMP as zero, this can potentially result
in a memory corruption due to accessing and setting -1 th element of
port_map array.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40045/">CVE-2025-40045 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40045">CVE-2025-40045 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252784">SUSE bug 1252784</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540047" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40047</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40047" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40047" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40047" ref_url="https://www.suse.com/security/cve/CVE-2025-40047" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:21469" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003115.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21933" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

io_uring/waitid: always prune wait queue entry in io_waitid_wait()

For a successful return, always remove our entry from the wait queue
entry list. Previously this was skipped if a cancelation was in
progress, but this can race with another invocation of the wait queue
entry callback.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40047/">CVE-2025-40047 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40047">CVE-2025-40047 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252790">SUSE bug 1252790</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540048" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40048</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40048" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40048" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40048" ref_url="https://www.suse.com/security/cve/CVE-2025-40048" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

uio_hv_generic: Let userspace take care of interrupt mask

Remove the logic to set interrupt mask by default in uio_hv_generic
driver as the interrupt mask value is supposed to be controlled
completely by the user space. If the mask bit gets changed
by the driver, concurrently with user mode operating on the ring,
the mask bit may be set when it is supposed to be clear, and the
user-mode driver will miss an interrupt which will cause a hang.

For eg- when the driver sets inbound ring buffer interrupt mask to 1,
the host does not interrupt the guest on the UIO VMBus channel.
However, setting the mask does not prevent the host from putting a
message in the inbound ring buffer.  So let's assume that happens,
the host puts a message into the ring buffer but does not interrupt.

Subsequently, the user space code in the guest sets the inbound ring
buffer interrupt mask to 0, saying “Hey, I'm ready for interrupts”.
User space code then calls pread() to wait for an interrupt.
Then one of two things happens:

* The host never sends another message. So the pread() waits forever.
* The host does send another message. But because there's already a
  message in the ring buffer, it doesn't generate an interrupt.
  This is the correct behavior, because the host should only send an
  interrupt when the inbound ring buffer transitions from empty to
  not-empty. Adding an additional message to a ring buffer that is not
  empty is not supposed to generate an interrupt on the guest.
  Since the guest is waiting in pread() and not removing messages from
  the ring buffer, the pread() waits forever.

This could be easily reproduced in hv_fcopy_uio_daemon if we delay
setting interrupt mask to 0.

Similarly if hv_uio_channel_cb() sets the interrupt_mask to 1,
there's a race condition. Once user space empties the inbound ring
buffer, but before user space sets interrupt_mask to 0, the host could
put another message in the ring buffer but it wouldn't interrupt.
Then the next pread() would hang.

Fix these by removing all instances where interrupt_mask is changed,
while keeping the one in set_event() unchanged to enable userspace
control the interrupt mask by writing 0/1 to /dev/uioX.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40048/">CVE-2025-40048 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40048">CVE-2025-40048 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252862">SUSE bug 1252862</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031708" comment="cluster-md-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031709" comment="cluster-md-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031710" comment="cluster-md-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031711" comment="dlm-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031712" comment="dlm-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031713" comment="dlm-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031714" comment="dtb-allwinner-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031715" comment="dtb-altera-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031716" comment="dtb-amazon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031717" comment="dtb-amd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031718" comment="dtb-amlogic-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031719" comment="dtb-apm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031720" comment="dtb-apple-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031721" comment="dtb-arm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031722" comment="dtb-broadcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031723" comment="dtb-cavium-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031724" comment="dtb-exynos-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031725" comment="dtb-freescale-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031726" comment="dtb-hisilicon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031727" comment="dtb-lg-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031728" comment="dtb-marvell-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031729" comment="dtb-mediatek-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031730" comment="dtb-nvidia-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031731" comment="dtb-qcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031732" comment="dtb-renesas-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031733" comment="dtb-rockchip-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031734" comment="dtb-socionext-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031735" comment="dtb-sprd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031736" comment="dtb-xilinx-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031737" comment="gfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031738" comment="gfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031739" comment="gfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031742" comment="kernel-64kb-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031743" comment="kernel-64kb-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031747" comment="kernel-default-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031748" comment="kernel-default-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031750" comment="kernel-docs-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031751" comment="kernel-docs-html-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031752" comment="kernel-kvmsmall-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031754" comment="kernel-kvmsmall-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031756" comment="kernel-obs-build-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031757" comment="kernel-obs-qa-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031760" comment="kernel-rt-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031761" comment="kernel-rt-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031762" comment="kernel-rt-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031764" comment="kernel-source-vanilla-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031765" comment="kernel-syms-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031766" comment="kernel-zfcpdump-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031767" comment="kselftests-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031768" comment="kselftests-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031769" comment="kselftests-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031770" comment="ocfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031771" comment="ocfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031772" comment="ocfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540049" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40049</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40049" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40049" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40049" ref_url="https://www.suse.com/security/cve/CVE-2025-40049" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Squashfs: fix uninit-value in squashfs_get_parent

Syzkaller reports a "KMSAN: uninit-value in squashfs_get_parent" bug.

This is caused by open_by_handle_at() being called with a file handle
containing an invalid parent inode number.  In particular the inode number
is that of a symbolic link, rather than a directory.

Squashfs_get_parent() gets called with that symbolic link inode, and
accesses the parent member field.

	unsigned int parent_ino = squashfs_i(inode)-&gt;parent;

Because non-directory inodes in Squashfs do not have a parent value, this
is uninitialised, and this causes an uninitialised value access.

The fix is to initialise parent with the invalid inode 0, which will cause
an EINVAL error to be returned.

Regular inodes used to share the parent field with the block_list_start
field.  This is removed in this commit to enable the parent field to
contain the invalid inode number 0.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40049/">CVE-2025-40049 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40049">CVE-2025-40049 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252822">SUSE bug 1252822</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031708" comment="cluster-md-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031709" comment="cluster-md-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031710" comment="cluster-md-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031711" comment="dlm-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031712" comment="dlm-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031713" comment="dlm-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031714" comment="dtb-allwinner-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031715" comment="dtb-altera-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031716" comment="dtb-amazon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031717" comment="dtb-amd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031718" comment="dtb-amlogic-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031719" comment="dtb-apm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031720" comment="dtb-apple-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031721" comment="dtb-arm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031722" comment="dtb-broadcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031723" comment="dtb-cavium-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031724" comment="dtb-exynos-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031725" comment="dtb-freescale-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031726" comment="dtb-hisilicon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031727" comment="dtb-lg-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031728" comment="dtb-marvell-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031729" comment="dtb-mediatek-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031730" comment="dtb-nvidia-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031731" comment="dtb-qcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031732" comment="dtb-renesas-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031733" comment="dtb-rockchip-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031734" comment="dtb-socionext-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031735" comment="dtb-sprd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031736" comment="dtb-xilinx-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031737" comment="gfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031738" comment="gfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031739" comment="gfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031742" comment="kernel-64kb-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031743" comment="kernel-64kb-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031747" comment="kernel-default-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031748" comment="kernel-default-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031750" comment="kernel-docs-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031751" comment="kernel-docs-html-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031752" comment="kernel-kvmsmall-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031754" comment="kernel-kvmsmall-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031756" comment="kernel-obs-build-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031757" comment="kernel-obs-qa-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031760" comment="kernel-rt-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031761" comment="kernel-rt-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031762" comment="kernel-rt-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031764" comment="kernel-source-vanilla-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031765" comment="kernel-syms-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031766" comment="kernel-zfcpdump-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031767" comment="kselftests-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031768" comment="kselftests-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031769" comment="kselftests-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031770" comment="ocfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031771" comment="ocfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031772" comment="ocfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540051" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40051</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40051" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40051" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40051" ref_url="https://www.suse.com/security/cve/CVE-2025-40051" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vhost: vringh: Modify the return value check

The return value of copy_from_iter and copy_to_iter can't be negative,
check whether the copied lengths are equal.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40051/">CVE-2025-40051 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40051">CVE-2025-40051 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252858">SUSE bug 1252858</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031708" comment="cluster-md-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031709" comment="cluster-md-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031710" comment="cluster-md-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031711" comment="dlm-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031712" comment="dlm-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031713" comment="dlm-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031714" comment="dtb-allwinner-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031715" comment="dtb-altera-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031716" comment="dtb-amazon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031717" comment="dtb-amd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031718" comment="dtb-amlogic-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031719" comment="dtb-apm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031720" comment="dtb-apple-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031721" comment="dtb-arm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031722" comment="dtb-broadcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031723" comment="dtb-cavium-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031724" comment="dtb-exynos-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031725" comment="dtb-freescale-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031726" comment="dtb-hisilicon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031727" comment="dtb-lg-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031728" comment="dtb-marvell-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031729" comment="dtb-mediatek-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031730" comment="dtb-nvidia-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031731" comment="dtb-qcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031732" comment="dtb-renesas-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031733" comment="dtb-rockchip-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031734" comment="dtb-socionext-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031735" comment="dtb-sprd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031736" comment="dtb-xilinx-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031737" comment="gfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031738" comment="gfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031739" comment="gfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031742" comment="kernel-64kb-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031743" comment="kernel-64kb-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031747" comment="kernel-default-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031748" comment="kernel-default-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031750" comment="kernel-docs-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031751" comment="kernel-docs-html-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031752" comment="kernel-kvmsmall-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031754" comment="kernel-kvmsmall-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031756" comment="kernel-obs-build-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031757" comment="kernel-obs-qa-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031760" comment="kernel-rt-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031761" comment="kernel-rt-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031762" comment="kernel-rt-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031764" comment="kernel-source-vanilla-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031765" comment="kernel-syms-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031766" comment="kernel-zfcpdump-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031767" comment="kselftests-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031768" comment="kselftests-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031769" comment="kselftests-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031770" comment="ocfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031771" comment="ocfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031772" comment="ocfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540052" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40052</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40052" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40052" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40052" ref_url="https://www.suse.com/security/cve/CVE-2025-40052" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix crypto buffers in non-linear memory

The crypto API, through the scatterlist API, expects input buffers to be
in linear memory.  We handle this with the cifs_sg_set_buf() helper
that converts vmalloc'd memory to their corresponding pages.

However, when we allocate our aead_request buffer (@creq in
smb2ops.c::crypt_message()), we do so with kvzalloc(), which possibly
puts aead_request-&gt;__ctx in vmalloc area.

AEAD algorithm then uses -&gt;__ctx for its private/internal data and
operations, and uses sg_set_buf() for such data on a few places.

This works fine as long as @creq falls into kmalloc zone (small
requests) or vmalloc'd memory is still within linear range.

Tasks' stacks are vmalloc'd by default (CONFIG_VMAP_STACK=y), so too
many tasks will increment the base stacks' addresses to a point where
virt_addr_valid(buf) will fail (BUG() in sg_set_buf()) when that
happens.

In practice: too many parallel reads and writes on an encrypted mount
will trigger this bug.

To fix this, always alloc @creq with kmalloc() instead.
Also drop the @sensitive_size variable/arguments since
kfree_sensitive() doesn't need it.

Backtrace:

[  945.272081] ------------[ cut here ]------------
[  945.272774] kernel BUG at include/linux/scatterlist.h:209!
[  945.273520] Oops: invalid opcode: 0000 [#1] SMP DEBUG_PAGEALLOC NOPTI
[  945.274412] CPU: 7 UID: 0 PID: 56 Comm: kworker/u33:0 Kdump: loaded Not tainted 6.15.0-lku-11779-g8e9d6efccdd7-dirty #1 PREEMPT(voluntary)
[  945.275736] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.16.3-2-gc13ff2cd-prebuilt.qemu.org 04/01/2014
[  945.276877] Workqueue: writeback wb_workfn (flush-cifs-2)
[  945.277457] RIP: 0010:crypto_gcm_init_common+0x1f9/0x220
[  945.278018] Code: b0 00 00 00 48 83 c4 08 5b 5d 41 5c 41 5d 41 5e 41 5f c3 cc cc cc cc 48 c7 c0 00 00 00 80 48 2b 05 5c 58 e5 00 e9 58 ff ff ff &lt;0f&gt; 0b 0f 0b 0f 0b 0f 0b 0f 0b 0f 0b 48 c7 04 24 01 00 00 00 48 8b
[  945.279992] RSP: 0018:ffffc90000a27360 EFLAGS: 00010246
[  945.280578] RAX: 0000000000000000 RBX: ffffc90001d85060 RCX: 0000000000000030
[  945.281376] RDX: 0000000000080000 RSI: 0000000000000000 RDI: ffffc90081d85070
[  945.282145] RBP: ffffc90001d85010 R08: ffffc90001d85000 R09: 0000000000000000
[  945.282898] R10: ffffc90001d85090 R11: 0000000000001000 R12: ffffc90001d85070
[  945.283656] R13: ffff888113522948 R14: ffffc90001d85060 R15: ffffc90001d85010
[  945.284407] FS:  0000000000000000(0000) GS:ffff8882e66cf000(0000) knlGS:0000000000000000
[  945.285262] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  945.285884] CR2: 00007fa7ffdd31f4 CR3: 000000010540d000 CR4: 0000000000350ef0
[  945.286683] Call Trace:
[  945.286952]  &lt;TASK&gt;
[  945.287184]  ? crypt_message+0x33f/0xad0 [cifs]
[  945.287719]  crypto_gcm_encrypt+0x36/0xe0
[  945.288152]  crypt_message+0x54a/0xad0 [cifs]
[  945.288724]  smb3_init_transform_rq+0x277/0x300 [cifs]
[  945.289300]  smb_send_rqst+0xa3/0x160 [cifs]
[  945.289944]  cifs_call_async+0x178/0x340 [cifs]
[  945.290514]  ? __pfx_smb2_writev_callback+0x10/0x10 [cifs]
[  945.291177]  smb2_async_writev+0x3e3/0x670 [cifs]
[  945.291759]  ? find_held_lock+0x32/0x90
[  945.292212]  ? netfs_advance_write+0xf2/0x310
[  945.292723]  netfs_advance_write+0xf2/0x310
[  945.293210]  netfs_write_folio+0x346/0xcc0
[  945.293689]  ? __pfx__raw_spin_unlock_irq+0x10/0x10
[  945.294250]  netfs_writepages+0x117/0x460
[  945.294724]  do_writepages+0xbe/0x170
[  945.295152]  ? find_held_lock+0x32/0x90
[  945.295600]  ? kvm_sched_clock_read+0x11/0x20
[  945.296103]  __writeback_single_inode+0x56/0x4b0
[  945.296643]  writeback_sb_inodes+0x229/0x550
[  945.297140]  __writeback_inodes_wb+0x4c/0xe0
[  945.297642]  wb_writeback+0x2f1/0x3f0
[  945.298069]  wb_workfn+0x300/0x490
[  945.298472]  process_one_work+0x1fe/0x590
[  945.298949]  worker_thread+0x1ce/0x3c0
[  945.299397]  ? __pfx_worker_thread+0x10/0x10
[  945.299900]  kthr
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40052/">CVE-2025-40052 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40052">CVE-2025-40052 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252851">SUSE bug 1252851</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031708" comment="cluster-md-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031709" comment="cluster-md-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031710" comment="cluster-md-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031711" comment="dlm-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031712" comment="dlm-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031713" comment="dlm-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031714" comment="dtb-allwinner-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031715" comment="dtb-altera-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031716" comment="dtb-amazon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031717" comment="dtb-amd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031718" comment="dtb-amlogic-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031719" comment="dtb-apm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031720" comment="dtb-apple-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031721" comment="dtb-arm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031722" comment="dtb-broadcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031723" comment="dtb-cavium-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031724" comment="dtb-exynos-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031725" comment="dtb-freescale-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031726" comment="dtb-hisilicon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031727" comment="dtb-lg-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031728" comment="dtb-marvell-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031729" comment="dtb-mediatek-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031730" comment="dtb-nvidia-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031731" comment="dtb-qcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031732" comment="dtb-renesas-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031733" comment="dtb-rockchip-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031734" comment="dtb-socionext-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031735" comment="dtb-sprd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031736" comment="dtb-xilinx-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031737" comment="gfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031738" comment="gfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031739" comment="gfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031742" comment="kernel-64kb-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031743" comment="kernel-64kb-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031747" comment="kernel-default-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031748" comment="kernel-default-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031750" comment="kernel-docs-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031751" comment="kernel-docs-html-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031752" comment="kernel-kvmsmall-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031754" comment="kernel-kvmsmall-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031756" comment="kernel-obs-build-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031757" comment="kernel-obs-qa-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031760" comment="kernel-rt-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031761" comment="kernel-rt-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031762" comment="kernel-rt-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031764" comment="kernel-source-vanilla-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031765" comment="kernel-syms-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031766" comment="kernel-zfcpdump-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031767" comment="kselftests-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031768" comment="kselftests-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031769" comment="kselftests-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031770" comment="ocfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031771" comment="ocfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031772" comment="ocfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40053</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40053" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40053" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40053" ref_url="https://www.suse.com/security/cve/CVE-2025-40053" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: dlink: handle copy_thresh allocation failure

The driver did not handle failure of `netdev_alloc_skb_ip_align()`.
If the allocation failed, dereferencing `skb-&gt;protocol` could lead to
a NULL pointer dereference.

This patch tries to allocate `skb`. If the allocation fails, it falls
back to the normal path.

Tested-on: D-Link DGE-550T Rev-A3
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40053/">CVE-2025-40053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40053">CVE-2025-40053 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252808">SUSE bug 1252808</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540055" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40055</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40055" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40055" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40055" ref_url="https://www.suse.com/security/cve/CVE-2025-40055" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ocfs2: fix double free in user_cluster_connect()

user_cluster_disconnect() frees "conn-&gt;cc_private" which is "lc" but then
the error handling frees "lc" a second time.  Set "lc" to NULL on this
path to avoid a double free.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40055/">CVE-2025-40055 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40055">CVE-2025-40055 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252821">SUSE bug 1252821</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540056" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40056</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40056" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40056" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40056" ref_url="https://www.suse.com/security/cve/CVE-2025-40056" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vhost: vringh: Fix copy_to_iter return value check

The return value of copy_to_iter can't be negative, check whether the
copied length is equal to the requested length instead of checking for
negative values.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40056/">CVE-2025-40056 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40056">CVE-2025-40056 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252826">SUSE bug 1252826</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031708" comment="cluster-md-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031709" comment="cluster-md-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031710" comment="cluster-md-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031711" comment="dlm-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031712" comment="dlm-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031713" comment="dlm-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031714" comment="dtb-allwinner-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031715" comment="dtb-altera-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031716" comment="dtb-amazon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031717" comment="dtb-amd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031718" comment="dtb-amlogic-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031719" comment="dtb-apm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031720" comment="dtb-apple-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031721" comment="dtb-arm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031722" comment="dtb-broadcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031723" comment="dtb-cavium-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031724" comment="dtb-exynos-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031725" comment="dtb-freescale-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031726" comment="dtb-hisilicon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031727" comment="dtb-lg-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031728" comment="dtb-marvell-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031729" comment="dtb-mediatek-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031730" comment="dtb-nvidia-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031731" comment="dtb-qcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031732" comment="dtb-renesas-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031733" comment="dtb-rockchip-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031734" comment="dtb-socionext-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031735" comment="dtb-sprd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031736" comment="dtb-xilinx-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031737" comment="gfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031738" comment="gfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031739" comment="gfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031742" comment="kernel-64kb-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031743" comment="kernel-64kb-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031747" comment="kernel-default-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031748" comment="kernel-default-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031750" comment="kernel-docs-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031751" comment="kernel-docs-html-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031752" comment="kernel-kvmsmall-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031754" comment="kernel-kvmsmall-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031756" comment="kernel-obs-build-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031757" comment="kernel-obs-qa-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031760" comment="kernel-rt-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031761" comment="kernel-rt-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031762" comment="kernel-rt-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031764" comment="kernel-source-vanilla-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031765" comment="kernel-syms-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031766" comment="kernel-zfcpdump-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031767" comment="kselftests-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031768" comment="kselftests-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031769" comment="kselftests-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031770" comment="ocfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031771" comment="ocfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031772" comment="ocfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540058" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40058</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40058" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40058" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40058" ref_url="https://www.suse.com/security/cve/CVE-2025-40058" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:22405" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommu/vt-d: Disallow dirty tracking if incoherent page walk

Dirty page tracking relies on the IOMMU atomically updating the dirty bit
in the paging-structure entry. For this operation to succeed, the paging-
structure memory must be coherent between the IOMMU and the CPU. In
another word, if the iommu page walk is incoherent, dirty page tracking
doesn't work.

The Intel VT-d specification, Section 3.10 "Snoop Behavior" states:

"Remapping hardware encountering the need to atomically update A/EA/D bits
 in a paging-structure entry that is not snooped will result in a non-
 recoverable fault."

To prevent an IOMMU from being incorrectly configured for dirty page
tracking when it is operating in an incoherent mode, mark SSADS as
supported only when both ecap_slads and ecap_smpwc are supported.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40058/">CVE-2025-40058 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40058">CVE-2025-40058 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252854">SUSE bug 1252854</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031708" comment="cluster-md-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031709" comment="cluster-md-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031710" comment="cluster-md-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031711" comment="dlm-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031712" comment="dlm-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031713" comment="dlm-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031714" comment="dtb-allwinner-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031715" comment="dtb-altera-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031716" comment="dtb-amazon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031717" comment="dtb-amd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031718" comment="dtb-amlogic-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031719" comment="dtb-apm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031720" comment="dtb-apple-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031721" comment="dtb-arm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031722" comment="dtb-broadcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031723" comment="dtb-cavium-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031724" comment="dtb-exynos-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031725" comment="dtb-freescale-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031726" comment="dtb-hisilicon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031727" comment="dtb-lg-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031728" comment="dtb-marvell-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031729" comment="dtb-mediatek-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031730" comment="dtb-nvidia-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031731" comment="dtb-qcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031732" comment="dtb-renesas-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031733" comment="dtb-rockchip-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031734" comment="dtb-socionext-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031735" comment="dtb-sprd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031736" comment="dtb-xilinx-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031737" comment="gfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031738" comment="gfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031739" comment="gfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031742" comment="kernel-64kb-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031743" comment="kernel-64kb-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031747" comment="kernel-default-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031748" comment="kernel-default-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031750" comment="kernel-docs-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031751" comment="kernel-docs-html-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031752" comment="kernel-kvmsmall-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031754" comment="kernel-kvmsmall-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031756" comment="kernel-obs-build-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031757" comment="kernel-obs-qa-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031760" comment="kernel-rt-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031761" comment="kernel-rt-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031762" comment="kernel-rt-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031764" comment="kernel-source-vanilla-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031765" comment="kernel-syms-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031766" comment="kernel-zfcpdump-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031767" comment="kselftests-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031768" comment="kselftests-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031769" comment="kselftests-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031770" comment="ocfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031771" comment="ocfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031772" comment="ocfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540059" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40059</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40059" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40059" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40059" ref_url="https://www.suse.com/security/cve/CVE-2025-40059" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

coresight: Fix incorrect handling for return value of devm_kzalloc

The return value of devm_kzalloc could be an null pointer,
use "!desc.pdata" to fix incorrect handling return value
of devm_kzalloc.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40059/">CVE-2025-40059 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40059">CVE-2025-40059 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252809">SUSE bug 1252809</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540060" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40060</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40060" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40060" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40060" ref_url="https://www.suse.com/security/cve/CVE-2025-40060" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

coresight: trbe: Return NULL pointer for allocation failures

When the TRBE driver fails to allocate a buffer, it currently returns
the error code "-ENOMEM". However, the caller etm_setup_aux() only
checks for a NULL pointer, so it misses the error. As a result, the
driver continues and eventually causes a kernel panic.

Fix this by returning a NULL pointer from arm_trbe_alloc_buffer() on
allocation failures. This allows that the callers can properly handle
the failure.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40060/">CVE-2025-40060 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40060">CVE-2025-40060 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252848">SUSE bug 1252848</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031708" comment="cluster-md-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031709" comment="cluster-md-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031710" comment="cluster-md-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031711" comment="dlm-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031712" comment="dlm-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031713" comment="dlm-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031714" comment="dtb-allwinner-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031715" comment="dtb-altera-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031716" comment="dtb-amazon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031717" comment="dtb-amd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031718" comment="dtb-amlogic-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031719" comment="dtb-apm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031720" comment="dtb-apple-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031721" comment="dtb-arm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031722" comment="dtb-broadcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031723" comment="dtb-cavium-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031724" comment="dtb-exynos-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031725" comment="dtb-freescale-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031726" comment="dtb-hisilicon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031727" comment="dtb-lg-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031728" comment="dtb-marvell-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031729" comment="dtb-mediatek-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031730" comment="dtb-nvidia-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031731" comment="dtb-qcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031732" comment="dtb-renesas-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031733" comment="dtb-rockchip-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031734" comment="dtb-socionext-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031735" comment="dtb-sprd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031736" comment="dtb-xilinx-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031737" comment="gfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031738" comment="gfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031739" comment="gfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031742" comment="kernel-64kb-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031743" comment="kernel-64kb-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031747" comment="kernel-default-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031748" comment="kernel-default-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031750" comment="kernel-docs-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031751" comment="kernel-docs-html-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031752" comment="kernel-kvmsmall-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031754" comment="kernel-kvmsmall-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031756" comment="kernel-obs-build-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031757" comment="kernel-obs-qa-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031760" comment="kernel-rt-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031761" comment="kernel-rt-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031762" comment="kernel-rt-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031764" comment="kernel-source-vanilla-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031765" comment="kernel-syms-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031766" comment="kernel-zfcpdump-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031767" comment="kselftests-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031768" comment="kselftests-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031769" comment="kselftests-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031770" comment="ocfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031771" comment="ocfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031772" comment="ocfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540061" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40061</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40061" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40061" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40061" ref_url="https://www.suse.com/security/cve/CVE-2025-40061" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/rxe: Fix race in do_task() when draining

When do_task() exhausts its iteration budget (!ret), it sets the state
to TASK_STATE_IDLE to reschedule, without a secondary check on the
current task-&gt;state. This can overwrite the TASK_STATE_DRAINING state
set by a concurrent call to rxe_cleanup_task() or rxe_disable_task().

While state changes are protected by a spinlock, both rxe_cleanup_task()
and rxe_disable_task() release the lock while waiting for the task to
finish draining in the while(!is_done(task)) loop. The race occurs if
do_task() hits its iteration limit and acquires the lock in this window.
The cleanup logic may then proceed while the task incorrectly
reschedules itself, leading to a potential use-after-free.

This bug was introduced during the migration from tasklets to workqueues,
where the special handling for the draining case was lost.

Fix this by restoring the original pre-migration behavior. If the state is
TASK_STATE_DRAINING when iterations are exhausted, set cont to 1 to
force a new loop iteration. This allows the task to finish its work, so
that a subsequent iteration can reach the switch statement and correctly
transition the state to TASK_STATE_DRAINED, stopping the task as intended.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40061/">CVE-2025-40061 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40061">CVE-2025-40061 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252849">SUSE bug 1252849</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031708" comment="cluster-md-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031709" comment="cluster-md-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031710" comment="cluster-md-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031711" comment="dlm-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031712" comment="dlm-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031713" comment="dlm-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031714" comment="dtb-allwinner-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031715" comment="dtb-altera-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031716" comment="dtb-amazon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031717" comment="dtb-amd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031718" comment="dtb-amlogic-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031719" comment="dtb-apm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031720" comment="dtb-apple-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031721" comment="dtb-arm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031722" comment="dtb-broadcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031723" comment="dtb-cavium-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031724" comment="dtb-exynos-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031725" comment="dtb-freescale-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031726" comment="dtb-hisilicon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031727" comment="dtb-lg-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031728" comment="dtb-marvell-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031729" comment="dtb-mediatek-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031730" comment="dtb-nvidia-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031731" comment="dtb-qcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031732" comment="dtb-renesas-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031733" comment="dtb-rockchip-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031734" comment="dtb-socionext-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031735" comment="dtb-sprd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031736" comment="dtb-xilinx-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031737" comment="gfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031738" comment="gfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031739" comment="gfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031742" comment="kernel-64kb-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031743" comment="kernel-64kb-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031747" comment="kernel-default-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031748" comment="kernel-default-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031750" comment="kernel-docs-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031751" comment="kernel-docs-html-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031752" comment="kernel-kvmsmall-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031754" comment="kernel-kvmsmall-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031756" comment="kernel-obs-build-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031757" comment="kernel-obs-qa-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031760" comment="kernel-rt-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031761" comment="kernel-rt-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031762" comment="kernel-rt-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031764" comment="kernel-source-vanilla-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031765" comment="kernel-syms-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031766" comment="kernel-zfcpdump-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031767" comment="kselftests-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031768" comment="kselftests-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031769" comment="kselftests-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031770" comment="ocfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031771" comment="ocfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031772" comment="ocfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40062</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40062" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40062" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40062" ref_url="https://www.suse.com/security/cve/CVE-2025-40062" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: hisilicon/qm - set NULL to qm-&gt;debug.qm_diff_regs

When the initialization of qm-&gt;debug.acc_diff_reg fails,
the probe process does not exit. However, after qm-&gt;debug.qm_diff_regs is
freed, it is not set to NULL. This can lead to a double free when the
remove process attempts to free it again. Therefore, qm-&gt;debug.qm_diff_regs
should be set to NULL after it is freed.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40062/">CVE-2025-40062 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40062">CVE-2025-40062 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252850">SUSE bug 1252850</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031708" comment="cluster-md-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031709" comment="cluster-md-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031710" comment="cluster-md-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031711" comment="dlm-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031712" comment="dlm-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031713" comment="dlm-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031714" comment="dtb-allwinner-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031715" comment="dtb-altera-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031716" comment="dtb-amazon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031717" comment="dtb-amd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031718" comment="dtb-amlogic-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031719" comment="dtb-apm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031720" comment="dtb-apple-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031721" comment="dtb-arm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031722" comment="dtb-broadcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031723" comment="dtb-cavium-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031724" comment="dtb-exynos-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031725" comment="dtb-freescale-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031726" comment="dtb-hisilicon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031727" comment="dtb-lg-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031728" comment="dtb-marvell-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031729" comment="dtb-mediatek-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031730" comment="dtb-nvidia-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031731" comment="dtb-qcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031732" comment="dtb-renesas-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031733" comment="dtb-rockchip-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031734" comment="dtb-socionext-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031735" comment="dtb-sprd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031736" comment="dtb-xilinx-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031737" comment="gfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031738" comment="gfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031739" comment="gfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031742" comment="kernel-64kb-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031743" comment="kernel-64kb-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031747" comment="kernel-default-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031748" comment="kernel-default-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031750" comment="kernel-docs-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031751" comment="kernel-docs-html-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031752" comment="kernel-kvmsmall-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031754" comment="kernel-kvmsmall-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031756" comment="kernel-obs-build-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031757" comment="kernel-obs-qa-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031760" comment="kernel-rt-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031761" comment="kernel-rt-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031762" comment="kernel-rt-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031764" comment="kernel-source-vanilla-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031765" comment="kernel-syms-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031766" comment="kernel-zfcpdump-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031767" comment="kselftests-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031768" comment="kselftests-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031769" comment="kselftests-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031770" comment="ocfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031771" comment="ocfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031772" comment="ocfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40064</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40064" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40064" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40064" ref_url="https://www.suse.com/security/cve/CVE-2025-40064" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2722" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003230.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3083" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002524.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smc: Fix use-after-free in __pnet_find_base_ndev().

syzbot reported use-after-free of net_device in __pnet_find_base_ndev(),
which was called during connect(). [0]

smc_pnet_find_ism_resource() fetches sk_dst_get(sk)-&gt;dev and passes
down to pnet_find_base_ndev(), where RTNL is held.  Then, UAF happened
at __pnet_find_base_ndev() when the dev is first used.

This means dev had already been freed before acquiring RTNL in
pnet_find_base_ndev().

While dev is going away, dst-&gt;dev could be swapped with blackhole_netdev,
and the dev's refcnt by dst will be released.

We must hold dev's refcnt before calling smc_pnet_find_ism_resource().

Also, smc_pnet_find_roce_resource() has the same problem.

Let's use __sk_dst_get() and dst_dev_rcu() in the two functions.

[0]:
BUG: KASAN: use-after-free in __pnet_find_base_ndev+0x1b1/0x1c0 net/smc/smc_pnet.c:926
Read of size 1 at addr ffff888036bac33a by task syz.0.3632/18609

CPU: 1 UID: 0 PID: 18609 Comm: syz.0.3632 Not tainted syzkaller #0 PREEMPT(full)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120
 print_address_description mm/kasan/report.c:378 [inline]
 print_report+0xca/0x240 mm/kasan/report.c:482
 kasan_report+0x118/0x150 mm/kasan/report.c:595
 __pnet_find_base_ndev+0x1b1/0x1c0 net/smc/smc_pnet.c:926
 pnet_find_base_ndev net/smc/smc_pnet.c:946 [inline]
 smc_pnet_find_ism_by_pnetid net/smc/smc_pnet.c:1103 [inline]
 smc_pnet_find_ism_resource+0xef/0x390 net/smc/smc_pnet.c:1154
 smc_find_ism_device net/smc/af_smc.c:1030 [inline]
 smc_find_proposal_devices net/smc/af_smc.c:1115 [inline]
 __smc_connect+0x372/0x1890 net/smc/af_smc.c:1545
 smc_connect+0x877/0xd90 net/smc/af_smc.c:1715
 __sys_connect_file net/socket.c:2086 [inline]
 __sys_connect+0x313/0x440 net/socket.c:2105
 __do_sys_connect net/socket.c:2111 [inline]
 __se_sys_connect net/socket.c:2108 [inline]
 __x64_sys_connect+0x7a/0x90 net/socket.c:2108
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f47cbf8eba9
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f47ccdb1038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a
RAX: ffffffffffffffda RBX: 00007f47cc1d5fa0 RCX: 00007f47cbf8eba9
RDX: 0000000000000010 RSI: 0000200000000280 RDI: 000000000000000b
RBP: 00007f47cc011e19 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007f47cc1d6038 R14: 00007f47cc1d5fa0 R15: 00007ffc512f8aa8
 &lt;/TASK&gt;

The buggy address belongs to the physical page:
page: refcount:0 mapcount:0 mapping:0000000000000000 index:0xffff888036bacd00 pfn:0x36bac
flags: 0xfff00000000000(node=0|zone=1|lastcpupid=0x7ff)
raw: 00fff00000000000 ffffea0001243d08 ffff8880b863fdc0 0000000000000000
raw: ffff888036bacd00 0000000000000000 00000000ffffffff 0000000000000000
page dumped because: kasan: bad access detected
page_owner tracks the page as freed
page last allocated via order 2, migratetype Unmovable, gfp_mask 0x446dc0(GFP_KERNEL_ACCOUNT|__GFP_ZERO|__GFP_NOWARN|__GFP_RETRY_MAYFAIL|__GFP_COMP), pid 16741, tgid 16741 (syz-executor), ts 343313197788, free_ts 380670750466
 set_page_owner include/linux/page_owner.h:32 [inline]
 post_alloc_hook+0x240/0x2a0 mm/page_alloc.c:1851
 prep_new_page mm/page_alloc.c:1859 [inline]
 get_page_from_freelist+0x21e4/0x22c0 mm/page_alloc.c:3858
 __alloc_frozen_pages_noprof+0x181/0x370 mm/page_alloc.c:5148
 alloc_pages_mpol+0x232/0x4a0 mm/mempolicy.c:2416
 ___kmalloc_large_node+0x5f/0x1b0 mm/slub.c:4317
 __kmalloc_large_node_noprof+0x18/0x90 mm/slub.c:4348
 __do_kmalloc_node mm/slub.c:4364 [inline]
 __kvmalloc_node
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40064/">CVE-2025-40064 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40064">CVE-2025-40064 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252845">SUSE bug 1252845</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540070" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40070</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40070" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40070" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40070" ref_url="https://www.suse.com/security/cve/CVE-2025-40070" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pps: fix warning in pps_register_cdev when register device fail

Similar to previous commit 2a934fdb01db ("media: v4l2-dev: fix error
handling in __video_register_device()"), the release hook should be set
before device_register(). Otherwise, when device_register() return error
and put_device() try to callback the release function, the below warning
may happen.

  ------------[ cut here ]------------
  WARNING: CPU: 1 PID: 4760 at drivers/base/core.c:2567 device_release+0x1bd/0x240 drivers/base/core.c:2567
  Modules linked in:
  CPU: 1 UID: 0 PID: 4760 Comm: syz.4.914 Not tainted 6.17.0-rc3+ #1 NONE
  RIP: 0010:device_release+0x1bd/0x240 drivers/base/core.c:2567
  Call Trace:
   &lt;TASK&gt;
   kobject_cleanup+0x136/0x410 lib/kobject.c:689
   kobject_release lib/kobject.c:720 [inline]
   kref_put include/linux/kref.h:65 [inline]
   kobject_put+0xe9/0x130 lib/kobject.c:737
   put_device+0x24/0x30 drivers/base/core.c:3797
   pps_register_cdev+0x2da/0x370 drivers/pps/pps.c:402
   pps_register_source+0x2f6/0x480 drivers/pps/kapi.c:108
   pps_tty_open+0x190/0x310 drivers/pps/clients/pps-ldisc.c:57
   tty_ldisc_open+0xa7/0x120 drivers/tty/tty_ldisc.c:432
   tty_set_ldisc+0x333/0x780 drivers/tty/tty_ldisc.c:563
   tiocsetd drivers/tty/tty_io.c:2429 [inline]
   tty_ioctl+0x5d1/0x1700 drivers/tty/tty_io.c:2728
   vfs_ioctl fs/ioctl.c:51 [inline]
   __do_sys_ioctl fs/ioctl.c:598 [inline]
   __se_sys_ioctl fs/ioctl.c:584 [inline]
   __x64_sys_ioctl+0x194/0x210 fs/ioctl.c:584
   do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
   do_syscall_64+0x5f/0x2a0 arch/x86/entry/syscall_64.c:94
   entry_SYSCALL_64_after_hwframe+0x76/0x7e
   &lt;/TASK&gt;

Before commit c79a39dc8d06 ("pps: Fix a use-after-free"),
pps_register_cdev() call device_create() to create pps-&gt;dev, which will
init dev-&gt;release to device_create_release(). Now the comment is outdated,
just remove it.

Thanks for the reminder from Calvin Owens, 'kfree_pps' should be removed
in pps_register_source() to avoid a double free in the failure case.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40070/">CVE-2025-40070 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40070">CVE-2025-40070 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252836">SUSE bug 1252836</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540071" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40071</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40071" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40071" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40071" ref_url="https://www.suse.com/security/cve/CVE-2025-40071" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tty: n_gsm: Don't block input queue by waiting MSC

Currently gsm_queue() processes incoming frames and when opening
a DLC channel it calls gsm_dlci_open() which calls gsm_modem_update().
If basic mode is used it calls gsm_modem_upd_via_msc() and it
cannot block the input queue by waiting the response to come
into the same input queue.

Instead allow sending Modem Status Command without waiting for remote
end to respond. Define a new function gsm_modem_send_initial_msc()
for this purpose. As MSC is only valid for basic encoding, it does
not do anything for advanced or when convergence layer type 2 is used.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40071/">CVE-2025-40071 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40071">CVE-2025-40071 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252797">SUSE bug 1252797</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031708" comment="cluster-md-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031709" comment="cluster-md-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031710" comment="cluster-md-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031711" comment="dlm-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031712" comment="dlm-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031713" comment="dlm-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031714" comment="dtb-allwinner-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031715" comment="dtb-altera-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031716" comment="dtb-amazon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031717" comment="dtb-amd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031718" comment="dtb-amlogic-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031719" comment="dtb-apm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031720" comment="dtb-apple-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031721" comment="dtb-arm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031722" comment="dtb-broadcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031723" comment="dtb-cavium-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031724" comment="dtb-exynos-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031725" comment="dtb-freescale-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031726" comment="dtb-hisilicon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031727" comment="dtb-lg-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031728" comment="dtb-marvell-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031729" comment="dtb-mediatek-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031730" comment="dtb-nvidia-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031731" comment="dtb-qcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031732" comment="dtb-renesas-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031733" comment="dtb-rockchip-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031734" comment="dtb-socionext-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031735" comment="dtb-sprd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031736" comment="dtb-xilinx-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031737" comment="gfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031738" comment="gfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031739" comment="gfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031742" comment="kernel-64kb-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031743" comment="kernel-64kb-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031747" comment="kernel-default-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031748" comment="kernel-default-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031750" comment="kernel-docs-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031751" comment="kernel-docs-html-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031752" comment="kernel-kvmsmall-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031754" comment="kernel-kvmsmall-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031756" comment="kernel-obs-build-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031757" comment="kernel-obs-qa-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031760" comment="kernel-rt-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031761" comment="kernel-rt-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031762" comment="kernel-rt-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031764" comment="kernel-source-vanilla-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031765" comment="kernel-syms-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031766" comment="kernel-zfcpdump-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031767" comment="kselftests-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031768" comment="kselftests-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031769" comment="kselftests-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031770" comment="ocfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031771" comment="ocfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031772" comment="ocfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40074</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40074" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40074" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40074" ref_url="https://www.suse.com/security/cve/CVE-2025-40074" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv4: start using dst_dev_rcu()

Change icmpv4_xrlim_allow(), ip_defrag() to prevent possible UAF.

Change ipmr_prepare_xmit(), ipmr_queue_fwd_xmit(), ip_mr_output(),
ipv4_neigh_lookup() to use lockdep enabled dst_dev_rcu().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40074/">CVE-2025-40074 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40074">CVE-2025-40074 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252794">SUSE bug 1252794</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40075</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40075" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40075" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40075" ref_url="https://www.suse.com/security/cve/CVE-2025-40075" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tcp_metrics: use dst_dev_net_rcu()

Replace three dst_dev() with a lockdep enabled helper.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40075/">CVE-2025-40075 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40075">CVE-2025-40075 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252795">SUSE bug 1252795</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40078</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40078" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40078" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40078" ref_url="https://www.suse.com/security/cve/CVE-2025-40078" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Explicitly check accesses to bpf_sock_addr

Syzkaller found a kernel warning on the following sock_addr program:

    0: r0 = 0
    1: r2 = *(u32 *)(r1 +60)
    2: exit

which triggers:

    verifier bug: error during ctx access conversion (0)

This is happening because offset 60 in bpf_sock_addr corresponds to an
implicit padding of 4 bytes, right after msg_src_ip4. Access to this
padding isn't rejected in sock_addr_is_valid_access and it thus later
fails to convert the access.

This patch fixes it by explicitly checking the various fields of
bpf_sock_addr in sock_addr_is_valid_access.

I checked the other ctx structures and is_valid_access functions and
didn't find any other similar cases. Other cases of (properly handled)
padding are covered in new tests in a subsequent patch.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40078/">CVE-2025-40078 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40078">CVE-2025-40078 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252789">SUSE bug 1252789</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031708" comment="cluster-md-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031709" comment="cluster-md-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031710" comment="cluster-md-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031711" comment="dlm-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031712" comment="dlm-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031713" comment="dlm-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031714" comment="dtb-allwinner-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031715" comment="dtb-altera-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031716" comment="dtb-amazon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031717" comment="dtb-amd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031718" comment="dtb-amlogic-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031719" comment="dtb-apm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031720" comment="dtb-apple-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031721" comment="dtb-arm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031722" comment="dtb-broadcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031723" comment="dtb-cavium-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031724" comment="dtb-exynos-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031725" comment="dtb-freescale-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031726" comment="dtb-hisilicon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031727" comment="dtb-lg-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031728" comment="dtb-marvell-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031729" comment="dtb-mediatek-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031730" comment="dtb-nvidia-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031731" comment="dtb-qcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031732" comment="dtb-renesas-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031733" comment="dtb-rockchip-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031734" comment="dtb-socionext-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031735" comment="dtb-sprd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031736" comment="dtb-xilinx-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031737" comment="gfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031738" comment="gfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031739" comment="gfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031742" comment="kernel-64kb-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031743" comment="kernel-64kb-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031747" comment="kernel-default-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031748" comment="kernel-default-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031750" comment="kernel-docs-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031751" comment="kernel-docs-html-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031752" comment="kernel-kvmsmall-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031754" comment="kernel-kvmsmall-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031756" comment="kernel-obs-build-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031757" comment="kernel-obs-qa-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031760" comment="kernel-rt-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031761" comment="kernel-rt-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031762" comment="kernel-rt-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031764" comment="kernel-source-vanilla-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031765" comment="kernel-syms-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031766" comment="kernel-zfcpdump-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031767" comment="kselftests-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031768" comment="kselftests-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031769" comment="kselftests-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031770" comment="ocfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031771" comment="ocfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031772" comment="ocfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540080" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40080</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40080" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40080" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40080" ref_url="https://www.suse.com/security/cve/CVE-2025-40080" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nbd: restrict sockets to TCP and UDP

Recently, syzbot started to abuse NBD with all kinds of sockets.

Commit cf1b2326b734 ("nbd: verify socket is supported during setup")
made sure the socket supported a shutdown() method.

Explicitely accept TCP and UNIX stream sockets.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40080/">CVE-2025-40080 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40080">CVE-2025-40080 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252774">SUSE bug 1252774</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031708" comment="cluster-md-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031709" comment="cluster-md-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031710" comment="cluster-md-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031711" comment="dlm-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031712" comment="dlm-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031713" comment="dlm-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031714" comment="dtb-allwinner-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031715" comment="dtb-altera-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031716" comment="dtb-amazon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031717" comment="dtb-amd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031718" comment="dtb-amlogic-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031719" comment="dtb-apm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031720" comment="dtb-apple-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031721" comment="dtb-arm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031722" comment="dtb-broadcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031723" comment="dtb-cavium-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031724" comment="dtb-exynos-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031725" comment="dtb-freescale-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031726" comment="dtb-hisilicon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031727" comment="dtb-lg-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031728" comment="dtb-marvell-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031729" comment="dtb-mediatek-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031730" comment="dtb-nvidia-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031731" comment="dtb-qcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031732" comment="dtb-renesas-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031733" comment="dtb-rockchip-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031734" comment="dtb-socionext-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031735" comment="dtb-sprd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031736" comment="dtb-xilinx-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031737" comment="gfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031738" comment="gfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031739" comment="gfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031742" comment="kernel-64kb-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031743" comment="kernel-64kb-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031747" comment="kernel-default-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031748" comment="kernel-default-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031750" comment="kernel-docs-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031751" comment="kernel-docs-html-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031752" comment="kernel-kvmsmall-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031754" comment="kernel-kvmsmall-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031756" comment="kernel-obs-build-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031757" comment="kernel-obs-qa-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031760" comment="kernel-rt-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031761" comment="kernel-rt-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031762" comment="kernel-rt-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031764" comment="kernel-source-vanilla-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031765" comment="kernel-syms-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031766" comment="kernel-zfcpdump-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031767" comment="kselftests-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031768" comment="kselftests-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031769" comment="kselftests-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031770" comment="ocfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031771" comment="ocfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031772" comment="ocfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40081</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40081" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40081" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40081" ref_url="https://www.suse.com/security/cve/CVE-2025-40081" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

perf: arm_spe: Prevent overflow in PERF_IDX2OFF()

Cast nr_pages to unsigned long to avoid overflow when handling large
AUX buffer sizes (&gt;= 2 GiB).
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40081/">CVE-2025-40081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40081">CVE-2025-40081 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252776">SUSE bug 1252776</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40083</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40083" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40083" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40083" ref_url="https://www.suse.com/security/cve/CVE-2025-40083" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: sch_qfq: Fix null-deref in agg_dequeue

To prevent a potential crash in agg_dequeue (net/sched/sch_qfq.c)
when cl-&gt;qdisc-&gt;ops-&gt;peek(cl-&gt;qdisc) returns NULL, we check the return
value before using it, similar to the existing approach in sch_hfsc.c.

To avoid code duplication, the following changes are made:

1. Changed qdisc_warn_nonwc(include/net/pkt_sched.h) into a static
inline function.

2. Moved qdisc_peek_len from net/sched/sch_hfsc.c to
include/net/pkt_sched.h so that sch_qfq can reuse it.

3. Applied qdisc_peek_len in agg_dequeue to avoid crashing.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40083/">CVE-2025-40083 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40083">CVE-2025-40083 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252912">SUSE bug 1252912</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540085" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40085</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40085" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40085" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40085" ref_url="https://www.suse.com/security/cve/CVE-2025-40085" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: usb-audio: Fix NULL pointer deference in try_to_register_card

In try_to_register_card(), the return value of usb_ifnum_to_if() is
passed directly to usb_interface_claimed() without a NULL check, which
will lead to a NULL pointer dereference when creating an invalid
USB audio device. Fix this by adding a check to ensure the interface
pointer is valid before passing it to usb_interface_claimed().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40085/">CVE-2025-40085 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40085">CVE-2025-40085 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252873">SUSE bug 1252873</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031708" comment="cluster-md-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031709" comment="cluster-md-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031710" comment="cluster-md-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031711" comment="dlm-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031712" comment="dlm-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031713" comment="dlm-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031714" comment="dtb-allwinner-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031715" comment="dtb-altera-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031716" comment="dtb-amazon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031717" comment="dtb-amd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031718" comment="dtb-amlogic-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031719" comment="dtb-apm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031720" comment="dtb-apple-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031721" comment="dtb-arm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031722" comment="dtb-broadcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031723" comment="dtb-cavium-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031724" comment="dtb-exynos-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031725" comment="dtb-freescale-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031726" comment="dtb-hisilicon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031727" comment="dtb-lg-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031728" comment="dtb-marvell-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031729" comment="dtb-mediatek-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031730" comment="dtb-nvidia-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031731" comment="dtb-qcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031732" comment="dtb-renesas-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031733" comment="dtb-rockchip-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031734" comment="dtb-socionext-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031735" comment="dtb-sprd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031736" comment="dtb-xilinx-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031737" comment="gfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031738" comment="gfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031739" comment="gfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031742" comment="kernel-64kb-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031743" comment="kernel-64kb-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031747" comment="kernel-default-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031748" comment="kernel-default-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031750" comment="kernel-docs-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031751" comment="kernel-docs-html-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031752" comment="kernel-kvmsmall-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031754" comment="kernel-kvmsmall-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031756" comment="kernel-obs-build-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031757" comment="kernel-obs-qa-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031760" comment="kernel-rt-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031761" comment="kernel-rt-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031762" comment="kernel-rt-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031764" comment="kernel-source-vanilla-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031765" comment="kernel-syms-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031766" comment="kernel-zfcpdump-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031767" comment="kselftests-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031768" comment="kselftests-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031769" comment="kselftests-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031770" comment="ocfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031771" comment="ocfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031772" comment="ocfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540086" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40086</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40086" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40086" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40086" ref_url="https://www.suse.com/security/cve/CVE-2025-40086" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/xe: Don't allow evicting of BOs in same VM in array of VM binds

An array of VM binds can potentially evict other buffer objects (BOs)
within the same VM under certain conditions, which may lead to NULL
pointer dereferences later in the bind pipeline. To prevent this, clear
the allow_res_evict flag in the xe_bo_validate call.

v2:
 - Invert polarity of no_res_evict (Thomas)
 - Add comment in code explaining issue (Thomas)

(cherry picked from commit 8b9ba8d6d95fe75fed6b0480bb03da4b321bea08)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40086/">CVE-2025-40086 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40086">CVE-2025-40086 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252923">SUSE bug 1252923</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540087" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40087</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40087" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40087" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40087" ref_url="https://www.suse.com/security/cve/CVE-2025-40087" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFSD: Define a proc_layoutcommit for the FlexFiles layout type

Avoid a crash if a pNFS client should happen to send a LAYOUTCOMMIT
operation on a FlexFiles layout.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40087/">CVE-2025-40087 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40087">CVE-2025-40087 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252909">SUSE bug 1252909</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031708" comment="cluster-md-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031709" comment="cluster-md-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031710" comment="cluster-md-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031711" comment="dlm-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031712" comment="dlm-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031713" comment="dlm-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031714" comment="dtb-allwinner-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031715" comment="dtb-altera-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031716" comment="dtb-amazon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031717" comment="dtb-amd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031718" comment="dtb-amlogic-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031719" comment="dtb-apm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031720" comment="dtb-apple-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031721" comment="dtb-arm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031722" comment="dtb-broadcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031723" comment="dtb-cavium-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031724" comment="dtb-exynos-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031725" comment="dtb-freescale-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031726" comment="dtb-hisilicon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031727" comment="dtb-lg-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031728" comment="dtb-marvell-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031729" comment="dtb-mediatek-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031730" comment="dtb-nvidia-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031731" comment="dtb-qcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031732" comment="dtb-renesas-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031733" comment="dtb-rockchip-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031734" comment="dtb-socionext-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031735" comment="dtb-sprd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031736" comment="dtb-xilinx-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031737" comment="gfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031738" comment="gfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031739" comment="gfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031742" comment="kernel-64kb-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031743" comment="kernel-64kb-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031747" comment="kernel-default-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031748" comment="kernel-default-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031750" comment="kernel-docs-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031751" comment="kernel-docs-html-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031752" comment="kernel-kvmsmall-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031754" comment="kernel-kvmsmall-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031756" comment="kernel-obs-build-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031757" comment="kernel-obs-qa-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031760" comment="kernel-rt-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031761" comment="kernel-rt-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031762" comment="kernel-rt-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031764" comment="kernel-source-vanilla-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031765" comment="kernel-syms-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031766" comment="kernel-zfcpdump-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031767" comment="kselftests-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031768" comment="kselftests-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031769" comment="kselftests-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031770" comment="ocfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031771" comment="ocfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031772" comment="ocfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540091" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40091</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40091" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40091" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40091" ref_url="https://www.suse.com/security/cve/CVE-2025-40091" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ixgbe: fix too early devlink_free() in ixgbe_remove()

Since ixgbe_adapter is embedded in devlink, calling devlink_free()
prematurely in the ixgbe_remove() path can lead to UAF. Move devlink_free()
to the end.

KASAN report:

 BUG: KASAN: use-after-free in ixgbe_reset_interrupt_capability+0x140/0x180 [ixgbe]
 Read of size 8 at addr ffff0000adf813e0 by task bash/2095
 CPU: 1 UID: 0 PID: 2095 Comm: bash Tainted: G S  6.17.0-rc2-tnguy.net-queue+ #1 PREEMPT(full)
 [...]
 Call trace:
  show_stack+0x30/0x90 (C)
  dump_stack_lvl+0x9c/0xd0
  print_address_description.constprop.0+0x90/0x310
  print_report+0x104/0x1f0
  kasan_report+0x88/0x180
  __asan_report_load8_noabort+0x20/0x30
  ixgbe_reset_interrupt_capability+0x140/0x180 [ixgbe]
  ixgbe_clear_interrupt_scheme+0xf8/0x130 [ixgbe]
  ixgbe_remove+0x2d0/0x8c0 [ixgbe]
  pci_device_remove+0xa0/0x220
  device_remove+0xb8/0x170
  device_release_driver_internal+0x318/0x490
  device_driver_detach+0x40/0x68
  unbind_store+0xec/0x118
  drv_attr_store+0x64/0xb8
  sysfs_kf_write+0xcc/0x138
  kernfs_fop_write_iter+0x294/0x440
  new_sync_write+0x1fc/0x588
  vfs_write+0x480/0x6a0
  ksys_write+0xf0/0x1e0
  __arm64_sys_write+0x70/0xc0
  invoke_syscall.constprop.0+0xcc/0x280
  el0_svc_common.constprop.0+0xa8/0x248
  do_el0_svc+0x44/0x68
  el0_svc+0x54/0x160
  el0t_64_sync_handler+0xa0/0xe8
  el0t_64_sync+0x1b0/0x1b8
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40091/">CVE-2025-40091 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40091">CVE-2025-40091 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252915">SUSE bug 1252915</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031708" comment="cluster-md-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031709" comment="cluster-md-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031710" comment="cluster-md-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031711" comment="dlm-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031712" comment="dlm-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031713" comment="dlm-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031714" comment="dtb-allwinner-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031715" comment="dtb-altera-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031716" comment="dtb-amazon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031717" comment="dtb-amd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031718" comment="dtb-amlogic-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031719" comment="dtb-apm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031720" comment="dtb-apple-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031721" comment="dtb-arm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031722" comment="dtb-broadcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031723" comment="dtb-cavium-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031724" comment="dtb-exynos-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031725" comment="dtb-freescale-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031726" comment="dtb-hisilicon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031727" comment="dtb-lg-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031728" comment="dtb-marvell-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031729" comment="dtb-mediatek-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031730" comment="dtb-nvidia-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031731" comment="dtb-qcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031732" comment="dtb-renesas-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031733" comment="dtb-rockchip-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031734" comment="dtb-socionext-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031735" comment="dtb-sprd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031736" comment="dtb-xilinx-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031737" comment="gfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031738" comment="gfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031739" comment="gfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031742" comment="kernel-64kb-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031743" comment="kernel-64kb-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031747" comment="kernel-default-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031748" comment="kernel-default-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031750" comment="kernel-docs-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031751" comment="kernel-docs-html-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031752" comment="kernel-kvmsmall-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031754" comment="kernel-kvmsmall-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031756" comment="kernel-obs-build-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031757" comment="kernel-obs-qa-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031760" comment="kernel-rt-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031761" comment="kernel-rt-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031762" comment="kernel-rt-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031764" comment="kernel-source-vanilla-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031765" comment="kernel-syms-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031766" comment="kernel-zfcpdump-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031767" comment="kselftests-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031768" comment="kselftests-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031769" comment="kselftests-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031770" comment="ocfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031771" comment="ocfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031772" comment="ocfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540096" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40096</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40096" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40096" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40096" ref_url="https://www.suse.com/security/cve/CVE-2025-40096" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0759" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002404.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6153" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/sched: Fix potential double free in drm_sched_job_add_resv_dependencies

When adding dependencies with drm_sched_job_add_dependency(), that
function consumes the fence reference both on success and failure, so in
the latter case the dma_fence_put() on the error path (xarray failed to
expand) is a double free.

Interestingly this bug appears to have been present ever since
commit ebd5f74255b9 ("drm/sched: Add dependency tracking"), since the code
back then looked like this:

drm_sched_job_add_implicit_dependencies():
...
       for (i = 0; i &lt; fence_count; i++) {
               ret = drm_sched_job_add_dependency(job, fences[i]);
               if (ret)
                       break;
       }

       for (; i &lt; fence_count; i++)
               dma_fence_put(fences[i]);

Which means for the failing 'i' the dma_fence_put was already a double
free. Possibly there were no users at that time, or the test cases were
insufficient to hit it.

The bug was then only noticed and fixed after
commit 9c2ba265352a ("drm/scheduler: use new iterator in drm_sched_job_add_implicit_dependencies v2")
landed, with its fixup of
commit 4eaf02d6076c ("drm/scheduler: fix drm_sched_job_add_implicit_dependencies").

At that point it was a slightly different flavour of a double free, which
commit 963d0b356935 ("drm/scheduler: fix drm_sched_job_add_implicit_dependencies harder")
noticed and attempted to fix.

But it only moved the double free from happening inside the
drm_sched_job_add_dependency(), when releasing the reference not yet
obtained, to the caller, when releasing the reference already released by
the former in the failure case.

As such it is not easy to identify the right target for the fixes tag so
lets keep it simple and just continue the chain.

While fixing we also improve the comment and explain the reason for taking
the reference and not dropping it.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40096/">CVE-2025-40096 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40096">CVE-2025-40096 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252902">SUSE bug 1252902</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031708" comment="cluster-md-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031709" comment="cluster-md-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031710" comment="cluster-md-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031711" comment="dlm-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031712" comment="dlm-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031713" comment="dlm-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031714" comment="dtb-allwinner-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031715" comment="dtb-altera-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031716" comment="dtb-amazon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031717" comment="dtb-amd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031718" comment="dtb-amlogic-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031719" comment="dtb-apm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031720" comment="dtb-apple-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031721" comment="dtb-arm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031722" comment="dtb-broadcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031723" comment="dtb-cavium-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031724" comment="dtb-exynos-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031725" comment="dtb-freescale-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031726" comment="dtb-hisilicon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031727" comment="dtb-lg-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031728" comment="dtb-marvell-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031729" comment="dtb-mediatek-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031730" comment="dtb-nvidia-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031731" comment="dtb-qcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031732" comment="dtb-renesas-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031733" comment="dtb-rockchip-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031734" comment="dtb-socionext-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031735" comment="dtb-sprd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031736" comment="dtb-xilinx-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031737" comment="gfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031738" comment="gfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031739" comment="gfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031742" comment="kernel-64kb-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031743" comment="kernel-64kb-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031747" comment="kernel-default-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031748" comment="kernel-default-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031750" comment="kernel-docs-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031751" comment="kernel-docs-html-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031752" comment="kernel-kvmsmall-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031754" comment="kernel-kvmsmall-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031756" comment="kernel-obs-build-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031757" comment="kernel-obs-qa-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031760" comment="kernel-rt-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031761" comment="kernel-rt-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031762" comment="kernel-rt-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031764" comment="kernel-source-vanilla-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031765" comment="kernel-syms-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031766" comment="kernel-zfcpdump-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031767" comment="kselftests-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031768" comment="kselftests-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031769" comment="kselftests-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031770" comment="ocfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031771" comment="ocfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031772" comment="ocfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40097</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40097" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40097" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40097" ref_url="https://www.suse.com/security/cve/CVE-2025-40097" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: hda: Fix missing pointer check in hda_component_manager_init function

The __component_match_add function may assign the 'matchptr' pointer
the value ERR_PTR(-ENOMEM), which will subsequently be dereferenced.

The call stack leading to the error looks like this:

hda_component_manager_init
|-&gt; component_match_add
    |-&gt; component_match_add_release
        |-&gt; __component_match_add ( ... ,**matchptr, ... )
            |-&gt; *matchptr = ERR_PTR(-ENOMEM);       // assign
|-&gt; component_master_add_with_match( ...  match)
    |-&gt; component_match_realloc(match, match-&gt;num); // dereference

Add IS_ERR() check to prevent the crash.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40097/">CVE-2025-40097 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40097">CVE-2025-40097 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252900">SUSE bug 1252900</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40098</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40098" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40098" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40098" ref_url="https://www.suse.com/security/cve/CVE-2025-40098" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_get_acpi_mute_state()

Return value of a function acpi_evaluate_dsm() is dereferenced  without
checking for NULL, but it is usually checked for this function.

acpi_evaluate_dsm() may return NULL, when acpi_evaluate_object() returns
acpi_status other than ACPI_SUCCESS, so add a check to prevent the crach.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40098/">CVE-2025-40098 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40098">CVE-2025-40098 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252917">SUSE bug 1252917</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540099" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40099</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40099" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40099" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40099" ref_url="https://www.suse.com/security/cve/CVE-2025-40099" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cifs: parse_dfs_referrals: prevent oob on malformed input

Malicious SMB server can send invalid reply to FSCTL_DFS_GET_REFERRALS

- reply smaller than sizeof(struct get_dfs_referral_rsp)
- reply with number of referrals smaller than NumberOfReferrals in the
header

Processing of such replies will cause oob.

Return -EINVAL error on such replies to prevent oob-s.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40099/">CVE-2025-40099 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40099">CVE-2025-40099 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252911">SUSE bug 1252911</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540100" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40100</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40100" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40100" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40100" ref_url="https://www.suse.com/security/cve/CVE-2025-40100" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: do not assert we found block group item when creating free space tree

Currently, when building a free space tree at populate_free_space_tree(),
if we are not using the block group tree feature, we always expect to find
block group items (either extent items or a block group item with key type
BTRFS_BLOCK_GROUP_ITEM_KEY) when we search the extent tree with
btrfs_search_slot_for_read(), so we assert that we found an item. However
this expectation is wrong since we can have a new block group created in
the current transaction which is still empty and for which we still have
not added the block group's item to the extent tree, in which case we do
not have any items in the extent tree associated to the block group.

The insertion of a new block group's block group item in the extent tree
happens at btrfs_create_pending_block_groups() when it calls the helper
insert_block_group_item(). This typically is done when a transaction
handle is released, committed or when running delayed refs (either as
part of a transaction commit or when serving tickets for space reservation
if we are low on free space).

So remove the assertion at populate_free_space_tree() even when the block
group tree feature is not enabled and update the comment to mention this
case.

Syzbot reported this with the following stack trace:

  BTRFS info (device loop3 state M): rebuilding free space tree
  assertion failed: ret == 0 :: 0, in fs/btrfs/free-space-tree.c:1115
  ------------[ cut here ]------------
  kernel BUG at fs/btrfs/free-space-tree.c:1115!
  Oops: invalid opcode: 0000 [#1] SMP KASAN PTI
  CPU: 1 UID: 0 PID: 6352 Comm: syz.3.25 Not tainted syzkaller #0 PREEMPT(full)
  Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025
  RIP: 0010:populate_free_space_tree+0x700/0x710 fs/btrfs/free-space-tree.c:1115
  Code: ff ff e8 d3 (...)
  RSP: 0018:ffffc9000430f780 EFLAGS: 00010246
  RAX: 0000000000000043 RBX: ffff88805b709630 RCX: fea61d0e2e79d000
  RDX: 0000000000000000 RSI: 0000000080000000 RDI: 0000000000000000
  RBP: ffffc9000430f8b0 R08: ffffc9000430f4a7 R09: 1ffff92000861e94
  R10: dffffc0000000000 R11: fffff52000861e95 R12: 0000000000000001
  R13: 1ffff92000861f00 R14: dffffc0000000000 R15: 0000000000000000
  FS:  00007f424d9fe6c0(0000) GS:ffff888125afc000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: 00007fd78ad212c0 CR3: 0000000076d68000 CR4: 00000000003526f0
  Call Trace:
   &lt;TASK&gt;
   btrfs_rebuild_free_space_tree+0x1ba/0x6d0 fs/btrfs/free-space-tree.c:1364
   btrfs_start_pre_rw_mount+0x128f/0x1bf0 fs/btrfs/disk-io.c:3062
   btrfs_remount_rw fs/btrfs/super.c:1334 [inline]
   btrfs_reconfigure+0xaed/0x2160 fs/btrfs/super.c:1559
   reconfigure_super+0x227/0x890 fs/super.c:1076
   do_remount fs/namespace.c:3279 [inline]
   path_mount+0xd1a/0xfe0 fs/namespace.c:4027
   do_mount fs/namespace.c:4048 [inline]
   __do_sys_mount fs/namespace.c:4236 [inline]
   __se_sys_mount+0x313/0x410 fs/namespace.c:4213
   do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
   do_syscall_64+0xfa/0xfa0 arch/x86/entry/syscall_64.c:94
   entry_SYSCALL_64_after_hwframe+0x77/0x7f
   RIP: 0033:0x7f424e39066a
  Code: d8 64 89 02 (...)
  RSP: 002b:00007f424d9fde68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5
  RAX: ffffffffffffffda RBX: 00007f424d9fdef0 RCX: 00007f424e39066a
  RDX: 0000200000000180 RSI: 0000200000000380 RDI: 0000000000000000
  RBP: 0000200000000180 R08: 00007f424d9fdef0 R09: 0000000000000020
  R10: 0000000000000020 R11: 0000000000000246 R12: 0000200000000380
  R13: 00007f424d9fdeb0 R14: 0000000000000000 R15: 00002000000002c0
   &lt;/TASK&gt;
  Modules linked in:
  ---[ end trace 0000000000000000 ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40100/">CVE-2025-40100 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40100">CVE-2025-40100 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252918">SUSE bug 1252918</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031708" comment="cluster-md-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031709" comment="cluster-md-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031710" comment="cluster-md-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031711" comment="dlm-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031712" comment="dlm-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031713" comment="dlm-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031714" comment="dtb-allwinner-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031715" comment="dtb-altera-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031716" comment="dtb-amazon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031717" comment="dtb-amd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031718" comment="dtb-amlogic-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031719" comment="dtb-apm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031720" comment="dtb-apple-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031721" comment="dtb-arm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031722" comment="dtb-broadcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031723" comment="dtb-cavium-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031724" comment="dtb-exynos-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031725" comment="dtb-freescale-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031726" comment="dtb-hisilicon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031727" comment="dtb-lg-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031728" comment="dtb-marvell-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031729" comment="dtb-mediatek-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031730" comment="dtb-nvidia-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031731" comment="dtb-qcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031732" comment="dtb-renesas-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031733" comment="dtb-rockchip-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031734" comment="dtb-socionext-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031735" comment="dtb-sprd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031736" comment="dtb-xilinx-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031737" comment="gfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031738" comment="gfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031739" comment="gfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031742" comment="kernel-64kb-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031743" comment="kernel-64kb-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031747" comment="kernel-default-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031748" comment="kernel-default-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031750" comment="kernel-docs-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031751" comment="kernel-docs-html-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031752" comment="kernel-kvmsmall-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031754" comment="kernel-kvmsmall-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031756" comment="kernel-obs-build-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031757" comment="kernel-obs-qa-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031760" comment="kernel-rt-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031761" comment="kernel-rt-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031762" comment="kernel-rt-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031764" comment="kernel-source-vanilla-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031765" comment="kernel-syms-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031766" comment="kernel-zfcpdump-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031767" comment="kselftests-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031768" comment="kselftests-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031769" comment="kselftests-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031770" comment="ocfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031771" comment="ocfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031772" comment="ocfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540101" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40101</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40101" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40101" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40101" ref_url="https://www.suse.com/security/cve/CVE-2025-40101" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix memory leaks when rejecting a non SINGLE data profile without an RST

At the end of btrfs_load_block_group_zone_info() the first thing we do
is to ensure that if the mapping type is not a SINGLE one and there is
no RAID stripe tree, then we return early with an error.

Doing that, though, prevents the code from running the last calls from
this function which are about freeing memory allocated during its
run. Hence, in this case, instead of returning early, we set the ret
value and fall through the rest of the cleanup code.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-06"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40101/">CVE-2025-40101 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40101">CVE-2025-40101 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252901">SUSE bug 1252901</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540102" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40102</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40102" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40102" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40102" ref_url="https://www.suse.com/security/cve/CVE-2025-40102" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4111-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4139-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-November/042755.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: arm64: Prevent access to vCPU events before init

Another day, another syzkaller bug. KVM erroneously allows userspace to
pend vCPU events for a vCPU that hasn't been initialized yet, leading to
KVM interpreting a bunch of uninitialized garbage for routing /
injecting the exception.

In one case the injection code and the hyp disagree on whether the vCPU
has a 32bit EL1 and put the vCPU into an illegal mode for AArch64,
tripping the BUG() in exception_target_el() during the next injection:

  kernel BUG at arch/arm64/kvm/inject_fault.c:40!
  Internal error: Oops - BUG: 00000000f2000800 [#1]  SMP
  CPU: 3 UID: 0 PID: 318 Comm: repro Not tainted 6.17.0-rc4-00104-g10fd0285305d #6 PREEMPT
  Hardware name: linux,dummy-virt (DT)
  pstate: 21402009 (nzCv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--)
  pc : exception_target_el+0x88/0x8c
  lr : pend_serror_exception+0x18/0x13c
  sp : ffff800082f03a10
  x29: ffff800082f03a10 x28: ffff0000cb132280 x27: 0000000000000000
  x26: 0000000000000000 x25: ffff0000c2a99c20 x24: 0000000000000000
  x23: 0000000000008000 x22: 0000000000000002 x21: 0000000000000004
  x20: 0000000000008000 x19: ffff0000c2a99c20 x18: 0000000000000000
  x17: 0000000000000000 x16: 0000000000000000 x15: 00000000200000c0
  x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
  x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000
  x8 : ffff800082f03af8 x7 : 0000000000000000 x6 : 0000000000000000
  x5 : ffff800080f621f0 x4 : 0000000000000000 x3 : 0000000000000000
  x2 : 000000000040009b x1 : 0000000000000003 x0 : ffff0000c2a99c20
  Call trace:
   exception_target_el+0x88/0x8c (P)
   kvm_inject_serror_esr+0x40/0x3b4
   __kvm_arm_vcpu_set_events+0xf0/0x100
   kvm_arch_vcpu_ioctl+0x180/0x9d4
   kvm_vcpu_ioctl+0x60c/0x9f4
   __arm64_sys_ioctl+0xac/0x104
   invoke_syscall+0x48/0x110
   el0_svc_common.constprop.0+0x40/0xe0
   do_el0_svc+0x1c/0x28
   el0_svc+0x34/0xf0
   el0t_64_sync_handler+0xa0/0xe4
   el0t_64_sync+0x198/0x19c
  Code: f946bc01 b4fffe61 9101e020 17fffff2 (d4210000)

Reject the ioctls outright as no sane VMM would call these before
KVM_ARM_VCPU_INIT anyway. Even if it did the exception would've been
thrown away by the eventual reset of the vCPU's state.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40102/">CVE-2025-40102 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40102">CVE-2025-40102 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252919">SUSE bug 1252919</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540103" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40103</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40103" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40103" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40103" ref_url="https://www.suse.com/security/cve/CVE-2025-40103" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: client: Fix refcount leak for cifs_sb_tlink

Fix three refcount inconsistency issues related to `cifs_sb_tlink`.

Comments for `cifs_sb_tlink` state that `cifs_put_tlink()` needs to be
called after successful calls to `cifs_sb_tlink()`. Three calls fail to
update refcount accordingly, leading to possible resource leaks.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40103/">CVE-2025-40103 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40103">CVE-2025-40103 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252924">SUSE bug 1252924</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40104</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40104" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40104" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40104" ref_url="https://www.suse.com/security/cve/CVE-2025-40104" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023304.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ixgbevf: fix mailbox API compatibility by negotiating supported features

There was backward compatibility in the terms of mailbox API. Various
drivers from various OSes supporting 10G adapters from Intel portfolio
could easily negotiate mailbox API.

This convention has been broken since introducing API 1.4.
Commit 0062e7cc955e ("ixgbevf: add VF IPsec offload code") added support
for IPSec which is specific only for the kernel ixgbe driver. None of the
rest of the Intel 10G PF/VF drivers supports it. And actually lack of
support was not included in the IPSec implementation - there were no such
code paths. No possibility to negotiate support for the feature was
introduced along with introduction of the feature itself.

Commit 339f28964147 ("ixgbevf: Add support for new mailbox communication
between PF and VF") increasing API version to 1.5 did the same - it
introduced code supported specifically by the PF ESX driver. It altered API
version for the VF driver in the same time not touching the version
defined for the PF ixgbe driver. It led to additional discrepancies,
as the code provided within API 1.6 cannot be supported for Linux ixgbe
driver as it causes crashes.

The issue was noticed some time ago and mitigated by Jake within the commit
d0725312adf5 ("ixgbevf: stop attempting IPSEC offload on Mailbox API 1.5").
As a result we have regression for IPsec support and after increasing API
to version 1.6 ixgbevf driver stopped to support ESX MBX.

To fix this mess add new mailbox op asking PF driver about supported
features. Basing on a response determine whether to set support for IPSec
and ESX-specific enhanced mailbox.

New mailbox op, for compatibility purposes, must be added within new API
revision, as API version of OOT PF &amp; VF drivers is already increased to
1.6 and doesn't incorporate features negotiate op.

Features negotiation mechanism gives possibility to be extended with new
features when needed in the future.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="0/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N" cvss4="0/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40104/">CVE-2025-40104 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40104">CVE-2025-40104 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252921">SUSE bug 1252921</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031708" comment="cluster-md-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031709" comment="cluster-md-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031710" comment="cluster-md-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031711" comment="dlm-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031712" comment="dlm-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031713" comment="dlm-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031714" comment="dtb-allwinner-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031715" comment="dtb-altera-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031716" comment="dtb-amazon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031717" comment="dtb-amd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031718" comment="dtb-amlogic-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031719" comment="dtb-apm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031720" comment="dtb-apple-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031721" comment="dtb-arm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031722" comment="dtb-broadcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031723" comment="dtb-cavium-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031724" comment="dtb-exynos-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031725" comment="dtb-freescale-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031726" comment="dtb-hisilicon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031727" comment="dtb-lg-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031728" comment="dtb-marvell-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031729" comment="dtb-mediatek-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031730" comment="dtb-nvidia-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031731" comment="dtb-qcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031732" comment="dtb-renesas-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031733" comment="dtb-rockchip-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031734" comment="dtb-socionext-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031735" comment="dtb-sprd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031736" comment="dtb-xilinx-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031737" comment="gfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031738" comment="gfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031739" comment="gfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031742" comment="kernel-64kb-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031743" comment="kernel-64kb-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031747" comment="kernel-default-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031748" comment="kernel-default-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031750" comment="kernel-docs-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031751" comment="kernel-docs-html-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031752" comment="kernel-kvmsmall-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031754" comment="kernel-kvmsmall-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031756" comment="kernel-obs-build-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031757" comment="kernel-obs-qa-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031760" comment="kernel-rt-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031761" comment="kernel-rt-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031762" comment="kernel-rt-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031764" comment="kernel-source-vanilla-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031765" comment="kernel-syms-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031766" comment="kernel-zfcpdump-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031767" comment="kselftests-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031768" comment="kselftests-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031769" comment="kselftests-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031770" comment="ocfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031771" comment="ocfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031772" comment="ocfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540105" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40105</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40105" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40105" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40105" ref_url="https://www.suse.com/security/cve/CVE-2025-40105" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vfs: Don't leak disconnected dentries on umount

When user calls open_by_handle_at() on some inode that is not cached, we
will create disconnected dentry for it. If such dentry is a directory,
exportfs_decode_fh_raw() will then try to connect this dentry to the
dentry tree through reconnect_path(). It may happen for various reasons
(such as corrupted fs or race with rename) that the call to
lookup_one_unlocked() in reconnect_one() will fail to find the dentry we
are trying to reconnect and instead create a new dentry under the
parent. Now this dentry will not be marked as disconnected although the
parent still may well be disconnected (at least in case this
inconsistency happened because the fs is corrupted and .. doesn't point
to the real parent directory). This creates inconsistency in
disconnected flags but AFAICS it was mostly harmless. At least until
commit f1ee616214cb ("VFS: don't keep disconnected dentries on d_anon")
which removed adding of most disconnected dentries to sb-&gt;s_anon list.
Thus after this commit cleanup of disconnected dentries implicitely
relies on the fact that dput() will immediately reclaim such dentries.
However when some leaf dentry isn't marked as disconnected, as in the
scenario described above, the reclaim doesn't happen and the dentries
are "leaked". Memory reclaim can eventually reclaim them but otherwise
they stay in memory and if umount comes first, we hit infamous "Busy
inodes after unmount" bug. Make sure all dentries created under a
disconnected parent are marked as disconnected as well.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-06"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40105/">CVE-2025-40105 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40105">CVE-2025-40105 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252928">SUSE bug 1252928</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540106" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40106</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40106" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40106" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40106" ref_url="https://www.suse.com/security/cve/CVE-2025-40106" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

comedi: fix divide-by-zero in comedi_buf_munge()

The comedi_buf_munge() function performs a modulo operation
`async-&gt;munge_chan %= async-&gt;cmd.chanlist_len` without first
checking if chanlist_len is zero. If a user program submits a command with
chanlist_len set to zero, this causes a divide-by-zero error when the device
processes data in the interrupt handler path.

Add a check for zero chanlist_len at the beginning of the
function, similar to the existing checks for !map and
CMDF_RAWDATA flag. When chanlist_len is zero, update
munge_count and return early, indicating the data was
handled without munging.

This prevents potential kernel panics from malformed user commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40106/">CVE-2025-40106 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40106">CVE-2025-40106 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252891">SUSE bug 1252891</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540107" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40107</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40107" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40107" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40107" ref_url="https://www.suse.com/security/cve/CVE-2025-40107" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: hi311x: fix null pointer dereference when resuming from sleep before interface was enabled

This issue is similar to the vulnerability in the `mcp251x` driver,
which was fixed in commit 03c427147b2d ("can: mcp251x: fix resume from
sleep before interface was brought up").

In the `hi311x` driver, when the device resumes from sleep, the driver
schedules `priv-&gt;restart_work`. However, if the network interface was
not previously enabled, the `priv-&gt;wq` (workqueue) is not allocated and
initialized, leading to a null pointer dereference.

To fix this, we move the allocation and initialization of the workqueue
from the `hi3110_open` function to the `hi3110_can_probe` function.
This ensures that the workqueue is properly initialized before it is
used during device resume. And added logic to destroy the workqueue
in the error handling paths of `hi3110_can_probe` and in the
`hi3110_can_remove` function to prevent resource leaks.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40107/">CVE-2025-40107 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40107">CVE-2025-40107 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253018">SUSE bug 1253018</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540109" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40109</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40109" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40109" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40109" ref_url="https://www.suse.com/security/cve/CVE-2025-40109" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: rng - Ensure set_ent is always present

Ensure that set_ent is always set since only drbg provides it.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40109/">CVE-2025-40109 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40109">CVE-2025-40109 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253176">SUSE bug 1253176</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540110" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40110</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40110" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40110" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40110" ref_url="https://www.suse.com/security/cve/CVE-2025-40110" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/vmwgfx: Fix a null-ptr access in the cursor snooper

Check that the resource which is converted to a surface exists before
trying to use the cursor snooper on it.

vmw_cmd_res_check allows explicit invalid (SVGA3D_INVALID_ID) identifiers
because some svga commands accept SVGA3D_INVALID_ID to mean "no surface",
unfortunately functions that accept the actual surfaces as objects might
(and in case of the cursor snooper, do not) be able to handle null
objects. Make sure that we validate not only the identifier (via the
vmw_cmd_res_check) but also check that the actual resource exists before
trying to do something with it.

Fixes unchecked null-ptr reference in the snooping code.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40110/">CVE-2025-40110 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40110">CVE-2025-40110 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253275">SUSE bug 1253275</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40111</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40111" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40111" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40111" ref_url="https://www.suse.com/security/cve/CVE-2025-40111" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/vmwgfx: Fix Use-after-free in validation

Nodes stored in the validation duplicates hashtable come from an arena
allocator that is cleared at the end of vmw_execbuf_process. All nodes
are expected to be cleared in vmw_validation_drop_ht but this node escaped
because its resource was destroyed prematurely.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-40111/">CVE-2025-40111 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40111">CVE-2025-40111 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253362">SUSE bug 1253362</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540115" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40115</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40115" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40115" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40115" ref_url="https://www.suse.com/security/cve/CVE-2025-40115" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: mpt3sas: Fix crash in transport port remove by using ioc_info()

During mpt3sas_transport_port_remove(), messages were logged with
dev_printk() against &amp;mpt3sas_port-&gt;port-&gt;dev. At this point the SAS
transport device may already be partially unregistered or freed, leading
to a crash when accessing its struct device.

Using ioc_info(), which logs via the PCI device (ioc-&gt;pdev-&gt;dev),
guaranteed to remain valid until driver removal.

[83428.295776] Oops: general protection fault, probably for non-canonical address 0x6f702f323a33312d: 0000 [#1] SMP NOPTI
[83428.295785] CPU: 145 UID: 0 PID: 113296 Comm: rmmod Kdump: loaded Tainted: G           OE       6.16.0-rc1+ #1 PREEMPT(voluntary)
[83428.295792] Tainted: [O]=OOT_MODULE, [E]=UNSIGNED_MODULE
[83428.295795] Hardware name: Dell Inc. Precision 7875 Tower/, BIOS 89.1.67 02/23/2024
[83428.295799] RIP: 0010:__dev_printk+0x1f/0x70
[83428.295805] Code: 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 49 89 d1 48 85 f6 74 52 4c 8b 46 50 4d 85 c0 74 1f 48 8b 46 68 48 85 c0 74 22 &lt;48&gt; 8b 08 0f b6 7f 01 48 c7 c2 db e8 42 ad 83 ef 30 e9 7b f8 ff ff
[83428.295813] RSP: 0018:ff85aeafc3137bb0 EFLAGS: 00010206
[83428.295817] RAX: 6f702f323a33312d RBX: ff4290ee81292860 RCX: 5000cca25103be32
[83428.295820] RDX: ff85aeafc3137bb8 RSI: ff4290eeb1966c00 RDI: ffffffffc1560845
[83428.295823] RBP: ff85aeafc3137c18 R08: 74726f702f303a33 R09: ff85aeafc3137bb8
[83428.295826] R10: ff85aeafc3137b18 R11: ff4290f5bd60fe68 R12: ff4290ee81290000
[83428.295830] R13: ff4290ee6e345de0 R14: ff4290ee81290000 R15: ff4290ee6e345e30
[83428.295833] FS:  00007fd9472a6740(0000) GS:ff4290f5ce96b000(0000) knlGS:0000000000000000
[83428.295837] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[83428.295840] CR2: 00007f242b4db238 CR3: 00000002372b8006 CR4: 0000000000771ef0
[83428.295844] PKRU: 55555554
[83428.295846] Call Trace:
[83428.295848]  &lt;TASK&gt;
[83428.295850]  _dev_printk+0x5c/0x80
[83428.295857]  ? srso_alias_return_thunk+0x5/0xfbef5
[83428.295863]  mpt3sas_transport_port_remove+0x1c7/0x420 [mpt3sas]
[83428.295882]  _scsih_remove_device+0x21b/0x280 [mpt3sas]
[83428.295894]  ? _scsih_expander_node_remove+0x108/0x140 [mpt3sas]
[83428.295906]  ? srso_alias_return_thunk+0x5/0xfbef5
[83428.295910]  mpt3sas_device_remove_by_sas_address.part.0+0x8f/0x110 [mpt3sas]
[83428.295921]  _scsih_expander_node_remove+0x129/0x140 [mpt3sas]
[83428.295933]  _scsih_expander_node_remove+0x6a/0x140 [mpt3sas]
[83428.295944]  scsih_remove+0x3f0/0x4a0 [mpt3sas]
[83428.295957]  pci_device_remove+0x3b/0xb0
[83428.295962]  device_release_driver_internal+0x193/0x200
[83428.295968]  driver_detach+0x44/0x90
[83428.295971]  bus_remove_driver+0x69/0xf0
[83428.295975]  pci_unregister_driver+0x2a/0xb0
[83428.295979]  _mpt3sas_exit+0x1f/0x300 [mpt3sas]
[83428.295991]  __do_sys_delete_module.constprop.0+0x174/0x310
[83428.295997]  ? srso_alias_return_thunk+0x5/0xfbef5
[83428.296000]  ? __x64_sys_getdents64+0x9a/0x110
[83428.296005]  ? srso_alias_return_thunk+0x5/0xfbef5
[83428.296009]  ? syscall_trace_enter+0xf6/0x1b0
[83428.296014]  do_syscall_64+0x7b/0x2c0
[83428.296019]  ? srso_alias_return_thunk+0x5/0xfbef5
[83428.296023]  entry_SYSCALL_64_after_hwframe+0x76/0x7e
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40115/">CVE-2025-40115 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40115">CVE-2025-40115 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253318">SUSE bug 1253318</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40116</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40116" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40116" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40116" ref_url="https://www.suse.com/security/cve/CVE-2025-40116" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: host: max3421-hcd: Fix error pointer dereference in probe cleanup

The kthread_run() function returns error pointers so the
max3421_hcd-&gt;spi_thread pointer can be either error pointers or NULL.
Check for both before dereferencing it.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40116/">CVE-2025-40116 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40116">CVE-2025-40116 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253324">SUSE bug 1253324</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540118" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40118</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40118" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40118" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40118" ref_url="https://www.suse.com/security/cve/CVE-2025-40118" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: pm80xx: Fix array-index-out-of-of-bounds on rmmod

Since commit f7b705c238d1 ("scsi: pm80xx: Set phy_attached to zero when
device is gone") UBSAN reports:

  UBSAN: array-index-out-of-bounds in drivers/scsi/pm8001/pm8001_sas.c:786:17
  index 28 is out of range for type 'pm8001_phy [16]'

on rmmod when using an expander.

For a direct attached device, attached_phy contains the local phy id.
For a device behind an expander, attached_phy contains the remote phy
id, not the local phy id.

I.e. while pm8001_ha will have pm8001_ha-&gt;chip-&gt;n_phy local phys, for a
device behind an expander, attached_phy can be much larger than
pm8001_ha-&gt;chip-&gt;n_phy (depending on the amount of phys of the
expander).

E.g. on my system pm8001_ha has 8 phys with phy ids 0-7.  One of the
ports has an expander connected.  The expander has 31 phys with phy ids
0-30.

The pm8001_ha-&gt;phy array only contains the phys of the HBA.  It does not
contain the phys of the expander.  Thus, it is wrong to use attached_phy
to index the pm8001_ha-&gt;phy array for a device behind an expander.

Thus, we can only clear phy_attached for devices that are directly
attached.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40118/">CVE-2025-40118 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40118">CVE-2025-40118 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253363">SUSE bug 1253363</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540120" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40120</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40120" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40120" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40120" ref_url="https://www.suse.com/security/cve/CVE-2025-40120" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: usb: asix: hold PM usage ref to avoid PM/MDIO + RTNL deadlock

Prevent USB runtime PM (autosuspend) for AX88772* in bind.

usbnet enables runtime PM (autosuspend) by default, so disabling it via
the usb_driver flag is ineffective. On AX88772B, autosuspend shows no
measurable power saving with current driver (no link partner, admin
up/down). The ~0.453 W -&gt; ~0.248 W drop on v6.1 comes from phylib powering
the PHY off on admin-down, not from USB autosuspend.

The real hazard is that with runtime PM enabled, ndo_open() (under RTNL)
may synchronously trigger autoresume (usb_autopm_get_interface()) into
asix_resume() while the USB PM lock is held. Resume paths then invoke
phylink/phylib and MDIO, which also expect RTNL, leading to possible
deadlocks or PM lock vs MDIO wake issues.

To avoid this, keep the device runtime-PM active by taking a usage
reference in ax88772_bind() and dropping it in unbind(). A non-zero PM
usage count blocks runtime suspend regardless of userspace policy
(.../power/control - pm_runtime_allow/forbid), making this approach
robust against sysfs overrides.

Holding a runtime-PM usage ref does not affect system-wide suspend;
system sleep/resume callbacks continue to run as before.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40120/">CVE-2025-40120 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40120">CVE-2025-40120 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253360">SUSE bug 1253360</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540121" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40121</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40121" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40121" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40121" ref_url="https://www.suse.com/security/cve/CVE-2025-40121" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: Intel: bytcr_rt5651: Fix invalid quirk input mapping

When an invalid value is passed via quirk option, currently
bytcr_rt5640 driver just ignores and leaves as is, which may lead to
unepxected results like OOB access.

This patch adds the sanity check and corrects the input mapping to the
certain default value if an invalid value is passed.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40121/">CVE-2025-40121 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40121">CVE-2025-40121 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253367">SUSE bug 1253367</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253430">SUSE bug 1253430</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540123" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40123</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40123" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40123" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40123" ref_url="https://www.suse.com/security/cve/CVE-2025-40123" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Enforce expected_attach_type for tailcall compatibility

Yinhao et al. recently reported:

  Our fuzzer tool discovered an uninitialized pointer issue in the
  bpf_prog_test_run_xdp() function within the Linux kernel's BPF subsystem.
  This leads to a NULL pointer dereference when a BPF program attempts to
  deference the txq member of struct xdp_buff object.

The test initializes two programs of BPF_PROG_TYPE_XDP: progA acts as the
entry point for bpf_prog_test_run_xdp() and its expected_attach_type can
neither be of be BPF_XDP_DEVMAP nor BPF_XDP_CPUMAP. progA calls into a slot
of a tailcall map it owns. progB's expected_attach_type must be BPF_XDP_DEVMAP
to pass xdp_is_valid_access() validation. The program returns struct xdp_md's
egress_ifindex, and the latter is only allowed to be accessed under mentioned
expected_attach_type. progB is then inserted into the tailcall which progA
calls.

The underlying issue goes beyond XDP though. Another example are programs
of type BPF_PROG_TYPE_CGROUP_SOCK_ADDR. sock_addr_is_valid_access() as well
as sock_addr_func_proto() have different logic depending on the programs'
expected_attach_type. Similarly, a program attached to BPF_CGROUP_INET4_GETPEERNAME
should not be allowed doing a tailcall into a program which calls bpf_bind()
out of BPF which is only enabled for BPF_CGROUP_INET4_CONNECT.

In short, specifying expected_attach_type allows to open up additional
functionality or restrictions beyond what the basic bpf_prog_type enables.
The use of tailcalls must not violate these constraints. Fix it by enforcing
expected_attach_type in __bpf_prog_map_compatible().

Note that we only enforce this for tailcall maps, but not for BPF devmaps or
cpumaps: There, the programs are invoked through dev_map_bpf_prog_run*() and
cpu_map_bpf_prog_run*() which set up a new environment / context and therefore
these situations are not prone to this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40123/">CVE-2025-40123 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40123">CVE-2025-40123 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253365">SUSE bug 1253365</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540127" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40127</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40127" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40127" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40127" ref_url="https://www.suse.com/security/cve/CVE-2025-40127" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hwrng: ks-sa - fix division by zero in ks_sa_rng_init

Fix division by zero in ks_sa_rng_init caused by missing clock
pointer initialization. The clk_get_rate() call is performed on
an uninitialized clk pointer, resulting in division by zero when
calculating delay values.

Add clock initialization code before using the clock.


 drivers/char/hw_random/ks-sa-rng.c | 7 +++++++
 1 file changed, 7 insertions(+)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40127/">CVE-2025-40127 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40127">CVE-2025-40127 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253369">SUSE bug 1253369</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540129" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40129</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40129" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40129" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40129" ref_url="https://www.suse.com/security/cve/CVE-2025-40129" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20455-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20456-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20457-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20458-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20459-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20460-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20461-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20462-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20463-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20464-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20465-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20467-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20468-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20469-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20470-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20471-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20472-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20635-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024655.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sunrpc: fix null pointer dereference on zero-length checksum

In xdr_stream_decode_opaque_auth(), zero-length checksum.len causes
checksum.data to be set to NULL. This triggers a NPD when accessing
checksum.data in gss_krb5_verify_mic_v2(). This patch ensures that
the value of checksum.len is not less than XDR_UNIT.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40129/">CVE-2025-40129 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40129">CVE-2025-40129 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253472">SUSE bug 1253472</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253473">SUSE bug 1253473</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40130</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40130" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40130" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40130" ref_url="https://www.suse.com/security/cve/CVE-2025-40130" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20634-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024644.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20635-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20636-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024642.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20637-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024641.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024652.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: ufs: core: Fix data race in CPU latency PM QoS request handling

The cpu_latency_qos_add/remove/update_request interfaces lack internal
synchronization by design, requiring the caller to ensure thread safety.
The current implementation relies on the 'pm_qos_enabled' flag, which is
insufficient to prevent concurrent access and cannot serve as a proper
synchronization mechanism. This has led to data races and list
corruption issues.

A typical race condition call trace is:

[Thread A]
ufshcd_pm_qos_exit()
  --&gt; cpu_latency_qos_remove_request()
    --&gt; cpu_latency_qos_apply();
      --&gt; pm_qos_update_target()
        --&gt; plist_del              &lt;--(1) delete plist node
    --&gt; memset(req, 0, sizeof(*req));
  --&gt; hba-&gt;pm_qos_enabled = false;

[Thread B]
ufshcd_devfreq_target
  --&gt; ufshcd_devfreq_scale
    --&gt; ufshcd_scale_clks
      --&gt; ufshcd_pm_qos_update     &lt;--(2) pm_qos_enabled is true
        --&gt; cpu_latency_qos_update_request
          --&gt; pm_qos_update_target
            --&gt; plist_del          &lt;--(3) plist node use-after-free

Introduces a dedicated mutex to serialize PM QoS operations, preventing
data races and ensuring safe access to PM QoS resources, including sysfs
interface reads.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40130/">CVE-2025-40130 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40130">CVE-2025-40130 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253414">SUSE bug 1253414</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253415">SUSE bug 1253415</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540132" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40132</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40132" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40132" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40132" ref_url="https://www.suse.com/security/cve/CVE-2025-40132" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: Intel: sof_sdw: Prevent jump to NULL add_sidecar callback

In create_sdw_dailink() check that sof_end-&gt;codec_info-&gt;add_sidecar
is not NULL before calling it.

The original code assumed that if include_sidecar is true, the codec
on that link has an add_sidecar callback. But there could be other
codecs on the same link that do not have an add_sidecar callback.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40132/">CVE-2025-40132 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40132">CVE-2025-40132 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253330">SUSE bug 1253330</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540133" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40133</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40133" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40133" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40133" ref_url="https://www.suse.com/security/cve/CVE-2025-40133" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mptcp: Use __sk_dst_get() and dst_dev_rcu() in mptcp_active_enable().

mptcp_active_enable() is called from subflow_finish_connect(),
which is icsk-&gt;icsk_af_ops-&gt;sk_rx_dst_set() and it's not always
under RCU.

Using sk_dst_get(sk)-&gt;dev could trigger UAF.

Let's use __sk_dst_get() and dst_dev_rcu().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40133/">CVE-2025-40133 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40133">CVE-2025-40133 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253328">SUSE bug 1253328</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540134" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40134</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40134" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40134" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40134" ref_url="https://www.suse.com/security/cve/CVE-2025-40134" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dm: fix NULL pointer dereference in __dm_suspend()

There is a race condition between dm device suspend and table load that
can lead to null pointer dereference. The issue occurs when suspend is
invoked before table load completes:

BUG: kernel NULL pointer dereference, address: 0000000000000054
Oops: 0000 [#1] PREEMPT SMP PTI
CPU: 6 PID: 6798 Comm: dmsetup Not tainted 6.6.0-g7e52f5f0ca9b #62
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.1-2.fc37 04/01/2014
RIP: 0010:blk_mq_wait_quiesce_done+0x0/0x50
Call Trace:
  &lt;TASK&gt;
  blk_mq_quiesce_queue+0x2c/0x50
  dm_stop_queue+0xd/0x20
  __dm_suspend+0x130/0x330
  dm_suspend+0x11a/0x180
  dev_suspend+0x27e/0x560
  ctl_ioctl+0x4cf/0x850
  dm_ctl_ioctl+0xd/0x20
  vfs_ioctl+0x1d/0x50
  __se_sys_ioctl+0x9b/0xc0
  __x64_sys_ioctl+0x19/0x30
  x64_sys_call+0x2c4a/0x4620
  do_syscall_64+0x9e/0x1b0

The issue can be triggered as below:

T1 						T2
dm_suspend					table_load
__dm_suspend					dm_setup_md_queue
						dm_mq_init_request_queue
						blk_mq_init_allocated_queue
						=&gt; q-&gt;mq_ops = set-&gt;ops; (1)
dm_stop_queue / dm_wait_for_completion
=&gt; q-&gt;tag_set NULL pointer!	(2)
						=&gt; q-&gt;tag_set = set; (3)

Fix this by checking if a valid table (map) exists before performing
request-based suspend and waiting for target I/O. When map is NULL,
skip these table-dependent suspend steps.

Even when map is NULL, no I/O can reach any target because there is
no table loaded; I/O submitted in this state will fail early in the
DM layer. Skipping the table-dependent suspend logic in this case
is safe and avoids NULL pointer dereferences.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40134/">CVE-2025-40134 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40134">CVE-2025-40134 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253386">SUSE bug 1253386</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40135</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40135" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40135" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40135" ref_url="https://www.suse.com/security/cve/CVE-2025-40135" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2212" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003185.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2264" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv6: use RCU in ip6_xmit()

Use RCU in ip6_xmit() in order to use dst_dev_rcu() to prevent
possible UAF.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40135/">CVE-2025-40135 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40135">CVE-2025-40135 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253342">SUSE bug 1253342</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40139</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40139" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40139" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40139" ref_url="https://www.suse.com/security/cve/CVE-2025-40139" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1131-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smc: Use __sk_dst_get() and dst_dev_rcu() in in smc_clc_prfx_set().

smc_clc_prfx_set() is called during connect() and not under RCU
nor RTNL.

Using sk_dst_get(sk)-&gt;dev could trigger UAF.

Let's use __sk_dst_get() and dev_dst_rcu() under rcu_read_lock()
after kernel_getsockname().

Note that the returned value of smc_clc_prfx_set() is not used
in the caller.

While at it, we change the 1st arg of smc_clc_prfx_set[46]_rcu()
not to touch dst there.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-31"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40139/">CVE-2025-40139 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40139">CVE-2025-40139 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253409">SUSE bug 1253409</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253411">SUSE bug 1253411</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40140</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40140" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40140" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40140" ref_url="https://www.suse.com/security/cve/CVE-2025-40140" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: usb: Remove disruptive netif_wake_queue in rtl8150_set_multicast

syzbot reported WARNING in rtl8150_start_xmit/usb_submit_urb.
This is the sequence of events that leads to the warning:

rtl8150_start_xmit() {
	netif_stop_queue();
	usb_submit_urb(dev-&gt;tx_urb);
}

rtl8150_set_multicast() {
	netif_stop_queue();
	netif_wake_queue();		&lt;-- wakes up TX queue before URB is done
}

rtl8150_start_xmit() {
	netif_stop_queue();
	usb_submit_urb(dev-&gt;tx_urb);	&lt;-- double submission
}

rtl8150_set_multicast being the ndo_set_rx_mode callback should not be
calling netif_stop_queue and notif_start_queue as these handle
TX queue synchronization.

The net core function dev_set_rx_mode handles the synchronization
for rtl8150_set_multicast making it safe to remove these locks.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-06"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40140/">CVE-2025-40140 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40140">CVE-2025-40140 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253349">SUSE bug 1253349</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40141</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40141" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40141" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40141" ref_url="https://www.suse.com/security/cve/CVE-2025-40141" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2212" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: ISO: Fix possible UAF on iso_conn_free

This attempt to fix similar issue to sco_conn_free where if the
conn-&gt;sk is not set to NULL may lead to UAF on iso_conn_free.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40141/">CVE-2025-40141 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40141">CVE-2025-40141 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253352">SUSE bug 1253352</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40142</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40142" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40142" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40142" ref_url="https://www.suse.com/security/cve/CVE-2025-40142" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: pcm: Disable bottom softirqs as part of spin_lock_irq() on PREEMPT_RT

snd_pcm_group_lock_irq() acquires a spinlock_t and disables interrupts
via spin_lock_irq(). This also implicitly disables the handling of
softirqs such as TIMER_SOFTIRQ.
On PREEMPT_RT softirqs are preemptible and spin_lock_irq() does not
disable them. That means a timer can be invoked during spin_lock_irq()
on the same CPU. Due to synchronisations reasons local_bh_disable() has
a per-CPU lock named softirq_ctrl.lock which synchronizes individual
softirq against each other.
syz-bot managed to trigger a lockdep report where softirq_ctrl.lock is
acquired in hrtimer_cancel() in addition to hrtimer_run_softirq(). This
is a possible deadlock.

The softirq_ctrl.lock can not be made part of spin_lock_irq() as this
would lead to too much synchronisation against individual threads on the
system. To avoid the possible deadlock, softirqs must be manually
disabled before the lock is acquired.

Disable softirqs before the lock is acquired on PREEMPT_RT.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40142/">CVE-2025-40142 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40142">CVE-2025-40142 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253348">SUSE bug 1253348</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540147" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40147</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40147" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40147" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40147" ref_url="https://www.suse.com/security/cve/CVE-2025-40147" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

blk-throttle: fix access race during throttle policy activation

On repeated cold boots we occasionally hit a NULL pointer crash in
blk_should_throtl() when throttling is consulted before the throttle
policy is fully enabled for the queue. Checking only q-&gt;td != NULL is
insufficient during early initialization, so blkg_to_pd() for the
throttle policy can still return NULL and blkg_to_tg() becomes NULL,
which later gets dereferenced.

 Unable to handle kernel NULL pointer dereference
 at virtual address 0000000000000156
 ...
 pc : submit_bio_noacct+0x14c/0x4c8
 lr : submit_bio_noacct+0x48/0x4c8
 sp : ffff800087f0b690
 x29: ffff800087f0b690 x28: 0000000000005f90 x27: ffff00068af393c0
 x26: 0000000000080000 x25: 000000000002fbc0 x24: ffff000684ddcc70
 x23: 0000000000000000 x22: 0000000000000000 x21: 0000000000000000
 x20: 0000000000080000 x19: ffff000684ddcd08 x18: ffffffffffffffff
 x17: 0000000000000000 x16: ffff80008132a550 x15: 0000ffff98020fff
 x14: 0000000000000000 x13: 1fffe000d11d7021 x12: ffff000688eb810c
 x11: ffff00077ec4bb80 x10: ffff000688dcb720 x9 : ffff80008068ef60
 x8 : 00000a6fb8a86e85 x7 : 000000000000111e x6 : 0000000000000002
 x5 : 0000000000000246 x4 : 0000000000015cff x3 : 0000000000394500
 x2 : ffff000682e35e40 x1 : 0000000000364940 x0 : 000000000000001a
 Call trace:
  submit_bio_noacct+0x14c/0x4c8
  verity_map+0x178/0x2c8
  __map_bio+0x228/0x250
  dm_submit_bio+0x1c4/0x678
  __submit_bio+0x170/0x230
  submit_bio_noacct_nocheck+0x16c/0x388
  submit_bio_noacct+0x16c/0x4c8
  submit_bio+0xb4/0x210
  f2fs_submit_read_bio+0x4c/0xf0
  f2fs_mpage_readpages+0x3b0/0x5f0
  f2fs_readahead+0x90/0xe8

Tighten blk_throtl_activated() to also require that the throttle policy
bit is set on the queue:

  return q-&gt;td != NULL &amp;&amp;
         test_bit(blkcg_policy_throtl.plid, q-&gt;blkcg_pols);

This prevents blk_should_throtl() from accessing throttle group state
until policy data has been attached to blkgs.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40147/">CVE-2025-40147 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40147">CVE-2025-40147 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253344">SUSE bug 1253344</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540149" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40149</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40149" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40149" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40149" ref_url="https://www.suse.com/security/cve/CVE-2025-40149" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tls: Use __sk_dst_get() and dst_dev_rcu() in get_netdev_for_sock().

get_netdev_for_sock() is called during setsockopt(),
so not under RCU.

Using sk_dst_get(sk)-&gt;dev could trigger UAF.

Let's use __sk_dst_get() and dst_dev_rcu().

Note that the only -&gt;ndo_sk_get_lower_dev() user is
bond_sk_get_lower_dev(), which uses RCU.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40149/">CVE-2025-40149 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-40149">CVE-2025-40149 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253355">SUSE bug 1253355</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40153</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40153" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40153" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40153" ref_url="https://www.suse.com/security/cve/CVE-2025-40153" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm: hugetlb: avoid soft lockup when mprotect to large memory area

When calling mprotect() to a large hugetlb memory area in our customer's
workload (~300GB hugetlb memory), soft lockup was observed:

watchdog: BUG: soft lockup - CPU#98 stuck for 23s! [t2_new_sysv:126916]

CPU: 98 PID: 126916 Comm: t2_new_sysv Kdump: loaded Not tainted 6.17-rc7
Hardware name: GIGACOMPUTING R2A3-T40-AAV1/Jefferson CIO, BIOS 5.4.4.1 07/15/2025
pstate: 20400009 (nzCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc  : mte_clear_page_tags+0x14/0x24
lr  : mte_sync_tags+0x1c0/0x240
sp  : ffff80003150bb80
x29: ffff80003150bb80 x28: ffff00739e9705a8 x27: 0000ffd2d6a00000
x26: 0000ff8e4bc00000 x25: 00e80046cde00f45 x24: 0000000000022458
x23: 0000000000000000 x22: 0000000000000004 x21: 000000011b380000
x20: ffff000000000000 x19: 000000011b379f40 x18: 0000000000000000
x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
x11: 0000000000000000 x10: 0000000000000000 x9 : ffffc875e0aa5e2c
x8  : 0000000000000000 x7 : 0000000000000000 x6 : 0000000000000000
x5  : fffffc01ce7a5c00 x4 : 00000000046cde00 x3 : fffffc0000000000
x2  : 0000000000000004 x1 : 0000000000000040 x0 : ffff0046cde7c000

Call trace:
    mte_clear_page_tags+0x14/0x24
    set_huge_pte_at+0x25c/0x280
    hugetlb_change_protection+0x220/0x430
    change_protection+0x5c/0x8c
    mprotect_fixup+0x10c/0x294
    do_mprotect_pkey.constprop.0+0x2e0/0x3d4
    __arm64_sys_mprotect+0x24/0x44
    invoke_syscall+0x50/0x160
    el0_svc_common+0x48/0x144
    do_el0_svc+0x30/0xe0
    el0_svc+0x30/0xf0
    el0t_64_sync_handler+0xc4/0x148
    el0t_64_sync+0x1a4/0x1a8

Soft lockup is not triggered with THP or base page because there is
cond_resched() called for each PMD size.

Although the soft lockup was triggered by MTE, it should be not MTE
specific.  The other processing which takes long time in the loop may
trigger soft lockup too.

So add cond_resched() for hugetlb to avoid soft lockup.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-31"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40153/">CVE-2025-40153 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40153">CVE-2025-40153 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253408">SUSE bug 1253408</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40154</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40154" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40154" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40154" ref_url="https://www.suse.com/security/cve/CVE-2025-40154" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1142" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002437.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1617" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: Intel: bytcr_rt5640: Fix invalid quirk input mapping

When an invalid value is passed via quirk option, currently
bytcr_rt5640 driver only shows an error message but leaves as is.
This may lead to unepxected results like OOB access.

This patch corrects the input mapping to the certain default value if
an invalid value is passed.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40154/">CVE-2025-40154 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40154">CVE-2025-40154 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253431">SUSE bug 1253431</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253432">SUSE bug 1253432</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40156</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40156" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40156" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40156" ref_url="https://www.suse.com/security/cve/CVE-2025-40156" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

PM / devfreq: mtk-cci: Fix potential error pointer dereference in probe()

The drv-&gt;sram_reg pointer could be set to ERR_PTR(-EPROBE_DEFER) which
would lead to a error pointer dereference.  Use IS_ERR_OR_NULL() to check
that the pointer is valid.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40156/">CVE-2025-40156 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40156">CVE-2025-40156 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253428">SUSE bug 1253428</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540157" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40157</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40157" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40157" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40157" ref_url="https://www.suse.com/security/cve/CVE-2025-40157" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

EDAC/i10nm: Skip DIMM enumeration on a disabled memory controller

When loading the i10nm_edac driver on some Intel Granite Rapids servers,
a call trace may appear as follows:

  UBSAN: shift-out-of-bounds in drivers/edac/skx_common.c:453:16
  shift exponent -66 is negative
  ...
  __ubsan_handle_shift_out_of_bounds+0x1e3/0x390
  skx_get_dimm_info.cold+0x47/0xd40 [skx_edac_common]
  i10nm_get_dimm_config+0x23e/0x390 [i10nm_edac]
  skx_register_mci+0x159/0x220 [skx_edac_common]
  i10nm_init+0xcb0/0x1ff0 [i10nm_edac]
  ...

This occurs because some BIOS may disable a memory controller if there
aren't any memory DIMMs populated on this memory controller. The DIMMMTR
register of this disabled memory controller contains the invalid value
~0, resulting in the call trace above.

Fix this call trace by skipping DIMM enumeration on a disabled memory
controller.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40157/">CVE-2025-40157 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40157">CVE-2025-40157 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253423">SUSE bug 1253423</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540158" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40158</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40158" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40158" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40158" ref_url="https://www.suse.com/security/cve/CVE-2025-40158" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2212" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003185.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2264" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv6: use RCU in ip6_output()

Use RCU in ip6_output() in order to use dst_dev_rcu() to prevent
possible UAF.

We can remove rcu_read_lock()/rcu_read_unlock() pairs
from ip6_finish_output2().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40158/">CVE-2025-40158 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40158">CVE-2025-40158 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253402">SUSE bug 1253402</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540159" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40159</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40159" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40159" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40159" ref_url="https://www.suse.com/security/cve/CVE-2025-40159" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1180-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1188-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1236-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1239-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1244-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1259-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1261-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1271-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1278-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1283-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045410.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21007-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21009-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045397.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21053-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21054-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21055-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21056-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21057-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21058-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21059-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21060-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21061-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21072-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21073-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21074-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21075-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21076-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21077-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21078-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21079-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21080-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21082-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21083-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21084-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21085-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21086-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21087-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21088-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21089-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21090-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21091-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045433.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xsk: Harden userspace-supplied xdp_desc validation

Turned out certain clearly invalid values passed in xdp_desc from
userspace can pass xp_{,un}aligned_validate_desc() and then lead
to UBs or just invalid frames to be queued for xmit.

desc-&gt;len close to ``U32_MAX`` with a non-zero pool-&gt;tx_metadata_len
can cause positive integer overflow and wraparound, the same way low
enough desc-&gt;addr with a non-zero pool-&gt;tx_metadata_len can cause
negative integer overflow. Both scenarios can then pass the
validation successfully.
This doesn't happen with valid XSk applications, but can be used
to perform attacks.

Always promote desc-&gt;len to ``u64`` first to exclude positive
overflows of it. Use explicit check_{add,sub}_overflow() when
validating desc-&gt;addr (which is ``u64`` already).

bloat-o-meter reports a little growth of the code size:

add/remove: 0/0 grow/shrink: 2/1 up/down: 60/-16 (44)
Function                                     old     new   delta
xskq_cons_peek_desc                          299     330     +31
xsk_tx_peek_release_desc_batch               973    1002     +29
xsk_generic_xmit                            3148    3132     -16

but hopefully this doesn't hurt the performance much.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40159/">CVE-2025-40159 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40159">CVE-2025-40159 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253403">SUSE bug 1253403</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253404">SUSE bug 1253404</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40160</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40160" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40160" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40160" ref_url="https://www.suse.com/security/cve/CVE-2025-40160" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xen/events: Return -EEXIST for bound VIRQs

Change find_virq() to return -EEXIST when a VIRQ is bound to a
different CPU than the one passed in.  With that, remove the BUG_ON()
from bind_virq_to_irq() to propogate the error upwards.

Some VIRQs are per-cpu, but others are per-domain or global.  Those must
be bound to CPU0 and can then migrate elsewhere.  The lookup for
per-domain and global will probably fail when migrated off CPU 0,
especially when the current CPU is tracked.  This now returns -EEXIST
instead of BUG_ON().

A second call to bind a per-domain or global VIRQ is not expected, but
make it non-fatal to avoid trying to look up the irq, since we don't
know which per_cpu(virq_to_irq) it will be in.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40160/">CVE-2025-40160 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40160">CVE-2025-40160 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253400">SUSE bug 1253400</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540161" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40161</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40161" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40161" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40161" ref_url="https://www.suse.com/security/cve/CVE-2025-40161" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mailbox: zynqmp-ipi: Fix SGI cleanup on unbind

The driver incorrectly determines SGI vs SPI interrupts by checking IRQ
number &lt; 16, which fails with dynamic IRQ allocation. During unbind,
this causes improper SGI cleanup leading to kernel crash.

Add explicit irq_type field to pdata for reliable identification of SGI
interrupts (type-2) and only clean up SGI resources when appropriate.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40161/">CVE-2025-40161 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40161">CVE-2025-40161 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253410">SUSE bug 1253410</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540162" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40162</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40162" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40162" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40162" ref_url="https://www.suse.com/security/cve/CVE-2025-40162" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: amd/sdw_utils: avoid NULL deref when devm_kasprintf() fails

devm_kasprintf() may return NULL on memory allocation failure,
but the debug message prints cpus-&gt;dai_name before checking it.
Move the dev_dbg() call after the NULL check to prevent potential
NULL pointer dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40162/">CVE-2025-40162 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40162">CVE-2025-40162 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253422">SUSE bug 1253422</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540164" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40164</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40164" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40164" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40164" ref_url="https://www.suse.com/security/cve/CVE-2025-40164" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usbnet: Fix using smp_processor_id() in preemptible code warnings

Syzbot reported the following warning:

BUG: using smp_processor_id() in preemptible [00000000] code: dhcpcd/2879
caller is usbnet_skb_return+0x74/0x490 drivers/net/usb/usbnet.c:331
CPU: 1 UID: 0 PID: 2879 Comm: dhcpcd Not tainted 6.15.0-rc4-syzkaller-00098-g615dca38c2ea #0 PREEMPT(voluntary)
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:94 [inline]
 dump_stack_lvl+0x16c/0x1f0 lib/dump_stack.c:120
 check_preemption_disabled+0xd0/0xe0 lib/smp_processor_id.c:49
 usbnet_skb_return+0x74/0x490 drivers/net/usb/usbnet.c:331
 usbnet_resume_rx+0x4b/0x170 drivers/net/usb/usbnet.c:708
 usbnet_change_mtu+0x1be/0x220 drivers/net/usb/usbnet.c:417
 __dev_set_mtu net/core/dev.c:9443 [inline]
 netif_set_mtu_ext+0x369/0x5c0 net/core/dev.c:9496
 netif_set_mtu+0xb0/0x160 net/core/dev.c:9520
 dev_set_mtu+0xae/0x170 net/core/dev_api.c:247
 dev_ifsioc+0xa31/0x18d0 net/core/dev_ioctl.c:572
 dev_ioctl+0x223/0x10e0 net/core/dev_ioctl.c:821
 sock_do_ioctl+0x19d/0x280 net/socket.c:1204
 sock_ioctl+0x42f/0x6a0 net/socket.c:1311
 vfs_ioctl fs/ioctl.c:51 [inline]
 __do_sys_ioctl fs/ioctl.c:906 [inline]
 __se_sys_ioctl fs/ioctl.c:892 [inline]
 __x64_sys_ioctl+0x190/0x200 fs/ioctl.c:892
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xcd/0x260 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

For historical and portability reasons, the netif_rx() is usually
run in the softirq or interrupt context, this commit therefore add
local_bh_disable/enable() protection in the usbnet_resume_rx().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40164/">CVE-2025-40164 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-40164">CVE-2025-40164 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253407">SUSE bug 1253407</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540165" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40165</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40165" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40165" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40165" ref_url="https://www.suse.com/security/cve/CVE-2025-40165" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: nxp: imx8-isi: m2m: Fix streaming cleanup on release

If streamon/streamoff calls are imbalanced, such as when exiting an
application with Ctrl+C when streaming, the m2m usage_count will never
reach zero and the ISI channel won't be freed. Besides from that, if the
input line width is more than 2K, it will trigger a WARN_ON():

[ 59.222120] ------------[ cut here ]------------
[ 59.226758] WARNING: drivers/media/platform/nxp/imx8-isi/imx8-isi-hw.c:631 at mxc_isi_channel_chain+0xa4/0x120, CPU#4: v4l2-ctl/654
[ 59.238569] Modules linked in: ap1302
[ 59.242231] CPU: 4 UID: 0 PID: 654 Comm: v4l2-ctl Not tainted 6.16.0-rc4-next-20250704-06511-gff0e002d480a-dirty #258 PREEMPT
[ 59.253597] Hardware name: NXP i.MX95 15X15 board (DT)
[ 59.258720] pstate: 80400009 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[ 59.265669] pc : mxc_isi_channel_chain+0xa4/0x120
[ 59.270358] lr : mxc_isi_channel_chain+0x44/0x120
[ 59.275047] sp : ffff8000848c3b40
[ 59.278348] x29: ffff8000848c3b40 x28: ffff0000859b4c98 x27: ffff800081939f00
[ 59.285472] x26: 000000000000000a x25: ffff0000859b4cb8 x24: 0000000000000001
[ 59.292597] x23: ffff0000816f4760 x22: ffff0000816f4258 x21: ffff000084ceb780
[ 59.299720] x20: ffff000084342ff8 x19: ffff000084340000 x18: 0000000000000000
[ 59.306845] x17: 0000000000000000 x16: 0000000000000000 x15: 0000ffffdb369e1c
[ 59.313969] x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
[ 59.321093] x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000
[ 59.328217] x8 : ffff8000848c3d48 x7 : ffff800081930b30 x6 : ffff800081930b30
[ 59.335340] x5 : ffff0000859b6000 x4 : ffff80008193ae80 x3 : ffff800081022420
[ 59.342464] x2 : ffff0000852f6900 x1 : 0000000000000001 x0 : ffff000084341000
[ 59.349590] Call trace:
[ 59.352025]  mxc_isi_channel_chain+0xa4/0x120 (P)
[ 59.356722]  mxc_isi_m2m_streamon+0x160/0x20c
[ 59.361072]  v4l_streamon+0x24/0x30
[ 59.364556]  __video_do_ioctl+0x40c/0x4a0
[ 59.368560]  video_usercopy+0x2bc/0x690
[ 59.372382]  video_ioctl2+0x18/0x24
[ 59.375857]  v4l2_ioctl+0x40/0x60
[ 59.379168]  __arm64_sys_ioctl+0xac/0x104
[ 59.383172]  invoke_syscall+0x48/0x104
[ 59.386916]  el0_svc_common.constprop.0+0xc0/0xe0
[ 59.391613]  do_el0_svc+0x1c/0x28
[ 59.394915]  el0_svc+0x34/0xf4
[ 59.397966]  el0t_64_sync_handler+0xa0/0xe4
[ 59.402143]  el0t_64_sync+0x198/0x19c
[ 59.405801] ---[ end trace 0000000000000000 ]---

Address this issue by moving the streaming preparation and cleanup to
the vb2 .prepare_streaming() and .unprepare_streaming() operations. This
also simplifies the driver by allowing direct usage of the
v4l2_m2m_ioctl_streamon() and v4l2_m2m_ioctl_streamoff() helpers.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40165/">CVE-2025-40165 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40165">CVE-2025-40165 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253405">SUSE bug 1253405</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40166</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40166" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40166" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40166" ref_url="https://www.suse.com/security/cve/CVE-2025-40166" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/xe/guc: Check GuC running state before deregistering exec queue

In normal operation, a registered exec queue is disabled and
deregistered through the GuC, and freed only after the GuC confirms
completion. However, if the driver is forced to unbind while the exec
queue is still running, the user may call exec_destroy() after the GuC
has already been stopped and CT communication disabled.

In this case, the driver cannot receive a response from the GuC,
preventing proper cleanup of exec queue resources. Fix this by directly
releasing the resources when GuC is not running.

Here is the failure dmesg log:
"
[  468.089581] ---[ end trace 0000000000000000 ]---
[  468.089608] pci 0000:03:00.0: [drm] *ERROR* GT0: GUC ID manager unclean (1/65535)
[  468.090558] pci 0000:03:00.0: [drm] GT0:     total 65535
[  468.090562] pci 0000:03:00.0: [drm] GT0:     used 1
[  468.090564] pci 0000:03:00.0: [drm] GT0:     range 1..1 (1)
[  468.092716] ------------[ cut here ]------------
[  468.092719] WARNING: CPU: 14 PID: 4775 at drivers/gpu/drm/xe/xe_ttm_vram_mgr.c:298 ttm_vram_mgr_fini+0xf8/0x130 [xe]
"

v2: use xe_uc_fw_is_running() instead of xe_guc_ct_enabled().
    As CT may go down and come back during VF migration.

(cherry picked from commit 9b42321a02c50a12b2beb6ae9469606257fbecea)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40166/">CVE-2025-40166 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40166">CVE-2025-40166 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253433">SUSE bug 1253433</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40167</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40167" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40167" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40167" ref_url="https://www.suse.com/security/cve/CVE-2025-40167" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: detect invalid INLINE_DATA + EXTENTS flag combination

syzbot reported a BUG_ON in ext4_es_cache_extent() when opening a verity
file on a corrupted ext4 filesystem mounted without a journal.

The issue is that the filesystem has an inode with both the INLINE_DATA
and EXTENTS flags set:

    EXT4-fs error (device loop0): ext4_cache_extents:545: inode #15:
    comm syz.0.17: corrupted extent tree: lblk 0 &lt; prev 66

Investigation revealed that the inode has both flags set:
    DEBUG: inode 15 - flag=1, i_inline_off=164, has_inline=1, extents_flag=1

This is an invalid combination since an inode should have either:
- INLINE_DATA: data stored directly in the inode
- EXTENTS: data stored in extent-mapped blocks

Having both flags causes ext4_has_inline_data() to return true, skipping
extent tree validation in __ext4_iget(). The unvalidated out-of-order
extents then trigger a BUG_ON in ext4_es_cache_extent() due to integer
underflow when calculating hole sizes.

Fix this by detecting this invalid flag combination early in ext4_iget()
and rejecting the corrupted inode.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40167/">CVE-2025-40167 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40167">CVE-2025-40167 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253458">SUSE bug 1253458</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540168" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40168</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40168" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40168" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40168" ref_url="https://www.suse.com/security/cve/CVE-2025-40168" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2720" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002516.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3488" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smc: Use __sk_dst_get() and dst_dev_rcu() in smc_clc_prfx_match().

smc_clc_prfx_match() is called from smc_listen_work() and
not under RCU nor RTNL.

Using sk_dst_get(sk)-&gt;dev could trigger UAF.

Let's use __sk_dst_get() and dst_dev_rcu().

Note that the returned value of smc_clc_prfx_match() is not
used in the caller.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40168/">CVE-2025-40168 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40168">CVE-2025-40168 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253427">SUSE bug 1253427</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40169</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40169" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40169" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40169" ref_url="https://www.suse.com/security/cve/CVE-2025-40169" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Reject negative offsets for ALU ops

When verifying BPF programs, the check_alu_op() function validates
instructions with ALU operations. The 'offset' field in these
instructions is a signed 16-bit integer.

The existing check 'insn-&gt;off &gt; 1' was intended to ensure the offset is
either 0, or 1 for BPF_MOD/BPF_DIV. However, because 'insn-&gt;off' is
signed, this check incorrectly accepts all negative values (e.g., -1).

This commit tightens the validation by changing the condition to
'(insn-&gt;off != 0 &amp;&amp; insn-&gt;off != 1)'. This ensures that any value
other than the explicitly permitted 0 and 1 is rejected, hardening the
verifier against malformed BPF programs.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40169/">CVE-2025-40169 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40169">CVE-2025-40169 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253416">SUSE bug 1253416</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40170</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40170" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40170" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40170" ref_url="https://www.suse.com/security/cve/CVE-2025-40170" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2212" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003185.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2264" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002483.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: use dst_dev_rcu() in sk_setup_caps()

Use RCU to protect accesses to dst-&gt;dev from sk_setup_caps()
and sk_dst_gso_max_size().

Also use dst_dev_rcu() in ip6_dst_mtu_maybe_forward(),
and ip_dst_mtu_maybe_forward().

ip4_dst_hoplimit() can use dst_dev_net_rcu().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40170/">CVE-2025-40170 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40170">CVE-2025-40170 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253413">SUSE bug 1253413</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540171" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40171</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40171" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40171" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40171" ref_url="https://www.suse.com/security/cve/CVE-2025-40171" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvmet-fc: move lsop put work to nvmet_fc_ls_req_op

It's possible for more than one async command to be in flight from
__nvmet_fc_send_ls_req. For each command, a tgtport reference is taken.

In the current code, only one put work item is queued at a time, which
results in a leaked reference.

To fix this, move the work item to the nvmet_fc_ls_req_op struct, which
already tracks all resources related to the command.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40171/">CVE-2025-40171 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40171">CVE-2025-40171 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253412">SUSE bug 1253412</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540172" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40172</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40172" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40172" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40172" ref_url="https://www.suse.com/security/cve/CVE-2025-40172" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

accel/qaic: Treat remaining == 0 as error in find_and_map_user_pages()

Currently, if find_and_map_user_pages() takes a DMA xfer request from the
user with a length field set to 0, or in a rare case, the host receives
QAIC_TRANS_DMA_XFER_CONT from the device where resources-&gt;xferred_dma_size
is equal to the requested transaction size, the function will return 0
before allocating an sgt or setting the fields of the dma_xfer struct.
In that case, encode_addr_size_pairs() will try to access the sgt which
will lead to a general protection fault.

Return an EINVAL in case the user provides a zero-sized ALP, or the device
requests continuation after all of the bytes have been transferred.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40172/">CVE-2025-40172 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40172">CVE-2025-40172 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253424">SUSE bug 1253424</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540173" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40173</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40173" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40173" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40173" ref_url="https://www.suse.com/security/cve/CVE-2025-40173" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/ip6_tunnel: Prevent perpetual tunnel growth

Similarly to ipv4 tunnel, ipv6 version updates dev-&gt;needed_headroom, too.
While ipv4 tunnel headroom adjustment growth was limited in
commit 5ae1e9922bbd ("net: ip_tunnel: prevent perpetual headroom growth"),
ipv6 tunnel yet increases the headroom without any ceiling.

Reflect ipv4 tunnel headroom adjustment limit on ipv6 version.

Credits to Francesco Ruggeri, who was originally debugging this issue
and wrote local Arista-specific patch and a reproducer.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40173/">CVE-2025-40173 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40173">CVE-2025-40173 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253421">SUSE bug 1253421</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540175" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40175</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40175" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40175" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40175" ref_url="https://www.suse.com/security/cve/CVE-2025-40175" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

idpf: cleanup remaining SKBs in PTP flows

When the driver requests Tx timestamp value, one of the first steps is
to clone SKB using skb_get. It increases the reference counter for that
SKB to prevent unexpected freeing by another component.
However, there may be a case where the index is requested, SKB is
assigned and never consumed by PTP flows - for example due to reset during
running PTP apps.

Add a check in release timestamping function to verify if the SKB
assigned to Tx timestamp latch was freed, and release remaining SKBs.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40175/">CVE-2025-40175 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40175">CVE-2025-40175 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253426">SUSE bug 1253426</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40176</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40176" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40176" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40176" ref_url="https://www.suse.com/security/cve/CVE-2025-40176" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23241" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tls: wait for pending async decryptions if tls_strp_msg_hold fails

Async decryption calls tls_strp_msg_hold to create a clone of the
input skb to hold references to the memory it uses. If we fail to
allocate that clone, proceeding with async decryption can lead to
various issues (UAF on the skb, writing into userspace memory after
the recv() call has returned).

In this case, wait for all pending decryption requests.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40176/">CVE-2025-40176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40176">CVE-2025-40176 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253425">SUSE bug 1253425</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254100">SUSE bug 1254100</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40177</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40177" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40177" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40177" ref_url="https://www.suse.com/security/cve/CVE-2025-40177" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

accel/qaic: Fix bootlog initialization ordering

As soon as we queue MHI buffers to receive the bootlog from the device,
we could be receiving data. Therefore all the resources needed to
process that data need to be setup prior to queuing the buffers.

We currently initialize some of the resources after queuing the buffers
which creates a race between the probe() and any data that comes back
from the device. If the uninitialized resources are accessed, we could
see page faults.

Fix the init ordering to close the race.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40177/">CVE-2025-40177 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40177">CVE-2025-40177 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253443">SUSE bug 1253443</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40178</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40178" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40178" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40178" ref_url="https://www.suse.com/security/cve/CVE-2025-40178" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pid: Add a judgment for ns null in pid_nr_ns

__task_pid_nr_ns
        ns = task_active_pid_ns(current);
        pid_nr_ns(rcu_dereference(*task_pid_ptr(task, type)), ns);
                if (pid &amp;&amp; ns-&gt;level &lt;= pid-&gt;level) {

Sometimes null is returned for task_active_pid_ns. Then it will trigger kernel panic in pid_nr_ns.

For example:
	Unable to handle kernel NULL pointer dereference at virtual address 0000000000000058
	Mem abort info:
	ESR = 0x0000000096000007
	EC = 0x25: DABT (current EL), IL = 32 bits
	SET = 0, FnV = 0
	EA = 0, S1PTW = 0
	FSC = 0x07: level 3 translation fault
	Data abort info:
	ISV = 0, ISS = 0x00000007, ISS2 = 0x00000000
	CM = 0, WnR = 0, TnD = 0, TagAccess = 0
	GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0
	user pgtable: 4k pages, 39-bit VAs, pgdp=00000002175aa000
	[0000000000000058] pgd=08000002175ab003, p4d=08000002175ab003, pud=08000002175ab003, pmd=08000002175be003, pte=0000000000000000
	pstate: 834000c5 (Nzcv daIF +PAN -UAO +TCO +DIT -SSBS BTYPE=--)
	pc : __task_pid_nr_ns+0x74/0xd0
	lr : __task_pid_nr_ns+0x24/0xd0
	sp : ffffffc08001bd10
	x29: ffffffc08001bd10 x28: ffffffd4422b2000 x27: 0000000000000001
	x26: ffffffd442821168 x25: ffffffd442821000 x24: 00000f89492eab31
	x23: 00000000000000c0 x22: ffffff806f5693c0 x21: ffffff806f5693c0
	x20: 0000000000000001 x19: 0000000000000000 x18: 0000000000000000
	x17: 00000000529c6ef0 x16: 00000000529c6ef0 x15: 00000000023a1adc
	x14: 0000000000000003 x13: 00000000007ef6d8 x12: 001167c391c78800
	x11: 00ffffffffffffff x10: 0000000000000000 x9 : 0000000000000001
	x8 : ffffff80816fa3c0 x7 : 0000000000000000 x6 : 49534d702d535449
	x5 : ffffffc080c4c2c0 x4 : ffffffd43ee128c8 x3 : ffffffd43ee124dc
	x2 : 0000000000000000 x1 : 0000000000000001 x0 : ffffff806f5693c0
	Call trace:
	__task_pid_nr_ns+0x74/0xd0
	...
	__handle_irq_event_percpu+0xd4/0x284
	handle_irq_event+0x48/0xb0
	handle_fasteoi_irq+0x160/0x2d8
	generic_handle_domain_irq+0x44/0x60
	gic_handle_irq+0x4c/0x114
	call_on_irq_stack+0x3c/0x74
	do_interrupt_handler+0x4c/0x84
	el1_interrupt+0x34/0x58
	el1h_64_irq_handler+0x18/0x24
	el1h_64_irq+0x68/0x6c
	account_kernel_stack+0x60/0x144
	exit_task_stack_account+0x1c/0x80
	do_exit+0x7e4/0xaf8
	...
	get_signal+0x7bc/0x8d8
	do_notify_resume+0x128/0x828
	el0_svc+0x6c/0x70
	el0t_64_sync_handler+0x68/0xbc
	el0t_64_sync+0x1a8/0x1ac
	Code: 35fffe54 911a02a8 f9400108 b4000128 (b9405a69)
	---[ end trace 0000000000000000 ]---
	Kernel panic - not syncing: Oops: Fatal exception in interrupt
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40178/">CVE-2025-40178 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40178">CVE-2025-40178 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253463">SUSE bug 1253463</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40179</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40179" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40179" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40179" ref_url="https://www.suse.com/security/cve/CVE-2025-40179" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: verify orphan file size is not too big

In principle orphan file can be arbitrarily large. However orphan replay
needs to traverse it all and we also pin all its buffers in memory. Thus
filesystems with absurdly large orphan files can lead to big amounts of
memory consumed. Limit orphan file size to a sane value and also use
kvmalloc() for allocating array of block descriptor structures to avoid
large order allocations for sane but large orphan files.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40179/">CVE-2025-40179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40179">CVE-2025-40179 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253442">SUSE bug 1253442</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40180</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40180" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40180" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40180" ref_url="https://www.suse.com/security/cve/CVE-2025-40180" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mailbox: zynqmp-ipi: Fix out-of-bounds access in mailbox cleanup loop

The cleanup loop was starting at the wrong array index, causing
out-of-bounds access.
Start the loop at the correct index for zero-indexed arrays to prevent
accessing memory beyond the allocated array bounds.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40180/">CVE-2025-40180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40180">CVE-2025-40180 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253440">SUSE bug 1253440</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40183</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40183" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40183" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40183" ref_url="https://www.suse.com/security/cve/CVE-2025-40183" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix metadata_dst leak __bpf_redirect_neigh_v{4,6}

Cilium has a BPF egress gateway feature which forces outgoing K8s Pod
traffic to pass through dedicated egress gateways which then SNAT the
traffic in order to interact with stable IPs outside the cluster.

The traffic is directed to the gateway via vxlan tunnel in collect md
mode. A recent BPF change utilized the bpf_redirect_neigh() helper to
forward packets after the arrival and decap on vxlan, which turned out
over time that the kmalloc-256 slab usage in kernel was ever-increasing.

The issue was that vxlan allocates the metadata_dst object and attaches
it through a fake dst entry to the skb. The latter was never released
though given bpf_redirect_neigh() was merely setting the new dst entry
via skb_dst_set() without dropping an existing one first.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40183/">CVE-2025-40183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40183">CVE-2025-40183 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253441">SUSE bug 1253441</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40185</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40185" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40185" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40185" ref_url="https://www.suse.com/security/cve/CVE-2025-40185" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:22405" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: ice_adapter: release xa entry on adapter allocation failure

When ice_adapter_new() fails, the reserved XArray entry created by
xa_insert() is not released. This causes subsequent insertions at
the same index to return -EBUSY, potentially leading to
NULL pointer dereferences.

Reorder the operations as suggested by Przemek Kitszel:
1. Check if adapter already exists (xa_load)
2. Reserve the XArray slot (xa_reserve)
3. Allocate the adapter (ice_adapter_new)
4. Store the adapter (xa_store)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40185/">CVE-2025-40185 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40185">CVE-2025-40185 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253394">SUSE bug 1253394</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40186</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40186" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40186" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40186" ref_url="https://www.suse.com/security/cve/CVE-2025-40186" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0489-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024153.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0491-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0524-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024254.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0546-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024245.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0548-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0550-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0551-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0554-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0555-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0556-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024269.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20455-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20456-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20457-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20458-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20459-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044340.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20460-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20461-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20462-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20463-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20464-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20465-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20466-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20467-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20468-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20469-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20470-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20471-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044328.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20472-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044327.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024475.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20500-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024474.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20501-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20502-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20507-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20508-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20511-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20512-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20513-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024462.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024461.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024458.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20541-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20558-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20635-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024643.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024655.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tcp: Don't call reqsk_fastopen_remove() in tcp_conn_request().

syzbot reported the splat below in tcp_conn_request(). [0]

If a listener is close()d while a TFO socket is being processed in
tcp_conn_request(), inet_csk_reqsk_queue_add() does not set reqsk-&gt;sk
and calls inet_child_forget(), which calls tcp_disconnect() for the
TFO socket.

After the cited commit, tcp_disconnect() calls reqsk_fastopen_remove(),
where reqsk_put() is called due to !reqsk-&gt;sk.

Then, reqsk_fastopen_remove() in tcp_conn_request() decrements the
last req-&gt;rsk_refcnt and frees reqsk, and __reqsk_free() at the
drop_and_free label causes the refcount underflow for the listener
and double-free of the reqsk.

Let's remove reqsk_fastopen_remove() in tcp_conn_request().

Note that other callers make sure tp-&gt;fastopen_rsk is not NULL.

[0]:
refcount_t: underflow; use-after-free.
WARNING: CPU: 12 PID: 5563 at lib/refcount.c:28 refcount_warn_saturate (lib/refcount.c:28)
Modules linked in:
CPU: 12 UID: 0 PID: 5563 Comm: syz-executor Not tainted syzkaller #0 PREEMPT(full)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025
RIP: 0010:refcount_warn_saturate (lib/refcount.c:28)
Code: ab e8 8e b4 98 ff 0f 0b c3 cc cc cc cc cc 80 3d a4 e4 d6 01 00 75 9c c6 05 9b e4 d6 01 01 48 c7 c7 e8 df fb ab e8 6a b4 98 ff &lt;0f&gt; 0b e9 03 5b 76 00 cc 80 3d 7d e4 d6 01 00 0f 85 74 ff ff ff c6
RSP: 0018:ffffa79fc0304a98 EFLAGS: 00010246
RAX: d83af4db1c6b3900 RBX: ffff9f65c7a69020 RCX: d83af4db1c6b3900
RDX: 0000000000000000 RSI: 00000000ffff7fff RDI: ffffffffac78a280
RBP: 000000009d781b60 R08: 0000000000007fff R09: ffffffffac6ca280
R10: 0000000000017ffd R11: 0000000000000004 R12: ffff9f65c7b4f100
R13: ffff9f65c7d23c00 R14: ffff9f65c7d26000 R15: ffff9f65c7a64ef8
FS:  00007f9f962176c0(0000) GS:ffff9f65fcf00000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000200000000180 CR3: 000000000dbbe006 CR4: 0000000000372ef0
Call Trace:
 &lt;IRQ&gt;
 tcp_conn_request (./include/linux/refcount.h:400 ./include/linux/refcount.h:432 ./include/linux/refcount.h:450 ./include/net/sock.h:1965 ./include/net/request_sock.h:131 net/ipv4/tcp_input.c:7301)
 tcp_rcv_state_process (net/ipv4/tcp_input.c:6708)
 tcp_v6_do_rcv (net/ipv6/tcp_ipv6.c:1670)
 tcp_v6_rcv (net/ipv6/tcp_ipv6.c:1906)
 ip6_protocol_deliver_rcu (net/ipv6/ip6_input.c:438)
 ip6_input (net/ipv6/ip6_input.c:500)
 ipv6_rcv (net/ipv6/ip6_input.c:311)
 __netif_receive_skb (net/core/dev.c:6104)
 process_backlog (net/core/dev.c:6456)
 __napi_poll (net/core/dev.c:7506)
 net_rx_action (net/core/dev.c:7569 net/core/dev.c:7696)
 handle_softirqs (kernel/softirq.c:579)
 do_softirq (kernel/softirq.c:480)
 &lt;/IRQ&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40186/">CVE-2025-40186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40186">CVE-2025-40186 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253438">SUSE bug 1253438</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253439">SUSE bug 1253439</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40187</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40187" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40187" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40187" ref_url="https://www.suse.com/security/cve/CVE-2025-40187" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sctp: fix a null dereference in sctp_disposition sctp_sf_do_5_1D_ce()

If new_asoc-&gt;peer.adaptation_ind=0 and sctp_ulpevent_make_authkey=0
and sctp_ulpevent_make_authkey() returns 0, then the variable
ai_ev remains zero and the zero will be dereferenced
in the sctp_ulpevent_free() function.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40187/">CVE-2025-40187 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40187">CVE-2025-40187 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253647">SUSE bug 1253647</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40188</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40188" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40188" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40188" ref_url="https://www.suse.com/security/cve/CVE-2025-40188" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pwm: berlin: Fix wrong register in suspend/resume

The 'enable' register should be BERLIN_PWM_EN rather than
BERLIN_PWM_ENABLE, otherwise, the driver accesses wrong address, there
will be cpu exception then kernel panic during suspend/resume.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40188/">CVE-2025-40188 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40188">CVE-2025-40188 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253449">SUSE bug 1253449</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540190" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40190</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40190" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40190" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40190" ref_url="https://www.suse.com/security/cve/CVE-2025-40190" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: guard against EA inode refcount underflow in xattr update

syzkaller found a path where ext4_xattr_inode_update_ref() reads an EA
inode refcount that is already &lt;= 0 and then applies ref_change (often
-1). That lets the refcount underflow and we proceed with a bogus value,
triggering errors like:

  EXT4-fs error: EA inode &lt;n&gt; ref underflow: ref_count=-1 ref_change=-1
  EXT4-fs warning: ea_inode dec ref err=-117

Make the invariant explicit: if the current refcount is non-positive,
treat this as on-disk corruption, emit ext4_error_inode(), and fail the
operation with -EFSCORRUPTED instead of updating the refcount. Delete the
WARN_ONCE() as negative refcounts are now impossible; keep error reporting
in ext4_error_inode().

This prevents the underflow and the follow-on orphan/cleanup churn.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40190/">CVE-2025-40190 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40190">CVE-2025-40190 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253623">SUSE bug 1253623</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540192" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40192</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40192" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40192" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40192" ref_url="https://www.suse.com/security/cve/CVE-2025-40192" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Revert "ipmi: fix msg stack when IPMI is disconnected"

This reverts commit c608966f3f9c2dca596967501d00753282b395fc.

This patch has a subtle bug that can cause the IPMI driver to go into an
infinite loop if the BMC misbehaves in a certain way.  Apparently
certain BMCs do misbehave this way because several reports have come in
recently about this.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40192/">CVE-2025-40192 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40192">CVE-2025-40192 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253622">SUSE bug 1253622</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540194" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40194</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40194" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40194" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40194" ref_url="https://www.suse.com/security/cve/CVE-2025-40194" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cpufreq: intel_pstate: Fix object lifecycle issue in update_qos_request()

The cpufreq_cpu_put() call in update_qos_request() takes place too early
because the latter subsequently calls freq_qos_update_request() that
indirectly accesses the policy object in question through the QoS request
object passed to it.

Fortunately, update_qos_request() is called under intel_pstate_driver_lock,
so this issue does not matter for changing the intel_pstate operation
mode, but it theoretically can cause a crash to occur on CPU device hot
removal (which currently can only happen in virt, but it is formally
supported nevertheless).

Address this issue by modifying update_qos_request() to drop the
reference to the policy later.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40194/">CVE-2025-40194 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40194">CVE-2025-40194 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253445">SUSE bug 1253445</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40195</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40195" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40195" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40195" ref_url="https://www.suse.com/security/cve/CVE-2025-40195" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mount: handle NULL values in mnt_ns_release()

When calling in listmount() mnt_ns_release() may be passed a NULL
pointer. Handle that case gracefully.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40195/">CVE-2025-40195 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40195">CVE-2025-40195 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253500">SUSE bug 1253500</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40196</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40196" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40196" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40196" ref_url="https://www.suse.com/security/cve/CVE-2025-40196" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs: quota: create dedicated workqueue for quota_release_work

There is a kernel panic due to WARN_ONCE when panic_on_warn is set.

This issue occurs when writeback is triggered due to sync call for an
opened file(ie, writeback reason is WB_REASON_SYNC). When f2fs balance
is needed at sync path, flush for quota_release_work is triggered.
By default quota_release_work is queued to "events_unbound" queue which
does not have WQ_MEM_RECLAIM flag. During f2fs balance "writeback"
workqueue tries to flush quota_release_work causing kernel panic due to
MEM_RECLAIM flag mismatch errors.

This patch creates dedicated workqueue with WQ_MEM_RECLAIM flag
for work quota_release_work.

------------[ cut here ]------------
WARNING: CPU: 4 PID: 14867 at kernel/workqueue.c:3721 check_flush_dependency+0x13c/0x148
Call trace:
 check_flush_dependency+0x13c/0x148
 __flush_work+0xd0/0x398
 flush_delayed_work+0x44/0x5c
 dquot_writeback_dquots+0x54/0x318
 f2fs_do_quota_sync+0xb8/0x1a8
 f2fs_write_checkpoint+0x3cc/0x99c
 f2fs_gc+0x190/0x750
 f2fs_balance_fs+0x110/0x168
 f2fs_write_single_data_page+0x474/0x7dc
 f2fs_write_data_pages+0x7d0/0xd0c
 do_writepages+0xe0/0x2f4
 __writeback_single_inode+0x44/0x4ac
 writeback_sb_inodes+0x30c/0x538
 wb_writeback+0xf4/0x440
 wb_workfn+0x128/0x5d4
 process_scheduled_works+0x1c4/0x45c
 worker_thread+0x32c/0x3e8
 kthread+0x11c/0x1b0
 ret_from_fork+0x10/0x20
Kernel panic - not syncing: kernel: panic_on_warn set ...
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-06"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40196/">CVE-2025-40196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40196">CVE-2025-40196 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253624">SUSE bug 1253624</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40197</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40197" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40197" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40197" ref_url="https://www.suse.com/security/cve/CVE-2025-40197" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: mc: Clear minor number before put device

The device minor should not be cleared after the device is released.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40197/">CVE-2025-40197 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40197">CVE-2025-40197 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253450">SUSE bug 1253450</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40198</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40198" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40198" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40198" ref_url="https://www.suse.com/security/cve/CVE-2025-40198" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: avoid potential buffer over-read in parse_apply_sb_mount_options()

Unlike other strings in the ext4 superblock, we rely on tune2fs to
make sure s_mount_opts is NUL terminated.  Harden
parse_apply_sb_mount_options() by treating s_mount_opts as a potential
__nonstring.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40198/">CVE-2025-40198 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40198">CVE-2025-40198 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253453">SUSE bug 1253453</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40200</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40200" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40200" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40200" ref_url="https://www.suse.com/security/cve/CVE-2025-40200" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Squashfs: reject negative file sizes in squashfs_read_inode()

Syskaller reports a "WARNING in ovl_copy_up_file" in overlayfs.

This warning is ultimately caused because the underlying Squashfs file
system returns a file with a negative file size.

This commit checks for a negative file size and returns EINVAL.

[phillip@squashfs.org.uk: only need to check 64 bit quantity]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40200/">CVE-2025-40200 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40200">CVE-2025-40200 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253448">SUSE bug 1253448</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40201</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40201" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40201" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40201" ref_url="https://www.suse.com/security/cve/CVE-2025-40201" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

kernel/sys.c: fix the racy usage of task_lock(tsk-&gt;group_leader) in sys_prlimit64() paths

The usage of task_lock(tsk-&gt;group_leader) in sys_prlimit64()-&gt;do_prlimit()
path is very broken.

sys_prlimit64() does get_task_struct(tsk) but this only protects task_struct
itself. If tsk != current and tsk is not a leader, this process can exit/exec
and task_lock(tsk-&gt;group_leader) may use the already freed task_struct.

Another problem is that sys_prlimit64() can race with mt-exec which changes
-&gt;group_leader. In this case do_prlimit() may take the wrong lock, or (worse)
-&gt;group_leader may change between task_lock() and task_unlock().

Change sys_prlimit64() to take tasklist_lock when necessary. This is not
nice, but I don't see a better fix for -stable.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40201/">CVE-2025-40201 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40201">CVE-2025-40201 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253455">SUSE bug 1253455</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40202</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40202" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40202" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40202" ref_url="https://www.suse.com/security/cve/CVE-2025-40202" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipmi: Rework user message limit handling

The limit on the number of user messages had a number of issues,
improper counting in some cases and a use after free.

Restructure how this is all done to handle more in the receive message
allocation routine, so all refcouting and user message limit counts
are done in that routine.  It's a lot cleaner and safer.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40202/">CVE-2025-40202 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40202">CVE-2025-40202 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253451">SUSE bug 1253451</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540203" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40203</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40203" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40203" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40203" ref_url="https://www.suse.com/security/cve/CVE-2025-40203" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

listmount: don't call path_put() under namespace semaphore

Massage listmount() and make sure we don't call path_put() under the
namespace semaphore. If we put the last reference we're fscked.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40203/">CVE-2025-40203 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40203">CVE-2025-40203 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253457">SUSE bug 1253457</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540204" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40204</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40204" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40204" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40204" ref_url="https://www.suse.com/security/cve/CVE-2025-40204" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023639.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023658.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0033-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0034-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0166-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023801.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0173-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023800.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0174-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023798.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023840.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0203-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0204-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0209-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0246-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0247-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0269-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023907.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0283-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0284-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20248-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20249-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20250-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20251-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024223.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024228.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20256-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024215.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20261-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20262-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024213.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024218.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024217.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20376-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20379-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20380-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20381-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20385-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20392-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20394-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20395-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20396-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20397-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20399-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20400-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sctp: Fix MAC comparison to be constant-time

To prevent timing attacks, MACs need to be compared in constant time.
Use the appropriate helper function for this.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-07"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40204/">CVE-2025-40204 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40204">CVE-2025-40204 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253436">SUSE bug 1253436</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1253437">SUSE bug 1253437</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540205" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40205</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40205" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40205" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40205" ref_url="https://www.suse.com/security/cve/CVE-2025-40205" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4515-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: avoid potential out-of-bounds in btrfs_encode_fh()

The function btrfs_encode_fh() does not properly account for the three
cases it handles.

Before writing to the file handle (fh), the function only returns to the
user BTRFS_FID_SIZE_NON_CONNECTABLE (5 dwords, 20 bytes) or
BTRFS_FID_SIZE_CONNECTABLE (8 dwords, 32 bytes).

However, when a parent exists and the root ID of the parent and the
inode are different, the function writes BTRFS_FID_SIZE_CONNECTABLE_ROOT
(10 dwords, 40 bytes).

If *max_len is not large enough, this write goes out of bounds because
BTRFS_FID_SIZE_CONNECTABLE_ROOT is greater than
BTRFS_FID_SIZE_CONNECTABLE originally returned.

This results in an 8-byte out-of-bounds write at
fid-&gt;parent_root_objectid = parent_root_id.

A previous attempt to fix this issue was made but was lost.

https://lore.kernel.org/all/4CADAEEC020000780001B32C@vpn.id2.novell.com/

Although this issue does not seem to be easily triggerable, it is a
potential memory corruption bug that should be fixed. This patch
resolves the issue by ensuring the function returns the appropriate size
for all three cases and validates that *max_len is large enough before
writing any data.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40205/">CVE-2025-40205 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40205">CVE-2025-40205 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253456">SUSE bug 1253456</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540206" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40206</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40206" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40206" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40206" ref_url="https://www.suse.com/security/cve/CVE-2025-40206" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nft_objref: validate objref and objrefmap expressions

Referencing a synproxy stateful object from OUTPUT hook causes kernel
crash due to infinite recursive calls:

BUG: TASK stack guard page was hit at 000000008bda5b8c (stack is 000000003ab1c4a5..00000000494d8b12)
[...]
Call Trace:
 __find_rr_leaf+0x99/0x230
 fib6_table_lookup+0x13b/0x2d0
 ip6_pol_route+0xa4/0x400
 fib6_rule_lookup+0x156/0x240
 ip6_route_output_flags+0xc6/0x150
 __nf_ip6_route+0x23/0x50
 synproxy_send_tcp_ipv6+0x106/0x200
 synproxy_send_client_synack_ipv6+0x1aa/0x1f0
 nft_synproxy_do_eval+0x263/0x310
 nft_do_chain+0x5a8/0x5f0 [nf_tables
 nft_do_chain_inet+0x98/0x110
 nf_hook_slow+0x43/0xc0
 __ip6_local_out+0xf0/0x170
 ip6_local_out+0x17/0x70
 synproxy_send_tcp_ipv6+0x1a2/0x200
 synproxy_send_client_synack_ipv6+0x1aa/0x1f0
[...]

Implement objref and objrefmap expression validate functions.

Currently, only NFT_OBJECT_SYNPROXY object type requires validation.
This will also handle a jump to a chain using a synproxy object from the
OUTPUT hook.

Now when trying to reference a synproxy object in the OUTPUT hook, nft
will produce the following error:

synproxy_crash.nft: Error: Could not process rule: Operation not supported
  synproxy name mysynproxy
  ^^^^^^^^^^^^^^^^^^^^^^^^
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40206/">CVE-2025-40206 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40206">CVE-2025-40206 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253393">SUSE bug 1253393</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40207</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40207" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40207" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40207" ref_url="https://www.suse.com/security/cve/CVE-2025-40207" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4393-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023538.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4516-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023646.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4521-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20015-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023727.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023767.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20473-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024477.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20519-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024456.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20562-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024577.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: v4l2-subdev: Fix alloc failure check in v4l2_subdev_call_state_try()

v4l2_subdev_call_state_try() macro allocates a subdev state with
__v4l2_subdev_state_alloc(), but does not check the returned value. If
__v4l2_subdev_state_alloc fails, it returns an ERR_PTR, and that would
cause v4l2_subdev_call_state_try() to crash.

Add proper error handling to v4l2_subdev_call_state_try().
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40207/">CVE-2025-40207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40207">CVE-2025-40207 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253395">SUSE bug 1253395</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035060" comment="cluster-md-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035061" comment="cluster-md-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035062" comment="cluster-md-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035063" comment="dlm-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035064" comment="dlm-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035065" comment="dlm-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035066" comment="dtb-allwinner-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035067" comment="dtb-altera-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035068" comment="dtb-amazon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035069" comment="dtb-amd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035070" comment="dtb-amlogic-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035071" comment="dtb-apm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035072" comment="dtb-apple-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035073" comment="dtb-arm-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035074" comment="dtb-broadcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035075" comment="dtb-cavium-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035076" comment="dtb-exynos-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035077" comment="dtb-freescale-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035078" comment="dtb-hisilicon-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035079" comment="dtb-lg-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035080" comment="dtb-marvell-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035081" comment="dtb-mediatek-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035082" comment="dtb-nvidia-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035083" comment="dtb-qcom-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035084" comment="dtb-renesas-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035085" comment="dtb-rockchip-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035086" comment="dtb-socionext-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035087" comment="dtb-sprd-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035088" comment="dtb-xilinx-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035089" comment="gfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035090" comment="gfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035091" comment="gfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035092" comment="kernel-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035094" comment="kernel-64kb-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035095" comment="kernel-64kb-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035096" comment="kernel-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035097" comment="kernel-default-base-6.12.0-160000.8.1.160000.2.5 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035099" comment="kernel-default-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035100" comment="kernel-default-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035101" comment="kernel-default-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035103" comment="kernel-docs-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035104" comment="kernel-docs-html-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035105" comment="kernel-kvmsmall-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035107" comment="kernel-kvmsmall-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035108" comment="kernel-macros-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035109" comment="kernel-obs-build-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035110" comment="kernel-obs-qa-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035111" comment="kernel-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035113" comment="kernel-rt-extra-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035114" comment="kernel-rt-optional-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035115" comment="kernel-rt-vdso-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035116" comment="kernel-source-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035117" comment="kernel-source-vanilla-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035118" comment="kernel-syms-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035119" comment="kernel-zfcpdump-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035120" comment="kselftests-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035121" comment="kselftests-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035122" comment="kselftests-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035123" comment="ocfs2-kmp-64kb-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035124" comment="ocfs2-kmp-default-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035125" comment="ocfs2-kmp-rt-6.12.0-160000.8.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40209</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40209" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40209" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40209" ref_url="https://www.suse.com/security/cve/CVE-2025-40209" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix memory leak of qgroup_list in btrfs_add_qgroup_relation

When btrfs_add_qgroup_relation() is called with invalid qgroup levels
(src &gt;= dst), the function returns -EINVAL directly without freeing the
preallocated qgroup_list structure passed by the caller. This causes a
memory leak because the caller unconditionally sets the pointer to NULL
after the call, preventing any cleanup.

The issue occurs because the level validation check happens before the
mutex is acquired and before any error handling path that would free
the prealloc pointer. On this early return, the cleanup code at the
'out' label (which includes kfree(prealloc)) is never reached.

In btrfs_ioctl_qgroup_assign(), the code pattern is:

    prealloc = kzalloc(sizeof(*prealloc), GFP_KERNEL);
    ret = btrfs_add_qgroup_relation(trans, sa-&gt;src, sa-&gt;dst, prealloc);
    prealloc = NULL;  // Always set to NULL regardless of return value
    ...
    kfree(prealloc);  // This becomes kfree(NULL), does nothing

When the level check fails, 'prealloc' is never freed by either the
callee or the caller, resulting in a 64-byte memory leak per failed
operation. This can be triggered repeatedly by an unprivileged user
with access to a writable btrfs mount, potentially exhausting kernel
memory.

Fix this by freeing prealloc before the early return, ensuring prealloc
is always freed on all error paths.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40209/">CVE-2025-40209 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40209">CVE-2025-40209 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254128">SUSE bug 1254128</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540211" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40211</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40211" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40211" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40211" ref_url="https://www.suse.com/security/cve/CVE-2025-40211" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ACPI: video: Fix use-after-free in acpi_video_switch_brightness()

The switch_brightness_work delayed work accesses device-&gt;brightness
and device-&gt;backlight, freed by acpi_video_dev_unregister_backlight()
during device removal.

If the work executes after acpi_video_bus_unregister_backlight()
frees these resources, it causes a use-after-free when
acpi_video_switch_brightness() dereferences device-&gt;brightness or
device-&gt;backlight.

Fix this by calling cancel_delayed_work_sync() for each device's
switch_brightness_work in acpi_video_bus_remove_notify_handler()
after removing the notify handler that queues the work. This ensures
the work completes before the memory is freed.

[ rjw: Changelog edit ]
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40211/">CVE-2025-40211 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40211">CVE-2025-40211 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254126">SUSE bug 1254126</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540212" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40212</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40212" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40212" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40212" ref_url="https://www.suse.com/security/cve/CVE-2025-40212" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023950.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20163-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20165-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023941.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20169-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20171-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfsd: fix refcount leak in nfsd_set_fh_dentry()

nfsd exports a "pseudo root filesystem" which is used by NFSv4 to find
the various exported filesystems using LOOKUP requests from a known root
filehandle.  NFSv3 uses the MOUNT protocol to find those exported
filesystems and so is not given access to the pseudo root filesystem.

If a v3 (or v2) client uses a filehandle from that filesystem,
nfsd_set_fh_dentry() will report an error, but still stores the export
in "struct svc_fh" even though it also drops the reference (exp_put()).
This means that when fh_put() is called an extra reference will be dropped
which can lead to use-after-free and possible denial of service.

Normal NFS usage will not provide a pseudo-root filehandle to a v3
client.  This bug can only be triggered by the client synthesising an
incorrect filehandle.

To fix this we move the assignments to the svc_fh later, after all
possible error cases have been detected.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-25"/>
	<updated date="2026-04-08"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40212/">CVE-2025-40212 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40212">CVE-2025-40212 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254195">SUSE bug 1254195</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254196">SUSE bug 1254196</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540213" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40213</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40213" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40213" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40213" ref_url="https://www.suse.com/security/cve/CVE-2025-40213" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: MGMT: fix crash in set_mesh_sync and set_mesh_complete

There is a BUG: KASAN: stack-out-of-bounds in set_mesh_sync due to
memcpy from badly declared on-stack flexible array.

Another crash is in set_mesh_complete() due to double list_del via
mgmt_pending_valid + mgmt_pending_remove.

Use DEFINE_FLEX to declare the flexible array right, and don't memcpy
outside bounds.

As mgmt_pending_valid removes the cmd from list, use mgmt_pending_free,
and also report status on error.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40213/">CVE-2025-40213 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40213">CVE-2025-40213 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253674">SUSE bug 1253674</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40214</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40214" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40214" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40214" ref_url="https://www.suse.com/security/cve/CVE-2025-40214" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20944-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20945-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20946-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045205.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

af_unix: Initialise scc_index in unix_add_edge().

Quang Le reported that the AF_UNIX GC could garbage-collect a
receive queue of an alive in-flight socket, with a nice repro.

The repro consists of three stages.

  1)
    1-a. Create a single cyclic reference with many sockets
    1-b. close() all sockets
    1-c. Trigger GC

  2)
    2-a. Pass sk-A to an embryo sk-B
    2-b. Pass sk-X to sk-X
    2-c. Trigger GC

  3)
    3-a. accept() the embryo sk-B
    3-b. Pass sk-B to sk-C
    3-c. close() the in-flight sk-A
    3-d. Trigger GC

As of 2-c, sk-A and sk-X are linked to unix_unvisited_vertices,
and unix_walk_scc() groups them into two different SCCs:

  unix_sk(sk-A)-&gt;vertex-&gt;scc_index = 2 (UNIX_VERTEX_INDEX_START)
  unix_sk(sk-X)-&gt;vertex-&gt;scc_index = 3

Once GC completes, unix_graph_grouped is set to true.
Also, unix_graph_maybe_cyclic is set to true due to sk-X's
cyclic self-reference, which makes close() trigger GC.

At 3-b, unix_add_edge() allocates unix_sk(sk-B)-&gt;vertex and
links it to unix_unvisited_vertices.

unix_update_graph() is called at 3-a. and 3-b., but neither
unix_graph_grouped nor unix_graph_maybe_cyclic is changed
because both sk-B's listener and sk-C are not in-flight.

3-c decrements sk-A's file refcnt to 1.

Since unix_graph_grouped is true at 3-d, unix_walk_scc_fast()
is finally called and iterates 3 sockets sk-A, sk-B, and sk-X:

  sk-A -&gt; sk-B (-&gt; sk-C)
  sk-X -&gt; sk-X

This is totally fine.  All of them are not yet close()d and
should be grouped into different SCCs.

However, unix_vertex_dead() misjudges that sk-A and sk-B are
in the same SCC and sk-A is dead.

  unix_sk(sk-A)-&gt;scc_index == unix_sk(sk-B)-&gt;scc_index &lt;-- Wrong!
  &amp;&amp;
  sk-A's file refcnt == unix_sk(sk-A)-&gt;vertex-&gt;out_degree
                                       ^-- 1 in-flight count for sk-B
  -&gt; sk-A is dead !?

The problem is that unix_add_edge() does not initialise scc_index.

Stage 1) is used for heap spraying, making a newly allocated
vertex have vertex-&gt;scc_index == 2 (UNIX_VERTEX_INDEX_START)
set by unix_walk_scc() at 1-c.

Let's track the max SCC index from the previous unix_walk_scc()
call and assign the max + 1 to a new vertex's scc_index.

This way, we can continue to avoid Tarjan's algorithm while
preventing misjudgments.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-04-02"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40214/">CVE-2025-40214 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40214">CVE-2025-40214 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254961">SUSE bug 1254961</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255052">SUSE bug 1255052</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540215" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40215</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40215" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40215" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40215" ref_url="https://www.suse.com/security/cve/CVE-2025-40215" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xfrm: delete x-&gt;tunnel as we delete x

The ipcomp fallback tunnels currently get deleted (from the various
lists and hashtables) as the last user state that needed that fallback
is destroyed (not deleted). If a reference to that user state still
exists, the fallback state will remain on the hashtables/lists,
triggering the WARN in xfrm_state_fini. Because of those remaining
references, the fix in commit f75a2804da39 ("xfrm: destroy xfrm_state
synchronously on net exit path") is not complete.

We recently fixed one such situation in TCP due to defered freeing of
skbs (commit 9b6412e6979f ("tcp: drop secpath at the same time as we
currently drop dst")). This can also happen due to IP reassembly: skbs
with a secpath remain on the reassembly queue until netns
destruction. If we can't guarantee that the queues are flushed by the
time xfrm_state_fini runs, there may still be references to a (user)
xfrm_state, preventing the timely deletion of the corresponding
fallback state.

Instead of chasing each instance of skbs holding a secpath one by one,
this patch fixes the issue directly within xfrm, by deleting the
fallback state as soon as the last user state depending on it has been
deleted. Destruction will still happen when the final reference is
dropped.

A separate lockdep class for the fallback state is required since
we're going to lock x-&gt;tunnel while x is locked.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40215/">CVE-2025-40215 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40215">CVE-2025-40215 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254959">SUSE bug 1254959</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255054">SUSE bug 1255054</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40218</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40218" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40218" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40218" ref_url="https://www.suse.com/security/cve/CVE-2025-40218" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/damon/vaddr: do not repeat pte_offset_map_lock() until success

DAMON's virtual address space operation set implementation (vaddr) calls
pte_offset_map_lock() inside the page table walk callback function.  This
is for reading and writing page table accessed bits.  If
pte_offset_map_lock() fails, it retries by returning the page table walk
callback function with ACTION_AGAIN.

pte_offset_map_lock() can continuously fail if the target is a pmd
migration entry, though.  Hence it could cause an infinite page table walk
if the migration cannot be done until the page table walk is finished. 
This indeed caused a soft lockup when CPU hotplugging and DAMON were
running in parallel.

Avoid the infinite loop by simply not retrying the page table walk.  DAMON
is promising only a best-effort accuracy, so missing access to such pages
is no problem.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40218/">CVE-2025-40218 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40218">CVE-2025-40218 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254964">SUSE bug 1254964</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540219" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40219</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40219" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40219" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40219" ref_url="https://www.suse.com/security/cve/CVE-2025-40219" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

PCI/IOV: Fix race between SR-IOV enable/disable and hotplug

Commit 05703271c3cd ("PCI/IOV: Add PCI rescan-remove locking when
enabling/disabling SR-IOV") tried to fix a race between the VF removal
inside sriov_del_vfs() and concurrent hot unplug by taking the PCI
rescan/remove lock in sriov_del_vfs(). Similarly the PCI rescan/remove lock
was also taken in sriov_add_vfs() to protect addition of VFs.

This approach however causes deadlock on trying to remove PFs with SR-IOV
enabled because PFs disable SR-IOV during removal and this removal happens
under the PCI rescan/remove lock. So the original fix had to be reverted.

Instead of taking the PCI rescan/remove lock in sriov_add_vfs() and
sriov_del_vfs(), fix the race that occurs with SR-IOV enable and disable vs
hotplug higher up in the callchain by taking the lock in
sriov_numvfs_store() before calling into the driver's sriov_configure()
callback.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-04-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40219/">CVE-2025-40219 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40219">CVE-2025-40219 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254518">SUSE bug 1254518</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540220" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40220</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40220" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40220" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40220" ref_url="https://www.suse.com/security/cve/CVE-2025-40220" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fuse: fix livelock in synchronous file put from fuseblk workers

I observed a hang when running generic/323 against a fuseblk server.
This test opens a file, initiates a lot of AIO writes to that file
descriptor, and closes the file descriptor before the writes complete.
Unsurprisingly, the AIO exerciser threads are mostly stuck waiting for
responses from the fuseblk server:

# cat /proc/372265/task/372313/stack
[&lt;0&gt;] request_wait_answer+0x1fe/0x2a0 [fuse]
[&lt;0&gt;] __fuse_simple_request+0xd3/0x2b0 [fuse]
[&lt;0&gt;] fuse_do_getattr+0xfc/0x1f0 [fuse]
[&lt;0&gt;] fuse_file_read_iter+0xbe/0x1c0 [fuse]
[&lt;0&gt;] aio_read+0x130/0x1e0
[&lt;0&gt;] io_submit_one+0x542/0x860
[&lt;0&gt;] __x64_sys_io_submit+0x98/0x1a0
[&lt;0&gt;] do_syscall_64+0x37/0xf0
[&lt;0&gt;] entry_SYSCALL_64_after_hwframe+0x4b/0x53

But the /weird/ part is that the fuseblk server threads are waiting for
responses from itself:

# cat /proc/372210/task/372232/stack
[&lt;0&gt;] request_wait_answer+0x1fe/0x2a0 [fuse]
[&lt;0&gt;] __fuse_simple_request+0xd3/0x2b0 [fuse]
[&lt;0&gt;] fuse_file_put+0x9a/0xd0 [fuse]
[&lt;0&gt;] fuse_release+0x36/0x50 [fuse]
[&lt;0&gt;] __fput+0xec/0x2b0
[&lt;0&gt;] task_work_run+0x55/0x90
[&lt;0&gt;] syscall_exit_to_user_mode+0xe9/0x100
[&lt;0&gt;] do_syscall_64+0x43/0xf0
[&lt;0&gt;] entry_SYSCALL_64_after_hwframe+0x4b/0x53

The fuseblk server is fuse2fs so there's nothing all that exciting in
the server itself.  So why is the fuse server calling fuse_file_put?
The commit message for the fstest sheds some light on that:

"By closing the file descriptor before calling io_destroy, you pretty
much guarantee that the last put on the ioctx will be done in interrupt
context (during I/O completion).

Aha.  AIO fgets a new struct file from the fd when it queues the ioctx.
The completion of the FUSE_WRITE command from userspace causes the fuse
server to call the AIO completion function.  The completion puts the
struct file, queuing a delayed fput to the fuse server task.  When the
fuse server task returns to userspace, it has to run the delayed fput,
which in the case of a fuseblk server, it does synchronously.

Sending the FUSE_RELEASE command sychronously from fuse server threads
is a bad idea because a client program can initiate enough simultaneous
AIOs such that all the fuse server threads end up in delayed_fput, and
now there aren't any threads left to handle the queued fuse commands.

Fix this by only using asynchronous fputs when closing files, and leave
a comment explaining why.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40220/">CVE-2025-40220 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40220">CVE-2025-40220 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254520">SUSE bug 1254520</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40221</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40221" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40221" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40221" ref_url="https://www.suse.com/security/cve/CVE-2025-40221" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: pci: mg4b: fix uninitialized iio scan data

Fix potential leak of uninitialized stack data to userspace by ensuring
that the `scan` structure is zeroed before use.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40221/">CVE-2025-40221 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40221">CVE-2025-40221 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254519">SUSE bug 1254519</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540223" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40223</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40223" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40223" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40223" ref_url="https://www.suse.com/security/cve/CVE-2025-40223" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

most: usb: Fix use-after-free in hdm_disconnect

hdm_disconnect() calls most_deregister_interface(), which eventually
unregisters the MOST interface device with device_unregister(iface-&gt;dev).
If that drops the last reference, the device core may call release_mdev()
immediately while hdm_disconnect() is still executing.

The old code also freed several mdev-owned allocations in
hdm_disconnect() and then performed additional put_device() calls.
Depending on refcount order, this could lead to use-after-free or
double-free when release_mdev() ran (or when unregister paths also
performed puts).

Fix by moving the frees of mdev-owned allocations into release_mdev(),
so they happen exactly once when the device is truly released, and by
dropping the extra put_device() calls in hdm_disconnect() that are
redundant after device_unregister() and most_deregister_interface().

This addresses the KASAN slab-use-after-free reported by syzbot in
hdm_disconnect(). See report and stack traces in the bug link below.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40223/">CVE-2025-40223 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40223">CVE-2025-40223 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254957">SUSE bug 1254957</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540225" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40225</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40225" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40225" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40225" ref_url="https://www.suse.com/security/cve/CVE-2025-40225" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/panthor: Fix kernel panic on partial unmap of a GPU VA region

This commit address a kernel panic issue that can happen if Userspace
tries to partially unmap a GPU virtual region (aka drm_gpuva).
The VM_BIND interface allows partial unmapping of a BO.

Panthor driver pre-allocates memory for the new drm_gpuva structures
that would be needed for the map/unmap operation, done using drm_gpuvm
layer. It expected that only one new drm_gpuva would be needed on umap
but a partial unmap can require 2 new drm_gpuva and that's why it
ended up doing a NULL pointer dereference causing a kernel panic.

Following dump was seen when partial unmap was exercised.
 Unable to handle kernel NULL pointer dereference at virtual address 0000000000000078
 Mem abort info:
   ESR = 0x0000000096000046
   EC = 0x25: DABT (current EL), IL = 32 bits
   SET = 0, FnV = 0
   EA = 0, S1PTW = 0
   FSC = 0x06: level 2 translation fault
 Data abort info:
   ISV = 0, ISS = 0x00000046, ISS2 = 0x00000000
   CM = 0, WnR = 1, TnD = 0, TagAccess = 0
   GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0
 user pgtable: 4k pages, 48-bit VAs, pgdp=000000088a863000
 [000000000000078] pgd=080000088a842003, p4d=080000088a842003, pud=0800000884bf5003, pmd=0000000000000000
 Internal error: Oops: 0000000096000046 [#1] PREEMPT SMP
 &lt;snip&gt;
 pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
 pc : panthor_gpuva_sm_step_remap+0xe4/0x330 [panthor]
 lr : panthor_gpuva_sm_step_remap+0x6c/0x330 [panthor]
 sp : ffff800085d43970
 x29: ffff800085d43970 x28: ffff00080363e440 x27: ffff0008090c6000
 x26: 0000000000000030 x25: ffff800085d439f8 x24: ffff00080d402000
 x23: ffff800085d43b60 x22: ffff800085d439e0 x21: ffff00080abdb180
 x20: 0000000000000000 x19: 0000000000000000 x18: 0000000000000010
 x17: 6e656c202c303030 x16: 3666666666646466 x15: 393d61766f69202c
 x14: 312d3d7361203a70 x13: 303030323d6e656c x12: ffff80008324bf58
 x11: 0000000000000003 x10: 0000000000000002 x9 : ffff8000801a6a9c
 x8 : ffff00080360b300 x7 : 0000000000000000 x6 : 000000088aa35fc7
 x5 : fff1000080000000 x4 : ffff8000842ddd30 x3 : 0000000000000001
 x2 : 0000000100000000 x1 : 0000000000000001 x0 : 0000000000000078
 Call trace:
  panthor_gpuva_sm_step_remap+0xe4/0x330 [panthor]
  op_remap_cb.isra.22+0x50/0x80
  __drm_gpuvm_sm_unmap+0x10c/0x1c8
  drm_gpuvm_sm_unmap+0x40/0x60
  panthor_vm_exec_op+0xb4/0x3d0 [panthor]
  panthor_vm_bind_exec_sync_op+0x154/0x278 [panthor]
  panthor_ioctl_vm_bind+0x160/0x4a0 [panthor]
  drm_ioctl_kernel+0xbc/0x138
  drm_ioctl+0x240/0x500
  __arm64_sys_ioctl+0xb0/0xf8
  invoke_syscall+0x4c/0x110
  el0_svc_common.constprop.1+0x98/0xf8
  do_el0_svc+0x24/0x38
  el0_svc+0x40/0xf8
  el0t_64_sync_handler+0xa0/0xc8
  el0t_64_sync+0x174/0x178
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40225/">CVE-2025-40225 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40225">CVE-2025-40225 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254827">SUSE bug 1254827</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540226" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40226</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40226" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40226" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40226" ref_url="https://www.suse.com/security/cve/CVE-2025-40226" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

firmware: arm_scmi: Account for failed debug initialization

When the SCMI debug subsystem fails to initialize, the related debug root
will be missing, and the underlying descriptor will be NULL.

Handle this fault condition in the SCMI debug helpers that maintain
metrics counters.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40226/">CVE-2025-40226 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40226">CVE-2025-40226 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254821">SUSE bug 1254821</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540230" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40230</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40230" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40230" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40230" ref_url="https://www.suse.com/security/cve/CVE-2025-40230" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm: prevent poison consumption when splitting THP

When performing memory error injection on a THP (Transparent Huge Page)
mapped to userspace on an x86 server, the kernel panics with the following
trace.  The expected behavior is to terminate the affected process instead
of panicking the kernel, as the x86 Machine Check code can recover from an
in-userspace #MC.

  mce: [Hardware Error]: CPU 0: Machine Check Exception: f Bank 3: bd80000000070134
  mce: [Hardware Error]: RIP 10:&lt;ffffffff8372f8bc&gt; {memchr_inv+0x4c/0xf0}
  mce: [Hardware Error]: TSC afff7bbff88a ADDR 1d301b000 MISC 80 PPIN 1e741e77539027db
  mce: [Hardware Error]: PROCESSOR 0:d06d0 TIME 1758093249 SOCKET 0 APIC 0 microcode 80000320
  mce: [Hardware Error]: Run the above through 'mcelog --ascii'
  mce: [Hardware Error]: Machine check: Data load in unrecoverable area of kernel
  Kernel panic - not syncing: Fatal local machine check

The root cause of this panic is that handling a memory failure triggered
by an in-userspace #MC necessitates splitting the THP.  The splitting
process employs a mechanism, implemented in
try_to_map_unused_to_zeropage(), which reads the pages in the THP to
identify zero-filled pages.  However, reading the pages in the THP results
in a second in-kernel #MC, occurring before the initial memory_failure()
completes, ultimately leading to a kernel panic.  See the kernel panic
call trace on the two #MCs.

  First Machine Check occurs // [1]
    memory_failure()         // [2]
      try_to_split_thp_page()
        split_huge_page()
          split_huge_page_to_list_to_order()
            __folio_split()  // [3]
              remap_page()
                remove_migration_ptes()
                  remove_migration_pte()
                    try_to_map_unused_to_zeropage()  // [4]
                      memchr_inv()                   // [5]
                        Second Machine Check occurs  // [6]
                          Kernel panic

[1] Triggered by accessing a hardware-poisoned THP in userspace, which is
    typically recoverable by terminating the affected process.

[2] Call folio_set_has_hwpoisoned() before try_to_split_thp_page().

[3] Pass the RMP_USE_SHARED_ZEROPAGE remap flag to remap_page().

[4] Try to map the unused THP to zeropage.

[5] Re-access pages in the hw-poisoned THP in the kernel.

[6] Triggered in-kernel, leading to a panic kernel.

In Step[2], memory_failure() sets the poisoned flag on the page in the THP
by TestSetPageHWPoison() before calling try_to_split_thp_page().

As suggested by David Hildenbrand, fix this panic by not accessing to the
poisoned page in the THP during zeropage identification, while continuing
to scan unaffected pages in the THP for possible zeropage mapping.  This
prevents a second in-kernel #MC that would cause kernel panic in Step[4].

Thanks to Andrew Zaborowski for his initial work on fixing this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40230/">CVE-2025-40230 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40230">CVE-2025-40230 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254817">SUSE bug 1254817</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40231</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40231" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40231" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40231" ref_url="https://www.suse.com/security/cve/CVE-2025-40231" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vsock: fix lock inversion in vsock_assign_transport()

Syzbot reported a potential lock inversion deadlock between
vsock_register_mutex and sk_lock-AF_VSOCK when vsock_linger() is called.

The issue was introduced by commit 687aa0c5581b ("vsock: Fix
transport_* TOCTOU") which added vsock_register_mutex locking in
vsock_assign_transport() around the transport-&gt;release() call, that can
call vsock_linger(). vsock_assign_transport() can be called with sk_lock
held. vsock_linger() calls sk_wait_event() that temporarily releases and
re-acquires sk_lock. During this window, if another thread hold
vsock_register_mutex while trying to acquire sk_lock, a circular
dependency is created.

Fix this by releasing vsock_register_mutex before calling
transport-&gt;release() and vsock_deassign_transport(). This is safe
because we don't need to hold vsock_register_mutex while releasing the
old transport, and we ensure the new transport won't disappear by
obtaining a module reference first via try_module_get().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40231/">CVE-2025-40231 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40231">CVE-2025-40231 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254815">SUSE bug 1254815</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40233</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40233" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40233" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40233" ref_url="https://www.suse.com/security/cve/CVE-2025-40233" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ocfs2: clear extent cache after moving/defragmenting extents

The extent map cache can become stale when extents are moved or
defragmented, causing subsequent operations to see outdated extent flags. 
This triggers a BUG_ON in ocfs2_refcount_cal_cow_clusters().

The problem occurs when:
1. copy_file_range() creates a reflinked extent with OCFS2_EXT_REFCOUNTED
2. ioctl(FITRIM) triggers ocfs2_move_extents()
3. __ocfs2_move_extents_range() reads and caches the extent (flags=0x2)
4. ocfs2_move_extent()/ocfs2_defrag_extent() calls __ocfs2_move_extent()
   which clears OCFS2_EXT_REFCOUNTED flag on disk (flags=0x0)
5. The extent map cache is not invalidated after the move
6. Later write() operations read stale cached flags (0x2) but disk has
   updated flags (0x0), causing a mismatch
7. BUG_ON(!(rec-&gt;e_flags &amp; OCFS2_EXT_REFCOUNTED)) triggers

Fix by clearing the extent map cache after each extent move/defrag
operation in __ocfs2_move_extents_range().  This ensures subsequent
operations read fresh extent data from disk.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40233/">CVE-2025-40233 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40233">CVE-2025-40233 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254813">SUSE bug 1254813</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40235</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40235" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40235" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40235" ref_url="https://www.suse.com/security/cve/CVE-2025-40235" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: directly free partially initialized fs_info in btrfs_check_leaked_roots()

If fs_info-&gt;super_copy or fs_info-&gt;super_for_commit allocated failed in
btrfs_get_tree_subvol(), then no need to call btrfs_free_fs_info().
Otherwise btrfs_check_leaked_roots() would access NULL pointer because
fs_info-&gt;allocated_roots had not been initialised.

syzkaller reported the following information:
  ------------[ cut here ]------------
  BUG: unable to handle page fault for address: fffffffffffffbb0
  #PF: supervisor read access in kernel mode
  #PF: error_code(0x0000) - not-present page
  PGD 64c9067 P4D 64c9067 PUD 64cb067 PMD 0
  Oops: Oops: 0000 [#1] SMP KASAN PTI
  CPU: 0 UID: 0 PID: 1402 Comm: syz.1.35 Not tainted 6.15.8 #4 PREEMPT(lazy)
  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), (...)
  RIP: 0010:arch_atomic_read arch/x86/include/asm/atomic.h:23 [inline]
  RIP: 0010:raw_atomic_read include/linux/atomic/atomic-arch-fallback.h:457 [inline]
  RIP: 0010:atomic_read include/linux/atomic/atomic-instrumented.h:33 [inline]
  RIP: 0010:refcount_read include/linux/refcount.h:170 [inline]
  RIP: 0010:btrfs_check_leaked_roots+0x18f/0x2c0 fs/btrfs/disk-io.c:1230
  [...]
  Call Trace:
   &lt;TASK&gt;
   btrfs_free_fs_info+0x310/0x410 fs/btrfs/disk-io.c:1280
   btrfs_get_tree_subvol+0x592/0x6b0 fs/btrfs/super.c:2029
   btrfs_get_tree+0x63/0x80 fs/btrfs/super.c:2097
   vfs_get_tree+0x98/0x320 fs/super.c:1759
   do_new_mount+0x357/0x660 fs/namespace.c:3899
   path_mount+0x716/0x19c0 fs/namespace.c:4226
   do_mount fs/namespace.c:4239 [inline]
   __do_sys_mount fs/namespace.c:4450 [inline]
   __se_sys_mount fs/namespace.c:4427 [inline]
   __x64_sys_mount+0x28c/0x310 fs/namespace.c:4427
   do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
   do_syscall_64+0x92/0x180 arch/x86/entry/syscall_64.c:94
   entry_SYSCALL_64_after_hwframe+0x76/0x7e
  RIP: 0033:0x7f032eaffa8d
  [...]
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40235/">CVE-2025-40235 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40235">CVE-2025-40235 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254808">SUSE bug 1254808</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540237" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40237</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40237" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40237" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40237" ref_url="https://www.suse.com/security/cve/CVE-2025-40237" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs/notify: call exportfs_encode_fid with s_umount

Calling intotify_show_fdinfo() on fd watching an overlayfs inode, while
the overlayfs is being unmounted, can lead to dereferencing NULL ptr.

This issue was found by syzkaller.

Race Condition Diagram:

Thread 1                           Thread 2
--------                           --------

generic_shutdown_super()
 shrink_dcache_for_umount
  sb-&gt;s_root = NULL

                    |
                    |             vfs_read()
                    |              inotify_fdinfo()
                    |               * inode get from mark *
                    |               show_mark_fhandle(m, inode)
                    |                exportfs_encode_fid(inode, ..)
                    |                 ovl_encode_fh(inode, ..)
                    |                  ovl_check_encode_origin(inode)
                    |                   * deref i_sb-&gt;s_root *
                    |
                    |
                    v
 fsnotify_sb_delete(sb)

Which then leads to:

[   32.133461] Oops: general protection fault, probably for non-canonical address 0xdffffc0000000006: 0000 [#1] SMP DEBUG_PAGEALLOC KASAN NOPTI
[   32.134438] KASAN: null-ptr-deref in range [0x0000000000000030-0x0000000000000037]
[   32.135032] CPU: 1 UID: 0 PID: 4468 Comm: systemd-coredum Not tainted 6.17.0-rc6 #22 PREEMPT(none)

&lt;snip registers, unreliable trace&gt;

[   32.143353] Call Trace:
[   32.143732]  ovl_encode_fh+0xd5/0x170
[   32.144031]  exportfs_encode_inode_fh+0x12f/0x300
[   32.144425]  show_mark_fhandle+0xbe/0x1f0
[   32.145805]  inotify_fdinfo+0x226/0x2d0
[   32.146442]  inotify_show_fdinfo+0x1c5/0x350
[   32.147168]  seq_show+0x530/0x6f0
[   32.147449]  seq_read_iter+0x503/0x12a0
[   32.148419]  seq_read+0x31f/0x410
[   32.150714]  vfs_read+0x1f0/0x9e0
[   32.152297]  ksys_read+0x125/0x240

IOW ovl_check_encode_origin derefs inode-&gt;i_sb-&gt;s_root, after it was set
to NULL in the unmount path.

Fix it by protecting calling exportfs_encode_fid() from
show_mark_fhandle() with s_umount lock.

This form of fix was suggested by Amir in [1].

[1]: https://lore.kernel.org/all/CAOQ4uxhbDwhb+2Brs1UdkoF0a3NSdBAOQPNfEHjahrgoKJpLEw@mail.gmail.com/
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40237/">CVE-2025-40237 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40237">CVE-2025-40237 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254809">SUSE bug 1254809</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540238" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40238</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40238" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40238" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40238" ref_url="https://www.suse.com/security/cve/CVE-2025-40238" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: Fix IPsec cleanup over MPV device

When we do mlx5e_detach_netdev() we eventually disable blocking events
notifier, among those events are IPsec MPV events from IB to core.

So before disabling those blocking events, make sure to also unregister
the devcom device and mark all this device operations as complete,
in order to prevent the other device from using invalid netdev
during future devcom events which could cause the trace below.

BUG: kernel NULL pointer dereference, address: 0000000000000010
PGD 146427067 P4D 146427067 PUD 146488067 PMD 0
Oops: Oops: 0000 [#1] SMP
CPU: 1 UID: 0 PID: 7735 Comm: devlink Tainted: GW 6.12.0-rc6_for_upstream_min_debug_2024_11_08_00_46 #1
Tainted: [W]=WARN
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014
RIP: 0010:mlx5_devcom_comp_set_ready+0x5/0x40 [mlx5_core]
Code: 00 01 48 83 05 23 32 1e 00 01 41 b8 ed ff ff ff e9 60 ff ff ff 48 83 05 00 32 1e 00 01 eb e3 66 0f 1f 44 00 00 0f 1f 44 00 00 &lt;48&gt; 8b 47 10 48 83 05 5f 32 1e 00 01 48 8b 50 40 48 85 d2 74 05 40
RSP: 0018:ffff88811a5c35f8 EFLAGS: 00010206
RAX: ffff888106e8ab80 RBX: ffff888107d7e200 RCX: ffff88810d6f0a00
RDX: ffff88810d6f0a00 RSI: 0000000000000001 RDI: 0000000000000000
RBP: ffff88811a17e620 R08: 0000000000000040 R09: 0000000000000000
R10: ffff88811a5c3618 R11: 0000000de85d51bd R12: ffff88811a17e600
R13: ffff88810d6f0a00 R14: 0000000000000000 R15: ffff8881034bda80
FS:  00007f27bdf89180(0000) GS:ffff88852c880000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000010 CR3: 000000010f159005 CR4: 0000000000372eb0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
 ? __die+0x20/0x60
 ? page_fault_oops+0x150/0x3e0
 ? exc_page_fault+0x74/0x130
 ? asm_exc_page_fault+0x22/0x30
 ? mlx5_devcom_comp_set_ready+0x5/0x40 [mlx5_core]
 mlx5e_devcom_event_mpv+0x42/0x60 [mlx5_core]
 mlx5_devcom_send_event+0x8c/0x170 [mlx5_core]
 blocking_event+0x17b/0x230 [mlx5_core]
 notifier_call_chain+0x35/0xa0
 blocking_notifier_call_chain+0x3d/0x60
 mlx5_blocking_notifier_call_chain+0x22/0x30 [mlx5_core]
 mlx5_core_mp_event_replay+0x12/0x20 [mlx5_core]
 mlx5_ib_bind_slave_port+0x228/0x2c0 [mlx5_ib]
 mlx5_ib_stage_init_init+0x664/0x9d0 [mlx5_ib]
 ? idr_alloc_cyclic+0x50/0xb0
 ? __kmalloc_cache_noprof+0x167/0x340
 ? __kmalloc_noprof+0x1a7/0x430
 __mlx5_ib_add+0x34/0xd0 [mlx5_ib]
 mlx5r_probe+0xe9/0x310 [mlx5_ib]
 ? kernfs_add_one+0x107/0x150
 ? __mlx5_ib_add+0xd0/0xd0 [mlx5_ib]
 auxiliary_bus_probe+0x3e/0x90
 really_probe+0xc5/0x3a0
 ? driver_probe_device+0x90/0x90
 __driver_probe_device+0x80/0x160
 driver_probe_device+0x1e/0x90
 __device_attach_driver+0x7d/0x100
 bus_for_each_drv+0x80/0xd0
 __device_attach+0xbc/0x1f0
 bus_probe_device+0x86/0xa0
 device_add+0x62d/0x830
 __auxiliary_device_add+0x3b/0xa0
 ? auxiliary_device_init+0x41/0x90
 add_adev+0xd1/0x150 [mlx5_core]
 mlx5_rescan_drivers_locked+0x21c/0x300 [mlx5_core]
 esw_mode_change+0x6c/0xc0 [mlx5_core]
 mlx5_devlink_eswitch_mode_set+0x21e/0x640 [mlx5_core]
 devlink_nl_eswitch_set_doit+0x60/0xe0
 genl_family_rcv_msg_doit+0xd0/0x120
 genl_rcv_msg+0x180/0x2b0
 ? devlink_get_from_attrs_lock+0x170/0x170
 ? devlink_nl_eswitch_get_doit+0x290/0x290
 ? devlink_nl_pre_doit_port_optional+0x50/0x50
 ? genl_family_rcv_msg_dumpit+0xf0/0xf0
 netlink_rcv_skb+0x54/0x100
 genl_rcv+0x24/0x40
 netlink_unicast+0x1fc/0x2d0
 netlink_sendmsg+0x1e4/0x410
 __sock_sendmsg+0x38/0x60
 ? sockfd_lookup_light+0x12/0x60
 __sys_sendto+0x105/0x160
 ? __sys_recvmsg+0x4e/0x90
 __x64_sys_sendto+0x20/0x30
 do_syscall_64+0x4c/0x100
 entry_SYSCALL_64_after_hwframe+0x4b/0x53
RIP: 0033:0x7f27bc91b13a
Code: bb 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 8b 05 fa 96 2c 00 45 89 c9 4c 63 d1 48 63 ff 85 c0 75 15 b8 2c 00 00 00 0f 05 &lt;48&gt; 3d 00 f0 ff ff 
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40238/">CVE-2025-40238 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40238">CVE-2025-40238 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254871">SUSE bug 1254871</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540239" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40239</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40239" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40239" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40239" ref_url="https://www.suse.com/security/cve/CVE-2025-40239" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: phy: micrel: always set shared-&gt;phydev for LAN8814

Currently, during the LAN8814 PTP probe shared-&gt;phydev is only set if PTP
clock gets actually set, otherwise the function will return before setting
it.

This is an issue as shared-&gt;phydev is unconditionally being used when IRQ
is being handled, especially in lan8814_gpio_process_cap and since it was
not set it will cause a NULL pointer exception and crash the kernel.

So, simply always set shared-&gt;phydev to avoid the NULL pointer exception.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40239/">CVE-2025-40239 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40239">CVE-2025-40239 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254868">SUSE bug 1254868</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540240" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40240</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40240" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40240" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40240" ref_url="https://www.suse.com/security/cve/CVE-2025-40240" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0445" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sctp: avoid NULL dereference when chunk data buffer is missing

chunk-&gt;skb pointer is dereferenced in the if-block where it's supposed
to be NULL only.

chunk-&gt;skb can only be NULL if chunk-&gt;head_skb is not. Check for frag_list
instead and do it just before replacing chunk-&gt;skb. We're sure that
otherwise chunk-&gt;skb is non-NULL because of outer if() condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40240/">CVE-2025-40240 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40240">CVE-2025-40240 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254869">SUSE bug 1254869</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40242</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40242" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40242" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40242" ref_url="https://www.suse.com/security/cve/CVE-2025-40242" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1131-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gfs2: Fix unlikely race in gdlm_put_lock

In gdlm_put_lock(), there is a small window of time in which the
DFL_UNMOUNT flag has been set but the lockspace hasn't been released,
yet.  In that window, dlm may still call gdlm_ast() and gdlm_bast().
To prevent it from dereferencing freed glock objects, only free the
glock if the lockspace has actually been released.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40242/">CVE-2025-40242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40242">CVE-2025-40242 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255075">SUSE bug 1255075</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255076">SUSE bug 1255076</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540246" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40246</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40246" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40246" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40246" ref_url="https://www.suse.com/security/cve/CVE-2025-40246" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xfs: fix out of bounds memory read error in symlink repair

xfs/286 produced this report on my test fleet:

 ==================================================================
 BUG: KFENCE: out-of-bounds read in memcpy_orig+0x54/0x110

 Out-of-bounds read at 0xffff88843fe9e038 (184B right of kfence-#184):
  memcpy_orig+0x54/0x110
  xrep_symlink_salvage_inline+0xb3/0xf0 [xfs]
  xrep_symlink_salvage+0x100/0x110 [xfs]
  xrep_symlink+0x2e/0x80 [xfs]
  xrep_attempt+0x61/0x1f0 [xfs]
  xfs_scrub_metadata+0x34f/0x5c0 [xfs]
  xfs_ioc_scrubv_metadata+0x387/0x560 [xfs]
  xfs_file_ioctl+0xe23/0x10e0 [xfs]
  __x64_sys_ioctl+0x76/0xc0
  do_syscall_64+0x4e/0x1e0
  entry_SYSCALL_64_after_hwframe+0x4b/0x53

 kfence-#184: 0xffff88843fe9df80-0xffff88843fe9dfea, size=107, cache=kmalloc-128

 allocated by task 3470 on cpu 1 at 263329.131592s (192823.508886s ago):
  xfs_init_local_fork+0x79/0xe0 [xfs]
  xfs_iformat_local+0xa4/0x170 [xfs]
  xfs_iformat_data_fork+0x148/0x180 [xfs]
  xfs_inode_from_disk+0x2cd/0x480 [xfs]
  xfs_iget+0x450/0xd60 [xfs]
  xfs_bulkstat_one_int+0x6b/0x510 [xfs]
  xfs_bulkstat_iwalk+0x1e/0x30 [xfs]
  xfs_iwalk_ag_recs+0xdf/0x150 [xfs]
  xfs_iwalk_run_callbacks+0xb9/0x190 [xfs]
  xfs_iwalk_ag+0x1dc/0x2f0 [xfs]
  xfs_iwalk_args.constprop.0+0x6a/0x120 [xfs]
  xfs_iwalk+0xa4/0xd0 [xfs]
  xfs_bulkstat+0xfa/0x170 [xfs]
  xfs_ioc_fsbulkstat.isra.0+0x13a/0x230 [xfs]
  xfs_file_ioctl+0xbf2/0x10e0 [xfs]
  __x64_sys_ioctl+0x76/0xc0
  do_syscall_64+0x4e/0x1e0
  entry_SYSCALL_64_after_hwframe+0x4b/0x53

 CPU: 1 UID: 0 PID: 1300113 Comm: xfs_scrub Not tainted 6.18.0-rc4-djwx #rc4 PREEMPT(lazy)  3d744dd94e92690f00a04398d2bd8631dcef1954
 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.0-4.module+el8.8.0+21164+ed375313 04/01/2014
 ==================================================================

On further analysis, I realized that the second parameter to min() is
not correct.  xfs_ifork::if_bytes is the size of the xfs_ifork::if_data
buffer.  if_bytes can be smaller than the data fork size because:

(a) the forkoff code tries to keep the data area as large as possible
(b) for symbolic links, if_bytes is the ondisk file size + 1
(c) forkoff is always a multiple of 8.

Case in point: for a single-byte symlink target, forkoff will be
8 but the buffer will only be 2 bytes long.

In other words, the logic here is wrong and we walk off the end of the
incore buffer.  Fix that.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40246/">CVE-2025-40246 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40246">CVE-2025-40246 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254861">SUSE bug 1254861</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540248" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40248</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40248" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40248" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40248" ref_url="https://www.suse.com/security/cve/CVE-2025-40248" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1142" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002437.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1143" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003191.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1581" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002478.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1703" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vsock: Ignore signal/timeout on connect() if already established

During connect(), acting on a signal/timeout by disconnecting an already
established socket leads to several issues:

1. connect() invoking vsock_transport_cancel_pkt() -&gt;
   virtio_transport_purge_skbs() may race with sendmsg() invoking
   virtio_transport_get_credit(). This results in a permanently elevated
   `vvs-&gt;bytes_unsent`. Which, in turn, confuses the SOCK_LINGER handling.

2. connect() resetting a connected socket's state may race with socket
   being placed in a sockmap. A disconnected socket remaining in a sockmap
   breaks sockmap's assumptions. And gives rise to WARNs.

3. connect() transitioning SS_CONNECTED -&gt; SS_UNCONNECTED allows for a
   transport change/drop after TCP_ESTABLISHED. Which poses a problem for
   any simultaneous sendmsg() or connect() and may result in a
   use-after-free/null-ptr-deref.

Do not disconnect socket on signal/timeout. Keep the logic for unconnected
sockets: they don't linger, can't be placed in a sockmap, are rejected by
sendmsg().

[1]: https://lore.kernel.org/netdev/e07fd95c-9a38-4eea-9638-133e38c2ec9b@rbox.co/
[2]: https://lore.kernel.org/netdev/20250317-vsock-trans-signal-race-v4-0-fc8837f3f1d4@rbox.co/
[3]: https://lore.kernel.org/netdev/60f1b7db-3099-4f6a-875e-af9f6ef194f6@rbox.co/
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40248/">CVE-2025-40248 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40248">CVE-2025-40248 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254864">SUSE bug 1254864</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540250" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40250</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40250" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40250" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40250" ref_url="https://www.suse.com/security/cve/CVE-2025-40250" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: Clean up only new IRQ glue on request_irq() failure

The mlx5_irq_alloc() function can inadvertently free the entire rmap
and end up in a crash[1] when the other threads tries to access this,
when request_irq() fails due to exhausted IRQ vectors. This commit
modifies the cleanup to remove only the specific IRQ mapping that was
just added.

This prevents removal of other valid mappings and ensures precise
cleanup of the failed IRQ allocation's associated glue object.

Note: This error is observed when both fwctl and rds configs are enabled.

[1]
mlx5_core 0000:05:00.0: Successfully registered panic handler for port 1
mlx5_core 0000:05:00.0: mlx5_irq_alloc:293:(pid 66740): Failed to
request irq. err = -28
infiniband mlx5_0: mlx5_ib_test_wc:290:(pid 66740): Error -28 while
trying to test write-combining support
mlx5_core 0000:05:00.0: Successfully unregistered panic handler for port 1
mlx5_core 0000:06:00.0: Successfully registered panic handler for port 1
mlx5_core 0000:06:00.0: mlx5_irq_alloc:293:(pid 66740): Failed to
request irq. err = -28
infiniband mlx5_0: mlx5_ib_test_wc:290:(pid 66740): Error -28 while
trying to test write-combining support
mlx5_core 0000:06:00.0: Successfully unregistered panic handler for port 1
mlx5_core 0000:03:00.0: mlx5_irq_alloc:293:(pid 28895): Failed to
request irq. err = -28
mlx5_core 0000:05:00.0: mlx5_irq_alloc:293:(pid 28895): Failed to
request irq. err = -28
general protection fault, probably for non-canonical address
0xe277a58fde16f291: 0000 [#1] SMP NOPTI

RIP: 0010:free_irq_cpu_rmap+0x23/0x7d
Call Trace:
   &lt;TASK&gt;
   ? show_trace_log_lvl+0x1d6/0x2f9
   ? show_trace_log_lvl+0x1d6/0x2f9
   ? mlx5_irq_alloc.cold+0x5d/0xf3 [mlx5_core]
   ? __die_body.cold+0x8/0xa
   ? die_addr+0x39/0x53
   ? exc_general_protection+0x1c4/0x3e9
   ? dev_vprintk_emit+0x5f/0x90
   ? asm_exc_general_protection+0x22/0x27
   ? free_irq_cpu_rmap+0x23/0x7d
   mlx5_irq_alloc.cold+0x5d/0xf3 [mlx5_core]
   irq_pool_request_vector+0x7d/0x90 [mlx5_core]
   mlx5_irq_request+0x2e/0xe0 [mlx5_core]
   mlx5_irq_request_vector+0xad/0xf7 [mlx5_core]
   comp_irq_request_pci+0x64/0xf0 [mlx5_core]
   create_comp_eq+0x71/0x385 [mlx5_core]
   ? mlx5e_open_xdpsq+0x11c/0x230 [mlx5_core]
   mlx5_comp_eqn_get+0x72/0x90 [mlx5_core]
   ? xas_load+0x8/0x91
   mlx5_comp_irqn_get+0x40/0x90 [mlx5_core]
   mlx5e_open_channel+0x7d/0x3c7 [mlx5_core]
   mlx5e_open_channels+0xad/0x250 [mlx5_core]
   mlx5e_open_locked+0x3e/0x110 [mlx5_core]
   mlx5e_open+0x23/0x70 [mlx5_core]
   __dev_open+0xf1/0x1a5
   __dev_change_flags+0x1e1/0x249
   dev_change_flags+0x21/0x5c
   do_setlink+0x28b/0xcc4
   ? __nla_parse+0x22/0x3d
   ? inet6_validate_link_af+0x6b/0x108
   ? cpumask_next+0x1f/0x35
   ? __snmp6_fill_stats64.constprop.0+0x66/0x107
   ? __nla_validate_parse+0x48/0x1e6
   __rtnl_newlink+0x5ff/0xa57
   ? kmem_cache_alloc_trace+0x164/0x2ce
   rtnl_newlink+0x44/0x6e
   rtnetlink_rcv_msg+0x2bb/0x362
   ? __netlink_sendskb+0x4c/0x6c
   ? netlink_unicast+0x28f/0x2ce
   ? rtnl_calcit.isra.0+0x150/0x146
   netlink_rcv_skb+0x5f/0x112
   netlink_unicast+0x213/0x2ce
   netlink_sendmsg+0x24f/0x4d9
   __sock_sendmsg+0x65/0x6a
   ____sys_sendmsg+0x28f/0x2c9
   ? import_iovec+0x17/0x2b
   ___sys_sendmsg+0x97/0xe0
   __sys_sendmsg+0x81/0xd8
   do_syscall_64+0x35/0x87
   entry_SYSCALL_64_after_hwframe+0x6e/0x0
RIP: 0033:0x7fc328603727
Code: c3 66 90 41 54 41 89 d4 55 48 89 f5 53 89 fb 48 83 ec 10 e8 0b ed
ff ff 44 89 e2 48 89 ee 89 df 41 89 c0 b8 2e 00 00 00 0f 05 &lt;48&gt; 3d 00
f0 ff ff 77 35 44 89 c7 48 89 44 24 08 e8 44 ed ff ff 48
RSP: 002b:00007ffe8eb3f1a0 EFLAGS: 00000293 ORIG_RAX: 000000000000002e
RAX: ffffffffffffffda RBX: 000000000000000d RCX: 00007fc328603727
RDX: 0000000000000000 RSI: 00007ffe8eb3f1f0 RDI: 000000000000000d
RBP: 00007ffe8eb3f1f0 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000000
R13: 00000000000
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40250/">CVE-2025-40250 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40250">CVE-2025-40250 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254854">SUSE bug 1254854</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540251" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40251</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40251" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40251" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40251" ref_url="https://www.suse.com/security/cve/CVE-2025-40251" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1617" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003184.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

devlink: rate: Unset parent pointer in devl_rate_nodes_destroy

The function devl_rate_nodes_destroy is documented to "Unset parent for
all rate objects". However, it was only calling the driver-specific
`rate_leaf_parent_set` or `rate_node_parent_set` ops and decrementing
the parent's refcount, without actually setting the
`devlink_rate-&gt;parent` pointer to NULL.

This leaves a dangling pointer in the `devlink_rate` struct, which cause
refcount error in netdevsim[1] and mlx5[2]. In addition, this is
inconsistent with the behavior of `devlink_nl_rate_parent_node_set`,
where the parent pointer is correctly cleared.

This patch fixes the issue by explicitly setting `devlink_rate-&gt;parent`
to NULL after notifying the driver, thus fulfilling the function's
documented behavior for all rate objects.

[1]
repro steps:
echo 1 &gt; /sys/bus/netdevsim/new_device
devlink dev eswitch set netdevsim/netdevsim1 mode switchdev
echo 1 &gt; /sys/bus/netdevsim/devices/netdevsim1/sriov_numvfs
devlink port function rate add netdevsim/netdevsim1/test_node
devlink port function rate set netdevsim/netdevsim1/128 parent test_node
echo 1 &gt; /sys/bus/netdevsim/del_device

dmesg:
refcount_t: decrement hit 0; leaking memory.
WARNING: CPU: 8 PID: 1530 at lib/refcount.c:31 refcount_warn_saturate+0x42/0xe0
CPU: 8 UID: 0 PID: 1530 Comm: bash Not tainted 6.18.0-rc4+ #1 NONE
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014
RIP: 0010:refcount_warn_saturate+0x42/0xe0
Call Trace:
 &lt;TASK&gt;
 devl_rate_leaf_destroy+0x8d/0x90
 __nsim_dev_port_del+0x6c/0x70 [netdevsim]
 nsim_dev_reload_destroy+0x11c/0x140 [netdevsim]
 nsim_drv_remove+0x2b/0xb0 [netdevsim]
 device_release_driver_internal+0x194/0x1f0
 bus_remove_device+0xc6/0x130
 device_del+0x159/0x3c0
 device_unregister+0x1a/0x60
 del_device_store+0x111/0x170 [netdevsim]
 kernfs_fop_write_iter+0x12e/0x1e0
 vfs_write+0x215/0x3d0
 ksys_write+0x5f/0xd0
 do_syscall_64+0x55/0x10f0
 entry_SYSCALL_64_after_hwframe+0x4b/0x53

[2]
devlink dev eswitch set pci/0000:08:00.0 mode switchdev
devlink port add pci/0000:08:00.0 flavour pcisf pfnum 0 sfnum 1000
devlink port function rate add pci/0000:08:00.0/group1
devlink port function rate set pci/0000:08:00.0/32768 parent group1
modprobe -r mlx5_ib mlx5_fwctl mlx5_core

dmesg:
refcount_t: decrement hit 0; leaking memory.
WARNING: CPU: 7 PID: 16151 at lib/refcount.c:31 refcount_warn_saturate+0x42/0xe0
CPU: 7 UID: 0 PID: 16151 Comm: bash Not tainted 6.17.0-rc7_for_upstream_min_debug_2025_10_02_12_44 #1 NONE
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014
RIP: 0010:refcount_warn_saturate+0x42/0xe0
Call Trace:
 &lt;TASK&gt;
 devl_rate_leaf_destroy+0x8d/0x90
 mlx5_esw_offloads_devlink_port_unregister+0x33/0x60 [mlx5_core]
 mlx5_esw_offloads_unload_rep+0x3f/0x50 [mlx5_core]
 mlx5_eswitch_unload_sf_vport+0x40/0x90 [mlx5_core]
 mlx5_sf_esw_event+0xc4/0x120 [mlx5_core]
 notifier_call_chain+0x33/0xa0
 blocking_notifier_call_chain+0x3b/0x50
 mlx5_eswitch_disable_locked+0x50/0x110 [mlx5_core]
 mlx5_eswitch_disable+0x63/0x90 [mlx5_core]
 mlx5_unload+0x1d/0x170 [mlx5_core]
 mlx5_uninit_one+0xa2/0x130 [mlx5_core]
 remove_one+0x78/0xd0 [mlx5_core]
 pci_device_remove+0x39/0xa0
 device_release_driver_internal+0x194/0x1f0
 unbind_store+0x99/0xa0
 kernfs_fop_write_iter+0x12e/0x1e0
 vfs_write+0x215/0x3d0
 ksys_write+0x5f/0xd0
 do_syscall_64+0x53/0x1f0
 entry_SYSCALL_64_after_hwframe+0x4b/0x53
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40251/">CVE-2025-40251 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-40251">CVE-2025-40251 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254856">SUSE bug 1254856</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40252</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40252" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40252" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40252" ref_url="https://www.suse.com/security/cve/CVE-2025-40252" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: qlogic/qede: fix potential out-of-bounds read in qede_tpa_cont() and qede_tpa_end()

The loops in 'qede_tpa_cont()' and 'qede_tpa_end()', iterate
over 'cqe-&gt;len_list[]' using only a zero-length terminator as
the stopping condition. If the terminator was missing or
malformed, the loop could run past the end of the fixed-size array.

Add an explicit bound check using ARRAY_SIZE() in both loops to prevent
a potential out-of-bounds access.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40252/">CVE-2025-40252 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40252">CVE-2025-40252 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254849">SUSE bug 1254849</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540254" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40254</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40254" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40254" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40254" ref_url="https://www.suse.com/security/cve/CVE-2025-40254" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: openvswitch: remove never-working support for setting nsh fields

The validation of the set(nsh(...)) action is completely wrong.
It runs through the nsh_key_put_from_nlattr() function that is the
same function that validates NSH keys for the flow match and the
push_nsh() action.  However, the set(nsh(...)) has a very different
memory layout.  Nested attributes in there are doubled in size in
case of the masked set().  That makes proper validation impossible.

There is also confusion in the code between the 'masked' flag, that
says that the nested attributes are doubled in size containing both
the value and the mask, and the 'is_mask' that says that the value
we're parsing is the mask.  This is causing kernel crash on trying to
write into mask part of the match with SW_FLOW_KEY_PUT() during
validation, while validate_nsh() doesn't allocate any memory for it:

  BUG: kernel NULL pointer dereference, address: 0000000000000018
  #PF: supervisor read access in kernel mode
  #PF: error_code(0x0000) - not-present page
  PGD 1c2383067 P4D 1c2383067 PUD 20b703067 PMD 0
  Oops: Oops: 0000 [#1] SMP NOPTI
  CPU: 8 UID: 0 Kdump: loaded Not tainted 6.17.0-rc4+ #107 PREEMPT(voluntary)
  RIP: 0010:nsh_key_put_from_nlattr+0x19d/0x610 [openvswitch]
  Call Trace:
   &lt;TASK&gt;
   validate_nsh+0x60/0x90 [openvswitch]
   validate_set.constprop.0+0x270/0x3c0 [openvswitch]
   __ovs_nla_copy_actions+0x477/0x860 [openvswitch]
   ovs_nla_copy_actions+0x8d/0x100 [openvswitch]
   ovs_packet_cmd_execute+0x1cc/0x310 [openvswitch]
   genl_family_rcv_msg_doit+0xdb/0x130
   genl_family_rcv_msg+0x14b/0x220
   genl_rcv_msg+0x47/0xa0
   netlink_rcv_skb+0x53/0x100
   genl_rcv+0x24/0x40
   netlink_unicast+0x280/0x3b0
   netlink_sendmsg+0x1f7/0x430
   ____sys_sendmsg+0x36b/0x3a0
   ___sys_sendmsg+0x87/0xd0
   __sys_sendmsg+0x6d/0xd0
   do_syscall_64+0x7b/0x2c0
   entry_SYSCALL_64_after_hwframe+0x76/0x7e

The third issue with this process is that while trying to convert
the non-masked set into masked one, validate_set() copies and doubles
the size of the OVS_KEY_ATTR_NSH as if it didn't have any nested
attributes.  It should be copying each nested attribute and doubling
them in size independently.  And the process must be properly reversed
during the conversion back from masked to a non-masked variant during
the flow dump.

In the end, the only two outcomes of trying to use this action are
either validation failure or a kernel crash.  And if somehow someone
manages to install a flow with such an action, it will most definitely
not do what it is supposed to, since all the keys and the masks are
mixed up.

Fixing all the issues is a complex task as it requires re-writing
most of the validation code.

Given that and the fact that this functionality never worked since
introduction, let's just remove it altogether.  It's better to
re-introduce it later with a proper implementation instead of trying
to fix it in stable releases.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40254/">CVE-2025-40254 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40254">CVE-2025-40254 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254852">SUSE bug 1254852</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540255" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40255</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40255" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40255" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40255" ref_url="https://www.suse.com/security/cve/CVE-2025-40255" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: core: prevent NULL deref in generic_hwtstamp_ioctl_lower()

The ethtool tsconfig Netlink path can trigger a null pointer
dereference. A call chain such as:

  tsconfig_prepare_data() -&gt;
  dev_get_hwtstamp_phylib() -&gt;
  vlan_hwtstamp_get() -&gt;
  generic_hwtstamp_get_lower() -&gt;
  generic_hwtstamp_ioctl_lower()

results in generic_hwtstamp_ioctl_lower() being called with
kernel_cfg-&gt;ifr as NULL.

The generic_hwtstamp_ioctl_lower() function does not expect
a NULL ifr and dereferences it, leading to a system crash.

Fix this by adding a NULL check for kernel_cfg-&gt;ifr in
generic_hwtstamp_ioctl_lower(). If ifr is NULL, return -EINVAL.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40255/">CVE-2025-40255 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40255">CVE-2025-40255 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255156">SUSE bug 1255156</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540256" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40256</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40256" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40256" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40256" ref_url="https://www.suse.com/security/cve/CVE-2025-40256" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xfrm: also call xfrm_state_delete_tunnel at destroy time for states that were never added

In commit b441cf3f8c4b ("xfrm: delete x-&gt;tunnel as we delete x"), I
missed the case where state creation fails between full
initialization (-&gt;init_state has been called) and being inserted on
the lists.

In this situation, -&gt;init_state has been called, so for IPcomp
tunnels, the fallback tunnel has been created and added onto the
lists, but the user state never gets added, because we fail before
that. The user state doesn't go through __xfrm_state_delete, so we
don't call xfrm_state_delete_tunnel for those states, and we end up
leaking the FB tunnel.

There are several codepaths affected by this: the add/update paths, in
both net/key and xfrm, and the migrate code (xfrm_migrate,
xfrm_state_migrate). A "proper" rollback of the init_state work would
probably be doable in the add/update code, but for migrate it gets
more complicated as multiple states may be involved.

At some point, the new (not-inserted) state will be destroyed, so call
xfrm_state_delete_tunnel during xfrm_state_gc_destroy. Most states
will have their fallback tunnel cleaned up during __xfrm_state_delete,
which solves the issue that b441cf3f8c4b (and other patches before it)
aimed at. All states (including FB tunnels) will be removed from the
lists once xfrm_state_fini has called flush_work(&amp;xfrm_state_gc_work).
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40256/">CVE-2025-40256 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40256">CVE-2025-40256 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254851">SUSE bug 1254851</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540257" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40257</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40257" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40257" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40257" ref_url="https://www.suse.com/security/cve/CVE-2025-40257" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mptcp: fix a race in mptcp_pm_del_add_timer()

mptcp_pm_del_add_timer() can call sk_stop_timer_sync(sk, &amp;entry-&gt;add_timer)
while another might have free entry already, as reported by syzbot.

Add RCU protection to fix this issue.

Also change confusing add_timer variable with stop_timer boolean.

syzbot report:

BUG: KASAN: slab-use-after-free in __timer_delete_sync+0x372/0x3f0 kernel/time/timer.c:1616
Read of size 4 at addr ffff8880311e4150 by task kworker/1:1/44

CPU: 1 UID: 0 PID: 44 Comm: kworker/1:1 Not tainted syzkaller #0 PREEMPT_{RT,(full)}
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025
Workqueue: events mptcp_worker
Call Trace:
 &lt;TASK&gt;
  dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120
  print_address_description mm/kasan/report.c:378 [inline]
  print_report+0xca/0x240 mm/kasan/report.c:482
  kasan_report+0x118/0x150 mm/kasan/report.c:595
  __timer_delete_sync+0x372/0x3f0 kernel/time/timer.c:1616
  sk_stop_timer_sync+0x1b/0x90 net/core/sock.c:3631
  mptcp_pm_del_add_timer+0x283/0x310 net/mptcp/pm.c:362
  mptcp_incoming_options+0x1357/0x1f60 net/mptcp/options.c:1174
  tcp_data_queue+0xca/0x6450 net/ipv4/tcp_input.c:5361
  tcp_rcv_established+0x1335/0x2670 net/ipv4/tcp_input.c:6441
  tcp_v4_do_rcv+0x98b/0xbf0 net/ipv4/tcp_ipv4.c:1931
  tcp_v4_rcv+0x252a/0x2dc0 net/ipv4/tcp_ipv4.c:2374
  ip_protocol_deliver_rcu+0x221/0x440 net/ipv4/ip_input.c:205
  ip_local_deliver_finish+0x3bb/0x6f0 net/ipv4/ip_input.c:239
  NF_HOOK+0x30c/0x3a0 include/linux/netfilter.h:318
  NF_HOOK+0x30c/0x3a0 include/linux/netfilter.h:318
  __netif_receive_skb_one_core net/core/dev.c:6079 [inline]
  __netif_receive_skb+0x143/0x380 net/core/dev.c:6192
  process_backlog+0x31e/0x900 net/core/dev.c:6544
  __napi_poll+0xb6/0x540 net/core/dev.c:7594
  napi_poll net/core/dev.c:7657 [inline]
  net_rx_action+0x5f7/0xda0 net/core/dev.c:7784
  handle_softirqs+0x22f/0x710 kernel/softirq.c:622
  __do_softirq kernel/softirq.c:656 [inline]
  __local_bh_enable_ip+0x1a0/0x2e0 kernel/softirq.c:302
  mptcp_pm_send_ack net/mptcp/pm.c:210 [inline]
 mptcp_pm_addr_send_ack+0x41f/0x500 net/mptcp/pm.c:-1
  mptcp_pm_worker+0x174/0x320 net/mptcp/pm.c:1002
  mptcp_worker+0xd5/0x1170 net/mptcp/protocol.c:2762
  process_one_work kernel/workqueue.c:3263 [inline]
  process_scheduled_works+0xae1/0x17b0 kernel/workqueue.c:3346
  worker_thread+0x8a0/0xda0 kernel/workqueue.c:3427
  kthread+0x711/0x8a0 kernel/kthread.c:463
  ret_from_fork+0x4bc/0x870 arch/x86/kernel/process.c:158
  ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
 &lt;/TASK&gt;

Allocated by task 44:
  kasan_save_stack mm/kasan/common.c:56 [inline]
  kasan_save_track+0x3e/0x80 mm/kasan/common.c:77
  poison_kmalloc_redzone mm/kasan/common.c:400 [inline]
  __kasan_kmalloc+0x93/0xb0 mm/kasan/common.c:417
  kasan_kmalloc include/linux/kasan.h:262 [inline]
  __kmalloc_cache_noprof+0x1ef/0x6c0 mm/slub.c:5748
  kmalloc_noprof include/linux/slab.h:957 [inline]
  mptcp_pm_alloc_anno_list+0x104/0x460 net/mptcp/pm.c:385
  mptcp_pm_create_subflow_or_signal_addr+0xf9d/0x1360 net/mptcp/pm_kernel.c:355
  mptcp_pm_nl_fully_established net/mptcp/pm_kernel.c:409 [inline]
  __mptcp_pm_kernel_worker+0x417/0x1ef0 net/mptcp/pm_kernel.c:1529
  mptcp_pm_worker+0x1ee/0x320 net/mptcp/pm.c:1008
  mptcp_worker+0xd5/0x1170 net/mptcp/protocol.c:2762
  process_one_work kernel/workqueue.c:3263 [inline]
  process_scheduled_works+0xae1/0x17b0 kernel/workqueue.c:3346
  worker_thread+0x8a0/0xda0 kernel/workqueue.c:3427
  kthread+0x711/0x8a0 kernel/kthread.c:463
  ret_from_fork+0x4bc/0x870 arch/x86/kernel/process.c:158
  ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245

Freed by task 6630:
  kasan_save_stack mm/kasan/common.c:56 [inline]
  kasan_save_track+0x3e/0x80 mm/kasan/common.c:77
  __kasan_save_free_info+0x46/0x50 mm/kasan/generic.c:587
  kasan_save_free_info mm/kasan/kasan.h:406 [inline]
  poison_slab_object m
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-40257/">CVE-2025-40257 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40257">CVE-2025-40257 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254842">SUSE bug 1254842</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257242">SUSE bug 1257242</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540258" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40258</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40258" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40258" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40258" ref_url="https://www.suse.com/security/cve/CVE-2025-40258" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1143" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003191.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1662" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002457.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0944-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0992-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1132-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1136-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024847.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20817-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20887-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20888-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20889-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20891-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20892-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20893-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20895-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20896-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20897-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20898-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20899-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20900-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20944-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20945-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20946-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045205.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mptcp: fix race condition in mptcp_schedule_work()

syzbot reported use-after-free in mptcp_schedule_work() [1]

Issue here is that mptcp_schedule_work() schedules a work,
then gets a refcount on sk-&gt;sk_refcnt if the work was scheduled.
This refcount will be released by mptcp_worker().

[A] if (schedule_work(...)) {
[B]     sock_hold(sk);
        return true;
    }

Problem is that mptcp_worker() can run immediately and complete before [B]

We need instead :

    sock_hold(sk);
    if (schedule_work(...))
        return true;
    sock_put(sk);

[1]
refcount_t: addition on 0; use-after-free.
 WARNING: CPU: 1 PID: 29 at lib/refcount.c:25 refcount_warn_saturate+0xfa/0x1d0 lib/refcount.c:25
Call Trace:
 &lt;TASK&gt;
 __refcount_add include/linux/refcount.h:-1 [inline]
  __refcount_inc include/linux/refcount.h:366 [inline]
  refcount_inc include/linux/refcount.h:383 [inline]
  sock_hold include/net/sock.h:816 [inline]
  mptcp_schedule_work+0x164/0x1a0 net/mptcp/protocol.c:943
  mptcp_tout_timer+0x21/0xa0 net/mptcp/protocol.c:2316
  call_timer_fn+0x17e/0x5f0 kernel/time/timer.c:1747
  expire_timers kernel/time/timer.c:1798 [inline]
  __run_timers kernel/time/timer.c:2372 [inline]
  __run_timer_base+0x648/0x970 kernel/time/timer.c:2384
  run_timer_base kernel/time/timer.c:2393 [inline]
  run_timer_softirq+0xb7/0x180 kernel/time/timer.c:2403
  handle_softirqs+0x22f/0x710 kernel/softirq.c:622
  __do_softirq kernel/softirq.c:656 [inline]
  run_ktimerd+0xcf/0x190 kernel/softirq.c:1138
  smpboot_thread_fn+0x542/0xa60 kernel/smpboot.c:160
  kthread+0x711/0x8a0 kernel/kthread.c:463
  ret_from_fork+0x4bc/0x870 arch/x86/kernel/process.c:158
  ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40258/">CVE-2025-40258 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40258">CVE-2025-40258 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254843">SUSE bug 1254843</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255053">SUSE bug 1255053</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540259" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40259</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40259" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40259" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40259" ref_url="https://www.suse.com/security/cve/CVE-2025-40259" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: sg: Do not sleep in atomic context

sg_finish_rem_req() calls blk_rq_unmap_user(). The latter function may
sleep. Hence, call sg_finish_rem_req() with interrupts enabled instead
of disabled.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40259/">CVE-2025-40259 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40259">CVE-2025-40259 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254845">SUSE bug 1254845</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540261" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40261</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40261" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40261" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40261" ref_url="https://www.suse.com/security/cve/CVE-2025-40261" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvme: nvme-fc: Ensure -&gt;ioerr_work is cancelled in nvme_fc_delete_ctrl()

nvme_fc_delete_assocation() waits for pending I/O to complete before
returning, and an error can cause -&gt;ioerr_work to be queued after
cancel_work_sync() had been called.  Move the call to cancel_work_sync() to
be after nvme_fc_delete_association() to ensure -&gt;ioerr_work is not running
when the nvme_fc_ctrl object is freed.  Otherwise the following can occur:

[ 1135.911754] list_del corruption, ff2d24c8093f31f8-&gt;next is NULL
[ 1135.917705] ------------[ cut here ]------------
[ 1135.922336] kernel BUG at lib/list_debug.c:52!
[ 1135.926784] Oops: invalid opcode: 0000 [#1] SMP NOPTI
[ 1135.931851] CPU: 48 UID: 0 PID: 726 Comm: kworker/u449:23 Kdump: loaded Not tainted 6.12.0 #1 PREEMPT(voluntary)
[ 1135.943490] Hardware name: Dell Inc. PowerEdge R660/0HGTK9, BIOS 2.5.4 01/16/2025
[ 1135.950969] Workqueue:  0x0 (nvme-wq)
[ 1135.954673] RIP: 0010:__list_del_entry_valid_or_report.cold+0xf/0x6f
[ 1135.961041] Code: c7 c7 98 68 72 94 e8 26 45 fe ff 0f 0b 48 c7 c7 70 68 72 94 e8 18 45 fe ff 0f 0b 48 89 fe 48 c7 c7 80 69 72 94 e8 07 45 fe ff &lt;0f&gt; 0b 48 89 d1 48 c7 c7 a0 6a 72 94 48 89 c2 e8 f3 44 fe ff 0f 0b
[ 1135.979788] RSP: 0018:ff579b19482d3e50 EFLAGS: 00010046
[ 1135.985015] RAX: 0000000000000033 RBX: ff2d24c8093f31f0 RCX: 0000000000000000
[ 1135.992148] RDX: 0000000000000000 RSI: ff2d24d6bfa1d0c0 RDI: ff2d24d6bfa1d0c0
[ 1135.999278] RBP: ff2d24c8093f31f8 R08: 0000000000000000 R09: ffffffff951e2b08
[ 1136.006413] R10: ffffffff95122ac8 R11: 0000000000000003 R12: ff2d24c78697c100
[ 1136.013546] R13: fffffffffffffff8 R14: 0000000000000000 R15: ff2d24c78697c0c0
[ 1136.020677] FS:  0000000000000000(0000) GS:ff2d24d6bfa00000(0000) knlGS:0000000000000000
[ 1136.028765] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 1136.034510] CR2: 00007fd207f90b80 CR3: 000000163ea22003 CR4: 0000000000f73ef0
[ 1136.041641] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 1136.048776] DR3: 0000000000000000 DR6: 00000000fffe07f0 DR7: 0000000000000400
[ 1136.055910] PKRU: 55555554
[ 1136.058623] Call Trace:
[ 1136.061074]  &lt;TASK&gt;
[ 1136.063179]  ? show_trace_log_lvl+0x1b0/0x2f0
[ 1136.067540]  ? show_trace_log_lvl+0x1b0/0x2f0
[ 1136.071898]  ? move_linked_works+0x4a/0xa0
[ 1136.075998]  ? __list_del_entry_valid_or_report.cold+0xf/0x6f
[ 1136.081744]  ? __die_body.cold+0x8/0x12
[ 1136.085584]  ? die+0x2e/0x50
[ 1136.088469]  ? do_trap+0xca/0x110
[ 1136.091789]  ? do_error_trap+0x65/0x80
[ 1136.095543]  ? __list_del_entry_valid_or_report.cold+0xf/0x6f
[ 1136.101289]  ? exc_invalid_op+0x50/0x70
[ 1136.105127]  ? __list_del_entry_valid_or_report.cold+0xf/0x6f
[ 1136.110874]  ? asm_exc_invalid_op+0x1a/0x20
[ 1136.115059]  ? __list_del_entry_valid_or_report.cold+0xf/0x6f
[ 1136.120806]  move_linked_works+0x4a/0xa0
[ 1136.124733]  worker_thread+0x216/0x3a0
[ 1136.128485]  ? __pfx_worker_thread+0x10/0x10
[ 1136.132758]  kthread+0xfa/0x240
[ 1136.135904]  ? __pfx_kthread+0x10/0x10
[ 1136.139657]  ret_from_fork+0x31/0x50
[ 1136.143236]  ? __pfx_kthread+0x10/0x10
[ 1136.146988]  ret_from_fork_asm+0x1a/0x30
[ 1136.150915]  &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40261/">CVE-2025-40261 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40261">CVE-2025-40261 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254839">SUSE bug 1254839</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540262" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40262</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40262" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40262" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40262" ref_url="https://www.suse.com/security/cve/CVE-2025-40262" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Input: imx_sc_key - fix memory corruption on unload

This is supposed to be "priv" but we accidentally pass "&amp;priv" which is
an address in the stack and so it will lead to memory corruption when
the imx_sc_key_action() function is called.  Remove the &amp;.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40262/">CVE-2025-40262 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40262">CVE-2025-40262 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254840">SUSE bug 1254840</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540263" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40263</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40263" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40263" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40263" ref_url="https://www.suse.com/security/cve/CVE-2025-40263" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Input: cros_ec_keyb - fix an invalid memory access

If cros_ec_keyb_register_matrix() isn't called (due to
`buttons_switches_only`) in cros_ec_keyb_probe(), `ckdev-&gt;idev` remains
NULL.  An invalid memory access is observed in cros_ec_keyb_process()
when receiving an EC_MKBP_EVENT_KEY_MATRIX event in cros_ec_keyb_work()
in such case.

  Unable to handle kernel read from unreadable memory at virtual address 0000000000000028
  ...
  x3 : 0000000000000000 x2 : 0000000000000000
  x1 : 0000000000000000 x0 : 0000000000000000
  Call trace:
  input_event
  cros_ec_keyb_work
  blocking_notifier_call_chain
  ec_irq_thread

It's still unknown about why the kernel receives such malformed event,
in any cases, the kernel shouldn't access `ckdev-&gt;idev` and friends if
the driver doesn't intend to initialize them.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40263/">CVE-2025-40263 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40263">CVE-2025-40263 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255077">SUSE bug 1255077</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540264" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40264</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40264" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40264" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40264" ref_url="https://www.suse.com/security/cve/CVE-2025-40264" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

be2net: pass wrb_params in case of OS2BMC

be_insert_vlan_in_pkt() is called with the wrb_params argument being NULL
at be_send_pkt_to_bmc() call site.   This may lead to dereferencing a NULL
pointer when processing a workaround for specific packet, as commit
bc0c3405abbb ("be2net: fix a Tx stall bug caused by a specific ipv6
packet") states.

The correct way would be to pass the wrb_params from be_xmit().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40264/">CVE-2025-40264 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40264">CVE-2025-40264 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254835">SUSE bug 1254835</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540266" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40266</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40266" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40266" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40266" ref_url="https://www.suse.com/security/cve/CVE-2025-40266" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: arm64: Check the untrusted offset in FF-A memory share

Verify the offset to prevent OOB access in the hypervisor
FF-A buffer in case an untrusted large enough value
[U32_MAX - sizeof(struct ffa_composite_mem_region) + 1, U32_MAX]
is set from the host kernel.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40266/">CVE-2025-40266 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40266">CVE-2025-40266 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255040">SUSE bug 1255040</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540268" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40268</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40268" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40268" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40268" ref_url="https://www.suse.com/security/cve/CVE-2025-40268" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cifs: client: fix memory leak in smb3_fs_context_parse_param

The user calls fsconfig twice, but when the program exits, free() only
frees ctx-&gt;source for the second fsconfig, not the first.
Regarding fc-&gt;source, there is no code in the fs context related to its
memory reclamation.

To fix this memory leak, release the source memory corresponding to ctx
or fc before each parsing.

syzbot reported:
BUG: memory leak
unreferenced object 0xffff888128afa360 (size 96):
  backtrace (crc 79c9c7ba):
    kstrdup+0x3c/0x80 mm/util.c:84
    smb3_fs_context_parse_param+0x229b/0x36c0 fs/smb/client/fs_context.c:1444

BUG: memory leak
unreferenced object 0xffff888112c7d900 (size 96):
  backtrace (crc 79c9c7ba):
    smb3_fs_context_fullpath+0x70/0x1b0 fs/smb/client/fs_context.c:629
    smb3_fs_context_parse_param+0x2266/0x36c0 fs/smb/client/fs_context.c:1438
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40268/">CVE-2025-40268 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40268">CVE-2025-40268 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255082">SUSE bug 1255082</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540269" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40269</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40269" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40269" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40269" ref_url="https://www.suse.com/security/cve/CVE-2025-40269" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2212" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003185.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2264" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002483.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2759" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: usb-audio: Fix potential overflow of PCM transfer buffer

The PCM stream data in USB-audio driver is transferred over USB URB
packet buffers, and each packet size is determined dynamically.  The
packet sizes are limited by some factors such as wMaxPacketSize USB
descriptor.  OTOH, in the current code, the actually used packet sizes
are determined only by the rate and the PPS, which may be bigger than
the size limit above.  This results in a buffer overflow, as reported
by syzbot.

Basically when the limit is smaller than the calculated packet size,
it implies that something is wrong, most likely a weird USB
descriptor.  So the best option would be just to return an error at
the parameter setup time before doing any further operations.

This patch introduces such a sanity check, and returns -EINVAL when
the packet size is greater than maxpacksize.  The comparison with
ep-&gt;packsize[1] alone should suffice since it's always equal or
greater than ep-&gt;packsize[0].
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40269/">CVE-2025-40269 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40269">CVE-2025-40269 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255035">SUSE bug 1255035</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540271" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40271</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40271" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40271" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40271" ref_url="https://www.suse.com/security/cve/CVE-2025-40271" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1662" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002457.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2212" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003185.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2759" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002619.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3685" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fs/proc: fix uaf in proc_readdir_de()

Pde is erased from subdir rbtree through rb_erase(), but not set the node
to EMPTY, which may result in uaf access.  We should use RB_CLEAR_NODE()
set the erased node to EMPTY, then pde_subdir_next() will return NULL to
avoid uaf access.

We found an uaf issue while using stress-ng testing, need to run testcase
getdent and tun in the same time.  The steps of the issue is as follows:

1) use getdent to traverse dir /proc/pid/net/dev_snmp6/, and current
   pde is tun3;

2) in the [time windows] unregister netdevice tun3 and tun2, and erase
   them from rbtree.  erase tun3 first, and then erase tun2.  the
   pde(tun2) will be released to slab;

3) continue to getdent process, then pde_subdir_next() will return
   pde(tun2) which is released, it will case uaf access.

CPU 0                                      |    CPU 1
-------------------------------------------------------------------------
traverse dir /proc/pid/net/dev_snmp6/      |   unregister_netdevice(tun-&gt;dev)   //tun3 tun2
sys_getdents64()                           |
  iterate_dir()                            |
    proc_readdir()                         |
      proc_readdir_de()                    |     snmp6_unregister_dev()
        pde_get(de);                       |       proc_remove()
        read_unlock(&amp;proc_subdir_lock);    |         remove_proc_subtree()
                                           |           write_lock(&amp;proc_subdir_lock);
        [time window]                      |           rb_erase(&amp;root-&gt;subdir_node, &amp;parent-&gt;subdir);
                                           |           write_unlock(&amp;proc_subdir_lock);
        read_lock(&amp;proc_subdir_lock);      |
        next = pde_subdir_next(de);        |
        pde_put(de);                       |
        de = next;    //UAF                |

rbtree of dev_snmp6
                        |
                    pde(tun3)
                     /    \
                  NULL  pde(tun2)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-40271/">CVE-2025-40271 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40271">CVE-2025-40271 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255297">SUSE bug 1255297</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540272" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40272</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40272" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40272" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40272" ref_url="https://www.suse.com/security/cve/CVE-2025-40272" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/secretmem: fix use-after-free race in fault handler

When a page fault occurs in a secret memory file created with
`memfd_secret(2)`, the kernel will allocate a new folio for it, mark the
underlying page as not-present in the direct map, and add it to the file
mapping.

If two tasks cause a fault in the same page concurrently, both could end
up allocating a folio and removing the page from the direct map, but only
one would succeed in adding the folio to the file mapping.  The task that
failed undoes the effects of its attempt by (a) freeing the folio again
and (b) putting the page back into the direct map.  However, by doing
these two operations in this order, the page becomes available to the
allocator again before it is placed back in the direct mapping.

If another task attempts to allocate the page between (a) and (b), and the
kernel tries to access it via the direct map, it would result in a
supervisor not-present page fault.

Fix the ordering to restore the direct map before the folio is freed.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40272/">CVE-2025-40272 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40272">CVE-2025-40272 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254832">SUSE bug 1254832</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540273" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40273</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40273" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40273" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40273" ref_url="https://www.suse.com/security/cve/CVE-2025-40273" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFSD: free copynotify stateid in nfs4_free_ol_stateid()

Typically copynotify stateid is freed either when parent's stateid
is being close/freed or in nfsd4_laundromat if the stateid hasn't
been used in a lease period.

However, in case when the server got an OPEN (which created
a parent stateid), followed by a COPY_NOTIFY using that stateid,
followed by a client reboot. New client instance while doing
CREATE_SESSION would force expire previous state of this client.
It leads to the open state being freed thru release_openowner-&gt;
nfs4_free_ol_stateid() and it finds that it still has copynotify
stateid associated with it. We currently print a warning and is
triggerred

WARNING: CPU: 1 PID: 8858 at fs/nfsd/nfs4state.c:1550 nfs4_free_ol_stateid+0xb0/0x100 [nfsd]

This patch, instead, frees the associated copynotify stateid here.

If the parent stateid is freed (without freeing the copynotify
stateids associated with it), it leads to the list corruption
when laundromat ends up freeing the copynotify state later.

[ 1626.839430] Internal error: Oops - BUG: 00000000f2000800 [#1]  SMP
[ 1626.842828] Modules linked in: nfnetlink_queue nfnetlink_log bluetooth cfg80211 rpcrdma rdma_cm iw_cm ib_cm ib_core nfsd nfs_acl lockd grace nfs_localio ext4 crc16 mbcache jbd2 overlay uinput snd_seq_dummy snd_hrtimer qrtr rfkill vfat fat uvcvideo snd_hda_codec_generic videobuf2_vmalloc videobuf2_memops snd_hda_intel uvc snd_intel_dspcfg videobuf2_v4l2 videobuf2_common snd_hda_codec snd_hda_core videodev snd_hwdep snd_seq mc snd_seq_device snd_pcm snd_timer snd soundcore sg loop auth_rpcgss vsock_loopback vmw_vsock_virtio_transport_common vmw_vsock_vmci_transport vmw_vmci vsock xfs 8021q garp stp llc mrp nvme ghash_ce e1000e nvme_core sr_mod nvme_keyring nvme_auth cdrom vmwgfx drm_ttm_helper ttm sunrpc dm_mirror dm_region_hash dm_log iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi fuse dm_multipath dm_mod nfnetlink
[ 1626.855594] CPU: 2 UID: 0 PID: 199 Comm: kworker/u24:33 Kdump: loaded Tainted: G    B   W           6.17.0-rc7+ #22 PREEMPT(voluntary)
[ 1626.857075] Tainted: [B]=BAD_PAGE, [W]=WARN
[ 1626.857573] Hardware name: VMware, Inc. VMware20,1/VBSA, BIOS VMW201.00V.24006586.BA64.2406042154 06/04/2024
[ 1626.858724] Workqueue: nfsd4 laundromat_main [nfsd]
[ 1626.859304] pstate: 61400005 (nZCv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--)
[ 1626.860010] pc : __list_del_entry_valid_or_report+0x148/0x200
[ 1626.860601] lr : __list_del_entry_valid_or_report+0x148/0x200
[ 1626.861182] sp : ffff8000881d7a40
[ 1626.861521] x29: ffff8000881d7a40 x28: 0000000000000018 x27: ffff0000c2a98200
[ 1626.862260] x26: 0000000000000600 x25: 0000000000000000 x24: ffff8000881d7b20
[ 1626.862986] x23: ffff0000c2a981e8 x22: 1fffe00012410e7d x21: ffff0000920873e8
[ 1626.863701] x20: ffff0000920873e8 x19: ffff000086f22998 x18: 0000000000000000
[ 1626.864421] x17: 20747562202c3839 x16: 3932326636383030 x15: 3030666666662065
[ 1626.865092] x14: 6220646c756f6873 x13: 0000000000000001 x12: ffff60004fd9e4a3
[ 1626.865713] x11: 1fffe0004fd9e4a2 x10: ffff60004fd9e4a2 x9 : dfff800000000000
[ 1626.866320] x8 : 00009fffb0261b5e x7 : ffff00027ecf2513 x6 : 0000000000000001
[ 1626.866938] x5 : ffff00027ecf2510 x4 : ffff60004fd9e4a3 x3 : 0000000000000000
[ 1626.867553] x2 : 0000000000000000 x1 : ffff000096069640 x0 : 000000000000006d
[ 1626.868167] Call trace:
[ 1626.868382]  __list_del_entry_valid_or_report+0x148/0x200 (P)
[ 1626.868876]  _free_cpntf_state_locked+0xd0/0x268 [nfsd]
[ 1626.869368]  nfs4_laundromat+0x6f8/0x1058 [nfsd]
[ 1626.869813]  laundromat_main+0x24/0x60 [nfsd]
[ 1626.870231]  process_one_work+0x584/0x1050
[ 1626.870595]  worker_thread+0x4c4/0xc60
[ 1626.870893]  kthread+0x2f8/0x398
[ 1626.871146]  ret_from_fork+0x10/0x20
[ 1626.871422] Code: aa1303e1 aa1403e3 910e8000 97bc55d7 (d4210000)
[ 1626.871892] SMP: stopping secondary CPUs
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40273/">CVE-2025-40273 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40273">CVE-2025-40273 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254828">SUSE bug 1254828</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540274" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40274</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40274" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40274" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40274" ref_url="https://www.suse.com/security/cve/CVE-2025-40274" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: guest_memfd: Remove bindings on memslot deletion when gmem is dying

When unbinding a memslot from a guest_memfd instance, remove the bindings
even if the guest_memfd file is dying, i.e. even if its file refcount has
gone to zero.  If the memslot is freed before the file is fully released,
nullifying the memslot side of the binding in kvm_gmem_release() will
write to freed memory, as detected by syzbot+KASAN:

  ==================================================================
  BUG: KASAN: slab-use-after-free in kvm_gmem_release+0x176/0x440 virt/kvm/guest_memfd.c:353
  Write of size 8 at addr ffff88807befa508 by task syz.0.17/6022

  CPU: 0 UID: 0 PID: 6022 Comm: syz.0.17 Not tainted syzkaller #0 PREEMPT(full)
  Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025
  Call Trace:
   &lt;TASK&gt;
   dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120
   print_address_description mm/kasan/report.c:378 [inline]
   print_report+0xca/0x240 mm/kasan/report.c:482
   kasan_report+0x118/0x150 mm/kasan/report.c:595
   kvm_gmem_release+0x176/0x440 virt/kvm/guest_memfd.c:353
   __fput+0x44c/0xa70 fs/file_table.c:468
   task_work_run+0x1d4/0x260 kernel/task_work.c:227
   resume_user_mode_work include/linux/resume_user_mode.h:50 [inline]
   exit_to_user_mode_loop+0xe9/0x130 kernel/entry/common.c:43
   exit_to_user_mode_prepare include/linux/irq-entry-common.h:225 [inline]
   syscall_exit_to_user_mode_work include/linux/entry-common.h:175 [inline]
   syscall_exit_to_user_mode include/linux/entry-common.h:210 [inline]
   do_syscall_64+0x2bd/0xfa0 arch/x86/entry/syscall_64.c:100
   entry_SYSCALL_64_after_hwframe+0x77/0x7f
  RIP: 0033:0x7fbeeff8efc9
   &lt;/TASK&gt;

  Allocated by task 6023:
   kasan_save_stack mm/kasan/common.c:56 [inline]
   kasan_save_track+0x3e/0x80 mm/kasan/common.c:77
   poison_kmalloc_redzone mm/kasan/common.c:397 [inline]
   __kasan_kmalloc+0x93/0xb0 mm/kasan/common.c:414
   kasan_kmalloc include/linux/kasan.h:262 [inline]
   __kmalloc_cache_noprof+0x3e2/0x700 mm/slub.c:5758
   kmalloc_noprof include/linux/slab.h:957 [inline]
   kzalloc_noprof include/linux/slab.h:1094 [inline]
   kvm_set_memory_region+0x747/0xb90 virt/kvm/kvm_main.c:2104
   kvm_vm_ioctl_set_memory_region+0x6f/0xd0 virt/kvm/kvm_main.c:2154
   kvm_vm_ioctl+0x957/0xc60 virt/kvm/kvm_main.c:5201
   vfs_ioctl fs/ioctl.c:51 [inline]
   __do_sys_ioctl fs/ioctl.c:597 [inline]
   __se_sys_ioctl+0xfc/0x170 fs/ioctl.c:583
   do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
   do_syscall_64+0xfa/0xfa0 arch/x86/entry/syscall_64.c:94
   entry_SYSCALL_64_after_hwframe+0x77/0x7f

  Freed by task 6023:
   kasan_save_stack mm/kasan/common.c:56 [inline]
   kasan_save_track+0x3e/0x80 mm/kasan/common.c:77
   kasan_save_free_info+0x46/0x50 mm/kasan/generic.c:584
   poison_slab_object mm/kasan/common.c:252 [inline]
   __kasan_slab_free+0x5c/0x80 mm/kasan/common.c:284
   kasan_slab_free include/linux/kasan.h:234 [inline]
   slab_free_hook mm/slub.c:2533 [inline]
   slab_free mm/slub.c:6622 [inline]
   kfree+0x19a/0x6d0 mm/slub.c:6829
   kvm_set_memory_region+0x9c4/0xb90 virt/kvm/kvm_main.c:2130
   kvm_vm_ioctl_set_memory_region+0x6f/0xd0 virt/kvm/kvm_main.c:2154
   kvm_vm_ioctl+0x957/0xc60 virt/kvm/kvm_main.c:5201
   vfs_ioctl fs/ioctl.c:51 [inline]
   __do_sys_ioctl fs/ioctl.c:597 [inline]
   __se_sys_ioctl+0xfc/0x170 fs/ioctl.c:583
   do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
   do_syscall_64+0xfa/0xfa0 arch/x86/entry/syscall_64.c:94
   entry_SYSCALL_64_after_hwframe+0x77/0x7f

Deliberately don't acquire filemap invalid lock when the file is dying as
the lifecycle of f_mapping is outside the purview of KVM.  Dereferencing
the mapping is *probably* fine, but there's no need to invalidate anything
as memslot deletion is responsible for zapping SPTEs, and the only code
that can access the dying file is kvm_gmem_release(), whose core code is
mutual
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40274/">CVE-2025-40274 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40274">CVE-2025-40274 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254830">SUSE bug 1254830</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540275" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40275</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40275" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40275" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40275" ref_url="https://www.suse.com/security/cve/CVE-2025-40275" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: usb-audio: Fix NULL pointer dereference in snd_usb_mixer_controls_badd

In snd_usb_create_streams(), for UAC version 3 devices, the Interface
Association Descriptor (IAD) is retrieved via usb_ifnum_to_if(). If this
call fails, a fallback routine attempts to obtain the IAD from the next
interface and sets a BADD profile. However, snd_usb_mixer_controls_badd()
assumes that the IAD retrieved from usb_ifnum_to_if() is always valid,
without performing a NULL check. This can lead to a NULL pointer
dereference when usb_ifnum_to_if() fails to find the interface descriptor.

This patch adds a NULL pointer check after calling usb_ifnum_to_if() in
snd_usb_mixer_controls_badd() to prevent the dereference.

This issue was discovered by syzkaller, which triggered the bug by sending
a crafted USB device descriptor.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40275/">CVE-2025-40275 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40275">CVE-2025-40275 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254829">SUSE bug 1254829</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540276" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40276</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40276" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40276" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40276" ref_url="https://www.suse.com/security/cve/CVE-2025-40276" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/panthor: Flush shmem writes before mapping buffers CPU-uncached

The shmem layer zeroes out the new pages using cached mappings, and if
we don't CPU-flush we might leave dirty cachelines behind, leading to
potential data leaks and/or asynchronous buffer corruption when dirty
cachelines are evicted.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40276/">CVE-2025-40276 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40276">CVE-2025-40276 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254824">SUSE bug 1254824</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540277" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40277</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40277" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40277" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40277" ref_url="https://www.suse.com/security/cve/CVE-2025-40277" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0793" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003234.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1142" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/vmwgfx: Validate command header size against SVGA_CMD_MAX_DATASIZE

This data originates from userspace and is used in buffer offset
calculations which could potentially overflow causing an out-of-bounds
access.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40277/">CVE-2025-40277 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40277">CVE-2025-40277 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254894">SUSE bug 1254894</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540278" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40278</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40278" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40278" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40278" ref_url="https://www.suse.com/security/cve/CVE-2025-40278" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: sched: act_ife: initialize struct tc_ife to fix KMSAN kernel-infoleak

Fix a KMSAN kernel-infoleak detected  by the syzbot .

[net?] KMSAN: kernel-infoleak in __skb_datagram_iter

In tcf_ife_dump(), the variable 'opt' was partially initialized using a
designatied initializer. While the padding bytes are reamined
uninitialized. nla_put() copies the entire structure into a
netlink message, these uninitialized bytes leaked to userspace.

Initialize the structure with memset before assigning its fields
to ensure all members and padding are cleared prior to beign copied.

This change silences the KMSAN report and prevents potential information
leaks from the kernel memory.

This fix has been tested and validated by syzbot. This patch closes the
bug reported at the following syzkaller link and ensures no infoleak.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40278/">CVE-2025-40278 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40278">CVE-2025-40278 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254825">SUSE bug 1254825</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540279" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40279</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40279" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40279" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40279" ref_url="https://www.suse.com/security/cve/CVE-2025-40279" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: sched: act_connmark: initialize struct tc_ife to fix kernel leak

In tcf_connmark_dump(), the variable 'opt' was partially initialized using a
designatied initializer. While the padding bytes are reamined
uninitialized. nla_put() copies the entire structure into a
netlink message, these uninitialized bytes leaked to userspace.

Initialize the structure with memset before assigning its fields
to ensure all members and padding are cleared prior to beign copied.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40279/">CVE-2025-40279 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40279">CVE-2025-40279 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254846">SUSE bug 1254846</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540280" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40280</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40280" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40280" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40280" ref_url="https://www.suse.com/security/cve/CVE-2025-40280" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tipc: Fix use-after-free in tipc_mon_reinit_self().

syzbot reported use-after-free of tipc_net(net)-&gt;monitors[]
in tipc_mon_reinit_self(). [0]

The array is protected by RTNL, but tipc_mon_reinit_self()
iterates over it without RTNL.

tipc_mon_reinit_self() is called from tipc_net_finalize(),
which is always under RTNL except for tipc_net_finalize_work().

Let's hold RTNL in tipc_net_finalize_work().

[0]:
BUG: KASAN: slab-use-after-free in __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline]
BUG: KASAN: slab-use-after-free in _raw_spin_lock_irqsave+0xa7/0xf0 kernel/locking/spinlock.c:162
Read of size 1 at addr ffff88805eae1030 by task kworker/0:7/5989

CPU: 0 UID: 0 PID: 5989 Comm: kworker/0:7 Not tainted syzkaller #0 PREEMPT_{RT,(full)}
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025
Workqueue: events tipc_net_finalize_work
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120
 print_address_description mm/kasan/report.c:378 [inline]
 print_report+0xca/0x240 mm/kasan/report.c:482
 kasan_report+0x118/0x150 mm/kasan/report.c:595
 __kasan_check_byte+0x2a/0x40 mm/kasan/common.c:568
 kasan_check_byte include/linux/kasan.h:399 [inline]
 lock_acquire+0x8d/0x360 kernel/locking/lockdep.c:5842
 __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline]
 _raw_spin_lock_irqsave+0xa7/0xf0 kernel/locking/spinlock.c:162
 rtlock_slowlock kernel/locking/rtmutex.c:1894 [inline]
 rwbase_rtmutex_lock_state kernel/locking/spinlock_rt.c:160 [inline]
 rwbase_write_lock+0xd3/0x7e0 kernel/locking/rwbase_rt.c:244
 rt_write_lock+0x76/0x110 kernel/locking/spinlock_rt.c:243
 write_lock_bh include/linux/rwlock_rt.h:99 [inline]
 tipc_mon_reinit_self+0x79/0x430 net/tipc/monitor.c:718
 tipc_net_finalize+0x115/0x190 net/tipc/net.c:140
 process_one_work kernel/workqueue.c:3236 [inline]
 process_scheduled_works+0xade/0x17b0 kernel/workqueue.c:3319
 worker_thread+0x8a0/0xda0 kernel/workqueue.c:3400
 kthread+0x70e/0x8a0 kernel/kthread.c:463
 ret_from_fork+0x439/0x7d0 arch/x86/kernel/process.c:148
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
 &lt;/TASK&gt;

Allocated by task 6089:
 kasan_save_stack mm/kasan/common.c:47 [inline]
 kasan_save_track+0x3e/0x80 mm/kasan/common.c:68
 poison_kmalloc_redzone mm/kasan/common.c:388 [inline]
 __kasan_kmalloc+0x93/0xb0 mm/kasan/common.c:405
 kasan_kmalloc include/linux/kasan.h:260 [inline]
 __kmalloc_cache_noprof+0x1a8/0x320 mm/slub.c:4407
 kmalloc_noprof include/linux/slab.h:905 [inline]
 kzalloc_noprof include/linux/slab.h:1039 [inline]
 tipc_mon_create+0xc3/0x4d0 net/tipc/monitor.c:657
 tipc_enable_bearer net/tipc/bearer.c:357 [inline]
 __tipc_nl_bearer_enable+0xe16/0x13f0 net/tipc/bearer.c:1047
 __tipc_nl_compat_doit net/tipc/netlink_compat.c:371 [inline]
 tipc_nl_compat_doit+0x3bc/0x5f0 net/tipc/netlink_compat.c:393
 tipc_nl_compat_handle net/tipc/netlink_compat.c:-1 [inline]
 tipc_nl_compat_recv+0x83c/0xbe0 net/tipc/netlink_compat.c:1321
 genl_family_rcv_msg_doit+0x215/0x300 net/netlink/genetlink.c:1115
 genl_family_rcv_msg net/netlink/genetlink.c:1195 [inline]
 genl_rcv_msg+0x60e/0x790 net/netlink/genetlink.c:1210
 netlink_rcv_skb+0x208/0x470 net/netlink/af_netlink.c:2552
 genl_rcv+0x28/0x40 net/netlink/genetlink.c:1219
 netlink_unicast_kernel net/netlink/af_netlink.c:1320 [inline]
 netlink_unicast+0x846/0xa10 net/netlink/af_netlink.c:1346
 netlink_sendmsg+0x805/0xb30 net/netlink/af_netlink.c:1896
 sock_sendmsg_nosec net/socket.c:714 [inline]
 __sock_sendmsg+0x21c/0x270 net/socket.c:729
 ____sys_sendmsg+0x508/0x820 net/socket.c:2614
 ___sys_sendmsg+0x21f/0x2a0 net/socket.c:2668
 __sys_sendmsg net/socket.c:2700 [inline]
 __do_sys_sendmsg net/socket.c:2705 [inline]
 __se_sys_sendmsg net/socket.c:2703 [inline]
 __x64_sys_sendmsg+0x1a1/0x260 net/socket.c:2703
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xfa/0x3b0 arch/
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40280/">CVE-2025-40280 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40280">CVE-2025-40280 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254847">SUSE bug 1254847</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254951">SUSE bug 1254951</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540282" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40282</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40282" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40282" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40282" ref_url="https://www.suse.com/security/cve/CVE-2025-40282" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: 6lowpan: reset link-local header on ipv6 recv path

Bluetooth 6lowpan.c netdev has header_ops, so it must set link-local
header for RX skb, otherwise things crash, eg. with AF_PACKET SOCK_RAW

Add missing skb_reset_mac_header() for uncompressed ipv6 RX path.

For the compressed one, it is done in lowpan_header_decompress().

Log: (BlueZ 6lowpan-tester Client Recv Raw - Success)
------
kernel BUG at net/core/skbuff.c:212!
Call Trace:
&lt;IRQ&gt;
...
packet_rcv (net/packet/af_packet.c:2152)
...
&lt;TASK&gt;
__local_bh_enable_ip (kernel/softirq.c:407)
netif_rx (net/core/dev.c:5648)
chan_recv_cb (net/bluetooth/6lowpan.c:294 net/bluetooth/6lowpan.c:359)
------
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40282/">CVE-2025-40282 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40282">CVE-2025-40282 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254850">SUSE bug 1254850</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540283" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40283</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40283" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40283" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40283" ref_url="https://www.suse.com/security/cve/CVE-2025-40283" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: btusb: reorder cleanup in btusb_disconnect to avoid UAF

There is a KASAN: slab-use-after-free read in btusb_disconnect().
Calling "usb_driver_release_interface(&amp;btusb_driver, data-&gt;intf)" will
free the btusb data associated with the interface. The same data is
then used later in the function, hence the UAF.

Fix by moving the accesses to btusb data to before the data is free'd.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7/CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40283/">CVE-2025-40283 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40283">CVE-2025-40283 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254858">SUSE bug 1254858</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1254859">SUSE bug 1254859</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540284" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40284</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40284" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40284" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40284" ref_url="https://www.suse.com/security/cve/CVE-2025-40284" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1132-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024847.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20817-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20887-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20888-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20889-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20891-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20892-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20893-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20895-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20896-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20897-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20898-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20899-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20900-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20945-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20946-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045205.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: MGMT: cancel mesh send timer when hdev removed

mesh_send_done timer is not canceled when hdev is removed, which causes
crash if the timer triggers after hdev is gone.

Cancel the timer when MGMT removes the hdev, like other MGMT timers.

Should fix the BUG: sporadically seen by BlueZ test bot
(in "Mesh - Send cancel - 1" test).

Log:
------
BUG: KASAN: slab-use-after-free in run_timer_softirq+0x76b/0x7d0
...
Freed by task 36:
 kasan_save_stack+0x24/0x50
 kasan_save_track+0x14/0x30
 __kasan_save_free_info+0x3a/0x60
 __kasan_slab_free+0x43/0x70
 kfree+0x103/0x500
 device_release+0x9a/0x210
 kobject_put+0x100/0x1e0
 vhci_release+0x18b/0x240
------
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-04-02"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40284/">CVE-2025-40284 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40284">CVE-2025-40284 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254860">SUSE bug 1254860</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257669">SUSE bug 1257669</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540287" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40287</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40287" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40287" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40287" ref_url="https://www.suse.com/security/cve/CVE-2025-40287" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

exfat: fix improper check of dentry.stream.valid_size

We found an infinite loop bug in the exFAT file system that can lead to a
Denial-of-Service (DoS) condition. When a dentry in an exFAT filesystem is
malformed, the following system calls - SYS_openat, SYS_ftruncate, and
SYS_pwrite64 - can cause the kernel to hang.

Root cause analysis shows that the size validation code in exfat_find()
does not check whether dentry.stream.valid_size is negative. As a result,
the system calls mentioned above can succeed and eventually trigger the DoS
issue.

This patch adds a check for negative dentry.stream.valid_size to prevent
this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40287/">CVE-2025-40287 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40287">CVE-2025-40287 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255030">SUSE bug 1255030</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540288" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40288</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40288" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40288" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40288" ref_url="https://www.suse.com/security/cve/CVE-2025-40288" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: Fix NULL pointer dereference in VRAM logic for APU devices

Previously, APU platforms (and other scenarios with uninitialized VRAM managers)
triggered a NULL pointer dereference in `ttm_resource_manager_usage()`. The root
cause is not that the `struct ttm_resource_manager *man` pointer itself is NULL,
but that `man-&gt;bdev` (the backing device pointer within the manager) remains
uninitialized (NULL) on APUs-since APUs lack dedicated VRAM and do not fully
set up VRAM manager structures. When `ttm_resource_manager_usage()` attempts to
acquire `man-&gt;bdev-&gt;lru_lock`, it dereferences the NULL `man-&gt;bdev`, leading to
a kernel OOPS.

1. **amdgpu_cs.c**: Extend the existing bandwidth control check in
   `amdgpu_cs_get_threshold_for_moves()` to include a check for
   `ttm_resource_manager_used()`. If the manager is not used (uninitialized
   `bdev`), return 0 for migration thresholds immediately-skipping VRAM-specific
   logic that would trigger the NULL dereference.

2. **amdgpu_kms.c**: Update the `AMDGPU_INFO_VRAM_USAGE` ioctl and memory info
   reporting to use a conditional: if the manager is used, return the real VRAM
   usage; otherwise, return 0. This avoids accessing `man-&gt;bdev` when it is
   NULL.

3. **amdgpu_virt.c**: Modify the vf2pf (virtual function to physical function)
   data write path. Use `ttm_resource_manager_used()` to check validity: if the
   manager is usable, calculate `fb_usage` from VRAM usage; otherwise, set
   `fb_usage` to 0 (APUs have no discrete framebuffer to report).

This approach is more robust than APU-specific checks because it:
- Works for all scenarios where the VRAM manager is uninitialized (not just APUs),
- Aligns with TTM's design by using its native helper function,
- Preserves correct behavior for discrete GPUs (which have fully initialized
  `man-&gt;bdev` and pass the `ttm_resource_manager_used()` check).

v4: use ttm_resource_manager_used(&amp;adev-&gt;mman.vram_mgr.manager) instead of checking the adev-&gt;gmc.is_app_apu flag (Christian)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40288/">CVE-2025-40288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40288">CVE-2025-40288 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255057">SUSE bug 1255057</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540289" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40289</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40289" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40289" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40289" ref_url="https://www.suse.com/security/cve/CVE-2025-40289" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: hide VRAM sysfs attributes on GPUs without VRAM

Otherwise accessing them can cause a crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40289/">CVE-2025-40289 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40289">CVE-2025-40289 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255042">SUSE bug 1255042</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540292" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40292</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40292" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40292" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40292" ref_url="https://www.suse.com/security/cve/CVE-2025-40292" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

virtio-net: fix received length check in big packets

Since commit 4959aebba8c0 ("virtio-net: use mtu size as buffer length
for big packets"), when guest gso is off, the allocated size for big
packets is not MAX_SKB_FRAGS * PAGE_SIZE anymore but depends on
negotiated MTU. The number of allocated frags for big packets is stored
in vi-&gt;big_packets_num_skbfrags.

Because the host announced buffer length can be malicious (e.g. the host
vhost_net driver's get_rx_bufs is modified to announce incorrect
length), we need a check in virtio_net receive path. Currently, the
check is not adapted to the new change which can lead to NULL page
pointer dereference in the below while loop when receiving length that
is larger than the allocated one.

This commit fixes the received length check corresponding to the new
change.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40292/">CVE-2025-40292 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40292">CVE-2025-40292 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255175">SUSE bug 1255175</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540293" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40293</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40293" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40293" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40293" ref_url="https://www.suse.com/security/cve/CVE-2025-40293" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommufd: Don't overflow during division for dirty tracking

If pgshift is 63 then BITS_PER_TYPE(*bitmap-&gt;bitmap) * pgsize will overflow
to 0 and this triggers divide by 0.

In this case the index should just be 0, so reorganize things to divide
by shift and avoid hitting any overflows.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40293/">CVE-2025-40293 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40293">CVE-2025-40293 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255179">SUSE bug 1255179</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540294" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40294</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40294" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40294" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40294" ref_url="https://www.suse.com/security/cve/CVE-2025-40294" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1143" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003191.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2352" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: MGMT: Fix OOB access in parse_adv_monitor_pattern()

In the parse_adv_monitor_pattern() function, the value of
the 'length' variable is currently limited to HCI_MAX_EXT_AD_LENGTH(251).
The size of the 'value' array in the mgmt_adv_pattern structure is 31.
If the value of 'pattern[i].length' is set in the user space
and exceeds 31, the 'patterns[i].value' array can be accessed
out of bound when copied.

Increasing the size of the 'value' array in
the 'mgmt_adv_pattern' structure will break the userspace.
Considering this, and to avoid OOB access revert the limits for 'offset'
and 'length' back to the value of HCI_MAX_AD_LENGTH.

Found by InfoTeCS on behalf of Linux Verification Center
(linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40294/">CVE-2025-40294 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40294">CVE-2025-40294 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255181">SUSE bug 1255181</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540297" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40297</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40297" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40297" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40297" ref_url="https://www.suse.com/security/cve/CVE-2025-40297" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0944-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1132-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1136-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024847.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20817-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20887-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20888-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20889-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20891-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20892-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20893-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20895-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20896-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20897-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20898-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20899-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20900-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20944-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20945-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20946-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045205.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: bridge: fix use-after-free due to MST port state bypass

syzbot reported[1] a use-after-free when deleting an expired fdb. It is
due to a race condition between learning still happening and a port being
deleted, after all its fdbs have been flushed. The port's state has been
toggled to disabled so no learning should happen at that time, but if we
have MST enabled, it will bypass the port's state, that together with VLAN
filtering disabled can lead to fdb learning at a time when it shouldn't
happen while the port is being deleted. VLAN filtering must be disabled
because we flush the port VLANs when it's being deleted which will stop
learning. This fix adds a check for the port's vlan group which is
initialized to NULL when the port is getting deleted, that avoids the port
state bypass. When MST is enabled there would be a minimal new overhead
in the fast-path because the port's vlan group pointer is cache-hot.

[1] https://syzkaller.appspot.com/bug?extid=dd280197f0f7ab3917be
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-04-02"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40297/">CVE-2025-40297 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40297">CVE-2025-40297 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255187">SUSE bug 1255187</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255895">SUSE bug 1255895</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540300" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40300</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40300" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40300" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40300" ref_url="https://www.suse.com/security/cve/CVE-2025-40300" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:19930" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002218.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19931" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002216.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03601-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03614-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042177.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023025.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20861-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023116.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20994-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023515.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3725-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3751-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20560-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024586.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/vmscape: Add conditional IBPB mitigation

VMSCAPE is a vulnerability that exploits insufficient branch predictor
isolation between a guest and a userspace hypervisor (like QEMU). Existing
mitigations already protect kernel/KVM from a malicious guest. Userspace
can additionally be protected by flushing the branch predictors after a
VMexit.

Since it is the userspace that consumes the poisoned branch predictors,
conditionally issue an IBPB after a VMexit and before returning to
userspace. Workloads that frequently switch between hypervisor and
userspace will incur the most overhead from the new IBPB.

This new IBPB is not integrated with the existing IBPB sites. For
instance, a task can use the existing speculation control prctl() to
get an IBPB at context switch time. With this implementation, the
IBPB is doubled up: one at context switch and another before running
userspace.

The intent is to integrate and optimize these cases post-embargo.

[ dhansen: elaborate on suboptimal IBPB solution ]
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N" cvss4="8.2/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40300/">CVE-2025-40300 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-40300">CVE-2025-40300 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249561">SUSE bug 1249561</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025404" comment="cluster-md-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025405" comment="cluster-md-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025406" comment="cluster-md-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025407" comment="dlm-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025408" comment="dlm-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025409" comment="dlm-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025410" comment="dtb-allwinner-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025411" comment="dtb-altera-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025412" comment="dtb-amazon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025413" comment="dtb-amd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025414" comment="dtb-amlogic-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025415" comment="dtb-apm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025416" comment="dtb-apple-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025417" comment="dtb-arm-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025418" comment="dtb-broadcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025419" comment="dtb-cavium-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025420" comment="dtb-exynos-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025421" comment="dtb-freescale-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025422" comment="dtb-hisilicon-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025423" comment="dtb-lg-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025424" comment="dtb-marvell-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025425" comment="dtb-mediatek-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025426" comment="dtb-nvidia-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025427" comment="dtb-qcom-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025428" comment="dtb-renesas-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025429" comment="dtb-rockchip-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025430" comment="dtb-socionext-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025431" comment="dtb-sprd-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025432" comment="dtb-xilinx-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025433" comment="gfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025434" comment="gfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025435" comment="gfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025436" comment="kernel-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025438" comment="kernel-64kb-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025439" comment="kernel-64kb-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025440" comment="kernel-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025442" comment="kernel-default-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025443" comment="kernel-default-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025444" comment="kernel-default-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025446" comment="kernel-docs-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025447" comment="kernel-docs-html-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025448" comment="kernel-kvmsmall-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025450" comment="kernel-kvmsmall-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025451" comment="kernel-macros-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025452" comment="kernel-obs-build-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025453" comment="kernel-obs-qa-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025454" comment="kernel-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025456" comment="kernel-rt-extra-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025457" comment="kernel-rt-optional-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025458" comment="kernel-rt-vdso-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025459" comment="kernel-source-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025460" comment="kernel-source-vanilla-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025461" comment="kernel-syms-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025462" comment="kernel-zfcpdump-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025463" comment="kselftests-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025464" comment="kselftests-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025465" comment="kselftests-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025466" comment="ocfs2-kmp-64kb-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025467" comment="ocfs2-kmp-default-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025468" comment="ocfs2-kmp-rt-6.12.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540301" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40301</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40301" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40301" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40301" ref_url="https://www.suse.com/security/cve/CVE-2025-40301" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: hci_event: validate skb length for unknown CC opcode

In hci_cmd_complete_evt(), if the command complete event has an unknown
opcode, we assume the first byte of the remaining skb-&gt;data contains the
return status. However, parameter data has previously been pulled in
hci_event_func(), which may leave the skb empty. If so, using skb-&gt;data[0]
for the return status uses un-init memory.

The fix is to check skb-&gt;len before using skb-&gt;data.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40301/">CVE-2025-40301 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40301">CVE-2025-40301 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255193">SUSE bug 1255193</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540302" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40302</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40302" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40302" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40302" ref_url="https://www.suse.com/security/cve/CVE-2025-40302" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: videobuf2: forbid remove_bufs when legacy fileio is active

vb2_ioctl_remove_bufs() call manipulates queue internal buffer list,
potentially overwriting some pointers used by the legacy fileio access
mode. Forbid that ioctl when fileio is active to protect internal queue
state between subsequent read/write calls.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40302/">CVE-2025-40302 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40302">CVE-2025-40302 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255196">SUSE bug 1255196</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540303" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40303</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40303" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40303" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40303" ref_url="https://www.suse.com/security/cve/CVE-2025-40303" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: ensure no dirty metadata is written back for an fs with errors

[BUG]
During development of a minor feature (make sure all btrfs_bio::end_io()
is called in task context), I noticed a crash in generic/388, where
metadata writes triggered new works after btrfs_stop_all_workers().

It turns out that it can even happen without any code modification, just
using RAID5 for metadata and the same workload from generic/388 is going
to trigger the use-after-free.

[CAUSE]
If btrfs hits an error, the fs is marked as error, no new
transaction is allowed thus metadata is in a frozen state.

But there are some metadata modifications before that error, and they are
still in the btree inode page cache.

Since there will be no real transaction commit, all those dirty folios
are just kept as is in the page cache, and they can not be invalidated
by invalidate_inode_pages2() call inside close_ctree(), because they are
dirty.

And finally after btrfs_stop_all_workers(), we call iput() on btree
inode, which triggers writeback of those dirty metadata.

And if the fs is using RAID56 metadata, this will trigger RMW and queue
new works into rmw_workers, which is already stopped, causing warning
from queue_work() and use-after-free.

[FIX]
Add a special handling for write_one_eb(), that if the fs is already in
an error state, immediately mark the bbio as failure, instead of really
submitting them.

Then during close_ctree(), iput() will just discard all those dirty
tree blocks without really writing them back, thus no more new jobs for
already stopped-and-freed workqueues.

The extra discard in write_one_eb() also acts as an extra safenet.
E.g. the transaction abort is triggered by some extent/free space
tree corruptions, and since extent/free space tree is already corrupted
some tree blocks may be allocated where they shouldn't be (overwriting
existing tree blocks). In that case writing them back will further
corrupting the fs.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40303/">CVE-2025-40303 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40303">CVE-2025-40303 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255058">SUSE bug 1255058</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540304" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40304</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40304" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40304" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40304" ref_url="https://www.suse.com/security/cve/CVE-2025-40304" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2720" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002516.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2722" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003230.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2759" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fbdev: Add bounds checking in bit_putcs to fix vmalloc-out-of-bounds

Add bounds checking to prevent writes past framebuffer boundaries when
rendering text near screen edges. Return early if the Y position is off-screen
and clip image height to screen boundary. Break from the rendering loop if the
X position is off-screen. When clipping image width to fit the screen, update
the character count to match the clipped width to prevent buffer size
mismatches.

Without the character count update, bit_putcs_aligned and bit_putcs_unaligned
receive mismatched parameters where the buffer is allocated for the clipped
width but cnt reflects the original larger count, causing out-of-bounds writes.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40304/">CVE-2025-40304 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40304">CVE-2025-40304 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255034">SUSE bug 1255034</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540307" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40307</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40307" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40307" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40307" ref_url="https://www.suse.com/security/cve/CVE-2025-40307" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

exfat: validate cluster allocation bits of the allocation bitmap

syzbot created an exfat image with cluster bits not set for the allocation
bitmap. exfat-fs reads and uses the allocation bitmap without checking
this. The problem is that if the start cluster of the allocation bitmap
is 6, cluster 6 can be allocated when creating a directory with mkdir.
exfat zeros out this cluster in exfat_mkdir, which can delete existing
entries. This can reallocate the allocated entries. In addition,
the allocation bitmap is also zeroed out, so cluster 6 can be reallocated.
This patch adds exfat_test_bitmap_range to validate that clusters used for
the allocation bitmap are correctly marked as in-use.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40307/">CVE-2025-40307 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40307">CVE-2025-40307 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255039">SUSE bug 1255039</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540308" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40308</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40308" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40308" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40308" ref_url="https://www.suse.com/security/cve/CVE-2025-40308" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: bcsp: receive data only if registered

Currently, bcsp_recv() can be called even when the BCSP protocol has not
been registered. This leads to a NULL pointer dereference, as shown in
the following stack trace:

    KASAN: null-ptr-deref in range [0x0000000000000108-0x000000000000010f]
    RIP: 0010:bcsp_recv+0x13d/0x1740 drivers/bluetooth/hci_bcsp.c:590
    Call Trace:
     &lt;TASK&gt;
     hci_uart_tty_receive+0x194/0x220 drivers/bluetooth/hci_ldisc.c:627
     tiocsti+0x23c/0x2c0 drivers/tty/tty_io.c:2290
     tty_ioctl+0x626/0xde0 drivers/tty/tty_io.c:2706
     vfs_ioctl fs/ioctl.c:51 [inline]
     __do_sys_ioctl fs/ioctl.c:907 [inline]
     __se_sys_ioctl+0xfc/0x170 fs/ioctl.c:893
     do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
     do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94
     entry_SYSCALL_64_after_hwframe+0x77/0x7f

To prevent this, ensure that the HCI_UART_REGISTERED flag is set before
processing received data. If the protocol is not registered, return
-EUNATCH.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40308/">CVE-2025-40308 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40308">CVE-2025-40308 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255064">SUSE bug 1255064</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540309" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40309</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40309" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40309" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40309" ref_url="https://www.suse.com/security/cve/CVE-2025-40309" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: SCO: Fix UAF on sco_conn_free

BUG: KASAN: slab-use-after-free in sco_conn_free net/bluetooth/sco.c:87 [inline]
BUG: KASAN: slab-use-after-free in kref_put include/linux/kref.h:65 [inline]
BUG: KASAN: slab-use-after-free in sco_conn_put+0xdd/0x410
net/bluetooth/sco.c:107
Write of size 8 at addr ffff88811cb96b50 by task kworker/u17:4/352

CPU: 1 UID: 0 PID: 352 Comm: kworker/u17:4 Not tainted
6.17.0-rc5-g717368f83676 #4 PREEMPT(voluntary)
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014
Workqueue: hci13 hci_cmd_sync_work
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:94 [inline]
 dump_stack_lvl+0x10b/0x170 lib/dump_stack.c:120
 print_address_description mm/kasan/report.c:378 [inline]
 print_report+0x191/0x550 mm/kasan/report.c:482
 kasan_report+0xc4/0x100 mm/kasan/report.c:595
 sco_conn_free net/bluetooth/sco.c:87 [inline]
 kref_put include/linux/kref.h:65 [inline]
 sco_conn_put+0xdd/0x410 net/bluetooth/sco.c:107
 sco_connect_cfm+0xb4/0xae0 net/bluetooth/sco.c:1441
 hci_connect_cfm include/net/bluetooth/hci_core.h:2082 [inline]
 hci_conn_failed+0x20a/0x2e0 net/bluetooth/hci_conn.c:1313
 hci_conn_unlink+0x55f/0x810 net/bluetooth/hci_conn.c:1121
 hci_conn_del+0xb6/0x1110 net/bluetooth/hci_conn.c:1147
 hci_abort_conn_sync+0x8c5/0xbb0 net/bluetooth/hci_sync.c:5689
 hci_cmd_sync_work+0x281/0x380 net/bluetooth/hci_sync.c:332
 process_one_work kernel/workqueue.c:3236 [inline]
 process_scheduled_works+0x77e/0x1040 kernel/workqueue.c:3319
 worker_thread+0xbee/0x1200 kernel/workqueue.c:3400
 kthread+0x3c7/0x870 kernel/kthread.c:463
 ret_from_fork+0x13a/0x1e0 arch/x86/kernel/process.c:148
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
 &lt;/TASK&gt;

Allocated by task 31370:
 kasan_save_stack mm/kasan/common.c:47 [inline]
 kasan_save_track+0x30/0x70 mm/kasan/common.c:68
 poison_kmalloc_redzone mm/kasan/common.c:388 [inline]
 __kasan_kmalloc+0x82/0x90 mm/kasan/common.c:405
 kasan_kmalloc include/linux/kasan.h:260 [inline]
 __do_kmalloc_node mm/slub.c:4382 [inline]
 __kmalloc_noprof+0x22f/0x390 mm/slub.c:4394
 kmalloc_noprof include/linux/slab.h:909 [inline]
 sk_prot_alloc+0xae/0x220 net/core/sock.c:2239
 sk_alloc+0x34/0x5a0 net/core/sock.c:2295
 bt_sock_alloc+0x3c/0x330 net/bluetooth/af_bluetooth.c:151
 sco_sock_alloc net/bluetooth/sco.c:562 [inline]
 sco_sock_create+0xc0/0x350 net/bluetooth/sco.c:593
 bt_sock_create+0x161/0x3b0 net/bluetooth/af_bluetooth.c:135
 __sock_create+0x3ad/0x780 net/socket.c:1589
 sock_create net/socket.c:1647 [inline]
 __sys_socket_create net/socket.c:1684 [inline]
 __sys_socket+0xd5/0x330 net/socket.c:1731
 __do_sys_socket net/socket.c:1745 [inline]
 __se_sys_socket net/socket.c:1743 [inline]
 __x64_sys_socket+0x7a/0x90 net/socket.c:1743
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xc7/0x240 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

Freed by task 31374:
 kasan_save_stack mm/kasan/common.c:47 [inline]
 kasan_save_track+0x30/0x70 mm/kasan/common.c:68
 kasan_save_free_info+0x40/0x50 mm/kasan/generic.c:576
 poison_slab_object mm/kasan/common.c:243 [inline]
 __kasan_slab_free+0x3d/0x50 mm/kasan/common.c:275
 kasan_slab_free include/linux/kasan.h:233 [inline]
 slab_free_hook mm/slub.c:2428 [inline]
 slab_free mm/slub.c:4701 [inline]
 kfree+0x199/0x3b0 mm/slub.c:4900
 sk_prot_free net/core/sock.c:2278 [inline]
 __sk_destruct+0x4aa/0x630 net/core/sock.c:2373
 sco_sock_release+0x2ad/0x300 net/bluetooth/sco.c:1333
 __sock_release net/socket.c:649 [inline]
 sock_close+0xb8/0x230 net/socket.c:1439
 __fput+0x3d1/0x9e0 fs/file_table.c:468
 task_work_run+0x206/0x2a0 kernel/task_work.c:227
 get_signal+0x1201/0x1410 kernel/signal.c:2807
 arch_do_signal_or_restart+0x34/0x740 arch/x86/kernel/signal.c:337
 exit_to_user_mode_loop+0x68/0xc0 kernel/entry/common.c:40
 exit_to_user_mode_prepare include/linux/irq-entry-common.h:225 [inline]
 s
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40309/">CVE-2025-40309 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40309">CVE-2025-40309 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255065">SUSE bug 1255065</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255066">SUSE bug 1255066</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540310" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40310</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40310" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40310" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40310" ref_url="https://www.suse.com/security/cve/CVE-2025-40310" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

amd/amdkfd: resolve a race in amdgpu_amdkfd_device_fini_sw

There is race in amdgpu_amdkfd_device_fini_sw and interrupt.
if amdgpu_amdkfd_device_fini_sw run in b/w kfd_cleanup_nodes and
  kfree(kfd), and KGD interrupt generated.

kernel panic log:

BUG: kernel NULL pointer dereference, address: 0000000000000098
amdgpu 0000:c8:00.0: amdgpu: Requesting 4 partitions through PSP

PGD d78c68067 P4D d78c68067

kfd kfd: amdgpu: Allocated 3969056 bytes on gart

PUD 1465b8067 PMD @

Oops: @002 [#1] SMP NOPTI

kfd kfd: amdgpu: Total number of KFD nodes to be created: 4
CPU: 115 PID: @ Comm: swapper/115 Kdump: loaded Tainted: G S W OE K

RIP: 0010:_raw_spin_lock_irqsave+0x12/0x40

Code: 89 e@ 41 5c c3 cc cc cc cc 66 66 2e Of 1f 84 00 00 00 00 00 OF 1f 40 00 Of 1f 44% 00 00 41 54 9c 41 5c fa 31 cO ba 01 00 00 00 &lt;fO&gt; OF b1 17 75 Ba 4c 89 e@ 41 Sc

89 c6 e8 07 38 5d

RSP: 0018: ffffc90@1a6b0e28 EFLAGS: 00010046

RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000000000000018
0000000000000001 RSI: ffff8883bb623e00 RDI: 0000000000000098
ffff8883bb000000 RO8: ffff888100055020 ROO: ffff888100055020
0000000000000000 R11: 0000000000000000 R12: 0900000000000002
ffff888F2b97da0@ R14: @000000000000098 R15: ffff8883babdfo00

CS: 010 DS: 0000 ES: 0000 CRO: 0000000080050033

CR2: 0000000000000098 CR3: 0000000e7cae2006 CR4: 0000000002770ce0
0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
0000000000000000 DR6: 00000000fffeO7FO DR7: 0000000000000400

PKRU: 55555554

Call Trace:

&lt;IRQ&gt;

kgd2kfd_interrupt+@x6b/0x1f@ [amdgpu]

? amdgpu_fence_process+0xa4/0x150 [amdgpu]

kfd kfd: amdgpu: Node: 0, interrupt_bitmap: 3 YcpxFl Rant tErace

amdgpu_irq_dispatch+0x165/0x210 [amdgpu]

amdgpu_ih_process+0x80/0x100 [amdgpu]

amdgpu: Virtual CRAT table created for GPU

amdgpu_irq_handler+0x1f/@x60 [amdgpu]

__handle_irq_event_percpu+0x3d/0x170

amdgpu: Topology: Add dGPU node [0x74a2:0x1002]

handle_irq_event+0x5a/@xcO

handle_edge_irq+0x93/0x240

kfd kfd: amdgpu: KFD node 1 partition @ size 49148M

asm_call_irq_on_stack+0xf/@x20

&lt;/IRQ&gt;

common_interrupt+0xb3/0x130

asm_common_interrupt+0x1le/0x40

5.10.134-010.a1i5000.a18.x86_64 #1
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40310/">CVE-2025-40310 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40310">CVE-2025-40310 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255041">SUSE bug 1255041</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40311</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40311" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40311" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40311" ref_url="https://www.suse.com/security/cve/CVE-2025-40311" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

accel/habanalabs: support mapping cb with vmalloc-backed coherent memory

When IOMMU is enabled, dma_alloc_coherent() with GFP_USER may return
addresses from the vmalloc range. If such an address is mapped without
VM_MIXEDMAP, vm_insert_page() will trigger a BUG_ON due to the
VM_PFNMAP restriction.

Fix this by checking for vmalloc addresses and setting VM_MIXEDMAP
in the VMA before mapping. This ensures safe mapping and avoids kernel
crashes. The memory is still driver-allocated and cannot be accessed
directly by userspace.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40311/">CVE-2025-40311 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40311">CVE-2025-40311 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255068">SUSE bug 1255068</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540314" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40314</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40314" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40314" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40314" ref_url="https://www.suse.com/security/cve/CVE-2025-40314" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: cdns3: gadget: Use-after-free during failed initialization and exit of cdnsp gadget

In the __cdnsp_gadget_init() and cdnsp_gadget_exit() functions, the gadget
structure (pdev-&gt;gadget) was freed before its endpoints.
The endpoints are linked via the ep_list in the gadget structure.
Freeing the gadget first leaves dangling pointers in the endpoint list.
When the endpoints are subsequently freed, this results in a use-after-free.

Fix:
By separating the usb_del_gadget_udc() operation into distinct "del" and
"put" steps, cdnsp_gadget_free_endpoints() can be executed prior to the
final release of the gadget structure with usb_put_gadget().

A patch similar to bb9c74a5bd14("usb: dwc3: gadget: Free gadget structure
 only after freeing endpoints").
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40314/">CVE-2025-40314 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40314">CVE-2025-40314 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255072">SUSE bug 1255072</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540315" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40315</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40315" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40315" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40315" ref_url="https://www.suse.com/security/cve/CVE-2025-40315" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: gadget: f_fs: Fix epfile null pointer access after ep enable.

A race condition occurs when ffs_func_eps_enable() runs concurrently
with ffs_data_reset(). The ffs_data_clear() called in ffs_data_reset()
sets ffs-&gt;epfiles to NULL before resetting ffs-&gt;eps_count to 0, leading
to a NULL pointer dereference when accessing epfile-&gt;ep in
ffs_func_eps_enable() after successful usb_ep_enable().

The ffs-&gt;epfiles pointer is set to NULL in both ffs_data_clear() and
ffs_data_close() functions, and its modification is protected by the
spinlock ffs-&gt;eps_lock. And the whole ffs_func_eps_enable() function
is also protected by ffs-&gt;eps_lock.

Thus, add NULL pointer handling for ffs-&gt;epfiles in the
ffs_func_eps_enable() function to fix issues
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40315/">CVE-2025-40315 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40315">CVE-2025-40315 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255083">SUSE bug 1255083</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540316" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40316</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40316" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40316" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40316" ref_url="https://www.suse.com/security/cve/CVE-2025-40316" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/mediatek: Fix device use-after-free on unbind

A recent change fixed device reference leaks when looking up drm
platform device driver data during bind() but failed to remove a partial
fix which had been added by commit 80805b62ea5b ("drm/mediatek: Fix
kobject put for component sub-drivers").

This results in a reference imbalance on component bind() failures and
on unbind() which could lead to a user-after-free.

Make sure to only drop the references after retrieving the driver data
by effectively reverting the previous partial fix.

Note that holding a reference to a device does not prevent its driver
data from going away so there is no point in keeping the reference.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40316/">CVE-2025-40316 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40316">CVE-2025-40316 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254797">SUSE bug 1254797</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540317" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40317</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40317" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40317" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40317" ref_url="https://www.suse.com/security/cve/CVE-2025-40317" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

regmap: slimbus: fix bus_context pointer in regmap init calls

Commit 4e65bda8273c ("ASoC: wcd934x: fix error handling in
wcd934x_codec_parse_data()") revealed the problem in the slimbus regmap.
That commit breaks audio playback, for instance, on sdm845 Thundercomm
Dragonboard 845c board:

 Unable to handle kernel paging request at virtual address ffff8000847cbad4
 ...
 CPU: 5 UID: 0 PID: 776 Comm: aplay Not tainted 6.18.0-rc1-00028-g7ea30958b305 #11 PREEMPT
 Hardware name: Thundercomm Dragonboard 845c (DT)
 ...
 Call trace:
  slim_xfer_msg+0x24/0x1ac [slimbus] (P)
  slim_read+0x48/0x74 [slimbus]
  regmap_slimbus_read+0x18/0x24 [regmap_slimbus]
  _regmap_raw_read+0xe8/0x174
  _regmap_bus_read+0x44/0x80
  _regmap_read+0x60/0xd8
  _regmap_update_bits+0xf4/0x140
  _regmap_select_page+0xa8/0x124
  _regmap_raw_write_impl+0x3b8/0x65c
  _regmap_bus_raw_write+0x60/0x80
  _regmap_write+0x58/0xc0
  regmap_write+0x4c/0x80
  wcd934x_hw_params+0x494/0x8b8 [snd_soc_wcd934x]
  snd_soc_dai_hw_params+0x3c/0x7c [snd_soc_core]
  __soc_pcm_hw_params+0x22c/0x634 [snd_soc_core]
  dpcm_be_dai_hw_params+0x1d4/0x38c [snd_soc_core]
  dpcm_fe_dai_hw_params+0x9c/0x17c [snd_soc_core]
  snd_pcm_hw_params+0x124/0x464 [snd_pcm]
  snd_pcm_common_ioctl+0x110c/0x1820 [snd_pcm]
  snd_pcm_ioctl+0x34/0x4c [snd_pcm]
  __arm64_sys_ioctl+0xac/0x104
  invoke_syscall+0x48/0x104
  el0_svc_common.constprop.0+0x40/0xe0
  do_el0_svc+0x1c/0x28
  el0_svc+0x34/0xec
  el0t_64_sync_handler+0xa0/0xf0
  el0t_64_sync+0x198/0x19c

The __devm_regmap_init_slimbus() started to be used instead of
__regmap_init_slimbus() after the commit mentioned above and turns out
the incorrect bus_context pointer (3rd argument) was used in
__devm_regmap_init_slimbus(). It should be just "slimbus" (which is equal
to &amp;slimbus-&gt;dev). Correct it. The wcd934x codec seems to be the only or
the first user of devm_regmap_init_slimbus() but we should fix it till
the point where __devm_regmap_init_slimbus() was introduced therefore
two "Fixes" tags.

While at this, also correct the same argument in __regmap_init_slimbus().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40317/">CVE-2025-40317 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40317">CVE-2025-40317 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254796">SUSE bug 1254796</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540318" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40318</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40318" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40318" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40318" ref_url="https://www.suse.com/security/cve/CVE-2025-40318" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2212" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003185.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: hci_sync: fix race in hci_cmd_sync_dequeue_once

hci_cmd_sync_dequeue_once() does lookup and then cancel
the entry under two separate lock sections. Meanwhile,
hci_cmd_sync_work() can also delete the same entry,
leading to double list_del() and "UAF".

Fix this by holding cmd_sync_work_lock across both
lookup and cancel, so that the entry cannot be removed
concurrently.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40318/">CVE-2025-40318 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40318">CVE-2025-40318 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254798">SUSE bug 1254798</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540319" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40319</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40319" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40319" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40319" ref_url="https://www.suse.com/security/cve/CVE-2025-40319" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Sync pending IRQ work before freeing ring buffer

Fix a race where irq_work can be queued in bpf_ringbuf_commit()
but the ring buffer is freed before the work executes.
In the syzbot reproducer, a BPF program attached to sched_switch
triggers bpf_ringbuf_commit(), queuing an irq_work. If the ring buffer
is freed before this work executes, the irq_work thread may accesses
freed memory.
Calling `irq_work_sync(&amp;rb-&gt;work)` ensures that all pending irq_work
complete before freeing the buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40319/">CVE-2025-40319 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40319">CVE-2025-40319 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254794">SUSE bug 1254794</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540320" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40320</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40320" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40320" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40320" ref_url="https://www.suse.com/security/cve/CVE-2025-40320" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix potential cfid UAF in smb2_query_info_compound

When smb2_query_info_compound() retries, a previously allocated cfid may
have been freed in the first attempt.
Because cfid wasn't reset on replay, later cleanup could act on a stale
pointer, leading to a potential use-after-free.

Reinitialize cfid to NULL under the replay label.

Example trace (trimmed):

refcount_t: underflow; use-after-free.
WARNING: CPU: 1 PID: 11224 at ../lib/refcount.c:28 refcount_warn_saturate+0x9c/0x110
[...]
RIP: 0010:refcount_warn_saturate+0x9c/0x110
[...]
Call Trace:
 &lt;TASK&gt;
 smb2_query_info_compound+0x29c/0x5c0 [cifs f90b72658819bd21c94769b6a652029a07a7172f]
 ? step_into+0x10d/0x690
 ? __legitimize_path+0x28/0x60
 smb2_queryfs+0x6a/0xf0 [cifs f90b72658819bd21c94769b6a652029a07a7172f]
 smb311_queryfs+0x12d/0x140 [cifs f90b72658819bd21c94769b6a652029a07a7172f]
 ? kmem_cache_alloc+0x18a/0x340
 ? getname_flags+0x46/0x1e0
 cifs_statfs+0x9f/0x2b0 [cifs f90b72658819bd21c94769b6a652029a07a7172f]
 statfs_by_dentry+0x67/0x90
 vfs_statfs+0x16/0xd0
 user_statfs+0x54/0xa0
 __do_sys_statfs+0x20/0x50
 do_syscall_64+0x58/0x80
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40320/">CVE-2025-40320 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40320">CVE-2025-40320 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254793">SUSE bug 1254793</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540321" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40321</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40321" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40321" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40321" ref_url="https://www.suse.com/security/cve/CVE-2025-40321" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: brcmfmac: fix crash while sending Action Frames in standalone AP Mode

Currently, whenever there is a need to transmit an Action frame,
the brcmfmac driver always uses the P2P vif to send the "actframe" IOVAR to
firmware. The P2P interfaces were available when wpa_supplicant is managing
the wlan interface.

However, the P2P interfaces are not created/initialized when only hostapd
is managing the wlan interface. And if hostapd receives an ANQP Query REQ
Action frame even from an un-associated STA, the brcmfmac driver tries
to use an uninitialized P2P vif pointer for sending the IOVAR to firmware.
This NULL pointer dereferencing triggers a driver crash.

 [ 1417.074538] Unable to handle kernel NULL pointer dereference at virtual
 address 0000000000000000
 [...]
 [ 1417.075188] Hardware name: Raspberry Pi 4 Model B Rev 1.5 (DT)
 [...]
 [ 1417.075653] Call trace:
 [ 1417.075662]  brcmf_p2p_send_action_frame+0x23c/0xc58 [brcmfmac]
 [ 1417.075738]  brcmf_cfg80211_mgmt_tx+0x304/0x5c0 [brcmfmac]
 [ 1417.075810]  cfg80211_mlme_mgmt_tx+0x1b0/0x428 [cfg80211]
 [ 1417.076067]  nl80211_tx_mgmt+0x238/0x388 [cfg80211]
 [ 1417.076281]  genl_family_rcv_msg_doit+0xe0/0x158
 [ 1417.076302]  genl_rcv_msg+0x220/0x2a0
 [ 1417.076317]  netlink_rcv_skb+0x68/0x140
 [ 1417.076330]  genl_rcv+0x40/0x60
 [ 1417.076343]  netlink_unicast+0x330/0x3b8
 [ 1417.076357]  netlink_sendmsg+0x19c/0x3f8
 [ 1417.076370]  __sock_sendmsg+0x64/0xc0
 [ 1417.076391]  ____sys_sendmsg+0x268/0x2a0
 [ 1417.076408]  ___sys_sendmsg+0xb8/0x118
 [ 1417.076427]  __sys_sendmsg+0x90/0xf8
 [ 1417.076445]  __arm64_sys_sendmsg+0x2c/0x40
 [ 1417.076465]  invoke_syscall+0x50/0x120
 [ 1417.076486]  el0_svc_common.constprop.0+0x48/0xf0
 [ 1417.076506]  do_el0_svc+0x24/0x38
 [ 1417.076525]  el0_svc+0x30/0x100
 [ 1417.076548]  el0t_64_sync_handler+0x100/0x130
 [ 1417.076569]  el0t_64_sync+0x190/0x198
 [ 1417.076589] Code: f9401e80 aa1603e2 f9403be1 5280e483 (f9400000)

Fix this, by always using the vif corresponding to the wdev on which the
Action frame Transmission request was initiated by the userspace. This way,
even if P2P vif is not available, the IOVAR is sent to firmware on AP vif
and the ANQP Query RESP Action frame is transmitted without crashing the
driver.

Move init_completion() for "send_af_done" from brcmf_p2p_create_p2pdev()
to brcmf_p2p_attach(). Because the former function would not get executed
when only hostapd is managing wlan interface, and it is not safe to do
reinit_completion() later in brcmf_p2p_tx_action_frame(), without any prior
init_completion().

And in the brcmf_p2p_tx_action_frame() function, the condition check for
P2P Presence response frame is not needed, since the wpa_supplicant is
properly sending the P2P Presense Response frame on the P2P-GO vif instead
of the P2P-Device vif.

[Cc stable]
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40321/">CVE-2025-40321 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40321">CVE-2025-40321 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254795">SUSE bug 1254795</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540322" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40322</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40322" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40322" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40322" ref_url="https://www.suse.com/security/cve/CVE-2025-40322" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1662" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002457.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2352" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002541.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2722" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fbdev: bitblit: bound-check glyph index in bit_putcs*

bit_putcs_aligned()/unaligned() derived the glyph pointer from the
character value masked by 0xff/0x1ff, which may exceed the actual font's
glyph count and read past the end of the built-in font array.
Clamp the index to the actual glyph count before computing the address.

This fixes a global out-of-bounds read reported by syzbot.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40322/">CVE-2025-40322 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40322">CVE-2025-40322 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255092">SUSE bug 1255092</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540323" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40323</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40323" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40323" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40323" ref_url="https://www.suse.com/security/cve/CVE-2025-40323" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fbcon: Set fb_display[i]-&gt;mode to NULL when the mode is released

Recently, we discovered the following issue through syzkaller:

BUG: KASAN: slab-use-after-free in fb_mode_is_equal+0x285/0x2f0
Read of size 4 at addr ff11000001b3c69c by task syz.xxx
...
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0xab/0xe0
 print_address_description.constprop.0+0x2c/0x390
 print_report+0xb9/0x280
 kasan_report+0xb8/0xf0
 fb_mode_is_equal+0x285/0x2f0
 fbcon_mode_deleted+0x129/0x180
 fb_set_var+0xe7f/0x11d0
 do_fb_ioctl+0x6a0/0x750
 fb_ioctl+0xe0/0x140
 __x64_sys_ioctl+0x193/0x210
 do_syscall_64+0x5f/0x9c0
 entry_SYSCALL_64_after_hwframe+0x76/0x7e

Based on experimentation and analysis, during framebuffer unregistration,
only the memory of fb_info-&gt;modelist is freed, without setting the
corresponding fb_display[i]-&gt;mode to NULL for the freed modes. This leads
to UAF issues during subsequent accesses. Here's an example of reproduction
steps:
1. With /dev/fb0 already registered in the system, load a kernel module
   to register a new device /dev/fb1;
2. Set fb1's mode to the global fb_display[] array (via FBIOPUT_CON2FBMAP);
3. Switch console from fb to VGA (to allow normal rmmod of the ko);
4. Unload the kernel module, at this point fb1's modelist is freed, leaving
   a wild pointer in fb_display[];
5. Trigger the bug via system calls through fb0 attempting to delete a mode
   from fb0.

Add a check in do_unregister_framebuffer(): if the mode to be freed exists
in fb_display[], set the corresponding mode pointer to NULL.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40323/">CVE-2025-40323 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40323">CVE-2025-40323 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255094">SUSE bug 1255094</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540324" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40324</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40324" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40324" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40324" ref_url="https://www.suse.com/security/cve/CVE-2025-40324" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFSD: Fix crash in nfsd4_read_release()

When tracing is enabled, the trace_nfsd_read_done trace point
crashes during the pynfs read.testNoFh test.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40324/">CVE-2025-40324 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40324">CVE-2025-40324 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254791">SUSE bug 1254791</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540328" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40328</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40328" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40328" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40328" ref_url="https://www.suse.com/security/cve/CVE-2025-40328" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix potential UAF in smb2_close_cached_fid()

find_or_create_cached_dir() could grab a new reference after kref_put()
had seen the refcount drop to zero but before cfid_list_lock is acquired
in smb2_close_cached_fid(), leading to use-after-free.

Switch to kref_put_lock() so cfid_release() is called with
cfid_list_lock held, closing that gap.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40328/">CVE-2025-40328 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40328">CVE-2025-40328 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254624">SUSE bug 1254624</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540329" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40329</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40329" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40329" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40329" ref_url="https://www.suse.com/security/cve/CVE-2025-40329" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/sched: Fix deadlock in drm_sched_entity_kill_jobs_cb

The Mesa issue referenced below pointed out a possible deadlock:

[ 1231.611031]  Possible interrupt unsafe locking scenario:

[ 1231.611033]        CPU0                    CPU1
[ 1231.611034]        ----                    ----
[ 1231.611035]   lock(&amp;xa-&gt;xa_lock#17);
[ 1231.611038]                                local_irq_disable();
[ 1231.611039]                                lock(&amp;fence-&gt;lock);
[ 1231.611041]                                lock(&amp;xa-&gt;xa_lock#17);
[ 1231.611044]   &lt;Interrupt&gt;
[ 1231.611045]     lock(&amp;fence-&gt;lock);
[ 1231.611047]
                *** DEADLOCK ***

In this example, CPU0 would be any function accessing job-&gt;dependencies
through the xa_* functions that don't disable interrupts (eg:
drm_sched_job_add_dependency(), drm_sched_entity_kill_jobs_cb()).

CPU1 is executing drm_sched_entity_kill_jobs_cb() as a fence signalling
callback so in an interrupt context. It will deadlock when trying to
grab the xa_lock which is already held by CPU0.

Replacing all xa_* usage by their xa_*_irq counterparts would fix
this issue, but Christian pointed out another issue: dma_fence_signal
takes fence.lock and so does dma_fence_add_callback.

  dma_fence_signal() // locks f1.lock
  -&gt; drm_sched_entity_kill_jobs_cb()
  -&gt; foreach dependencies
     -&gt; dma_fence_add_callback() // locks f2.lock

This will deadlock if f1 and f2 share the same spinlock.

To fix both issues, the code iterating on dependencies and re-arming them
is moved out to drm_sched_entity_kill_jobs_work().

[phasta: commit message nits]
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40329/">CVE-2025-40329 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40329">CVE-2025-40329 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254621">SUSE bug 1254621</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540330" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40330</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40330" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40330" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40330" ref_url="https://www.suse.com/security/cve/CVE-2025-40330" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bnxt_en: Shutdown FW DMA in bnxt_shutdown()

The netif_close() call in bnxt_shutdown() only stops packet DMA.  There
may be FW DMA for trace logging (recently added) that will continue.  If
we kexec to a new kernel, the DMA will corrupt memory in the new kernel.

Add bnxt_hwrm_func_drv_unrgtr() to unregister the driver from the FW.
This will stop the FW DMA.  In case the call fails, call pcie_flr() to
reset the function and stop the DMA.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40330/">CVE-2025-40330 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40330">CVE-2025-40330 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254616">SUSE bug 1254616</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540331" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40331</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40331" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40331" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40331" ref_url="https://www.suse.com/security/cve/CVE-2025-40331" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sctp: Prevent TOCTOU out-of-bounds write

For the following path not holding the sock lock,

  sctp_diag_dump() -&gt; sctp_for_each_endpoint() -&gt; sctp_ep_dump()

make sure not to exceed bounds in case the address list has grown
between buffer allocation (time-of-check) and write (time-of-use).
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40331/">CVE-2025-40331 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40331">CVE-2025-40331 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254615">SUSE bug 1254615</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540332" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40332</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40332" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40332" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40332" ref_url="https://www.suse.com/security/cve/CVE-2025-40332" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdkfd: Fix mmap write lock not release

If mmap write lock is taken while draining retry fault, mmap write lock
is not released because svm_range_restore_pages calls mmap_read_unlock
then returns. This causes deadlock and system hangs later because mmap
read or write lock cannot be taken.

Downgrade mmap write lock to read lock if draining retry fault fix this
bug.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40332/">CVE-2025-40332 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40332">CVE-2025-40332 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255116">SUSE bug 1255116</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540337" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40337</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40337" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40337" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40337" ref_url="https://www.suse.com/security/cve/CVE-2025-40337" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: stmmac: Correctly handle Rx checksum offload errors

The stmmac_rx function would previously set skb-&gt;ip_summed to
CHECKSUM_UNNECESSARY if hardware checksum offload (CoE) was enabled
and the packet was of a known IP ethertype.

However, this logic failed to check if the hardware had actually
reported a checksum error. The hardware status, indicating a header or
payload checksum failure, was being ignored at this stage. This could
cause corrupt packets to be passed up the network stack as valid.

This patch corrects the logic by checking the `csum_none` status flag,
which is set when the hardware reports a checksum error. If this flag
is set, skb-&gt;ip_summed is now correctly set to CHECKSUM_NONE,
ensuring the kernel's network stack will perform its own validation and
properly handle the corrupt packet.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40337/">CVE-2025-40337 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40337">CVE-2025-40337 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255081">SUSE bug 1255081</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540338" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40338</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40338" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40338" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40338" ref_url="https://www.suse.com/security/cve/CVE-2025-40338" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: Intel: avs: Do not share the name pointer between components

By sharing 'name' directly, tearing down components may lead to
use-after-free errors. Duplicate the name to avoid that.

At the same time, update the order of operations - since commit
cee28113db17 ("ASoC: dmaengine_pcm: Allow passing component name via
config") the framework does not override component-&gt;name if set before
invoking the initializer.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.2/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40338/">CVE-2025-40338 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40338">CVE-2025-40338 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255273">SUSE bug 1255273</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540339" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40339</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40339" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40339" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40339" ref_url="https://www.suse.com/security/cve/CVE-2025-40339" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: fix nullptr err of vm_handle_moved

If a amdgpu_bo_va is fpriv-&gt;prt_va, the bo of this one is always NULL.
So, such kind of amdgpu_bo_va should be updated separately before
amdgpu_vm_handle_moved.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40339/">CVE-2025-40339 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40339">CVE-2025-40339 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255428">SUSE bug 1255428</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540340" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40340</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40340" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40340" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40340" ref_url="https://www.suse.com/security/cve/CVE-2025-40340" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/xe: Fix oops in xe_gem_fault when running core_hotunplug test.

I saw an oops in xe_gem_fault when running the xe-fast-feedback
testlist against the realtime kernel without debug options enabled.

The panic happens after core_hotunplug unbind-rebind finishes.
Presumably what happens is that a process mmaps, unlocks because
of the FAULT_FLAG_RETRY_NOWAIT logic, has no process memory left,
causing ttm_bo_vm_dummy_page() to return VM_FAULT_NOPAGE, since
there was nothing left to populate, and then oopses in
"mem_type_is_vram(tbo-&gt;resource-&gt;mem_type)" because tbo-&gt;resource
is NULL.

It's convoluted, but fits the data and explains the oops after
the test exits.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-40340/">CVE-2025-40340 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40340">CVE-2025-40340 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254996">SUSE bug 1254996</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540342" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40342</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40342" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40342" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40342" ref_url="https://www.suse.com/security/cve/CVE-2025-40342" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvme-fc: use lock accessing port_state and rport state

nvme_fc_unregister_remote removes the remote port on a lport object at
any point in time when there is no active association. This races with
with the reconnect logic, because nvme_fc_create_association is not
taking a lock to check the port_state and atomically increase the
active count on the rport.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40342/">CVE-2025-40342 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40342">CVE-2025-40342 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255274">SUSE bug 1255274</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255275">SUSE bug 1255275</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540343" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40343</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40343" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40343" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40343" ref_url="https://www.suse.com/security/cve/CVE-2025-40343" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvmet-fc: avoid scheduling association deletion twice

When forcefully shutting down a port via the configfs interface,
nvmet_port_subsys_drop_link() first calls nvmet_port_del_ctrls() and
then nvmet_disable_port(). Both functions will eventually schedule all
remaining associations for deletion.

The current implementation checks whether an association is about to be
removed, but only after the work item has already been scheduled. As a
result, it is possible for the first scheduled work item to free all
resources, and then for the same work item to be scheduled again for
deletion.

Because the association list is an RCU list, it is not possible to take
a lock and remove the list entry directly, so it cannot be looked up
again. Instead, a flag (terminating) must be used to determine whether
the association is already in the process of being deleted.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40343/">CVE-2025-40343 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40343">CVE-2025-40343 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255276">SUSE bug 1255276</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255278">SUSE bug 1255278</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540344" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40344</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40344" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40344" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40344" ref_url="https://www.suse.com/security/cve/CVE-2025-40344" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: Intel: avs: Disable periods-elapsed work when closing PCM

avs_dai_fe_shutdown() handles the shutdown procedure for HOST HDAudio
stream while period-elapsed work services its IRQs. As the former
frees the DAI's private context, these two operations shall be
synchronized to avoid slab-use-after-free or worse errors.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40344/">CVE-2025-40344 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40344">CVE-2025-40344 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254618">SUSE bug 1254618</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40345</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40345" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40345" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40345" ref_url="https://www.suse.com/security/cve/CVE-2025-40345" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: storage: sddr55: Reject out-of-bound new_pba

Discovered by Atuin - Automated Vulnerability Discovery Engine.

new_pba comes from the status packet returned after each write.
A bogus device could report values beyond the block count derived
from info-&gt;capacity, letting the driver walk off the end of
pba_to_lba[] and corrupt heap memory.

Reject PBAs that exceed the computed block count and fail the
transfer so we avoid touching out-of-range mapping entries.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="7/CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40345/">CVE-2025-40345 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40345">CVE-2025-40345 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255279">SUSE bug 1255279</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540346" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40346</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40346" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40346" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40346" ref_url="https://www.suse.com/security/cve/CVE-2025-40346" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

arch_topology: Fix incorrect error check in topology_parse_cpu_capacity()

Fix incorrect use of PTR_ERR_OR_ZERO() in topology_parse_cpu_capacity()
which causes the code to proceed with NULL clock pointers. The current
logic uses !PTR_ERR_OR_ZERO(cpu_clk) which evaluates to true for both
valid pointers and NULL, leading to potential NULL pointer dereference
in clk_get_rate().

Per include/linux/err.h documentation, PTR_ERR_OR_ZERO(ptr) returns:
"The error code within @ptr if it is an error pointer; 0 otherwise."

This means PTR_ERR_OR_ZERO() returns 0 for both valid pointers AND NULL
pointers. Therefore !PTR_ERR_OR_ZERO(cpu_clk) evaluates to true (proceed)
when cpu_clk is either valid or NULL, causing clk_get_rate(NULL) to be
called when of_clk_get() returns NULL.

Replace with !IS_ERR_OR_NULL(cpu_clk) which only proceeds for valid
pointers, preventing potential NULL pointer dereference in clk_get_rate().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40346/">CVE-2025-40346 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40346">CVE-2025-40346 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255318">SUSE bug 1255318</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540347" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40347</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40347" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40347" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40347" ref_url="https://www.suse.com/security/cve/CVE-2025-40347" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: enetc: fix the deadlock of enetc_mdio_lock

After applying the workaround for err050089, the LS1028A platform
experiences RCU stalls on RT kernel. This issue is caused by the
recursive acquisition of the read lock enetc_mdio_lock. Here list some
of the call stacks identified under the enetc_poll path that may lead to
a deadlock:

enetc_poll
  -&gt; enetc_lock_mdio
  -&gt; enetc_clean_rx_ring OR napi_complete_done
     -&gt; napi_gro_receive
        -&gt; enetc_start_xmit
           -&gt; enetc_lock_mdio
           -&gt; enetc_map_tx_buffs
           -&gt; enetc_unlock_mdio
  -&gt; enetc_unlock_mdio

After enetc_poll acquires the read lock, a higher-priority writer attempts
to acquire the lock, causing preemption. The writer detects that a
read lock is already held and is scheduled out. However, readers under
enetc_poll cannot acquire the read lock again because a writer is already
waiting, leading to a thread hang.

Currently, the deadlock is avoided by adjusting enetc_lock_mdio to prevent
recursive lock acquisition.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40347/">CVE-2025-40347 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40347">CVE-2025-40347 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255262">SUSE bug 1255262</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540350" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40350</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40350" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40350" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40350" ref_url="https://www.suse.com/security/cve/CVE-2025-40350" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: RX, Fix generating skb from non-linear xdp_buff for striding RQ

XDP programs can change the layout of an xdp_buff through
bpf_xdp_adjust_tail() and bpf_xdp_adjust_head(). Therefore, the driver
cannot assume the size of the linear data area nor fragments. Fix the
bug in mlx5 by generating skb according to xdp_buff after XDP programs
run.

Currently, when handling multi-buf XDP, the mlx5 driver assumes the
layout of an xdp_buff to be unchanged. That is, the linear data area
continues to be empty and fragments remain the same. This may cause
the driver to generate erroneous skb or triggering a kernel
warning. When an XDP program added linear data through
bpf_xdp_adjust_head(), the linear data will be ignored as
mlx5e_build_linear_skb() builds an skb without linear data and then
pull data from fragments to fill the linear data area. When an XDP
program has shrunk the non-linear data through bpf_xdp_adjust_tail(),
the delta passed to __pskb_pull_tail() may exceed the actual nonlinear
data size and trigger the BUG_ON in it.

To fix the issue, first record the original number of fragments. If the
number of fragments changes after the XDP program runs, rewind the end
fragment pointer by the difference and recalculate the truesize. Then,
build the skb with the linear data area matching the xdp_buff. Finally,
only pull data in if there is non-linear data and fill the linear part
up to 256 bytes.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40350/">CVE-2025-40350 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40350">CVE-2025-40350 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255260">SUSE bug 1255260</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540353" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40353</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40353" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40353" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40353" ref_url="https://www.suse.com/security/cve/CVE-2025-40353" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

arm64: mte: Do not warn if the page is already tagged in copy_highpage()

The arm64 copy_highpage() assumes that the destination page is newly
allocated and not MTE-tagged (PG_mte_tagged unset) and warns
accordingly. However, following commit 060913999d7a ("mm: migrate:
support poisoned recover from migrate folio"), folio_mc_copy() is called
before __folio_migrate_mapping(). If the latter fails (-EAGAIN), the
copy will be done again to the same destination page. Since
copy_highpage() already set the PG_mte_tagged flag, this second copy
will warn.

Replace the WARN_ON_ONCE(page already tagged) in the arm64
copy_highpage() with a comment.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40353/">CVE-2025-40353 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40353">CVE-2025-40353 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255312">SUSE bug 1255312</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540354" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40354</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40354" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40354" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40354" ref_url="https://www.suse.com/security/cve/CVE-2025-40354" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: increase max link count and fix link-&gt;enc NULL pointer access

[why]
1.) dc-&gt;links[MAX_LINKS] array size smaller than actual requested.
max_connector + max_dpia + 4 virtual = 14.
increase from 12 to 14.

2.) hw_init() access null LINK_ENC for dpia non display_endpoint.

(cherry picked from commit d7f5a61e1b04ed87b008c8d327649d184dc5bb45)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40354/">CVE-2025-40354 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40354">CVE-2025-40354 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255316">SUSE bug 1255316</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540355" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40355</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40355" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40355" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40355" ref_url="https://www.suse.com/security/cve/CVE-2025-40355" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sysfs: check visibility before changing group attribute ownership

Since commit 0c17270f9b92 ("net: sysfs: Implement is_visible for
phys_(port_id, port_name, switch_id)"), __dev_change_net_namespace() can
hit WARN_ON() when trying to change owner of a file that isn't visible.
See the trace below:

 WARNING: CPU: 6 PID: 2938 at net/core/dev.c:12410 __dev_change_net_namespace+0xb89/0xc30
 CPU: 6 UID: 0 PID: 2938 Comm: incusd Not tainted 6.17.1-1-mainline #1 PREEMPT(full)  4b783b4a638669fb644857f484487d17cb45ed1f
 Hardware name: Framework Laptop 13 (AMD Ryzen 7040Series)/FRANMDCP07, BIOS 03.07 02/19/2025
 RIP: 0010:__dev_change_net_namespace+0xb89/0xc30
 [...]
 Call Trace:
  &lt;TASK&gt;
  ? if6_seq_show+0x30/0x50
  do_setlink.isra.0+0xc7/0x1270
  ? __nla_validate_parse+0x5c/0xcc0
  ? security_capable+0x94/0x1a0
  rtnl_newlink+0x858/0xc20
  ? update_curr+0x8e/0x1c0
  ? update_entity_lag+0x71/0x80
  ? sched_balance_newidle+0x358/0x450
  ? psi_task_switch+0x113/0x2a0
  ? __pfx_rtnl_newlink+0x10/0x10
  rtnetlink_rcv_msg+0x346/0x3e0
  ? sched_clock+0x10/0x30
  ? __pfx_rtnetlink_rcv_msg+0x10/0x10
  netlink_rcv_skb+0x59/0x110
  netlink_unicast+0x285/0x3c0
  ? __alloc_skb+0xdb/0x1a0
  netlink_sendmsg+0x20d/0x430
  ____sys_sendmsg+0x39f/0x3d0
  ? import_iovec+0x2f/0x40
  ___sys_sendmsg+0x99/0xe0
  __sys_sendmsg+0x8a/0xf0
  do_syscall_64+0x81/0x970
  ? __sys_bind+0xe3/0x110
  ? syscall_exit_work+0x143/0x1b0
  ? do_syscall_64+0x244/0x970
  ? sock_alloc_file+0x63/0xc0
  ? syscall_exit_work+0x143/0x1b0
  ? do_syscall_64+0x244/0x970
  ? alloc_fd+0x12e/0x190
  ? put_unused_fd+0x2a/0x70
  ? do_sys_openat2+0xa2/0xe0
  ? syscall_exit_work+0x143/0x1b0
  ? do_syscall_64+0x244/0x970
  ? exc_page_fault+0x7e/0x1a0
  entry_SYSCALL_64_after_hwframe+0x76/0x7e
 [...]
  &lt;/TASK&gt;

Fix this by checking is_visible() before trying to touch the attribute.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-40355/">CVE-2025-40355 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40355">CVE-2025-40355 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255261">SUSE bug 1255261</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540357" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40357</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40357" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40357" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40357" ref_url="https://www.suse.com/security/cve/CVE-2025-40357" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/smc: fix general protection fault in __smc_diag_dump

The syzbot report a crash:

  Oops: general protection fault, probably for non-canonical address 0xfbd5a5d5a0000003: 0000 [#1] SMP KASAN NOPTI
  KASAN: maybe wild-memory-access in range [0xdead4ead00000018-0xdead4ead0000001f]
  CPU: 1 UID: 0 PID: 6949 Comm: syz.0.335 Not tainted syzkaller #0 PREEMPT(full)
  Hardware name: Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025
  RIP: 0010:smc_diag_msg_common_fill net/smc/smc_diag.c:44 [inline]
  RIP: 0010:__smc_diag_dump.constprop.0+0x3ca/0x2550 net/smc/smc_diag.c:89
  Call Trace:
   &lt;TASK&gt;
   smc_diag_dump_proto+0x26d/0x420 net/smc/smc_diag.c:217
   smc_diag_dump+0x27/0x90 net/smc/smc_diag.c:234
   netlink_dump+0x539/0xd30 net/netlink/af_netlink.c:2327
   __netlink_dump_start+0x6d6/0x990 net/netlink/af_netlink.c:2442
   netlink_dump_start include/linux/netlink.h:341 [inline]
   smc_diag_handler_dump+0x1f9/0x240 net/smc/smc_diag.c:251
   __sock_diag_cmd net/core/sock_diag.c:249 [inline]
   sock_diag_rcv_msg+0x438/0x790 net/core/sock_diag.c:285
   netlink_rcv_skb+0x158/0x420 net/netlink/af_netlink.c:2552
   netlink_unicast_kernel net/netlink/af_netlink.c:1320 [inline]
   netlink_unicast+0x5a7/0x870 net/netlink/af_netlink.c:1346
   netlink_sendmsg+0x8d1/0xdd0 net/netlink/af_netlink.c:1896
   sock_sendmsg_nosec net/socket.c:714 [inline]
   __sock_sendmsg net/socket.c:729 [inline]
   ____sys_sendmsg+0xa95/0xc70 net/socket.c:2614
   ___sys_sendmsg+0x134/0x1d0 net/socket.c:2668
   __sys_sendmsg+0x16d/0x220 net/socket.c:2700
   do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
   do_syscall_64+0xcd/0x4e0 arch/x86/entry/syscall_64.c:94
   entry_SYSCALL_64_after_hwframe+0x77/0x7f
   &lt;/TASK&gt;

The process like this:

               (CPU1)              |             (CPU2)
  ---------------------------------|-------------------------------
  inet_create()                    |
    // init clcsock to NULL        |
    sk = sk_alloc()                |
                                   |
    // unexpectedly change clcsock |
    inet_init_csk_locks()          |
                                   |
    // add sk to hash table        |
    smc_inet_init_sock()           |
      smc_sk_init()                |
        smc_hash_sk()              |
                                   | // traverse the hash table
                                   | smc_diag_dump_proto
                                   |   __smc_diag_dump()
                                   |     // visit wrong clcsock
                                   |     smc_diag_msg_common_fill()
    // alloc clcsock               |
    smc_create_clcsk               |
      sock_create_kern             |

With CONFIG_DEBUG_LOCK_ALLOC=y, the smc-&gt;clcsock is unexpectedly changed
in inet_init_csk_locks(). The INET_PROTOSW_ICSK flag is no need by smc,
just remove it.

After removing the INET_PROTOSW_ICSK flag, this patch alse revert
commit 6fd27ea183c2 ("net/smc: fix lacks of icsk_syn_mss with IPPROTO_SMC")
to avoid casting smc_sock to inet_connection_sock.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40357/">CVE-2025-40357 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40357">CVE-2025-40357 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255097">SUSE bug 1255097</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540359" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40359</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40359" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40359" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40359" ref_url="https://www.suse.com/security/cve/CVE-2025-40359" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

perf/x86/intel: Fix KASAN global-out-of-bounds warning

When running "perf mem record" command on CWF, the below KASAN
global-out-of-bounds warning is seen.

  ==================================================================
  BUG: KASAN: global-out-of-bounds in cmt_latency_data+0x176/0x1b0
  Read of size 4 at addr ffffffffb721d000 by task dtlb/9850

  Call Trace:

   kasan_report+0xb8/0xf0
   cmt_latency_data+0x176/0x1b0
   setup_arch_pebs_sample_data+0xf49/0x2560
   intel_pmu_drain_arch_pebs+0x577/0xb00
   handle_pmi_common+0x6c4/0xc80

The issue is caused by below code in __grt_latency_data(). The code
tries to access x86_hybrid_pmu structure which doesn't exist on
non-hybrid platform like CWF.

        WARN_ON_ONCE(hybrid_pmu(event-&gt;pmu)-&gt;pmu_type == hybrid_big)

So add is_hybrid() check before calling this WARN_ON_ONCE to fix the
global-out-of-bounds access issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-06"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40359/">CVE-2025-40359 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40359">CVE-2025-40359 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255087">SUSE bug 1255087</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540360" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40360</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40360" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40360" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40360" ref_url="https://www.suse.com/security/cve/CVE-2025-40360" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/sysfb: Do not dereference NULL pointer in plane reset

The plane state in __drm_gem_reset_shadow_plane() can be NULL. Do not
deref that pointer, but forward NULL to the other plane-reset helpers.
Clears plane-&gt;state to NULL.

v2:
- fix typo in commit description (Javier)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40360/">CVE-2025-40360 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40360">CVE-2025-40360 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255095">SUSE bug 1255095</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540362" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40362</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40362" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40362" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40362" ref_url="https://www.suse.com/security/cve/CVE-2025-40362" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ceph: fix multifs mds auth caps issue

The mds auth caps check should also validate the
fsname along with the associated caps. Not doing
so would result in applying the mds auth caps of
one fs on to the other fs in a multifs ceph cluster.
The bug causes multiple issues w.r.t user
authentication, following is one such example.

Steps to Reproduce (on vstart cluster):
1. Create two file systems in a cluster, say 'fsname1' and 'fsname2'
2. Authorize read only permission to the user 'client.usr' on fs 'fsname1'
    $ceph fs authorize fsname1 client.usr / r
3. Authorize read and write permission to the same user 'client.usr' on fs 'fsname2'
    $ceph fs authorize fsname2 client.usr / rw
4. Update the keyring
    $ceph auth get client.usr &gt;&gt; ./keyring

With above permssions for the user 'client.usr', following is the
expectation.
  a. The 'client.usr' should be able to only read the contents
     and not allowed to create or delete files on file system 'fsname1'.
  b. The 'client.usr' should be able to read/write on file system 'fsname2'.

But, with this bug, the 'client.usr' is allowed to read/write on file
system 'fsname1'. See below.

5. Mount the file system 'fsname1' with the user 'client.usr'
     $sudo bin/mount.ceph usr@.fsname1=/ /kmnt_fsname1_usr/
6. Try creating a file on file system 'fsname1' with user 'client.usr'. This
   should fail but passes with this bug.
     $touch /kmnt_fsname1_usr/file1
7. Mount the file system 'fsname1' with the user 'client.admin' and create a
   file.
     $sudo bin/mount.ceph admin@.fsname1=/ /kmnt_fsname1_admin
     $echo "data" &gt; /kmnt_fsname1_admin/admin_file1
8. Try removing an existing file on file system 'fsname1' with the user
   'client.usr'. This shoudn't succeed but succeeds with the bug.
     $rm -f /kmnt_fsname1_usr/admin_file1

For more information, please take a look at the corresponding mds/fuse patch
and tests added by looking into the tracker mentioned below.

v2: Fix a possible null dereference in doutc
v3: Don't store fsname from mdsmap, validate against
    ceph_mount_options's fsname and use it
v4: Code refactor, better warning message and
    fix possible compiler warning

[ Slava.Dubeyko: "fsname check failed" -&gt; "fsname mismatch" ]
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-06"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40362/">CVE-2025-40362 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40362">CVE-2025-40362 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255103">SUSE bug 1255103</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255104">SUSE bug 1255104</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540363" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40363</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40363" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40363" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40363" ref_url="https://www.suse.com/security/cve/CVE-2025-40363" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: ipv6: fix field-spanning memcpy warning in AH output

Fix field-spanning memcpy warnings in ah6_output() and
ah6_output_done() where extension headers are copied to/from IPv6
address fields, triggering fortify-string warnings about writes beyond
the 16-byte address fields.

  memcpy: detected field-spanning write (size 40) of single field "&amp;top_iph-&gt;saddr" at net/ipv6/ah6.c:439 (size 16)
  WARNING: CPU: 0 PID: 8838 at net/ipv6/ah6.c:439 ah6_output+0xe7e/0x14e0 net/ipv6/ah6.c:439

The warnings are false positives as the extension headers are
intentionally placed after the IPv6 header in memory. Fix by properly
copying addresses and extension headers separately, and introduce
helper functions to avoid code duplication.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40363/">CVE-2025-40363 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40363">CVE-2025-40363 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255102">SUSE bug 1255102</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540364" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40364</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40364" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40364" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40364" ref_url="https://www.suse.com/security/cve/CVE-2025-40364" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01982-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21147-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023511.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21180-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023498.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20561-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024578.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

io_uring: fix io_req_prep_async with provided buffers

io_req_prep_async() can import provided buffers, commit the ring state
by giving up on that before, it'll be reimported later if needed.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40364/">CVE-2025-40364 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-40364">CVE-2025-40364 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1241637">SUSE bug 1241637</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031708" comment="cluster-md-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031709" comment="cluster-md-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031710" comment="cluster-md-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031711" comment="dlm-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031712" comment="dlm-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031713" comment="dlm-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031714" comment="dtb-allwinner-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031715" comment="dtb-altera-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031716" comment="dtb-amazon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031717" comment="dtb-amd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031718" comment="dtb-amlogic-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031719" comment="dtb-apm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031720" comment="dtb-apple-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031721" comment="dtb-arm-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031722" comment="dtb-broadcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031723" comment="dtb-cavium-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031724" comment="dtb-exynos-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031725" comment="dtb-freescale-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031726" comment="dtb-hisilicon-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031727" comment="dtb-lg-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031728" comment="dtb-marvell-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031729" comment="dtb-mediatek-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031730" comment="dtb-nvidia-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031731" comment="dtb-qcom-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031732" comment="dtb-renesas-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031733" comment="dtb-rockchip-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031734" comment="dtb-socionext-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031735" comment="dtb-sprd-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031736" comment="dtb-xilinx-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031737" comment="gfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031738" comment="gfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031739" comment="gfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031740" comment="kernel-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031742" comment="kernel-64kb-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031743" comment="kernel-64kb-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031744" comment="kernel-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031628" comment="kernel-default-base-6.12.0-160000.6.1.160000.2.4 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031746" comment="kernel-default-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031747" comment="kernel-default-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031748" comment="kernel-default-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031750" comment="kernel-docs-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031751" comment="kernel-docs-html-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031752" comment="kernel-kvmsmall-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031754" comment="kernel-kvmsmall-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031755" comment="kernel-macros-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031756" comment="kernel-obs-build-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031757" comment="kernel-obs-qa-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031758" comment="kernel-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031760" comment="kernel-rt-extra-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031761" comment="kernel-rt-optional-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031762" comment="kernel-rt-vdso-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031763" comment="kernel-source-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031764" comment="kernel-source-vanilla-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031765" comment="kernel-syms-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031766" comment="kernel-zfcpdump-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031767" comment="kselftests-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031768" comment="kselftests-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031769" comment="kselftests-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031770" comment="ocfs2-kmp-64kb-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031771" comment="ocfs2-kmp-default-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031772" comment="ocfs2-kmp-rt-6.12.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40778</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40778" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40778" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40778" ref_url="https://www.suse.com/security/cve/CVE-2025-40778" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:19793" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002177.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19835" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002182.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19950" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002208.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19951" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002219.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21110" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003119.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21111" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003108.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22205" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023814.html" source="SUSE-SU"/>
    <description>
    Under certain circumstances, BIND is too lenient when accepting records from answers, allowing an attacker to inject forged data into the cache.
This issue affects BIND 9 versions 9.11.0 through 9.16.50, 9.18.0 through 9.18.39, 9.20.0 through 9.20.13, 9.21.0 through 9.21.12, 9.11.3-S1 through 9.16.50-S1, 9.18.11-S1 through 9.18.39-S1, and 9.20.9-S1 through 9.20.13-S1.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-18"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40778/">CVE-2025-40778 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40778">CVE-2025-40778 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252379">SUSE bug 1252379</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037847" comment="bind-9.20.15-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151203" comment="bind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037848" comment="bind-doc-9.20.15-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151205" comment="bind-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037849" comment="bind-modules-bdbhpt-9.20.15-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037911" comment="bind-modules-bdbhpt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037850" comment="bind-modules-generic-9.20.15-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037912" comment="bind-modules-generic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037851" comment="bind-modules-ldap-9.20.15-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037913" comment="bind-modules-ldap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037852" comment="bind-modules-mysql-9.20.15-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037914" comment="bind-modules-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037853" comment="bind-modules-perl-9.20.15-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037915" comment="bind-modules-perl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037854" comment="bind-modules-sqlite3-9.20.15-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037916" comment="bind-modules-sqlite3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037855" comment="bind-utils-9.20.15-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151207" comment="bind-utils is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540779" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40779</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40779" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40779" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40779" ref_url="https://www.suse.com/security/cve/CVE-2025-40779" source="SUSE CVE"/>
    <description>
    If a DHCPv4 client sends a request with some specific options, and Kea fails to find an appropriate subnet for the client, the `kea-dhcp4` process will abort with an assertion failure.  This happens only if the client request is unicast directly to Kea; broadcast messages do not cause the problem.
This issue affects Kea versions 2.7.1 through 2.7.9, 3.0.0, and 3.1.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-13"/>
	<updated date="2026-03-13"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40779/">CVE-2025-40779 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40779">CVE-2025-40779 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248801">SUSE bug 1248801</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048393" comment="kea-3.0.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048437" comment="kea is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048394" comment="kea-devel-3.0.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048438" comment="kea-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048395" comment="kea-doc-3.0.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048439" comment="kea-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048396" comment="kea-hooks-3.0.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048440" comment="kea-hooks is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048397" comment="libkea-asiodns62-3.0.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048441" comment="libkea-asiodns62 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048398" comment="libkea-asiolink88-3.0.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048442" comment="libkea-asiolink88 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048399" comment="libkea-cc82-3.0.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048443" comment="libkea-cc82 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048400" comment="libkea-cfgrpt3-3.0.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048444" comment="libkea-cfgrpt3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048401" comment="libkea-config83-3.0.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048445" comment="libkea-config83 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048402" comment="libkea-cryptolink64-3.0.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048446" comment="libkea-cryptolink64 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048403" comment="libkea-d2srv63-3.0.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048447" comment="libkea-d2srv63 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048404" comment="libkea-database76-3.0.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048448" comment="libkea-database76 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048405" comment="libkea-dhcp109-3.0.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048449" comment="libkea-dhcp109 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048406" comment="libkea-dhcp_ddns68-3.0.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048450" comment="libkea-dhcp_ddns68 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048407" comment="libkea-dhcpsrv130-3.0.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048451" comment="libkea-dhcpsrv130 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048408" comment="libkea-dns71-3.0.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048452" comment="libkea-dns71 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048409" comment="libkea-eval84-3.0.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048453" comment="libkea-eval84 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048410" comment="libkea-exceptions45-3.0.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048454" comment="libkea-exceptions45 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048411" comment="libkea-hooks119-3.0.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048455" comment="libkea-hooks119 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048412" comment="libkea-http87-3.0.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048456" comment="libkea-http87 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048413" comment="libkea-log-interprocess3-3.0.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048457" comment="libkea-log-interprocess3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048414" comment="libkea-log75-3.0.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048458" comment="libkea-log75 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048415" comment="libkea-mysql88-3.0.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048459" comment="libkea-mysql88 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048416" comment="libkea-pgsql88-3.0.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048460" comment="libkea-pgsql88 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048417" comment="libkea-process90-3.0.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048461" comment="libkea-process90 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048418" comment="libkea-stats53-3.0.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048462" comment="libkea-stats53 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048419" comment="libkea-tcp33-3.0.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048463" comment="libkea-tcp33 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048420" comment="libkea-util-io12-3.0.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048464" comment="libkea-util-io12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048421" comment="libkea-util101-3.0.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048465" comment="libkea-util101 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048422" comment="python3-kea-3.0.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048466" comment="python3-kea is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202540780" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-40780</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-40780" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40780" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-40780" ref_url="https://www.suse.com/security/cve/CVE-2025-40780" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:19793" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002177.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19950" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002208.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19951" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002219.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21110" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003119.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21111" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003108.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4109-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023814.html" source="SUSE-SU"/>
    <description>
    In specific circumstances, due to a weakness in the Pseudo Random Number Generator (PRNG) that is used, it is possible for an attacker to predict the source port and query ID that BIND will use.
This issue affects BIND 9 versions 9.16.0 through 9.16.50, 9.18.0 through 9.18.39, 9.20.0 through 9.20.13, 9.21.0 through 9.21.12, 9.16.8-S1 through 9.16.50-S1, 9.18.11-S1 through 9.18.39-S1, and 9.20.9-S1 through 9.20.13-S1.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-18"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2025-40780/">CVE-2025-40780 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-40780">CVE-2025-40780 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252380">SUSE bug 1252380</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037847" comment="bind-9.20.15-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151203" comment="bind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037848" comment="bind-doc-9.20.15-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151205" comment="bind-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037849" comment="bind-modules-bdbhpt-9.20.15-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037911" comment="bind-modules-bdbhpt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037850" comment="bind-modules-generic-9.20.15-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037912" comment="bind-modules-generic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037851" comment="bind-modules-ldap-9.20.15-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037913" comment="bind-modules-ldap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037852" comment="bind-modules-mysql-9.20.15-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037914" comment="bind-modules-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037853" comment="bind-modules-perl-9.20.15-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037915" comment="bind-modules-perl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037854" comment="bind-modules-sqlite3-9.20.15-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037916" comment="bind-modules-sqlite3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037855" comment="bind-utils-9.20.15-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151207" comment="bind-utils is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202541244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-41244</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-41244" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-41244" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-41244" ref_url="https://www.suse.com/security/cve/CVE-2025-41244" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:17428" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002073.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:17509" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2026:20677-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03434-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03435-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03436-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03535-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042071.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03585-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20853-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20866-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042312.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20114-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023876.html" source="SUSE-SU"/>
    <description>
    VMware Aria Operations and VMware Tools contain a local privilege escalation vulnerability.  A malicious local actor with non-administrative privileges having access to a VM with VMware Tools  installed and managed by Aria Operations with SDMP enabled may exploit this vulnerability to escalate privileges to root on the same VM.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-22"/>
	<updated date="2026-03-19"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-41244/">CVE-2025-41244 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-41244">CVE-2025-41244 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250373">SUSE bug 1250373</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038469" comment="libvmtools-devel-13.0.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152856" comment="libvmtools-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038470" comment="libvmtools0-13.0.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152857" comment="libvmtools0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038471" comment="open-vm-tools-13.0.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152858" comment="open-vm-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038472" comment="open-vm-tools-containerinfo-13.0.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009781019" comment="open-vm-tools-containerinfo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038473" comment="open-vm-tools-desktop-13.0.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152859" comment="open-vm-tools-desktop is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038474" comment="open-vm-tools-salt-minion-13.0.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769148" comment="open-vm-tools-salt-minion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038475" comment="open-vm-tools-sdmp-13.0.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009708084" comment="open-vm-tools-sdmp is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202543272" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-43272</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-43272" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43272" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-43272" ref_url="https://www.suse.com/security/cve/CVE-2025-43272" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:17802" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002094.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18097" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002114.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20922" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3700-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3701-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023882.html" source="SUSE-SU"/>
    <description>
    The issue was addressed with improved memory handling. This issue is fixed in Safari 26, iOS 26 and iPadOS 26, macOS Tahoe 26, visionOS 26, watchOS 26. Processing maliciously crafted web content may lead to an unexpected Safari crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-22"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-43272/">CVE-2025-43272 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43272">CVE-2025-43272 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250439">SUSE bug 1250439</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038439" comment="WebKitGTK-4.0-lang-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779926" comment="WebKitGTK-4.0-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038440" comment="WebKitGTK-4.1-lang-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779927" comment="WebKitGTK-4.1-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038441" comment="WebKitGTK-6.0-lang-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779928" comment="WebKitGTK-6.0-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038442" comment="libjavascriptcoregtk-4_0-18-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038443" comment="libjavascriptcoregtk-4_1-0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698039" comment="libjavascriptcoregtk-4_1-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038444" comment="libjavascriptcoregtk-6_0-1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779930" comment="libjavascriptcoregtk-6_0-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038445" comment="libwebkit2gtk-4_0-37-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038446" comment="libwebkit2gtk-4_1-0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698041" comment="libwebkit2gtk-4_1-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038447" comment="libwebkitgtk-6_0-4-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779932" comment="libwebkitgtk-6_0-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038448" comment="typelib-1_0-JavaScriptCore-4_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038449" comment="typelib-1_0-JavaScriptCore-4_1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698148" comment="typelib-1_0-JavaScriptCore-4_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038450" comment="typelib-1_0-JavaScriptCore-6_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779933" comment="typelib-1_0-JavaScriptCore-6_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038451" comment="typelib-1_0-WebKit-6_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779934" comment="typelib-1_0-WebKit-6_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038452" comment="typelib-1_0-WebKit2-4_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038453" comment="typelib-1_0-WebKit2-4_1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698149" comment="typelib-1_0-WebKit2-4_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038454" comment="typelib-1_0-WebKit2WebExtension-4_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038455" comment="typelib-1_0-WebKit2WebExtension-4_1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698150" comment="typelib-1_0-WebKit2WebExtension-4_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038456" comment="typelib-1_0-WebKitWebProcessExtension-6_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779935" comment="typelib-1_0-WebKitWebProcessExtension-6_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038457" comment="webkit-jsc-4-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038458" comment="webkit-jsc-4.1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698152" comment="webkit-jsc-4.1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038459" comment="webkit-jsc-6.0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779936" comment="webkit-jsc-6.0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038460" comment="webkit2gtk-4_0-injected-bundles-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038461" comment="webkit2gtk-4_1-injected-bundles-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698045" comment="webkit2gtk-4_1-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038462" comment="webkit2gtk3-devel-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038463" comment="webkit2gtk3-minibrowser-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038464" comment="webkit2gtk3-soup2-devel-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698154" comment="webkit2gtk3-soup2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038465" comment="webkit2gtk3-soup2-minibrowser-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698155" comment="webkit2gtk3-soup2-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038466" comment="webkit2gtk4-devel-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698156" comment="webkit2gtk4-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038467" comment="webkit2gtk4-minibrowser-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698157" comment="webkit2gtk4-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038468" comment="webkitgtk-6_0-injected-bundles-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779937" comment="webkitgtk-6_0-injected-bundles is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202543342" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-43342</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-43342" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43342" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-43342" ref_url="https://www.suse.com/security/cve/CVE-2025-43342" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:17802" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002094.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18097" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002114.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20922" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3700-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3701-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023882.html" source="SUSE-SU"/>
    <description>
    A correctness issue was addressed with improved checks. This issue is fixed in Safari 26, iOS 18.7 and iPadOS 18.7, iOS 26 and iPadOS 26, macOS Tahoe 26, tvOS 26, visionOS 26, watchOS 26. Processing maliciously crafted web content may lead to an unexpected process crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-22"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-43342/">CVE-2025-43342 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43342">CVE-2025-43342 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250440">SUSE bug 1250440</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038439" comment="WebKitGTK-4.0-lang-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779926" comment="WebKitGTK-4.0-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038440" comment="WebKitGTK-4.1-lang-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779927" comment="WebKitGTK-4.1-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038441" comment="WebKitGTK-6.0-lang-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779928" comment="WebKitGTK-6.0-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038442" comment="libjavascriptcoregtk-4_0-18-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038443" comment="libjavascriptcoregtk-4_1-0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698039" comment="libjavascriptcoregtk-4_1-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038444" comment="libjavascriptcoregtk-6_0-1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779930" comment="libjavascriptcoregtk-6_0-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038445" comment="libwebkit2gtk-4_0-37-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038446" comment="libwebkit2gtk-4_1-0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698041" comment="libwebkit2gtk-4_1-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038447" comment="libwebkitgtk-6_0-4-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779932" comment="libwebkitgtk-6_0-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038448" comment="typelib-1_0-JavaScriptCore-4_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038449" comment="typelib-1_0-JavaScriptCore-4_1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698148" comment="typelib-1_0-JavaScriptCore-4_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038450" comment="typelib-1_0-JavaScriptCore-6_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779933" comment="typelib-1_0-JavaScriptCore-6_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038451" comment="typelib-1_0-WebKit-6_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779934" comment="typelib-1_0-WebKit-6_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038452" comment="typelib-1_0-WebKit2-4_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038453" comment="typelib-1_0-WebKit2-4_1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698149" comment="typelib-1_0-WebKit2-4_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038454" comment="typelib-1_0-WebKit2WebExtension-4_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038455" comment="typelib-1_0-WebKit2WebExtension-4_1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698150" comment="typelib-1_0-WebKit2WebExtension-4_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038456" comment="typelib-1_0-WebKitWebProcessExtension-6_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779935" comment="typelib-1_0-WebKitWebProcessExtension-6_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038457" comment="webkit-jsc-4-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038458" comment="webkit-jsc-4.1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698152" comment="webkit-jsc-4.1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038459" comment="webkit-jsc-6.0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779936" comment="webkit-jsc-6.0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038460" comment="webkit2gtk-4_0-injected-bundles-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038461" comment="webkit2gtk-4_1-injected-bundles-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698045" comment="webkit2gtk-4_1-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038462" comment="webkit2gtk3-devel-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038463" comment="webkit2gtk3-minibrowser-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038464" comment="webkit2gtk3-soup2-devel-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698154" comment="webkit2gtk3-soup2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038465" comment="webkit2gtk3-soup2-minibrowser-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698155" comment="webkit2gtk3-soup2-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038466" comment="webkit2gtk4-devel-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698156" comment="webkit2gtk4-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038467" comment="webkit2gtk4-minibrowser-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698157" comment="webkit2gtk4-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038468" comment="webkitgtk-6_0-injected-bundles-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779937" comment="webkitgtk-6_0-injected-bundles is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202543343" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-43343</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-43343" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43343" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-43343" ref_url="https://www.suse.com/security/cve/CVE-2025-43343" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:18070" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002104.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18097" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002114.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20922" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3700-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3701-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023882.html" source="SUSE-SU"/>
    <description>
    The issue was addressed with improved memory handling. This issue is fixed in Safari 26, iOS 26 and iPadOS 26, macOS Tahoe 26, tvOS 26, visionOS 26, watchOS 26. Processing maliciously crafted web content may lead to an unexpected process crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-22"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43343/">CVE-2025-43343 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43343">CVE-2025-43343 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251975">SUSE bug 1251975</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038439" comment="WebKitGTK-4.0-lang-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779926" comment="WebKitGTK-4.0-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038440" comment="WebKitGTK-4.1-lang-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779927" comment="WebKitGTK-4.1-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038441" comment="WebKitGTK-6.0-lang-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779928" comment="WebKitGTK-6.0-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038442" comment="libjavascriptcoregtk-4_0-18-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038443" comment="libjavascriptcoregtk-4_1-0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698039" comment="libjavascriptcoregtk-4_1-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038444" comment="libjavascriptcoregtk-6_0-1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779930" comment="libjavascriptcoregtk-6_0-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038445" comment="libwebkit2gtk-4_0-37-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038446" comment="libwebkit2gtk-4_1-0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698041" comment="libwebkit2gtk-4_1-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038447" comment="libwebkitgtk-6_0-4-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779932" comment="libwebkitgtk-6_0-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038448" comment="typelib-1_0-JavaScriptCore-4_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038449" comment="typelib-1_0-JavaScriptCore-4_1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698148" comment="typelib-1_0-JavaScriptCore-4_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038450" comment="typelib-1_0-JavaScriptCore-6_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779933" comment="typelib-1_0-JavaScriptCore-6_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038451" comment="typelib-1_0-WebKit-6_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779934" comment="typelib-1_0-WebKit-6_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038452" comment="typelib-1_0-WebKit2-4_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038453" comment="typelib-1_0-WebKit2-4_1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698149" comment="typelib-1_0-WebKit2-4_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038454" comment="typelib-1_0-WebKit2WebExtension-4_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038455" comment="typelib-1_0-WebKit2WebExtension-4_1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698150" comment="typelib-1_0-WebKit2WebExtension-4_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038456" comment="typelib-1_0-WebKitWebProcessExtension-6_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779935" comment="typelib-1_0-WebKitWebProcessExtension-6_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038457" comment="webkit-jsc-4-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038458" comment="webkit-jsc-4.1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698152" comment="webkit-jsc-4.1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038459" comment="webkit-jsc-6.0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779936" comment="webkit-jsc-6.0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038460" comment="webkit2gtk-4_0-injected-bundles-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038461" comment="webkit2gtk-4_1-injected-bundles-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698045" comment="webkit2gtk-4_1-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038462" comment="webkit2gtk3-devel-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038463" comment="webkit2gtk3-minibrowser-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038464" comment="webkit2gtk3-soup2-devel-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698154" comment="webkit2gtk3-soup2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038465" comment="webkit2gtk3-soup2-minibrowser-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698155" comment="webkit2gtk3-soup2-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038466" comment="webkit2gtk4-devel-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698156" comment="webkit2gtk4-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038467" comment="webkit2gtk4-minibrowser-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698157" comment="webkit2gtk4-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038468" comment="webkitgtk-6_0-injected-bundles-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779937" comment="webkitgtk-6_0-injected-bundles is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202543356" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-43356</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-43356" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43356" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-43356" ref_url="https://www.suse.com/security/cve/CVE-2025-43356" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:17802" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002094.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18097" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002114.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20922" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3700-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3701-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023882.html" source="SUSE-SU"/>
    <description>
    The issue was addressed with improved handling of caches. This issue is fixed in Safari 26, iOS 18.7 and iPadOS 18.7, iOS 26 and iPadOS 26, macOS Tahoe 26, tvOS 26, visionOS 26, watchOS 26. A website may be able to access sensor information without user consent.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-22"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-43356/">CVE-2025-43356 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43356">CVE-2025-43356 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250441">SUSE bug 1250441</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038439" comment="WebKitGTK-4.0-lang-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779926" comment="WebKitGTK-4.0-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038440" comment="WebKitGTK-4.1-lang-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779927" comment="WebKitGTK-4.1-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038441" comment="WebKitGTK-6.0-lang-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779928" comment="WebKitGTK-6.0-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038442" comment="libjavascriptcoregtk-4_0-18-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038443" comment="libjavascriptcoregtk-4_1-0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698039" comment="libjavascriptcoregtk-4_1-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038444" comment="libjavascriptcoregtk-6_0-1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779930" comment="libjavascriptcoregtk-6_0-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038445" comment="libwebkit2gtk-4_0-37-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038446" comment="libwebkit2gtk-4_1-0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698041" comment="libwebkit2gtk-4_1-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038447" comment="libwebkitgtk-6_0-4-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779932" comment="libwebkitgtk-6_0-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038448" comment="typelib-1_0-JavaScriptCore-4_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038449" comment="typelib-1_0-JavaScriptCore-4_1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698148" comment="typelib-1_0-JavaScriptCore-4_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038450" comment="typelib-1_0-JavaScriptCore-6_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779933" comment="typelib-1_0-JavaScriptCore-6_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038451" comment="typelib-1_0-WebKit-6_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779934" comment="typelib-1_0-WebKit-6_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038452" comment="typelib-1_0-WebKit2-4_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038453" comment="typelib-1_0-WebKit2-4_1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698149" comment="typelib-1_0-WebKit2-4_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038454" comment="typelib-1_0-WebKit2WebExtension-4_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038455" comment="typelib-1_0-WebKit2WebExtension-4_1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698150" comment="typelib-1_0-WebKit2WebExtension-4_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038456" comment="typelib-1_0-WebKitWebProcessExtension-6_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779935" comment="typelib-1_0-WebKitWebProcessExtension-6_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038457" comment="webkit-jsc-4-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038458" comment="webkit-jsc-4.1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698152" comment="webkit-jsc-4.1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038459" comment="webkit-jsc-6.0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779936" comment="webkit-jsc-6.0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038460" comment="webkit2gtk-4_0-injected-bundles-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038461" comment="webkit2gtk-4_1-injected-bundles-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698045" comment="webkit2gtk-4_1-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038462" comment="webkit2gtk3-devel-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038463" comment="webkit2gtk3-minibrowser-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038464" comment="webkit2gtk3-soup2-devel-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698154" comment="webkit2gtk3-soup2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038465" comment="webkit2gtk3-soup2-minibrowser-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698155" comment="webkit2gtk3-soup2-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038466" comment="webkit2gtk4-devel-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698156" comment="webkit2gtk4-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038467" comment="webkit2gtk4-minibrowser-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698157" comment="webkit2gtk4-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038468" comment="webkitgtk-6_0-injected-bundles-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779937" comment="webkitgtk-6_0-injected-bundles is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202543368" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-43368</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-43368" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43368" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-43368" ref_url="https://www.suse.com/security/cve/CVE-2025-43368" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:17802" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002094.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18097" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002114.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20922" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3700-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3701-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1150-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023882.html" source="SUSE-SU"/>
    <description>
    A use-after-free issue was addressed with improved memory management. This issue is fixed in Safari 26, iOS 26 and iPadOS 26, macOS Tahoe 26. Processing maliciously crafted web content may lead to an unexpected Safari crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-22"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2025-43368/">CVE-2025-43368 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43368">CVE-2025-43368 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250442">SUSE bug 1250442</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038439" comment="WebKitGTK-4.0-lang-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779926" comment="WebKitGTK-4.0-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038440" comment="WebKitGTK-4.1-lang-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779927" comment="WebKitGTK-4.1-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038441" comment="WebKitGTK-6.0-lang-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779928" comment="WebKitGTK-6.0-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038442" comment="libjavascriptcoregtk-4_0-18-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038443" comment="libjavascriptcoregtk-4_1-0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698039" comment="libjavascriptcoregtk-4_1-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038444" comment="libjavascriptcoregtk-6_0-1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779930" comment="libjavascriptcoregtk-6_0-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038445" comment="libwebkit2gtk-4_0-37-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038446" comment="libwebkit2gtk-4_1-0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698041" comment="libwebkit2gtk-4_1-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038447" comment="libwebkitgtk-6_0-4-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779932" comment="libwebkitgtk-6_0-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038448" comment="typelib-1_0-JavaScriptCore-4_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038449" comment="typelib-1_0-JavaScriptCore-4_1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698148" comment="typelib-1_0-JavaScriptCore-4_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038450" comment="typelib-1_0-JavaScriptCore-6_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779933" comment="typelib-1_0-JavaScriptCore-6_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038451" comment="typelib-1_0-WebKit-6_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779934" comment="typelib-1_0-WebKit-6_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038452" comment="typelib-1_0-WebKit2-4_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038453" comment="typelib-1_0-WebKit2-4_1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698149" comment="typelib-1_0-WebKit2-4_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038454" comment="typelib-1_0-WebKit2WebExtension-4_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038455" comment="typelib-1_0-WebKit2WebExtension-4_1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698150" comment="typelib-1_0-WebKit2WebExtension-4_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038456" comment="typelib-1_0-WebKitWebProcessExtension-6_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779935" comment="typelib-1_0-WebKitWebProcessExtension-6_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038457" comment="webkit-jsc-4-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038458" comment="webkit-jsc-4.1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698152" comment="webkit-jsc-4.1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038459" comment="webkit-jsc-6.0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779936" comment="webkit-jsc-6.0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038460" comment="webkit2gtk-4_0-injected-bundles-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038461" comment="webkit2gtk-4_1-injected-bundles-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698045" comment="webkit2gtk-4_1-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038462" comment="webkit2gtk3-devel-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038463" comment="webkit2gtk3-minibrowser-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038464" comment="webkit2gtk3-soup2-devel-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698154" comment="webkit2gtk3-soup2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038465" comment="webkit2gtk3-soup2-minibrowser-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698155" comment="webkit2gtk3-soup2-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038466" comment="webkit2gtk4-devel-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698156" comment="webkit2gtk4-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038467" comment="webkit2gtk4-minibrowser-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698157" comment="webkit2gtk4-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038468" comment="webkitgtk-6_0-injected-bundles-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779937" comment="webkitgtk-6_0-injected-bundles is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202543392" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-43392</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-43392" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43392" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-43392" ref_url="https://www.suse.com/security/cve/CVE-2025-43392" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:22789" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002280.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22790" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003113.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23110" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023882.html" source="SUSE-SU"/>
    <description>
    The issue was addressed with improved handling of caches. This issue is fixed in Safari 26.1, iOS 18.7.2 and iPadOS 18.7.2, iOS 26.1 and iPadOS 26.1, macOS Tahoe 26.1, tvOS 26.1, visionOS 26.1, watchOS 26.1. A website may exfiltrate image data cross-origin.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-22"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43392/">CVE-2025-43392 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43392">CVE-2025-43392 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254165">SUSE bug 1254165</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038439" comment="WebKitGTK-4.0-lang-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779926" comment="WebKitGTK-4.0-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038440" comment="WebKitGTK-4.1-lang-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779927" comment="WebKitGTK-4.1-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038441" comment="WebKitGTK-6.0-lang-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779928" comment="WebKitGTK-6.0-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038442" comment="libjavascriptcoregtk-4_0-18-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038443" comment="libjavascriptcoregtk-4_1-0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698039" comment="libjavascriptcoregtk-4_1-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038444" comment="libjavascriptcoregtk-6_0-1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779930" comment="libjavascriptcoregtk-6_0-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038445" comment="libwebkit2gtk-4_0-37-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038446" comment="libwebkit2gtk-4_1-0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698041" comment="libwebkit2gtk-4_1-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038447" comment="libwebkitgtk-6_0-4-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779932" comment="libwebkitgtk-6_0-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038448" comment="typelib-1_0-JavaScriptCore-4_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038449" comment="typelib-1_0-JavaScriptCore-4_1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698148" comment="typelib-1_0-JavaScriptCore-4_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038450" comment="typelib-1_0-JavaScriptCore-6_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779933" comment="typelib-1_0-JavaScriptCore-6_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038451" comment="typelib-1_0-WebKit-6_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779934" comment="typelib-1_0-WebKit-6_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038452" comment="typelib-1_0-WebKit2-4_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038453" comment="typelib-1_0-WebKit2-4_1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698149" comment="typelib-1_0-WebKit2-4_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038454" comment="typelib-1_0-WebKit2WebExtension-4_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038455" comment="typelib-1_0-WebKit2WebExtension-4_1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698150" comment="typelib-1_0-WebKit2WebExtension-4_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038456" comment="typelib-1_0-WebKitWebProcessExtension-6_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779935" comment="typelib-1_0-WebKitWebProcessExtension-6_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038457" comment="webkit-jsc-4-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038458" comment="webkit-jsc-4.1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698152" comment="webkit-jsc-4.1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038459" comment="webkit-jsc-6.0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779936" comment="webkit-jsc-6.0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038460" comment="webkit2gtk-4_0-injected-bundles-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038461" comment="webkit2gtk-4_1-injected-bundles-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698045" comment="webkit2gtk-4_1-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038462" comment="webkit2gtk3-devel-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038463" comment="webkit2gtk3-minibrowser-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038464" comment="webkit2gtk3-soup2-devel-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698154" comment="webkit2gtk3-soup2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038465" comment="webkit2gtk3-soup2-minibrowser-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698155" comment="webkit2gtk3-soup2-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038466" comment="webkit2gtk4-devel-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698156" comment="webkit2gtk4-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038467" comment="webkit2gtk4-minibrowser-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698157" comment="webkit2gtk4-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038468" comment="webkitgtk-6_0-injected-bundles-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779937" comment="webkitgtk-6_0-injected-bundles is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202543419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-43419</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-43419" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43419" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-43419" ref_url="https://www.suse.com/security/cve/CVE-2025-43419" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:22789" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1150-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023882.html" source="SUSE-SU"/>
    <description>
    The issue was addressed with improved memory handling. This issue is fixed in Safari 26, iOS 26 and iPadOS 26, macOS Tahoe 26, tvOS 26, visionOS 26, watchOS 26. Processing maliciously crafted web content may lead to memory corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-22"/>
	<updated date="2026-04-03"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43419/">CVE-2025-43419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43419">CVE-2025-43419 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254166">SUSE bug 1254166</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038439" comment="WebKitGTK-4.0-lang-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779926" comment="WebKitGTK-4.0-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038440" comment="WebKitGTK-4.1-lang-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779927" comment="WebKitGTK-4.1-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038441" comment="WebKitGTK-6.0-lang-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779928" comment="WebKitGTK-6.0-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038442" comment="libjavascriptcoregtk-4_0-18-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038443" comment="libjavascriptcoregtk-4_1-0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698039" comment="libjavascriptcoregtk-4_1-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038444" comment="libjavascriptcoregtk-6_0-1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779930" comment="libjavascriptcoregtk-6_0-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038445" comment="libwebkit2gtk-4_0-37-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038446" comment="libwebkit2gtk-4_1-0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698041" comment="libwebkit2gtk-4_1-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038447" comment="libwebkitgtk-6_0-4-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779932" comment="libwebkitgtk-6_0-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038448" comment="typelib-1_0-JavaScriptCore-4_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038449" comment="typelib-1_0-JavaScriptCore-4_1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698148" comment="typelib-1_0-JavaScriptCore-4_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038450" comment="typelib-1_0-JavaScriptCore-6_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779933" comment="typelib-1_0-JavaScriptCore-6_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038451" comment="typelib-1_0-WebKit-6_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779934" comment="typelib-1_0-WebKit-6_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038452" comment="typelib-1_0-WebKit2-4_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038453" comment="typelib-1_0-WebKit2-4_1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698149" comment="typelib-1_0-WebKit2-4_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038454" comment="typelib-1_0-WebKit2WebExtension-4_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038455" comment="typelib-1_0-WebKit2WebExtension-4_1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698150" comment="typelib-1_0-WebKit2WebExtension-4_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038456" comment="typelib-1_0-WebKitWebProcessExtension-6_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779935" comment="typelib-1_0-WebKitWebProcessExtension-6_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038457" comment="webkit-jsc-4-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038458" comment="webkit-jsc-4.1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698152" comment="webkit-jsc-4.1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038459" comment="webkit-jsc-6.0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779936" comment="webkit-jsc-6.0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038460" comment="webkit2gtk-4_0-injected-bundles-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038461" comment="webkit2gtk-4_1-injected-bundles-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698045" comment="webkit2gtk-4_1-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038462" comment="webkit2gtk3-devel-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038463" comment="webkit2gtk3-minibrowser-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038464" comment="webkit2gtk3-soup2-devel-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698154" comment="webkit2gtk3-soup2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038465" comment="webkit2gtk3-soup2-minibrowser-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698155" comment="webkit2gtk3-soup2-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038466" comment="webkit2gtk4-devel-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698156" comment="webkit2gtk4-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038467" comment="webkit2gtk4-minibrowser-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698157" comment="webkit2gtk4-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038468" comment="webkitgtk-6_0-injected-bundles-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779937" comment="webkitgtk-6_0-injected-bundles is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202543421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-43421</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-43421" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43421" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-43421" ref_url="https://www.suse.com/security/cve/CVE-2025-43421" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:22789" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002280.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22790" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003113.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23110" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023882.html" source="SUSE-SU"/>
    <description>
    Multiple issues were addressed by disabling array allocation sinking. This issue is fixed in Safari 26.1, iOS 26.1 and iPadOS 26.1, macOS Tahoe 26.1, visionOS 26.1. Processing maliciously crafted web content may lead to an unexpected process crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-22"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43421/">CVE-2025-43421 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43421">CVE-2025-43421 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254167">SUSE bug 1254167</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038439" comment="WebKitGTK-4.0-lang-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779926" comment="WebKitGTK-4.0-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038440" comment="WebKitGTK-4.1-lang-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779927" comment="WebKitGTK-4.1-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038441" comment="WebKitGTK-6.0-lang-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779928" comment="WebKitGTK-6.0-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038442" comment="libjavascriptcoregtk-4_0-18-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038443" comment="libjavascriptcoregtk-4_1-0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698039" comment="libjavascriptcoregtk-4_1-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038444" comment="libjavascriptcoregtk-6_0-1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779930" comment="libjavascriptcoregtk-6_0-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038445" comment="libwebkit2gtk-4_0-37-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038446" comment="libwebkit2gtk-4_1-0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698041" comment="libwebkit2gtk-4_1-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038447" comment="libwebkitgtk-6_0-4-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779932" comment="libwebkitgtk-6_0-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038448" comment="typelib-1_0-JavaScriptCore-4_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038449" comment="typelib-1_0-JavaScriptCore-4_1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698148" comment="typelib-1_0-JavaScriptCore-4_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038450" comment="typelib-1_0-JavaScriptCore-6_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779933" comment="typelib-1_0-JavaScriptCore-6_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038451" comment="typelib-1_0-WebKit-6_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779934" comment="typelib-1_0-WebKit-6_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038452" comment="typelib-1_0-WebKit2-4_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038453" comment="typelib-1_0-WebKit2-4_1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698149" comment="typelib-1_0-WebKit2-4_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038454" comment="typelib-1_0-WebKit2WebExtension-4_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038455" comment="typelib-1_0-WebKit2WebExtension-4_1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698150" comment="typelib-1_0-WebKit2WebExtension-4_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038456" comment="typelib-1_0-WebKitWebProcessExtension-6_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779935" comment="typelib-1_0-WebKitWebProcessExtension-6_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038457" comment="webkit-jsc-4-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038458" comment="webkit-jsc-4.1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698152" comment="webkit-jsc-4.1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038459" comment="webkit-jsc-6.0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779936" comment="webkit-jsc-6.0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038460" comment="webkit2gtk-4_0-injected-bundles-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038461" comment="webkit2gtk-4_1-injected-bundles-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698045" comment="webkit2gtk-4_1-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038462" comment="webkit2gtk3-devel-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038463" comment="webkit2gtk3-minibrowser-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038464" comment="webkit2gtk3-soup2-devel-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698154" comment="webkit2gtk3-soup2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038465" comment="webkit2gtk3-soup2-minibrowser-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698155" comment="webkit2gtk3-soup2-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038466" comment="webkit2gtk4-devel-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698156" comment="webkit2gtk4-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038467" comment="webkit2gtk4-minibrowser-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698157" comment="webkit2gtk4-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038468" comment="webkitgtk-6_0-injected-bundles-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779937" comment="webkitgtk-6_0-injected-bundles is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202543425" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-43425</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-43425" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43425" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-43425" ref_url="https://www.suse.com/security/cve/CVE-2025-43425" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:22789" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002280.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22790" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003113.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23110" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023882.html" source="SUSE-SU"/>
    <description>
    The issue was addressed with improved memory handling. This issue is fixed in Safari 26.1, iOS 26.1 and iPadOS 26.1, macOS Tahoe 26.1, tvOS 26.1, visionOS 26.1, watchOS 26.1. Processing maliciously crafted web content may lead to an unexpected process crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-22"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43425/">CVE-2025-43425 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43425">CVE-2025-43425 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254168">SUSE bug 1254168</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038439" comment="WebKitGTK-4.0-lang-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779926" comment="WebKitGTK-4.0-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038440" comment="WebKitGTK-4.1-lang-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779927" comment="WebKitGTK-4.1-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038441" comment="WebKitGTK-6.0-lang-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779928" comment="WebKitGTK-6.0-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038442" comment="libjavascriptcoregtk-4_0-18-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038443" comment="libjavascriptcoregtk-4_1-0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698039" comment="libjavascriptcoregtk-4_1-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038444" comment="libjavascriptcoregtk-6_0-1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779930" comment="libjavascriptcoregtk-6_0-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038445" comment="libwebkit2gtk-4_0-37-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038446" comment="libwebkit2gtk-4_1-0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698041" comment="libwebkit2gtk-4_1-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038447" comment="libwebkitgtk-6_0-4-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779932" comment="libwebkitgtk-6_0-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038448" comment="typelib-1_0-JavaScriptCore-4_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038449" comment="typelib-1_0-JavaScriptCore-4_1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698148" comment="typelib-1_0-JavaScriptCore-4_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038450" comment="typelib-1_0-JavaScriptCore-6_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779933" comment="typelib-1_0-JavaScriptCore-6_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038451" comment="typelib-1_0-WebKit-6_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779934" comment="typelib-1_0-WebKit-6_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038452" comment="typelib-1_0-WebKit2-4_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038453" comment="typelib-1_0-WebKit2-4_1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698149" comment="typelib-1_0-WebKit2-4_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038454" comment="typelib-1_0-WebKit2WebExtension-4_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038455" comment="typelib-1_0-WebKit2WebExtension-4_1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698150" comment="typelib-1_0-WebKit2WebExtension-4_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038456" comment="typelib-1_0-WebKitWebProcessExtension-6_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779935" comment="typelib-1_0-WebKitWebProcessExtension-6_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038457" comment="webkit-jsc-4-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038458" comment="webkit-jsc-4.1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698152" comment="webkit-jsc-4.1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038459" comment="webkit-jsc-6.0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779936" comment="webkit-jsc-6.0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038460" comment="webkit2gtk-4_0-injected-bundles-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038461" comment="webkit2gtk-4_1-injected-bundles-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698045" comment="webkit2gtk-4_1-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038462" comment="webkit2gtk3-devel-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038463" comment="webkit2gtk3-minibrowser-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038464" comment="webkit2gtk3-soup2-devel-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698154" comment="webkit2gtk3-soup2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038465" comment="webkit2gtk3-soup2-minibrowser-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698155" comment="webkit2gtk3-soup2-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038466" comment="webkit2gtk4-devel-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698156" comment="webkit2gtk4-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038467" comment="webkit2gtk4-minibrowser-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698157" comment="webkit2gtk4-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038468" comment="webkitgtk-6_0-injected-bundles-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779937" comment="webkitgtk-6_0-injected-bundles is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202543427" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-43427</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-43427" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43427" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-43427" ref_url="https://www.suse.com/security/cve/CVE-2025-43427" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:22789" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002280.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22790" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003113.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23110" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023882.html" source="SUSE-SU"/>
    <description>
    This issue was addressed through improved state management. This issue is fixed in Safari 26.1, iOS 26.1 and iPadOS 26.1, macOS Tahoe 26.1, tvOS 26.1, visionOS 26.1. Processing maliciously crafted web content may lead to an unexpected process crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-22"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43427/">CVE-2025-43427 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43427">CVE-2025-43427 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254169">SUSE bug 1254169</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038439" comment="WebKitGTK-4.0-lang-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779926" comment="WebKitGTK-4.0-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038440" comment="WebKitGTK-4.1-lang-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779927" comment="WebKitGTK-4.1-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038441" comment="WebKitGTK-6.0-lang-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779928" comment="WebKitGTK-6.0-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038442" comment="libjavascriptcoregtk-4_0-18-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038443" comment="libjavascriptcoregtk-4_1-0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698039" comment="libjavascriptcoregtk-4_1-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038444" comment="libjavascriptcoregtk-6_0-1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779930" comment="libjavascriptcoregtk-6_0-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038445" comment="libwebkit2gtk-4_0-37-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038446" comment="libwebkit2gtk-4_1-0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698041" comment="libwebkit2gtk-4_1-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038447" comment="libwebkitgtk-6_0-4-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779932" comment="libwebkitgtk-6_0-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038448" comment="typelib-1_0-JavaScriptCore-4_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038449" comment="typelib-1_0-JavaScriptCore-4_1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698148" comment="typelib-1_0-JavaScriptCore-4_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038450" comment="typelib-1_0-JavaScriptCore-6_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779933" comment="typelib-1_0-JavaScriptCore-6_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038451" comment="typelib-1_0-WebKit-6_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779934" comment="typelib-1_0-WebKit-6_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038452" comment="typelib-1_0-WebKit2-4_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038453" comment="typelib-1_0-WebKit2-4_1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698149" comment="typelib-1_0-WebKit2-4_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038454" comment="typelib-1_0-WebKit2WebExtension-4_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038455" comment="typelib-1_0-WebKit2WebExtension-4_1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698150" comment="typelib-1_0-WebKit2WebExtension-4_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038456" comment="typelib-1_0-WebKitWebProcessExtension-6_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779935" comment="typelib-1_0-WebKitWebProcessExtension-6_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038457" comment="webkit-jsc-4-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038458" comment="webkit-jsc-4.1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698152" comment="webkit-jsc-4.1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038459" comment="webkit-jsc-6.0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779936" comment="webkit-jsc-6.0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038460" comment="webkit2gtk-4_0-injected-bundles-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038461" comment="webkit2gtk-4_1-injected-bundles-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698045" comment="webkit2gtk-4_1-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038462" comment="webkit2gtk3-devel-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038463" comment="webkit2gtk3-minibrowser-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038464" comment="webkit2gtk3-soup2-devel-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698154" comment="webkit2gtk3-soup2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038465" comment="webkit2gtk3-soup2-minibrowser-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698155" comment="webkit2gtk3-soup2-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038466" comment="webkit2gtk4-devel-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698156" comment="webkit2gtk4-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038467" comment="webkit2gtk4-minibrowser-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698157" comment="webkit2gtk4-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038468" comment="webkitgtk-6_0-injected-bundles-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779937" comment="webkitgtk-6_0-injected-bundles is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202543429" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-43429</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-43429" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43429" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-43429" ref_url="https://www.suse.com/security/cve/CVE-2025-43429" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:22789" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002280.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22790" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003113.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23110" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023882.html" source="SUSE-SU"/>
    <description>
    A buffer overflow was addressed with improved bounds checking. This issue is fixed in Safari 26.1, iOS 18.7.2 and iPadOS 18.7.2, iOS 26.1 and iPadOS 26.1, macOS Tahoe 26.1, tvOS 26.1, visionOS 26.1, watchOS 26.1. Processing maliciously crafted web content may lead to an unexpected process crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-22"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43429/">CVE-2025-43429 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43429">CVE-2025-43429 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254174">SUSE bug 1254174</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038439" comment="WebKitGTK-4.0-lang-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779926" comment="WebKitGTK-4.0-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038440" comment="WebKitGTK-4.1-lang-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779927" comment="WebKitGTK-4.1-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038441" comment="WebKitGTK-6.0-lang-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779928" comment="WebKitGTK-6.0-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038442" comment="libjavascriptcoregtk-4_0-18-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038443" comment="libjavascriptcoregtk-4_1-0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698039" comment="libjavascriptcoregtk-4_1-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038444" comment="libjavascriptcoregtk-6_0-1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779930" comment="libjavascriptcoregtk-6_0-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038445" comment="libwebkit2gtk-4_0-37-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038446" comment="libwebkit2gtk-4_1-0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698041" comment="libwebkit2gtk-4_1-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038447" comment="libwebkitgtk-6_0-4-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779932" comment="libwebkitgtk-6_0-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038448" comment="typelib-1_0-JavaScriptCore-4_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038449" comment="typelib-1_0-JavaScriptCore-4_1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698148" comment="typelib-1_0-JavaScriptCore-4_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038450" comment="typelib-1_0-JavaScriptCore-6_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779933" comment="typelib-1_0-JavaScriptCore-6_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038451" comment="typelib-1_0-WebKit-6_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779934" comment="typelib-1_0-WebKit-6_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038452" comment="typelib-1_0-WebKit2-4_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038453" comment="typelib-1_0-WebKit2-4_1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698149" comment="typelib-1_0-WebKit2-4_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038454" comment="typelib-1_0-WebKit2WebExtension-4_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038455" comment="typelib-1_0-WebKit2WebExtension-4_1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698150" comment="typelib-1_0-WebKit2WebExtension-4_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038456" comment="typelib-1_0-WebKitWebProcessExtension-6_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779935" comment="typelib-1_0-WebKitWebProcessExtension-6_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038457" comment="webkit-jsc-4-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038458" comment="webkit-jsc-4.1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698152" comment="webkit-jsc-4.1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038459" comment="webkit-jsc-6.0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779936" comment="webkit-jsc-6.0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038460" comment="webkit2gtk-4_0-injected-bundles-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038461" comment="webkit2gtk-4_1-injected-bundles-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698045" comment="webkit2gtk-4_1-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038462" comment="webkit2gtk3-devel-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038463" comment="webkit2gtk3-minibrowser-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038464" comment="webkit2gtk3-soup2-devel-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698154" comment="webkit2gtk3-soup2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038465" comment="webkit2gtk3-soup2-minibrowser-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698155" comment="webkit2gtk3-soup2-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038466" comment="webkit2gtk4-devel-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698156" comment="webkit2gtk4-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038467" comment="webkit2gtk4-minibrowser-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698157" comment="webkit2gtk4-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038468" comment="webkitgtk-6_0-injected-bundles-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779937" comment="webkitgtk-6_0-injected-bundles is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202543430" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-43430</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-43430" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43430" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-43430" ref_url="https://www.suse.com/security/cve/CVE-2025-43430" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:22789" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002280.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22790" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003113.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23110" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023882.html" source="SUSE-SU"/>
    <description>
    This issue was addressed through improved state management. This issue is fixed in Safari 26.1, iOS 26.1 and iPadOS 26.1, macOS Tahoe 26.1, tvOS 26.1, visionOS 26.1, watchOS 26.1. Processing maliciously crafted web content may lead to an unexpected process crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-22"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43430/">CVE-2025-43430 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43430">CVE-2025-43430 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254172">SUSE bug 1254172</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038439" comment="WebKitGTK-4.0-lang-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779926" comment="WebKitGTK-4.0-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038440" comment="WebKitGTK-4.1-lang-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779927" comment="WebKitGTK-4.1-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038441" comment="WebKitGTK-6.0-lang-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779928" comment="WebKitGTK-6.0-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038442" comment="libjavascriptcoregtk-4_0-18-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038443" comment="libjavascriptcoregtk-4_1-0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698039" comment="libjavascriptcoregtk-4_1-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038444" comment="libjavascriptcoregtk-6_0-1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779930" comment="libjavascriptcoregtk-6_0-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038445" comment="libwebkit2gtk-4_0-37-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038446" comment="libwebkit2gtk-4_1-0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698041" comment="libwebkit2gtk-4_1-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038447" comment="libwebkitgtk-6_0-4-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779932" comment="libwebkitgtk-6_0-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038448" comment="typelib-1_0-JavaScriptCore-4_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038449" comment="typelib-1_0-JavaScriptCore-4_1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698148" comment="typelib-1_0-JavaScriptCore-4_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038450" comment="typelib-1_0-JavaScriptCore-6_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779933" comment="typelib-1_0-JavaScriptCore-6_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038451" comment="typelib-1_0-WebKit-6_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779934" comment="typelib-1_0-WebKit-6_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038452" comment="typelib-1_0-WebKit2-4_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038453" comment="typelib-1_0-WebKit2-4_1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698149" comment="typelib-1_0-WebKit2-4_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038454" comment="typelib-1_0-WebKit2WebExtension-4_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038455" comment="typelib-1_0-WebKit2WebExtension-4_1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698150" comment="typelib-1_0-WebKit2WebExtension-4_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038456" comment="typelib-1_0-WebKitWebProcessExtension-6_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779935" comment="typelib-1_0-WebKitWebProcessExtension-6_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038457" comment="webkit-jsc-4-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038458" comment="webkit-jsc-4.1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698152" comment="webkit-jsc-4.1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038459" comment="webkit-jsc-6.0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779936" comment="webkit-jsc-6.0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038460" comment="webkit2gtk-4_0-injected-bundles-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038461" comment="webkit2gtk-4_1-injected-bundles-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698045" comment="webkit2gtk-4_1-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038462" comment="webkit2gtk3-devel-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038463" comment="webkit2gtk3-minibrowser-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038464" comment="webkit2gtk3-soup2-devel-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698154" comment="webkit2gtk3-soup2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038465" comment="webkit2gtk3-soup2-minibrowser-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698155" comment="webkit2gtk3-soup2-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038466" comment="webkit2gtk4-devel-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698156" comment="webkit2gtk4-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038467" comment="webkit2gtk4-minibrowser-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698157" comment="webkit2gtk4-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038468" comment="webkitgtk-6_0-injected-bundles-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779937" comment="webkitgtk-6_0-injected-bundles is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202543431" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-43431</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-43431" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43431" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-43431" ref_url="https://www.suse.com/security/cve/CVE-2025-43431" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:22789" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002280.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22790" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003113.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23110" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023882.html" source="SUSE-SU"/>
    <description>
    The issue was addressed with improved memory handling. This issue is fixed in Safari 26.1, iOS 18.7.2 and iPadOS 18.7.2, iOS 26.1 and iPadOS 26.1, macOS Tahoe 26.1, tvOS 26.1, visionOS 26.1, watchOS 26.1. Processing maliciously crafted web content may lead to memory corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-22"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2025-43431/">CVE-2025-43431 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43431">CVE-2025-43431 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254170">SUSE bug 1254170</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038439" comment="WebKitGTK-4.0-lang-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779926" comment="WebKitGTK-4.0-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038440" comment="WebKitGTK-4.1-lang-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779927" comment="WebKitGTK-4.1-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038441" comment="WebKitGTK-6.0-lang-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779928" comment="WebKitGTK-6.0-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038442" comment="libjavascriptcoregtk-4_0-18-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038443" comment="libjavascriptcoregtk-4_1-0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698039" comment="libjavascriptcoregtk-4_1-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038444" comment="libjavascriptcoregtk-6_0-1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779930" comment="libjavascriptcoregtk-6_0-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038445" comment="libwebkit2gtk-4_0-37-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038446" comment="libwebkit2gtk-4_1-0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698041" comment="libwebkit2gtk-4_1-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038447" comment="libwebkitgtk-6_0-4-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779932" comment="libwebkitgtk-6_0-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038448" comment="typelib-1_0-JavaScriptCore-4_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038449" comment="typelib-1_0-JavaScriptCore-4_1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698148" comment="typelib-1_0-JavaScriptCore-4_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038450" comment="typelib-1_0-JavaScriptCore-6_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779933" comment="typelib-1_0-JavaScriptCore-6_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038451" comment="typelib-1_0-WebKit-6_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779934" comment="typelib-1_0-WebKit-6_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038452" comment="typelib-1_0-WebKit2-4_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038453" comment="typelib-1_0-WebKit2-4_1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698149" comment="typelib-1_0-WebKit2-4_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038454" comment="typelib-1_0-WebKit2WebExtension-4_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038455" comment="typelib-1_0-WebKit2WebExtension-4_1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698150" comment="typelib-1_0-WebKit2WebExtension-4_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038456" comment="typelib-1_0-WebKitWebProcessExtension-6_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779935" comment="typelib-1_0-WebKitWebProcessExtension-6_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038457" comment="webkit-jsc-4-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038458" comment="webkit-jsc-4.1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698152" comment="webkit-jsc-4.1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038459" comment="webkit-jsc-6.0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779936" comment="webkit-jsc-6.0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038460" comment="webkit2gtk-4_0-injected-bundles-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038461" comment="webkit2gtk-4_1-injected-bundles-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698045" comment="webkit2gtk-4_1-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038462" comment="webkit2gtk3-devel-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038463" comment="webkit2gtk3-minibrowser-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038464" comment="webkit2gtk3-soup2-devel-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698154" comment="webkit2gtk3-soup2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038465" comment="webkit2gtk3-soup2-minibrowser-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698155" comment="webkit2gtk3-soup2-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038466" comment="webkit2gtk4-devel-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698156" comment="webkit2gtk4-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038467" comment="webkit2gtk4-minibrowser-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698157" comment="webkit2gtk4-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038468" comment="webkitgtk-6_0-injected-bundles-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779937" comment="webkitgtk-6_0-injected-bundles is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202543432" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-43432</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-43432" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43432" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-43432" ref_url="https://www.suse.com/security/cve/CVE-2025-43432" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:22789" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002280.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22790" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003113.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23110" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023882.html" source="SUSE-SU"/>
    <description>
    A use-after-free issue was addressed with improved memory management. This issue is fixed in Safari 26.1, iOS 26.1 and iPadOS 26.1, macOS Tahoe 26.1, tvOS 26.1, visionOS 26.1, watchOS 26.1. Processing maliciously crafted web content may lead to an unexpected process crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-22"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43432/">CVE-2025-43432 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43432">CVE-2025-43432 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254171">SUSE bug 1254171</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038439" comment="WebKitGTK-4.0-lang-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779926" comment="WebKitGTK-4.0-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038440" comment="WebKitGTK-4.1-lang-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779927" comment="WebKitGTK-4.1-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038441" comment="WebKitGTK-6.0-lang-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779928" comment="WebKitGTK-6.0-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038442" comment="libjavascriptcoregtk-4_0-18-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038443" comment="libjavascriptcoregtk-4_1-0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698039" comment="libjavascriptcoregtk-4_1-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038444" comment="libjavascriptcoregtk-6_0-1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779930" comment="libjavascriptcoregtk-6_0-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038445" comment="libwebkit2gtk-4_0-37-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038446" comment="libwebkit2gtk-4_1-0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698041" comment="libwebkit2gtk-4_1-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038447" comment="libwebkitgtk-6_0-4-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779932" comment="libwebkitgtk-6_0-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038448" comment="typelib-1_0-JavaScriptCore-4_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038449" comment="typelib-1_0-JavaScriptCore-4_1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698148" comment="typelib-1_0-JavaScriptCore-4_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038450" comment="typelib-1_0-JavaScriptCore-6_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779933" comment="typelib-1_0-JavaScriptCore-6_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038451" comment="typelib-1_0-WebKit-6_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779934" comment="typelib-1_0-WebKit-6_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038452" comment="typelib-1_0-WebKit2-4_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038453" comment="typelib-1_0-WebKit2-4_1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698149" comment="typelib-1_0-WebKit2-4_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038454" comment="typelib-1_0-WebKit2WebExtension-4_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038455" comment="typelib-1_0-WebKit2WebExtension-4_1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698150" comment="typelib-1_0-WebKit2WebExtension-4_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038456" comment="typelib-1_0-WebKitWebProcessExtension-6_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779935" comment="typelib-1_0-WebKitWebProcessExtension-6_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038457" comment="webkit-jsc-4-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038458" comment="webkit-jsc-4.1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698152" comment="webkit-jsc-4.1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038459" comment="webkit-jsc-6.0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779936" comment="webkit-jsc-6.0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038460" comment="webkit2gtk-4_0-injected-bundles-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038461" comment="webkit2gtk-4_1-injected-bundles-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698045" comment="webkit2gtk-4_1-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038462" comment="webkit2gtk3-devel-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038463" comment="webkit2gtk3-minibrowser-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038464" comment="webkit2gtk3-soup2-devel-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698154" comment="webkit2gtk3-soup2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038465" comment="webkit2gtk3-soup2-minibrowser-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698155" comment="webkit2gtk3-soup2-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038466" comment="webkit2gtk4-devel-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698156" comment="webkit2gtk4-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038467" comment="webkit2gtk4-minibrowser-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698157" comment="webkit2gtk4-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038468" comment="webkitgtk-6_0-injected-bundles-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779937" comment="webkitgtk-6_0-injected-bundles is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202543434" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-43434</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-43434" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43434" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-43434" ref_url="https://www.suse.com/security/cve/CVE-2025-43434" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:22789" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002280.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22790" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003113.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23110" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1150-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023882.html" source="SUSE-SU"/>
    <description>
    A use-after-free issue was addressed with improved memory management. This issue is fixed in Safari 26.1, iOS 18.7.2 and iPadOS 18.7.2, iOS 26.1 and iPadOS 26.1, macOS Tahoe 26.1, visionOS 26.1, watchOS 26.1. Processing maliciously crafted web content may lead to an unexpected Safari crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-22"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43434/">CVE-2025-43434 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43434">CVE-2025-43434 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254179">SUSE bug 1254179</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038439" comment="WebKitGTK-4.0-lang-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779926" comment="WebKitGTK-4.0-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038440" comment="WebKitGTK-4.1-lang-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779927" comment="WebKitGTK-4.1-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038441" comment="WebKitGTK-6.0-lang-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779928" comment="WebKitGTK-6.0-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038442" comment="libjavascriptcoregtk-4_0-18-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038443" comment="libjavascriptcoregtk-4_1-0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698039" comment="libjavascriptcoregtk-4_1-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038444" comment="libjavascriptcoregtk-6_0-1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779930" comment="libjavascriptcoregtk-6_0-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038445" comment="libwebkit2gtk-4_0-37-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038446" comment="libwebkit2gtk-4_1-0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698041" comment="libwebkit2gtk-4_1-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038447" comment="libwebkitgtk-6_0-4-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779932" comment="libwebkitgtk-6_0-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038448" comment="typelib-1_0-JavaScriptCore-4_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038449" comment="typelib-1_0-JavaScriptCore-4_1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698148" comment="typelib-1_0-JavaScriptCore-4_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038450" comment="typelib-1_0-JavaScriptCore-6_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779933" comment="typelib-1_0-JavaScriptCore-6_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038451" comment="typelib-1_0-WebKit-6_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779934" comment="typelib-1_0-WebKit-6_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038452" comment="typelib-1_0-WebKit2-4_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038453" comment="typelib-1_0-WebKit2-4_1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698149" comment="typelib-1_0-WebKit2-4_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038454" comment="typelib-1_0-WebKit2WebExtension-4_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038455" comment="typelib-1_0-WebKit2WebExtension-4_1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698150" comment="typelib-1_0-WebKit2WebExtension-4_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038456" comment="typelib-1_0-WebKitWebProcessExtension-6_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779935" comment="typelib-1_0-WebKitWebProcessExtension-6_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038457" comment="webkit-jsc-4-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038458" comment="webkit-jsc-4.1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698152" comment="webkit-jsc-4.1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038459" comment="webkit-jsc-6.0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779936" comment="webkit-jsc-6.0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038460" comment="webkit2gtk-4_0-injected-bundles-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038461" comment="webkit2gtk-4_1-injected-bundles-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698045" comment="webkit2gtk-4_1-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038462" comment="webkit2gtk3-devel-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038463" comment="webkit2gtk3-minibrowser-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038464" comment="webkit2gtk3-soup2-devel-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698154" comment="webkit2gtk3-soup2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038465" comment="webkit2gtk3-soup2-minibrowser-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698155" comment="webkit2gtk3-soup2-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038466" comment="webkit2gtk4-devel-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698156" comment="webkit2gtk4-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038467" comment="webkit2gtk4-minibrowser-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698157" comment="webkit2gtk4-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038468" comment="webkitgtk-6_0-injected-bundles-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779937" comment="webkitgtk-6_0-injected-bundles is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202543440" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-43440</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-43440" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43440" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-43440" ref_url="https://www.suse.com/security/cve/CVE-2025-43440" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:22789" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002280.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22790" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003113.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23110" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1150-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023882.html" source="SUSE-SU"/>
    <description>
    This issue was addressed with improved checks. This issue is fixed in Safari 26.1, iOS 26.1 and iPadOS 26.1, macOS Tahoe 26.1, tvOS 26.1, visionOS 26.1, watchOS 26.1. Processing maliciously crafted web content may lead to an unexpected process crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-22"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43440/">CVE-2025-43440 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43440">CVE-2025-43440 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254177">SUSE bug 1254177</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038439" comment="WebKitGTK-4.0-lang-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779926" comment="WebKitGTK-4.0-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038440" comment="WebKitGTK-4.1-lang-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779927" comment="WebKitGTK-4.1-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038441" comment="WebKitGTK-6.0-lang-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779928" comment="WebKitGTK-6.0-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038442" comment="libjavascriptcoregtk-4_0-18-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038443" comment="libjavascriptcoregtk-4_1-0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698039" comment="libjavascriptcoregtk-4_1-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038444" comment="libjavascriptcoregtk-6_0-1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779930" comment="libjavascriptcoregtk-6_0-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038445" comment="libwebkit2gtk-4_0-37-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038446" comment="libwebkit2gtk-4_1-0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698041" comment="libwebkit2gtk-4_1-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038447" comment="libwebkitgtk-6_0-4-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779932" comment="libwebkitgtk-6_0-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038448" comment="typelib-1_0-JavaScriptCore-4_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038449" comment="typelib-1_0-JavaScriptCore-4_1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698148" comment="typelib-1_0-JavaScriptCore-4_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038450" comment="typelib-1_0-JavaScriptCore-6_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779933" comment="typelib-1_0-JavaScriptCore-6_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038451" comment="typelib-1_0-WebKit-6_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779934" comment="typelib-1_0-WebKit-6_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038452" comment="typelib-1_0-WebKit2-4_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038453" comment="typelib-1_0-WebKit2-4_1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698149" comment="typelib-1_0-WebKit2-4_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038454" comment="typelib-1_0-WebKit2WebExtension-4_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038455" comment="typelib-1_0-WebKit2WebExtension-4_1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698150" comment="typelib-1_0-WebKit2WebExtension-4_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038456" comment="typelib-1_0-WebKitWebProcessExtension-6_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779935" comment="typelib-1_0-WebKitWebProcessExtension-6_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038457" comment="webkit-jsc-4-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038458" comment="webkit-jsc-4.1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698152" comment="webkit-jsc-4.1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038459" comment="webkit-jsc-6.0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779936" comment="webkit-jsc-6.0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038460" comment="webkit2gtk-4_0-injected-bundles-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038461" comment="webkit2gtk-4_1-injected-bundles-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698045" comment="webkit2gtk-4_1-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038462" comment="webkit2gtk3-devel-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038463" comment="webkit2gtk3-minibrowser-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038464" comment="webkit2gtk3-soup2-devel-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698154" comment="webkit2gtk3-soup2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038465" comment="webkit2gtk3-soup2-minibrowser-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698155" comment="webkit2gtk3-soup2-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038466" comment="webkit2gtk4-devel-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698156" comment="webkit2gtk4-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038467" comment="webkit2gtk4-minibrowser-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698157" comment="webkit2gtk4-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038468" comment="webkitgtk-6_0-injected-bundles-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779937" comment="webkitgtk-6_0-injected-bundles is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202543443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-43443</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-43443" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43443" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-43443" ref_url="https://www.suse.com/security/cve/CVE-2025-43443" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:22789" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002280.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22790" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003113.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23110" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1150-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023882.html" source="SUSE-SU"/>
    <description>
    This issue was addressed with improved checks. This issue is fixed in Safari 26.1, iOS 18.7.2 and iPadOS 18.7.2, iOS 26.1 and iPadOS 26.1, macOS Tahoe 26.1, tvOS 26.1, visionOS 26.1, watchOS 26.1. Processing maliciously crafted web content may lead to an unexpected process crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-22"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43443/">CVE-2025-43443 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43443">CVE-2025-43443 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254176">SUSE bug 1254176</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038439" comment="WebKitGTK-4.0-lang-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779926" comment="WebKitGTK-4.0-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038440" comment="WebKitGTK-4.1-lang-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779927" comment="WebKitGTK-4.1-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038441" comment="WebKitGTK-6.0-lang-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779928" comment="WebKitGTK-6.0-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038442" comment="libjavascriptcoregtk-4_0-18-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038443" comment="libjavascriptcoregtk-4_1-0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698039" comment="libjavascriptcoregtk-4_1-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038444" comment="libjavascriptcoregtk-6_0-1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779930" comment="libjavascriptcoregtk-6_0-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038445" comment="libwebkit2gtk-4_0-37-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038446" comment="libwebkit2gtk-4_1-0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698041" comment="libwebkit2gtk-4_1-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038447" comment="libwebkitgtk-6_0-4-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779932" comment="libwebkitgtk-6_0-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038448" comment="typelib-1_0-JavaScriptCore-4_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038449" comment="typelib-1_0-JavaScriptCore-4_1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698148" comment="typelib-1_0-JavaScriptCore-4_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038450" comment="typelib-1_0-JavaScriptCore-6_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779933" comment="typelib-1_0-JavaScriptCore-6_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038451" comment="typelib-1_0-WebKit-6_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779934" comment="typelib-1_0-WebKit-6_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038452" comment="typelib-1_0-WebKit2-4_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038453" comment="typelib-1_0-WebKit2-4_1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698149" comment="typelib-1_0-WebKit2-4_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038454" comment="typelib-1_0-WebKit2WebExtension-4_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038455" comment="typelib-1_0-WebKit2WebExtension-4_1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698150" comment="typelib-1_0-WebKit2WebExtension-4_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038456" comment="typelib-1_0-WebKitWebProcessExtension-6_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779935" comment="typelib-1_0-WebKitWebProcessExtension-6_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038457" comment="webkit-jsc-4-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038458" comment="webkit-jsc-4.1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698152" comment="webkit-jsc-4.1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038459" comment="webkit-jsc-6.0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779936" comment="webkit-jsc-6.0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038460" comment="webkit2gtk-4_0-injected-bundles-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038461" comment="webkit2gtk-4_1-injected-bundles-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698045" comment="webkit2gtk-4_1-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038462" comment="webkit2gtk3-devel-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038463" comment="webkit2gtk3-minibrowser-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038464" comment="webkit2gtk3-soup2-devel-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698154" comment="webkit2gtk3-soup2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038465" comment="webkit2gtk3-soup2-minibrowser-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698155" comment="webkit2gtk3-soup2-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038466" comment="webkit2gtk4-devel-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698156" comment="webkit2gtk4-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038467" comment="webkit2gtk4-minibrowser-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698157" comment="webkit2gtk4-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038468" comment="webkitgtk-6_0-injected-bundles-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779937" comment="webkitgtk-6_0-injected-bundles is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202543458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-43458</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-43458" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43458" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-43458" ref_url="https://www.suse.com/security/cve/CVE-2025-43458" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:22789" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002280.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22790" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003113.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23110" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023882.html" source="SUSE-SU"/>
    <description>
    This issue was addressed through improved state management. This issue is fixed in Safari 26.1, iOS 18.7.2 and iPadOS 18.7.2, iOS 26.1 and iPadOS 26.1, macOS Tahoe 26.1, tvOS 26.1, visionOS 26.1, watchOS 26.1. Processing maliciously crafted web content may lead to an unexpected process crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-22"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="2.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43458/">CVE-2025-43458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43458">CVE-2025-43458 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254498">SUSE bug 1254498</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038439" comment="WebKitGTK-4.0-lang-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779926" comment="WebKitGTK-4.0-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038440" comment="WebKitGTK-4.1-lang-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779927" comment="WebKitGTK-4.1-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038441" comment="WebKitGTK-6.0-lang-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779928" comment="WebKitGTK-6.0-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038442" comment="libjavascriptcoregtk-4_0-18-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038443" comment="libjavascriptcoregtk-4_1-0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698039" comment="libjavascriptcoregtk-4_1-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038444" comment="libjavascriptcoregtk-6_0-1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779930" comment="libjavascriptcoregtk-6_0-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038445" comment="libwebkit2gtk-4_0-37-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038446" comment="libwebkit2gtk-4_1-0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698041" comment="libwebkit2gtk-4_1-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038447" comment="libwebkitgtk-6_0-4-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779932" comment="libwebkitgtk-6_0-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038448" comment="typelib-1_0-JavaScriptCore-4_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038449" comment="typelib-1_0-JavaScriptCore-4_1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698148" comment="typelib-1_0-JavaScriptCore-4_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038450" comment="typelib-1_0-JavaScriptCore-6_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779933" comment="typelib-1_0-JavaScriptCore-6_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038451" comment="typelib-1_0-WebKit-6_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779934" comment="typelib-1_0-WebKit-6_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038452" comment="typelib-1_0-WebKit2-4_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038453" comment="typelib-1_0-WebKit2-4_1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698149" comment="typelib-1_0-WebKit2-4_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038454" comment="typelib-1_0-WebKit2WebExtension-4_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038455" comment="typelib-1_0-WebKit2WebExtension-4_1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698150" comment="typelib-1_0-WebKit2WebExtension-4_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038456" comment="typelib-1_0-WebKitWebProcessExtension-6_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779935" comment="typelib-1_0-WebKitWebProcessExtension-6_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038457" comment="webkit-jsc-4-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038458" comment="webkit-jsc-4.1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698152" comment="webkit-jsc-4.1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038459" comment="webkit-jsc-6.0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779936" comment="webkit-jsc-6.0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038460" comment="webkit2gtk-4_0-injected-bundles-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038461" comment="webkit2gtk-4_1-injected-bundles-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698045" comment="webkit2gtk-4_1-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038462" comment="webkit2gtk3-devel-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038463" comment="webkit2gtk3-minibrowser-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038464" comment="webkit2gtk3-soup2-devel-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698154" comment="webkit2gtk3-soup2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038465" comment="webkit2gtk3-soup2-minibrowser-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698155" comment="webkit2gtk3-soup2-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038466" comment="webkit2gtk4-devel-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698156" comment="webkit2gtk4-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038467" comment="webkit2gtk4-minibrowser-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698157" comment="webkit2gtk4-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038468" comment="webkitgtk-6_0-injected-bundles-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779937" comment="webkitgtk-6_0-injected-bundles is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202543480" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-43480</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-43480" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43480" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-43480" ref_url="https://www.suse.com/security/cve/CVE-2025-43480" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:22789" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023882.html" source="SUSE-SU"/>
    <description>
    The issue was addressed with improved checks. This issue is fixed in Safari 26.1, iOS 26.1 and iPadOS 26.1, macOS Tahoe 26.1, tvOS 26.1, visionOS 26.1, watchOS 26.1. A malicious website may exfiltrate data cross-origin.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-22"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43480/">CVE-2025-43480 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43480">CVE-2025-43480 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254175">SUSE bug 1254175</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038439" comment="WebKitGTK-4.0-lang-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779926" comment="WebKitGTK-4.0-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038440" comment="WebKitGTK-4.1-lang-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779927" comment="WebKitGTK-4.1-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038441" comment="WebKitGTK-6.0-lang-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779928" comment="WebKitGTK-6.0-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038442" comment="libjavascriptcoregtk-4_0-18-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038443" comment="libjavascriptcoregtk-4_1-0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698039" comment="libjavascriptcoregtk-4_1-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038444" comment="libjavascriptcoregtk-6_0-1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779930" comment="libjavascriptcoregtk-6_0-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038445" comment="libwebkit2gtk-4_0-37-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038446" comment="libwebkit2gtk-4_1-0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698041" comment="libwebkit2gtk-4_1-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038447" comment="libwebkitgtk-6_0-4-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779932" comment="libwebkitgtk-6_0-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038448" comment="typelib-1_0-JavaScriptCore-4_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038449" comment="typelib-1_0-JavaScriptCore-4_1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698148" comment="typelib-1_0-JavaScriptCore-4_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038450" comment="typelib-1_0-JavaScriptCore-6_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779933" comment="typelib-1_0-JavaScriptCore-6_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038451" comment="typelib-1_0-WebKit-6_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779934" comment="typelib-1_0-WebKit-6_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038452" comment="typelib-1_0-WebKit2-4_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038453" comment="typelib-1_0-WebKit2-4_1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698149" comment="typelib-1_0-WebKit2-4_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038454" comment="typelib-1_0-WebKit2WebExtension-4_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038455" comment="typelib-1_0-WebKit2WebExtension-4_1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698150" comment="typelib-1_0-WebKit2WebExtension-4_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038456" comment="typelib-1_0-WebKitWebProcessExtension-6_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779935" comment="typelib-1_0-WebKitWebProcessExtension-6_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038457" comment="webkit-jsc-4-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038458" comment="webkit-jsc-4.1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698152" comment="webkit-jsc-4.1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038459" comment="webkit-jsc-6.0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779936" comment="webkit-jsc-6.0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038460" comment="webkit2gtk-4_0-injected-bundles-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038461" comment="webkit2gtk-4_1-injected-bundles-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698045" comment="webkit2gtk-4_1-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038462" comment="webkit2gtk3-devel-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038463" comment="webkit2gtk3-minibrowser-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038464" comment="webkit2gtk3-soup2-devel-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698154" comment="webkit2gtk3-soup2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038465" comment="webkit2gtk3-soup2-minibrowser-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698155" comment="webkit2gtk3-soup2-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038466" comment="webkit2gtk4-devel-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698156" comment="webkit2gtk4-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038467" comment="webkit2gtk4-minibrowser-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698157" comment="webkit2gtk4-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038468" comment="webkitgtk-6_0-injected-bundles-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779937" comment="webkitgtk-6_0-injected-bundles is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202543501" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-43501</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-43501" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43501" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-43501" ref_url="https://www.suse.com/security/cve/CVE-2025-43501" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23663" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002299.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23700" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003147.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23974" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023882.html" source="SUSE-SU"/>
    <description>
    A buffer overflow issue was addressed with improved memory handling. This issue is fixed in Safari 26.2, iOS 18.7.3 and iPadOS 18.7.3, iOS 26.2 and iPadOS 26.2, macOS Tahoe 26.2, visionOS 26.2. Processing maliciously crafted web content may lead to an unexpected process crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-22"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43501/">CVE-2025-43501 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43501">CVE-2025-43501 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255194">SUSE bug 1255194</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038439" comment="WebKitGTK-4.0-lang-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779926" comment="WebKitGTK-4.0-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038440" comment="WebKitGTK-4.1-lang-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779927" comment="WebKitGTK-4.1-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038441" comment="WebKitGTK-6.0-lang-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779928" comment="WebKitGTK-6.0-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038442" comment="libjavascriptcoregtk-4_0-18-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038443" comment="libjavascriptcoregtk-4_1-0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698039" comment="libjavascriptcoregtk-4_1-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038444" comment="libjavascriptcoregtk-6_0-1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779930" comment="libjavascriptcoregtk-6_0-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038445" comment="libwebkit2gtk-4_0-37-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038446" comment="libwebkit2gtk-4_1-0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698041" comment="libwebkit2gtk-4_1-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038447" comment="libwebkitgtk-6_0-4-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779932" comment="libwebkitgtk-6_0-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038448" comment="typelib-1_0-JavaScriptCore-4_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038449" comment="typelib-1_0-JavaScriptCore-4_1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698148" comment="typelib-1_0-JavaScriptCore-4_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038450" comment="typelib-1_0-JavaScriptCore-6_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779933" comment="typelib-1_0-JavaScriptCore-6_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038451" comment="typelib-1_0-WebKit-6_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779934" comment="typelib-1_0-WebKit-6_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038452" comment="typelib-1_0-WebKit2-4_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038453" comment="typelib-1_0-WebKit2-4_1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698149" comment="typelib-1_0-WebKit2-4_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038454" comment="typelib-1_0-WebKit2WebExtension-4_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038455" comment="typelib-1_0-WebKit2WebExtension-4_1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698150" comment="typelib-1_0-WebKit2WebExtension-4_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038456" comment="typelib-1_0-WebKitWebProcessExtension-6_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779935" comment="typelib-1_0-WebKitWebProcessExtension-6_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038457" comment="webkit-jsc-4-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038458" comment="webkit-jsc-4.1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698152" comment="webkit-jsc-4.1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038459" comment="webkit-jsc-6.0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779936" comment="webkit-jsc-6.0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038460" comment="webkit2gtk-4_0-injected-bundles-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038461" comment="webkit2gtk-4_1-injected-bundles-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698045" comment="webkit2gtk-4_1-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038462" comment="webkit2gtk3-devel-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038463" comment="webkit2gtk3-minibrowser-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038464" comment="webkit2gtk3-soup2-devel-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698154" comment="webkit2gtk3-soup2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038465" comment="webkit2gtk3-soup2-minibrowser-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698155" comment="webkit2gtk3-soup2-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038466" comment="webkit2gtk4-devel-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698156" comment="webkit2gtk4-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038467" comment="webkit2gtk4-minibrowser-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698157" comment="webkit2gtk4-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038468" comment="webkitgtk-6_0-injected-bundles-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779937" comment="webkitgtk-6_0-injected-bundles is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202543529" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-43529</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-43529" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43529" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-43529" ref_url="https://www.suse.com/security/cve/CVE-2025-43529" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23663" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002299.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23700" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003147.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23974" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023882.html" source="SUSE-SU"/>
    <description>
    A use-after-free issue was addressed with improved memory management. This issue is fixed in Safari 26.2, iOS 18.7.3 and iPadOS 18.7.3, iOS 26.2 and iPadOS 26.2, macOS Tahoe 26.2, tvOS 26.2, visionOS 26.2, watchOS 26.2. Processing maliciously crafted web content may lead to arbitrary code execution. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals on versions of iOS before iOS 26. CVE-2025-14174 was also issued in response to this report.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-22"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43529/">CVE-2025-43529 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43529">CVE-2025-43529 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255198">SUSE bug 1255198</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038439" comment="WebKitGTK-4.0-lang-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779926" comment="WebKitGTK-4.0-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038440" comment="WebKitGTK-4.1-lang-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779927" comment="WebKitGTK-4.1-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038441" comment="WebKitGTK-6.0-lang-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779928" comment="WebKitGTK-6.0-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038442" comment="libjavascriptcoregtk-4_0-18-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038443" comment="libjavascriptcoregtk-4_1-0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698039" comment="libjavascriptcoregtk-4_1-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038444" comment="libjavascriptcoregtk-6_0-1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779930" comment="libjavascriptcoregtk-6_0-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038445" comment="libwebkit2gtk-4_0-37-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038446" comment="libwebkit2gtk-4_1-0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698041" comment="libwebkit2gtk-4_1-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038447" comment="libwebkitgtk-6_0-4-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779932" comment="libwebkitgtk-6_0-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038448" comment="typelib-1_0-JavaScriptCore-4_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038449" comment="typelib-1_0-JavaScriptCore-4_1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698148" comment="typelib-1_0-JavaScriptCore-4_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038450" comment="typelib-1_0-JavaScriptCore-6_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779933" comment="typelib-1_0-JavaScriptCore-6_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038451" comment="typelib-1_0-WebKit-6_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779934" comment="typelib-1_0-WebKit-6_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038452" comment="typelib-1_0-WebKit2-4_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038453" comment="typelib-1_0-WebKit2-4_1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698149" comment="typelib-1_0-WebKit2-4_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038454" comment="typelib-1_0-WebKit2WebExtension-4_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038455" comment="typelib-1_0-WebKit2WebExtension-4_1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698150" comment="typelib-1_0-WebKit2WebExtension-4_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038456" comment="typelib-1_0-WebKitWebProcessExtension-6_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779935" comment="typelib-1_0-WebKitWebProcessExtension-6_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038457" comment="webkit-jsc-4-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038458" comment="webkit-jsc-4.1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698152" comment="webkit-jsc-4.1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038459" comment="webkit-jsc-6.0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779936" comment="webkit-jsc-6.0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038460" comment="webkit2gtk-4_0-injected-bundles-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038461" comment="webkit2gtk-4_1-injected-bundles-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698045" comment="webkit2gtk-4_1-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038462" comment="webkit2gtk3-devel-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038463" comment="webkit2gtk3-minibrowser-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038464" comment="webkit2gtk3-soup2-devel-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698154" comment="webkit2gtk3-soup2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038465" comment="webkit2gtk3-soup2-minibrowser-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698155" comment="webkit2gtk3-soup2-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038466" comment="webkit2gtk4-devel-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698156" comment="webkit2gtk4-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038467" comment="webkit2gtk4-minibrowser-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698157" comment="webkit2gtk4-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038468" comment="webkitgtk-6_0-injected-bundles-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779937" comment="webkitgtk-6_0-injected-bundles is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202543531" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-43531</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-43531" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43531" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-43531" ref_url="https://www.suse.com/security/cve/CVE-2025-43531" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23663" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002299.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23700" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003147.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23974" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023882.html" source="SUSE-SU"/>
    <description>
    A race condition was addressed with improved state handling. This issue is fixed in Safari 26.2, iOS 18.7.3 and iPadOS 18.7.3, iOS 26.2 and iPadOS 26.2, macOS Tahoe 26.2, tvOS 26.2, visionOS 26.2, watchOS 26.2. Processing maliciously crafted web content may lead to an unexpected process crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-22"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43531/">CVE-2025-43531 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43531">CVE-2025-43531 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255183">SUSE bug 1255183</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038439" comment="WebKitGTK-4.0-lang-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779926" comment="WebKitGTK-4.0-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038440" comment="WebKitGTK-4.1-lang-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779927" comment="WebKitGTK-4.1-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038441" comment="WebKitGTK-6.0-lang-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779928" comment="WebKitGTK-6.0-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038442" comment="libjavascriptcoregtk-4_0-18-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038443" comment="libjavascriptcoregtk-4_1-0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698039" comment="libjavascriptcoregtk-4_1-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038444" comment="libjavascriptcoregtk-6_0-1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779930" comment="libjavascriptcoregtk-6_0-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038445" comment="libwebkit2gtk-4_0-37-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038446" comment="libwebkit2gtk-4_1-0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698041" comment="libwebkit2gtk-4_1-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038447" comment="libwebkitgtk-6_0-4-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779932" comment="libwebkitgtk-6_0-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038448" comment="typelib-1_0-JavaScriptCore-4_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038449" comment="typelib-1_0-JavaScriptCore-4_1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698148" comment="typelib-1_0-JavaScriptCore-4_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038450" comment="typelib-1_0-JavaScriptCore-6_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779933" comment="typelib-1_0-JavaScriptCore-6_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038451" comment="typelib-1_0-WebKit-6_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779934" comment="typelib-1_0-WebKit-6_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038452" comment="typelib-1_0-WebKit2-4_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038453" comment="typelib-1_0-WebKit2-4_1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698149" comment="typelib-1_0-WebKit2-4_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038454" comment="typelib-1_0-WebKit2WebExtension-4_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038455" comment="typelib-1_0-WebKit2WebExtension-4_1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698150" comment="typelib-1_0-WebKit2WebExtension-4_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038456" comment="typelib-1_0-WebKitWebProcessExtension-6_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779935" comment="typelib-1_0-WebKitWebProcessExtension-6_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038457" comment="webkit-jsc-4-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038458" comment="webkit-jsc-4.1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698152" comment="webkit-jsc-4.1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038459" comment="webkit-jsc-6.0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779936" comment="webkit-jsc-6.0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038460" comment="webkit2gtk-4_0-injected-bundles-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038461" comment="webkit2gtk-4_1-injected-bundles-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698045" comment="webkit2gtk-4_1-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038462" comment="webkit2gtk3-devel-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038463" comment="webkit2gtk3-minibrowser-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038464" comment="webkit2gtk3-soup2-devel-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698154" comment="webkit2gtk3-soup2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038465" comment="webkit2gtk3-soup2-minibrowser-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698155" comment="webkit2gtk3-soup2-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038466" comment="webkit2gtk4-devel-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698156" comment="webkit2gtk4-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038467" comment="webkit2gtk4-minibrowser-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698157" comment="webkit2gtk4-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038468" comment="webkitgtk-6_0-injected-bundles-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779937" comment="webkitgtk-6_0-injected-bundles is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202543535" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-43535</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-43535" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43535" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-43535" ref_url="https://www.suse.com/security/cve/CVE-2025-43535" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23663" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002299.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23700" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003147.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23974" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023882.html" source="SUSE-SU"/>
    <description>
    The issue was addressed with improved memory handling. This issue is fixed in Safari 26.2, iOS 18.7.3 and iPadOS 18.7.3, iOS 26.2 and iPadOS 26.2, macOS Tahoe 26.2, visionOS 26.2. Processing maliciously crafted web content may lead to an unexpected process crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-22"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43535/">CVE-2025-43535 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43535">CVE-2025-43535 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255195">SUSE bug 1255195</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038439" comment="WebKitGTK-4.0-lang-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779926" comment="WebKitGTK-4.0-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038440" comment="WebKitGTK-4.1-lang-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779927" comment="WebKitGTK-4.1-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038441" comment="WebKitGTK-6.0-lang-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779928" comment="WebKitGTK-6.0-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038442" comment="libjavascriptcoregtk-4_0-18-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038443" comment="libjavascriptcoregtk-4_1-0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698039" comment="libjavascriptcoregtk-4_1-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038444" comment="libjavascriptcoregtk-6_0-1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779930" comment="libjavascriptcoregtk-6_0-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038445" comment="libwebkit2gtk-4_0-37-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038446" comment="libwebkit2gtk-4_1-0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698041" comment="libwebkit2gtk-4_1-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038447" comment="libwebkitgtk-6_0-4-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779932" comment="libwebkitgtk-6_0-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038448" comment="typelib-1_0-JavaScriptCore-4_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038449" comment="typelib-1_0-JavaScriptCore-4_1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698148" comment="typelib-1_0-JavaScriptCore-4_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038450" comment="typelib-1_0-JavaScriptCore-6_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779933" comment="typelib-1_0-JavaScriptCore-6_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038451" comment="typelib-1_0-WebKit-6_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779934" comment="typelib-1_0-WebKit-6_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038452" comment="typelib-1_0-WebKit2-4_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038453" comment="typelib-1_0-WebKit2-4_1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698149" comment="typelib-1_0-WebKit2-4_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038454" comment="typelib-1_0-WebKit2WebExtension-4_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038455" comment="typelib-1_0-WebKit2WebExtension-4_1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698150" comment="typelib-1_0-WebKit2WebExtension-4_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038456" comment="typelib-1_0-WebKitWebProcessExtension-6_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779935" comment="typelib-1_0-WebKitWebProcessExtension-6_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038457" comment="webkit-jsc-4-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038458" comment="webkit-jsc-4.1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698152" comment="webkit-jsc-4.1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038459" comment="webkit-jsc-6.0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779936" comment="webkit-jsc-6.0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038460" comment="webkit2gtk-4_0-injected-bundles-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038461" comment="webkit2gtk-4_1-injected-bundles-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698045" comment="webkit2gtk-4_1-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038462" comment="webkit2gtk3-devel-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038463" comment="webkit2gtk3-minibrowser-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038464" comment="webkit2gtk3-soup2-devel-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698154" comment="webkit2gtk3-soup2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038465" comment="webkit2gtk3-soup2-minibrowser-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698155" comment="webkit2gtk3-soup2-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038466" comment="webkit2gtk4-devel-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698156" comment="webkit2gtk4-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038467" comment="webkit2gtk4-minibrowser-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698157" comment="webkit2gtk4-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038468" comment="webkitgtk-6_0-injected-bundles-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779937" comment="webkitgtk-6_0-injected-bundles is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202543536" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-43536</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-43536" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43536" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-43536" ref_url="https://www.suse.com/security/cve/CVE-2025-43536" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23663" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002299.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23700" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003147.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23974" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023882.html" source="SUSE-SU"/>
    <description>
    A use-after-free issue was addressed with improved memory management. This issue is fixed in Safari 26.2, iOS 18.7.3 and iPadOS 18.7.3, iOS 26.2 and iPadOS 26.2, macOS Tahoe 26.2. Processing maliciously crafted web content may lead to an unexpected process crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-22"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43536/">CVE-2025-43536 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43536">CVE-2025-43536 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255200">SUSE bug 1255200</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038439" comment="WebKitGTK-4.0-lang-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779926" comment="WebKitGTK-4.0-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038440" comment="WebKitGTK-4.1-lang-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779927" comment="WebKitGTK-4.1-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038441" comment="WebKitGTK-6.0-lang-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779928" comment="WebKitGTK-6.0-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038442" comment="libjavascriptcoregtk-4_0-18-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038443" comment="libjavascriptcoregtk-4_1-0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698039" comment="libjavascriptcoregtk-4_1-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038444" comment="libjavascriptcoregtk-6_0-1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779930" comment="libjavascriptcoregtk-6_0-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038445" comment="libwebkit2gtk-4_0-37-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038446" comment="libwebkit2gtk-4_1-0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698041" comment="libwebkit2gtk-4_1-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038447" comment="libwebkitgtk-6_0-4-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779932" comment="libwebkitgtk-6_0-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038448" comment="typelib-1_0-JavaScriptCore-4_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038449" comment="typelib-1_0-JavaScriptCore-4_1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698148" comment="typelib-1_0-JavaScriptCore-4_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038450" comment="typelib-1_0-JavaScriptCore-6_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779933" comment="typelib-1_0-JavaScriptCore-6_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038451" comment="typelib-1_0-WebKit-6_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779934" comment="typelib-1_0-WebKit-6_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038452" comment="typelib-1_0-WebKit2-4_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038453" comment="typelib-1_0-WebKit2-4_1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698149" comment="typelib-1_0-WebKit2-4_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038454" comment="typelib-1_0-WebKit2WebExtension-4_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038455" comment="typelib-1_0-WebKit2WebExtension-4_1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698150" comment="typelib-1_0-WebKit2WebExtension-4_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038456" comment="typelib-1_0-WebKitWebProcessExtension-6_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779935" comment="typelib-1_0-WebKitWebProcessExtension-6_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038457" comment="webkit-jsc-4-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038458" comment="webkit-jsc-4.1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698152" comment="webkit-jsc-4.1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038459" comment="webkit-jsc-6.0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779936" comment="webkit-jsc-6.0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038460" comment="webkit2gtk-4_0-injected-bundles-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038461" comment="webkit2gtk-4_1-injected-bundles-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698045" comment="webkit2gtk-4_1-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038462" comment="webkit2gtk3-devel-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038463" comment="webkit2gtk3-minibrowser-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038464" comment="webkit2gtk3-soup2-devel-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698154" comment="webkit2gtk3-soup2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038465" comment="webkit2gtk3-soup2-minibrowser-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698155" comment="webkit2gtk3-soup2-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038466" comment="webkit2gtk4-devel-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698156" comment="webkit2gtk4-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038467" comment="webkit2gtk4-minibrowser-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698157" comment="webkit2gtk4-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038468" comment="webkitgtk-6_0-injected-bundles-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779937" comment="webkitgtk-6_0-injected-bundles is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202543541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-43541</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-43541" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-43541" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-43541" ref_url="https://www.suse.com/security/cve/CVE-2025-43541" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23663" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002299.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23700" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003147.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23974" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002350.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023655.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023654.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023882.html" source="SUSE-SU"/>
    <description>
    A type confusion issue was addressed with improved state handling. This issue is fixed in Safari 26.2, iOS 18.7.3 and iPadOS 18.7.3, iOS 26.2 and iPadOS 26.2, macOS Tahoe 26.2, visionOS 26.2. Processing maliciously crafted web content may lead to an unexpected Safari crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-22"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-43541/">CVE-2025-43541 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-43541">CVE-2025-43541 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255191">SUSE bug 1255191</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038439" comment="WebKitGTK-4.0-lang-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779926" comment="WebKitGTK-4.0-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038440" comment="WebKitGTK-4.1-lang-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779927" comment="WebKitGTK-4.1-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038441" comment="WebKitGTK-6.0-lang-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779928" comment="WebKitGTK-6.0-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038442" comment="libjavascriptcoregtk-4_0-18-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038443" comment="libjavascriptcoregtk-4_1-0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698039" comment="libjavascriptcoregtk-4_1-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038444" comment="libjavascriptcoregtk-6_0-1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779930" comment="libjavascriptcoregtk-6_0-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038445" comment="libwebkit2gtk-4_0-37-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038446" comment="libwebkit2gtk-4_1-0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698041" comment="libwebkit2gtk-4_1-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038447" comment="libwebkitgtk-6_0-4-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779932" comment="libwebkitgtk-6_0-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038448" comment="typelib-1_0-JavaScriptCore-4_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038449" comment="typelib-1_0-JavaScriptCore-4_1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698148" comment="typelib-1_0-JavaScriptCore-4_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038450" comment="typelib-1_0-JavaScriptCore-6_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779933" comment="typelib-1_0-JavaScriptCore-6_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038451" comment="typelib-1_0-WebKit-6_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779934" comment="typelib-1_0-WebKit-6_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038452" comment="typelib-1_0-WebKit2-4_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038453" comment="typelib-1_0-WebKit2-4_1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698149" comment="typelib-1_0-WebKit2-4_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038454" comment="typelib-1_0-WebKit2WebExtension-4_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038455" comment="typelib-1_0-WebKit2WebExtension-4_1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698150" comment="typelib-1_0-WebKit2WebExtension-4_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038456" comment="typelib-1_0-WebKitWebProcessExtension-6_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779935" comment="typelib-1_0-WebKitWebProcessExtension-6_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038457" comment="webkit-jsc-4-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038458" comment="webkit-jsc-4.1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698152" comment="webkit-jsc-4.1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038459" comment="webkit-jsc-6.0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779936" comment="webkit-jsc-6.0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038460" comment="webkit2gtk-4_0-injected-bundles-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038461" comment="webkit2gtk-4_1-injected-bundles-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698045" comment="webkit2gtk-4_1-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038462" comment="webkit2gtk3-devel-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038463" comment="webkit2gtk3-minibrowser-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038464" comment="webkit2gtk3-soup2-devel-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698154" comment="webkit2gtk3-soup2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038465" comment="webkit2gtk3-soup2-minibrowser-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698155" comment="webkit2gtk3-soup2-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038466" comment="webkit2gtk4-devel-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698156" comment="webkit2gtk4-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038467" comment="webkit2gtk4-minibrowser-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698157" comment="webkit2gtk4-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038468" comment="webkitgtk-6_0-injected-bundles-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779937" comment="webkitgtk-6_0-injected-bundles is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20254476" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-4476</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-4476" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4476" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-4476" ref_url="https://www.suse.com/security/cve/CVE-2025-4476" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01812-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040130.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01817-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20453-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0469-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024144.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024351.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024517.html" source="SUSE-SU"/>
    <description>
    A denial-of-service vulnerability has been identified in the libsoup HTTP client library. This flaw can be triggered when a libsoup client receives a 401 (Unauthorized) HTTP response containing a specifically crafted domain parameter within the WWW-Authenticate header. Processing this malformed header can lead to a crash of the client application using libsoup. An attacker could exploit this by setting up a malicious HTTP server. If a user's application using the vulnerable libsoup library connects to this malicious server, it could result in a denial-of-service. Successful exploitation requires tricking a user's client application into connecting to the attacker's malicious server.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-14"/>
	<updated date="2026-03-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="2.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4476/">CVE-2025-4476 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4476">CVE-2025-4476 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243422">SUSE bug 1243422</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048654" comment="libsoup-2_4-1-2.74.3-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151596" comment="libsoup-2_4-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048655" comment="libsoup2-devel-2.74.3-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009957647" comment="libsoup2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048656" comment="libsoup2-lang-2.74.3-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698060" comment="libsoup2-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048657" comment="typelib-1_0-Soup-2_4-2.74.3-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151599" comment="typelib-1_0-Soup-2_4 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20254478" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-4478</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-4478" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4478" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-4478" ref_url="https://www.suse.com/security/cve/CVE-2025-4478" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023993.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the FreeRDP used by Anaconda's remote install feature, where a crafted RDP packet could trigger a segmentation fault. This issue causes the service to crash and remain defunct, resulting in a denial of service. It occurs pre-boot and is likely due to a NULL pointer dereference. Rebooting is required to recover the system.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-13"/>
	<updated date="2026-03-13"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4478/">CVE-2025-4478 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-4478">CVE-2025-4478 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243109">SUSE bug 1243109</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048376" comment="freerdp-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151908" comment="freerdp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048377" comment="freerdp-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151909" comment="freerdp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048378" comment="freerdp-proxy-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287971" comment="freerdp-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048379" comment="freerdp-proxy-plugins-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048429" comment="freerdp-proxy-plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048380" comment="freerdp-sdl-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048430" comment="freerdp-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048381" comment="freerdp-server-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245861" comment="freerdp-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048382" comment="freerdp-wayland-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245862" comment="freerdp-wayland is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048383" comment="libfreerdp-server-proxy3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048431" comment="libfreerdp-server-proxy3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048384" comment="libfreerdp3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048432" comment="libfreerdp3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048385" comment="librdtk0-0-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048433" comment="librdtk0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048386" comment="libuwac0-0-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245863" comment="libuwac0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048387" comment="libwinpr3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048434" comment="libwinpr3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048388" comment="rdtk0-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048435" comment="rdtk0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048389" comment="uwac0-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048436" comment="uwac0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048390" comment="winpr-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009877482" comment="winpr-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202545582" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-45582</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-45582" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-45582" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-45582" ref_url="https://www.suse.com/security/cve/CVE-2025-45582" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0067" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1177-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20955-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20959-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21002-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045404.html" source="SUSE-SU"/>
    <description>
    GNU Tar through 1.35 allows file overwrite via directory traversal in crafted TAR archives, with a certain two-step process. First, the victim must extract an archive that contains a ../ symlink to a critical directory. Second, the victim must extract an archive that contains a critical file, specified via a relative pathname that begins with the symlink name and ends with that critical file's name. Here, the extraction follows the symlink and overwrites the critical file. This bypasses the protection mechanism of "Member name contains '..'" that would occur for a single TAR archive that attempted to specify the critical file via a ../ approach. For example, the first archive can contain "x -&gt; ../../../../../home/victim/.ssh" and the second archive can contain x/authorized_keys. This can affect server applications that automatically extract any number of user-supplied TAR archives, and were relying on the blocking of traversal. This can also affect software installation processes in which "tar xf" is run more than once (e.g., when installing a package can automatically install two dependencies that are set up as untrusted tarballs instead of official packages). NOTE: the official GNU Tar manual has an otherwise-empty directory for each "tar xf" in its Security Rules of Thumb; however, third-party advice leads users to run "tar xf" more than once into the same directory.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-10"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-45582/">CVE-2025-45582 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-45582">CVE-2025-45582 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246399">SUSE bug 1246399</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010053388" comment="tar-1.35-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151391" comment="tar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010053389" comment="tar-backup-scripts-1.35-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153774" comment="tar-backup-scripts is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010053390" comment="tar-doc-1.35-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251575" comment="tar-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010053391" comment="tar-lang-1.35-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151392" comment="tar-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010053392" comment="tar-rmt-1.35-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177166" comment="tar-rmt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010053393" comment="tar-tests-1.35-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153775" comment="tar-tests is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20254565" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-4565</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-4565" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4565" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-4565" ref_url="https://www.suse.com/security/cve/CVE-2025-4565" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02309-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040711.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02310-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02311-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040709.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20514-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20672-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041629.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3722-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025106.html" source="SUSE-SU"/>
    <description>
    Any project that uses Protobuf Pure-Python backend  to parse untrusted Protocol Buffers data containing an arbitrary number of recursive groups, recursive messages or a series of SGROUP  tags can be corrupted by exceeding the Python recursion limit. This can result in a Denial of service by crashing the application with a RecursionError. We recommend upgrading to version =&gt;6.31.1 or beyond commit  17838beda2943d08b8a9d4df5b68f5f04f26d901
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-25"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4565/">CVE-2025-4565 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-4565">CVE-2025-4565 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244663">SUSE bug 1244663</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050202" comment="libprotobuf-lite28_3_0-28.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010050223" comment="libprotobuf-lite28_3_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050016" comment="libprotobuf28_3_0-28.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010050224" comment="libprotobuf28_3_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050203" comment="libprotoc28_3_0-28.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010050225" comment="libprotoc28_3_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050017" comment="libutf8_range-28_3_0-28.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010050226" comment="libutf8_range-28_3_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050204" comment="protobuf-devel-28.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677909" comment="protobuf-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050205" comment="protobuf-java-28.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677910" comment="protobuf-java is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050206" comment="protobuf-java-bom-28.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010007673" comment="protobuf-java-bom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050207" comment="protobuf-java-javadoc-28.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010050227" comment="protobuf-java-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050208" comment="protobuf-java-parent-28.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010007674" comment="protobuf-java-parent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050209" comment="python313-protobuf-5.28.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010050228" comment="python313-protobuf is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20254574" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-4574</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-4574" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-4574" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-4574" ref_url="https://www.suse.com/security/cve/CVE-2025-4574" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01591-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023885.html" source="SUSE-SU"/>
    <description>
    In crossbeam-channel rust crate, the internal `Channel` type's `Drop` method has a race condition which could, in some circumstances, lead to a double-free that could result in memory corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-22"/>
	<updated date="2026-01-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-4574/">CVE-2025-4574 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-4574">CVE-2025-4574 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243169">SUSE bug 1243169</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038432" comment="cargo-c-0.10.15-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009948421" comment="cargo-c is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202546394" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-46394</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-46394" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-46394" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-46394" ref_url="https://www.suse.com/security/cve/CVE-2025-46394" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20134-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024802.html" source="SUSE-SU"/>
    <description>
    In tar in BusyBox through 1.37.0, a TAR archive can have filenames hidden from a listing through the use of terminal escape sequences.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-25"/>
	<updated date="2026-03-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" cvss4="5.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:N/SC:N/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2025-46394/">CVE-2025-46394 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-46394">CVE-2025-46394 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1241661">SUSE bug 1241661</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039709" comment="busybox-1.37.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152555" comment="busybox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039710" comment="busybox-static-1.37.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009653584" comment="busybox-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039711" comment="busybox-warewulf3-1.37.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009724864" comment="busybox-warewulf3 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202546404" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-46404</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-46404" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-46404" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-46404" ref_url="https://www.suse.com/security/cve/CVE-2025-46404" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023279.html" source="SUSE-SU"/>
    <description>
    A denial of service vulnerability exists in the lasso_provider_verify_saml_signature functionality of Entr&amp;#39;ouvert Lasso 2.5.1. A specially crafted SAML response can lead to a denial of service. An attacker can send a malformed SAML response to trigger this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-27"/>
	<updated date="2025-12-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-46404/">CVE-2025-46404 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-46404">CVE-2025-46404 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253092">SUSE bug 1253092</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031629" comment="liblasso-devel-2.8.2-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009625538" comment="liblasso-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031630" comment="liblasso3-2.8.2-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009625539" comment="liblasso3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031631" comment="python3-lasso-2.8.2-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009625540" comment="python3-lasso is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202546569" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-46569</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-46569" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-46569" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-46569" ref_url="https://www.suse.com/security/cve/CVE-2025-46569" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02592-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041004.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15059-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/HNV7O7SNYYY4AFS5HKAPLITKK3B57LE7/" source="SUSE-SU"/>
    <description>
    Open Policy Agent (OPA) is an open source, general-purpose policy engine. Prior to version 1.4.0, when run as a server, OPA exposes an HTTP Data API for reading and writing documents. Requesting a virtual document through the Data API entails policy evaluation, where a Rego query containing a single data document reference is constructed from the requested path. This query is then used for policy evaluation. A HTTP request path can be crafted in a way that injects Rego code into the constructed query. The evaluation result cannot be made to return any other data than what is generated by the requested path, but this path can be misdirected, and the injected Rego code can be crafted to make the query succeed or fail; opening up for oracle attacks or, given the right circumstances, erroneous policy decision results. Furthermore, the injected code can be crafted to be computationally expensive, resulting in a Denial Of Service (DoS) attack. This issue has been patched in version 1.4.0. A workaround involves having network access to OPA's RESTful APIs being limited to `localhost` and/or trusted networks, unless necessary for production reasons.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2025-12-19"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L" cvss4="7.6/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-46569/">CVE-2025-46569 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-46569">CVE-2025-46569 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246710">SUSE bug 1246710</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033446" comment="hauler-1.3.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033447" comment="hauler is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032107" comment="trivy-0.66.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698141" comment="trivy is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202546705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-46705</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-46705" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-46705" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-46705" ref_url="https://www.suse.com/security/cve/CVE-2025-46705" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023279.html" source="SUSE-SU"/>
    <description>
    A denial of service vulnerability exists in the g_assert_not_reached functionality of Entr&amp;#39;ouvert Lasso 2.5.1 and 2.8.2. A specially crafted SAML assertion response can lead to a denial of service. An attacker can send a malformed SAML response to trigger this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-27"/>
	<updated date="2025-12-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-46705/">CVE-2025-46705 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-46705">CVE-2025-46705 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253093">SUSE bug 1253093</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031629" comment="liblasso-devel-2.8.2-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009625538" comment="liblasso-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031630" comment="liblasso3-2.8.2-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009625539" comment="liblasso3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031631" comment="python3-lasso-2.8.2-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009625540" comment="python3-lasso is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202546817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-46817</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-46817" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-46817" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-46817" ref_url="https://www.suse.com/security/cve/CVE-2025-46817" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:19237" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002137.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19238" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002142.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19345" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002138.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20926" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003068.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20955" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003104.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21916" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03499-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03500-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03501-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03502-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03505-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03506-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03507-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20022-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023778.html" source="SUSE-SU"/>
    <description>
    Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to cause an integer overflow and potentially lead to remote code execution The problem exists in all versions of Redis with Lua scripting. This issue is fixed in version 8.2.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-04-11"/>
	<severity>Critical</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-46817/">CVE-2025-46817 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-46817">CVE-2025-46817 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250995">SUSE bug 1250995</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035662" comment="redis-8.2.3-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152049" comment="redis is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037150" comment="valkey-8.0.6-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009982165" comment="valkey is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037151" comment="valkey-compat-redis-8.0.6-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009982166" comment="valkey-compat-redis is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037152" comment="valkey-devel-8.0.6-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009982167" comment="valkey-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202546818" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-46818</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-46818" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-46818" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-46818" ref_url="https://www.suse.com/security/cve/CVE-2025-46818" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:19237" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002137.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19238" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002142.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19345" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002138.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20926" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003068.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20955" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003104.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21916" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03499-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03500-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03501-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03502-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03505-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03506-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03507-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20022-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023778.html" source="SUSE-SU"/>
    <description>
    Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to manipulate different LUA objects and potentially run their own code in the context of another user. The problem exists in all versions of Redis with LUA scripting. This issue is fixed in version 8.2.2. A workaround to mitigate the problem without patching the redis-server executable is to prevent users from executing LUA scripts. This can be done using ACL to block a script by restricting both the EVAL and FUNCTION command families.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-04-11"/>
	<severity>Critical</severity>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-46818/">CVE-2025-46818 at SUSE</cve>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-46818">CVE-2025-46818 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250995">SUSE bug 1250995</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035662" comment="redis-8.2.3-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152049" comment="redis is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037150" comment="valkey-8.0.6-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009982165" comment="valkey is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037151" comment="valkey-compat-redis-8.0.6-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009982166" comment="valkey-compat-redis is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037152" comment="valkey-devel-8.0.6-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009982167" comment="valkey-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202546819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-46819</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-46819" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-46819" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-46819" ref_url="https://www.suse.com/security/cve/CVE-2025-46819" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:19237" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002137.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19238" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002142.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19345" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002138.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20926" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003068.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20955" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003104.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21916" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03499-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03500-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03501-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03502-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03505-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03506-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03507-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20022-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023778.html" source="SUSE-SU"/>
    <description>
    Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted LUA script to read out-of-bound data or crash the server and subsequent denial of service. The problem exists in all versions of Redis with Lua scripting. This issue is fixed in version 8.2.2. To workaround this issue without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to block a script by restricting both the EVAL and FUNCTION command families.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-04-11"/>
	<severity>Critical</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="7.2/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-46819/">CVE-2025-46819 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-46819">CVE-2025-46819 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250995">SUSE bug 1250995</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035662" comment="redis-8.2.3-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152049" comment="redis is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037150" comment="valkey-8.0.6-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009982165" comment="valkey is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037151" comment="valkey-compat-redis-8.0.6-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009982166" comment="valkey-compat-redis is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037152" comment="valkey-devel-8.0.6-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009982167" comment="valkey-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202546836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-46836</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-46836" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-46836" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-46836" ref_url="https://www.suse.com/security/cve/CVE-2025-46836" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02974-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03245-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041723.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03260-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20566-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20747-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041894.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20825-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20940-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045212.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20948-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045254.html" source="SUSE-SU"/>
    <description>
    net-tools is a collection of programs that form the base set of the NET-3 networking distribution for the Linux operating system. Inn versions up to and including 2.10, the Linux network utilities (like ifconfig) from the net-tools package do not properly validate the structure of /proc files when showing interfaces. `get_name()` in `interface.c` copies interface labels from `/proc/net/dev` into a fixed 16-byte stack buffer without bounds checking, leading to possible arbitrary code execution or crash. The known attack path does not require privilege but also does not provide privilege escalation in this scenario. A patch is available and expected to be part of version 2.20.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-03"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-46836/">CVE-2025-46836 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-46836">CVE-2025-46836 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243581">SUSE bug 1243581</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052277" comment="net-tools-2.10-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010018364" comment="net-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052589" comment="net-tools-deprecated-2.10-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010018365" comment="net-tools-deprecated is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052278" comment="net-tools-lang-2.10-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010018366" comment="net-tools-lang is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202547151" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-47151</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-47151" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47151" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-47151" ref_url="https://www.suse.com/security/cve/CVE-2025-47151" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:21452" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002255.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21462" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003122.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21628" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002246.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4068-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023267.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4094-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023279.html" source="SUSE-SU"/>
    <description>
    A type confusion vulnerability exists in the lasso_node_impl_init_from_xml functionality of Entr&amp;#39;ouvert Lasso 2.5.1 and 2.8.2. A specially crafted SAML response can lead to an arbitrary code execution. An attacker can send a malformed SAML response to trigger this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-27"/>
	<updated date="2026-04-11"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47151/">CVE-2025-47151 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47151">CVE-2025-47151 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253095">SUSE bug 1253095</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031629" comment="liblasso-devel-2.8.2-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009625538" comment="liblasso-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031630" comment="liblasso3-2.8.2-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009625539" comment="liblasso3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031631" comment="python3-lasso-2.8.2-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009625540" comment="python3-lasso is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202547291" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-47291</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-47291" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47291" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-47291" ref_url="https://www.suse.com/security/cve/CVE-2025-47291" source="SUSE CVE"/>
		<reference ref_id="openSUSE-SU-2025:15159-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NBVOKYMJCE2HZLSF5W3H3Q7KEHMMOQR3/" source="SUSE-SU"/>
    <description>
    containerd is an open-source container runtime. A bug was found in the containerd's CRI implementation where containerd, starting in version 2.0.1 and prior to version 2.0.5, doesn't put usernamespaced containers under the Kubernetes' cgroup hierarchy, therefore some Kubernetes limits are not honored. This may cause a denial of service of the Kubernetes node. This bug has been fixed in containerd 2.0.5+ and 2.1.0+. Users should update to these versions to resolve the issue. As a workaround, disable usernamespaced pods in Kubernetes temporarily.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2025-11-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47291/">CVE-2025-47291 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-47291">CVE-2025-47291 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243632">SUSE bug 1243632</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032107" comment="trivy-0.66.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698141" comment="trivy is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202547910" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-47910</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-47910" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47910" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-47910" ref_url="https://www.suse.com/security/cve/CVE-2025-47910" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03200-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03524-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042065.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03525-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023923.html" source="SUSE-SU"/>
    <description>
    When using http.CrossOriginProtection, the AddInsecureBypassPattern method can unexpectedly bypass more requests than intended. CrossOriginProtection then skips validation, but forwards the original request path, which may be served by a different handler without the intended security protections.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-15"/>
	<updated date="2026-01-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-47910/">CVE-2025-47910 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47910">CVE-2025-47910 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249141">SUSE bug 1249141</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033428" comment="go1.25-1.25.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010014715" comment="go1.25 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033429" comment="go1.25-doc-1.25.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010014716" comment="go1.25-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033430" comment="go1.25-libstd-1.25.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033450" comment="go1.25-libstd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033431" comment="go1.25-race-1.25.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010014717" comment="go1.25-race is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202547911" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-47911</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-47911" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47911" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-47911" ref_url="https://www.suse.com/security/cve/CVE-2025-47911" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4446-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023607.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0403-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023811.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024734.html" source="SUSE-SU"/>
    <description>
    The html.Parse function in golang.org/x/net/html has quadratic parsing complexity when processing certain inputs, which can lead to denial of service (DoS) if an attacker provides specially crafted HTML content.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-03-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47911/">CVE-2025-47911 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-47911">CVE-2025-47911 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251308">SUSE bug 1251308</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037881" comment="alloy-1.12.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010030590" comment="alloy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041418" comment="elemental-register-1.8.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041627" comment="elemental-register is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041419" comment="elemental-support-1.8.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041628" comment="elemental-support is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041420" comment="elemental-toolkit-2.3.2-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041629" comment="elemental-toolkit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032565" comment="git-bug-0.10.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009969399" comment="git-bug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032566" comment="git-bug-bash-completion-0.10.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009969400" comment="git-bug-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032567" comment="git-bug-fish-completion-0.10.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009969401" comment="git-bug-fish-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032568" comment="git-bug-zsh-completion-0.10.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009969402" comment="git-bug-zsh-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047338" comment="gitea-tea-0.12.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009968665" comment="gitea-tea is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047339" comment="gitea-tea-bash-completion-0.12.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009968666" comment="gitea-tea-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047340" comment="gitea-tea-zsh-completion-0.12.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009968667" comment="gitea-tea-zsh-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037905" comment="go-sendxmpp-0.15.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010015344" comment="go-sendxmpp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035663" comment="golang-github-teddysun-v2ray-plugin-5.25.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010018580" comment="golang-github-teddysun-v2ray-plugin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035664" comment="golang-github-v2fly-v2ray-core-5.40.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010015623" comment="golang-github-v2fly-v2ray-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033446" comment="hauler-1.3.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033447" comment="hauler is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047570" comment="helm-3.19.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009718853" comment="helm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047571" comment="helm-bash-completion-3.19.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009718854" comment="helm-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047572" comment="helm-fish-completion-3.19.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009718855" comment="helm-fish-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047573" comment="helm-zsh-completion-3.19.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009718856" comment="helm-zsh-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010043899" comment="kepler-0.11.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010043907" comment="kepler is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039738" comment="sbctl-0.18-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039767" comment="sbctl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035665" comment="shadowsocks-v2ray-plugin-5.25.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010018581" comment="shadowsocks-v2ray-plugin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037211" comment="trivy-0.68.2-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698141" comment="trivy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035666" comment="v2ray-core-5.40.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010015624" comment="v2ray-core is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202547912" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-47912</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-47912" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47912" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-47912" ref_url="https://www.suse.com/security/cve/CVE-2025-47912" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03547-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024646.html" source="SUSE-SU"/>
    <description>
    The Parse function permits values other than IPv6 addresses to be included in square brackets within the host component of a URL. RFC 3986 permits IPv6 addresses to be included within the host component, enclosed within square brackets. For example: "http://[::1]/". IPv4 addresses and hostnames must not appear within square brackets. Parse did not enforce this requirement.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-15"/>
	<updated date="2026-03-07"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47912/">CVE-2025-47912 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47912">CVE-2025-47912 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251257">SUSE bug 1251257</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033432" comment="go1.24-1.24.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961683" comment="go1.24 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033433" comment="go1.24-doc-1.24.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961684" comment="go1.24-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033434" comment="go1.24-libstd-1.24.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033451" comment="go1.24-libstd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047321" comment="go1.24-openssl-1.24.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017809" comment="go1.24-openssl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047322" comment="go1.24-openssl-doc-1.24.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017810" comment="go1.24-openssl-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047323" comment="go1.24-openssl-race-1.24.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017811" comment="go1.24-openssl-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033435" comment="go1.24-race-1.24.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961685" comment="go1.24-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033428" comment="go1.25-1.25.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010014715" comment="go1.25 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033429" comment="go1.25-doc-1.25.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010014716" comment="go1.25-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033430" comment="go1.25-libstd-1.25.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033450" comment="go1.25-libstd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047311" comment="go1.25-openssl-1.25.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017812" comment="go1.25-openssl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047312" comment="go1.25-openssl-doc-1.25.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017813" comment="go1.25-openssl-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047313" comment="go1.25-openssl-race-1.25.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017814" comment="go1.25-openssl-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033431" comment="go1.25-race-1.25.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010014717" comment="go1.25-race is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202547913" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-47913</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-47913" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47913" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-47913" ref_url="https://www.suse.com/security/cve/CVE-2025-47913" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0437" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003134.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0470" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003176.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0753" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002398.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1084" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4185-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023317.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4191-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4274-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023811.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20123-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20949-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20976-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045355.html" source="SUSE-SU"/>
    <description>
    SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-06"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47913/">CVE-2025-47913 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47913">CVE-2025-47913 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253506">SUSE bug 1253506</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032562" comment="act-0.2.64-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032318" comment="act is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037881" comment="alloy-1.12.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010030590" comment="alloy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048653" comment="amazon-ssm-agent-3.3.2299.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009682775" comment="amazon-ssm-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039655" comment="buildah-1.39.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266828" comment="buildah is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035139" comment="cheat-4.4.2-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961128" comment="cheat is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052590" comment="docker-compose-2.33.1-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010052706" comment="docker-compose is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041418" comment="elemental-register-1.8.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041627" comment="elemental-register is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041419" comment="elemental-support-1.8.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041628" comment="elemental-support is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041420" comment="elemental-toolkit-2.3.2-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041629" comment="elemental-toolkit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032565" comment="git-bug-0.10.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009969399" comment="git-bug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032566" comment="git-bug-bash-completion-0.10.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009969400" comment="git-bug-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032567" comment="git-bug-fish-completion-0.10.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009969401" comment="git-bug-fish-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032568" comment="git-bug-zsh-completion-0.10.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009969402" comment="git-bug-zsh-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047314" comment="podman-5.4.2-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266791" comment="podman is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047315" comment="podman-docker-5.4.2-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009707063" comment="podman-docker is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047316" comment="podman-remote-5.4.2-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009707064" comment="podman-remote is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047317" comment="podmansh-5.4.2-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009853422" comment="podmansh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037211" comment="trivy-0.68.2-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698141" comment="trivy is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202547914" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-47914</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-47914" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-47914" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-47914" ref_url="https://www.suse.com/security/cve/CVE-2025-47914" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023710.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20123-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20949-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20976-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045355.html" source="SUSE-SU"/>
    <description>
    SSH Agent servers do not validate the size of messages when processing new identity requests, which may cause the program to panic if the message is malformed due to an out of bounds read.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-06"/>
	<updated date="2026-04-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-47914/">CVE-2025-47914 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-47914">CVE-2025-47914 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253967">SUSE bug 1253967</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039655" comment="buildah-1.39.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266828" comment="buildah is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035139" comment="cheat-4.4.2-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961128" comment="cheat is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052590" comment="docker-compose-2.33.1-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010052706" comment="docker-compose is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041418" comment="elemental-register-1.8.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041627" comment="elemental-register is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041419" comment="elemental-support-1.8.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041628" comment="elemental-support is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041420" comment="elemental-toolkit-2.3.2-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041629" comment="elemental-toolkit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032565" comment="git-bug-0.10.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009969399" comment="git-bug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032566" comment="git-bug-bash-completion-0.10.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009969400" comment="git-bug-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032567" comment="git-bug-fish-completion-0.10.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009969401" comment="git-bug-fish-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032568" comment="git-bug-zsh-completion-0.10.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009969402" comment="git-bug-zsh-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047314" comment="podman-5.4.2-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266791" comment="podman is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047315" comment="podman-docker-5.4.2-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009707063" comment="podman-docker is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047316" comment="podman-remote-5.4.2-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009707064" comment="podman-remote is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047317" comment="podmansh-5.4.2-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009853422" comment="podmansh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037211" comment="trivy-0.68.2-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698141" comment="trivy is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202548038" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-48038</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-48038" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48038" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-48038" ref_url="https://www.suse.com/security/cve/CVE-2025-48038" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0023-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023812.html" source="SUSE-SU"/>
    <description>
    Allocation of Resources Without Limits or Throttling vulnerability in Erlang OTP ssh (ssh_sftp modules) allows Excessive Allocation, Resource Leak Exposure. This vulnerability is associated with program files lib/ssh/src/ssh_sftpd.erl.

This issue affects OTP form OTP 17.0 until OTP 28.0.3, OTP 27.3.4.3 and 26.2.5.15 corresponding to ssh from 3.0.1 until 5.3.3, 5.2.11.3 and 5.1.4.12.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-18"/>
	<updated date="2026-02-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-48038/">CVE-2025-48038 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48038">CVE-2025-48038 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249470">SUSE bug 1249470</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037861" comment="erlang-27.1.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168070" comment="erlang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037862" comment="erlang-debugger-27.1.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168072" comment="erlang-debugger is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037863" comment="erlang-debugger-src-27.1.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168074" comment="erlang-debugger-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037864" comment="erlang-dialyzer-27.1.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168076" comment="erlang-dialyzer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037865" comment="erlang-dialyzer-src-27.1.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168078" comment="erlang-dialyzer-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037866" comment="erlang-diameter-27.1.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168080" comment="erlang-diameter is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037867" comment="erlang-diameter-src-27.1.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168082" comment="erlang-diameter-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037868" comment="erlang-doc-27.1.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168084" comment="erlang-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037869" comment="erlang-epmd-27.1.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168086" comment="erlang-epmd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037870" comment="erlang-et-27.1.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168088" comment="erlang-et is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037871" comment="erlang-et-src-27.1.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168090" comment="erlang-et-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037872" comment="erlang-jinterface-27.1.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168096" comment="erlang-jinterface is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037873" comment="erlang-jinterface-src-27.1.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168098" comment="erlang-jinterface-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037874" comment="erlang-observer-27.1.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168100" comment="erlang-observer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037875" comment="erlang-observer-src-27.1.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168102" comment="erlang-observer-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037876" comment="erlang-reltool-27.1.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168104" comment="erlang-reltool is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037877" comment="erlang-reltool-src-27.1.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168106" comment="erlang-reltool-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037878" comment="erlang-src-27.1.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168108" comment="erlang-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037879" comment="erlang-wx-27.1.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168110" comment="erlang-wx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037880" comment="erlang-wx-src-27.1.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168112" comment="erlang-wx-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202548039" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-48039</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-48039" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48039" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-48039" ref_url="https://www.suse.com/security/cve/CVE-2025-48039" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0023-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023812.html" source="SUSE-SU"/>
    <description>
    Allocation of Resources Without Limits or Throttling vulnerability in Erlang OTP ssh (ssh_sftp modules) allows Excessive Allocation, Resource Leak Exposure. This vulnerability is associated with program files lib/ssh/src/ssh_sftpd.erl.

This issue affects OTP form OTP 17.0 until OTP 28.0.3, OTP 27.3.4.3 and 26.2.5.15 corresponding to ssh from 3.0.1 until 5.3.3, 5.2.11.3 and 5.1.4.12.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-18"/>
	<updated date="2026-02-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-48039/">CVE-2025-48039 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48039">CVE-2025-48039 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249469">SUSE bug 1249469</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037861" comment="erlang-27.1.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168070" comment="erlang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037862" comment="erlang-debugger-27.1.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168072" comment="erlang-debugger is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037863" comment="erlang-debugger-src-27.1.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168074" comment="erlang-debugger-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037864" comment="erlang-dialyzer-27.1.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168076" comment="erlang-dialyzer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037865" comment="erlang-dialyzer-src-27.1.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168078" comment="erlang-dialyzer-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037866" comment="erlang-diameter-27.1.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168080" comment="erlang-diameter is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037867" comment="erlang-diameter-src-27.1.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168082" comment="erlang-diameter-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037868" comment="erlang-doc-27.1.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168084" comment="erlang-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037869" comment="erlang-epmd-27.1.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168086" comment="erlang-epmd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037870" comment="erlang-et-27.1.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168088" comment="erlang-et is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037871" comment="erlang-et-src-27.1.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168090" comment="erlang-et-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037872" comment="erlang-jinterface-27.1.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168096" comment="erlang-jinterface is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037873" comment="erlang-jinterface-src-27.1.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168098" comment="erlang-jinterface-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037874" comment="erlang-observer-27.1.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168100" comment="erlang-observer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037875" comment="erlang-observer-src-27.1.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168102" comment="erlang-observer-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037876" comment="erlang-reltool-27.1.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168104" comment="erlang-reltool is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037877" comment="erlang-reltool-src-27.1.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168106" comment="erlang-reltool-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037878" comment="erlang-src-27.1.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168108" comment="erlang-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037879" comment="erlang-wx-27.1.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168110" comment="erlang-wx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037880" comment="erlang-wx-src-27.1.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168112" comment="erlang-wx-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202548040" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-48040</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-48040" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-48040" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-48040" ref_url="https://www.suse.com/security/cve/CVE-2025-48040" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0023-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023812.html" source="SUSE-SU"/>
    <description>
    Uncontrolled Resource Consumption vulnerability in Erlang OTP ssh (ssh_sftp modules) allows Excessive Allocation, Flooding. This vulnerability is associated with program files lib/ssh/src/ssh_sftpd.erl.

This issue affects OTP form OTP 17.0 until OTP 28.0.3, OTP 27.3.4.3 and 26.2.5.15 corresponding to ssh from 3.0.1 until 5.3.3, 5.2.11.3 and 5.1.4.12.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-18"/>
	<updated date="2026-02-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-48040/">CVE-2025-48040 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-48040">CVE-2025-48040 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249472">SUSE bug 1249472</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037861" comment="erlang-27.1.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168070" comment="erlang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037862" comment="erlang-debugger-27.1.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168072" comment="erlang-debugger is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037863" comment="erlang-debugger-src-27.1.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168074" comment="erlang-debugger-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037864" comment="erlang-dialyzer-27.1.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168076" comment="erlang-dialyzer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037865" comment="erlang-dialyzer-src-27.1.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168078" comment="erlang-dialyzer-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037866" comment="erlang-diameter-27.1.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168080" comment="erlang-diameter is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037867" comment="erlang-diameter-src-27.1.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168082" comment="erlang-diameter-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037868" comment="erlang-doc-27.1.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168084" comment="erlang-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037869" comment="erlang-epmd-27.1.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168086" comment="erlang-epmd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037870" comment="erlang-et-27.1.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168088" comment="erlang-et is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037871" comment="erlang-et-src-27.1.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168090" comment="erlang-et-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037872" comment="erlang-jinterface-27.1.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168096" comment="erlang-jinterface is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037873" comment="erlang-jinterface-src-27.1.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168098" comment="erlang-jinterface-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037874" comment="erlang-observer-27.1.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168100" comment="erlang-observer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037875" comment="erlang-observer-src-27.1.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168102" comment="erlang-observer-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037876" comment="erlang-reltool-27.1.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168104" comment="erlang-reltool is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037877" comment="erlang-reltool-src-27.1.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168106" comment="erlang-reltool-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037878" comment="erlang-src-27.1.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168108" comment="erlang-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037879" comment="erlang-wx-27.1.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168110" comment="erlang-wx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037880" comment="erlang-wx-src-27.1.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168112" comment="erlang-wx-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202549844" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-49844</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-49844" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-49844" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-49844" ref_url="https://www.suse.com/security/cve/CVE-2025-49844" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:19237" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002137.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19238" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002142.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19345" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002138.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20926" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003068.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20955" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003104.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21916" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03499-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042038.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03500-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03501-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03502-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03505-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03506-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042042.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03507-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20022-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023778.html" source="SUSE-SU"/>
    <description>
    Redis is an open source, in-memory database that persists on disk. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to manipulate the garbage collector, trigger a use-after-free and potentially lead to remote code execution. The problem exists in all versions of Redis with Lua scripting. This issue is fixed in version 8.2.2. To workaround this issue without patching the redis-server executable is to prevent users from executing Lua scripts. This can be done using ACL to restrict EVAL and EVALSHA commands.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-04-11"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.9/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" cvss4="9.4/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-49844/">CVE-2025-49844 at SUSE</cve>
	<cve impact="critical" cvss3="9.9/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-49844">CVE-2025-49844 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250995">SUSE bug 1250995</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035662" comment="redis-8.2.3-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152049" comment="redis is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037150" comment="valkey-8.0.6-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009982165" comment="valkey is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037151" comment="valkey-compat-redis-8.0.6-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009982166" comment="valkey-compat-redis is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037152" comment="valkey-devel-8.0.6-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009982167" comment="valkey-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202550949" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-50949</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-50949" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-50949" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-50949" ref_url="https://www.suse.com/security/cve/CVE-2025-50949" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023519.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023726.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024340.html" source="SUSE-SU"/>
    <description>
    FontForge v20230101 was discovered to contain a memory leak via the component DlgCreate8.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-24"/>
	<updated date="2026-02-19"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-50949/">CVE-2025-50949 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-50949">CVE-2025-50949 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252652">SUSE bug 1252652</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044190" comment="fontforge-20251009-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276598" comment="fontforge is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044191" comment="fontforge-devel-20251009-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276599" comment="fontforge-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044192" comment="fontforge-doc-20251009-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276600" comment="fontforge-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202551006" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-51006</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-51006" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-51006" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-51006" ref_url="https://www.suse.com/security/cve/CVE-2025-51006" source="SUSE CVE"/>
    <description>
    Within tcpreplay's tcprewrite, a double free vulnerability has been identified in the dlt_linuxsll2_cleanup() function in plugins/dlt_linuxsll2/linuxsll2.c. This vulnerability is triggered when tcpedit_dlt_cleanup() indirectly invokes the cleanup routine multiple times on the same memory region. By supplying a specifically crafted pcap file to the tcprewrite binary, a local attacker can exploit this flaw to cause a Denial of Service (DoS) via memory corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2025-11-29"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-51006/">CVE-2025-51006 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-51006">CVE-2025-51006 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250356">SUSE bug 1250356</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032111" comment="tcpreplay-4.5.2-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154264" comment="tcpreplay is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20255244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-5244</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-5244" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5244" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-5244" ref_url="https://www.suse.com/security/cve/CVE-2025-5244" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023286.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in GNU Binutils up to 2.44. It has been rated as critical. Affected by this issue is the function elf_gc_sweep of the file bfd/elflink.c of the component ld. The manipulation leads to memory corruption. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. Upgrading to version 2.45 is able to address this issue. It is recommended to upgrade the affected component.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-13"/>
	<updated date="2025-12-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2025-5244/">CVE-2025-5244 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-5244">CVE-2025-5244 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243756">SUSE bug 1243756</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033339" comment="binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033340" comment="binutils-devel-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033444" comment="bpftool-7.5.0-160000.2.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009955992" comment="bpftool is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033445" comment="bpftool-bash-completion-7.5.0-160000.2.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033375" comment="bpftool-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033343" comment="cross-aarch64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167594" comment="cross-aarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033344" comment="cross-arm-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167596" comment="cross-arm-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033345" comment="cross-avr-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167598" comment="cross-avr-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033346" comment="cross-bpf-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010029579" comment="cross-bpf-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033347" comment="cross-epiphany-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238034" comment="cross-epiphany-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033348" comment="cross-hppa-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167600" comment="cross-hppa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033349" comment="cross-hppa64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167602" comment="cross-hppa64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033350" comment="cross-i386-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167604" comment="cross-i386-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033351" comment="cross-ia64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167606" comment="cross-ia64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033352" comment="cross-loongarch64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033376" comment="cross-loongarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033353" comment="cross-m68k-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167608" comment="cross-m68k-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033354" comment="cross-mips-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167610" comment="cross-mips-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033355" comment="cross-ppc-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167612" comment="cross-ppc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033356" comment="cross-ppc64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167614" comment="cross-ppc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033357" comment="cross-ppc64le-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167616" comment="cross-ppc64le-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033358" comment="cross-pru-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010029580" comment="cross-pru-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033359" comment="cross-riscv64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238035" comment="cross-riscv64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033360" comment="cross-rx-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238036" comment="cross-rx-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033361" comment="cross-s390-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167618" comment="cross-s390-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033362" comment="cross-s390x-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167620" comment="cross-s390x-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033363" comment="cross-sparc-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167622" comment="cross-sparc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033364" comment="cross-sparc64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167624" comment="cross-sparc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033365" comment="cross-spu-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167626" comment="cross-spu-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033366" comment="cross-x86_64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167628" comment="cross-x86_64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033367" comment="cross-xtensa-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297932" comment="cross-xtensa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033368" comment="gprofng-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033377" comment="gprofng is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033369" comment="libctf-nobfd0-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297779" comment="libctf-nobfd0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033370" comment="libctf0-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297780" comment="libctf0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20255245" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-5245</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-5245" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5245" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-5245" ref_url="https://www.suse.com/security/cve/CVE-2025-5245" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023286.html" source="SUSE-SU"/>
    <description>
    A vulnerability classified as critical has been found in GNU Binutils up to 2.44. This affects the function debug_type_samep of the file /binutils/debug.c of the component objdump. The manipulation leads to memory corruption. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-13"/>
	<updated date="2025-12-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="5.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-5245/">CVE-2025-5245 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-5245">CVE-2025-5245 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243760">SUSE bug 1243760</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033339" comment="binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033340" comment="binutils-devel-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033444" comment="bpftool-7.5.0-160000.2.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009955992" comment="bpftool is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033445" comment="bpftool-bash-completion-7.5.0-160000.2.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033375" comment="bpftool-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033343" comment="cross-aarch64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167594" comment="cross-aarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033344" comment="cross-arm-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167596" comment="cross-arm-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033345" comment="cross-avr-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167598" comment="cross-avr-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033346" comment="cross-bpf-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010029579" comment="cross-bpf-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033347" comment="cross-epiphany-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238034" comment="cross-epiphany-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033348" comment="cross-hppa-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167600" comment="cross-hppa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033349" comment="cross-hppa64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167602" comment="cross-hppa64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033350" comment="cross-i386-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167604" comment="cross-i386-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033351" comment="cross-ia64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167606" comment="cross-ia64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033352" comment="cross-loongarch64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033376" comment="cross-loongarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033353" comment="cross-m68k-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167608" comment="cross-m68k-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033354" comment="cross-mips-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167610" comment="cross-mips-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033355" comment="cross-ppc-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167612" comment="cross-ppc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033356" comment="cross-ppc64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167614" comment="cross-ppc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033357" comment="cross-ppc64le-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167616" comment="cross-ppc64le-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033358" comment="cross-pru-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010029580" comment="cross-pru-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033359" comment="cross-riscv64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238035" comment="cross-riscv64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033360" comment="cross-rx-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238036" comment="cross-rx-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033361" comment="cross-s390-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167618" comment="cross-s390-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033362" comment="cross-s390x-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167620" comment="cross-s390x-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033363" comment="cross-sparc-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167622" comment="cross-sparc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033364" comment="cross-sparc64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167624" comment="cross-sparc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033365" comment="cross-spu-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167626" comment="cross-spu-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033366" comment="cross-x86_64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167628" comment="cross-x86_64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033367" comment="cross-xtensa-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297932" comment="cross-xtensa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033368" comment="gprofng-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033377" comment="gprofng is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033369" comment="libctf-nobfd0-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297779" comment="libctf-nobfd0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033370" comment="libctf0-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297780" comment="libctf0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202552565" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-52565</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-52565" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-52565" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-52565" ref_url="https://www.suse.com/security/cve/CVE-2025-52565" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:19927" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002207.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20957" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003086.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21232" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002236.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023397.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21136-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4073-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20123-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024659.html" source="SUSE-SU"/>
    <description>
    runc is a CLI tool for spawning and running containers according to the OCI specification. Versions 1.0.0-rc3 through 1.2.7, 1.3.0-rc.1 through 1.3.2, and 1.4.0-rc.1 through 1.4.0-rc.2, due to insufficient checks when bind-mounting `/dev/pts/$n` to `/dev/console` inside the container, an attacker can trick runc into bind-mounting paths which would normally be made read-only or be masked onto a path that the attacker can write to. This attack is very similar in concept and application to CVE-2025-31133, except that it attacks a similar vulnerability in a different target (namely, the bind-mount of `/dev/pts/$n` to `/dev/console` as configured for all containers that allocate a console). This happens after `pivot_root(2)`, so this cannot be used to write to host files directly -- however, as with CVE-2025-31133, this can load to denial of service of the host or a container breakout by providing the attacker with a writable copy of `/proc/sysrq-trigger` or `/proc/sys/kernel/core_pattern` (respectively). This issue is fixed in versions 1.2.8, 1.3.3 and 1.4.0-rc.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-22"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-52565/">CVE-2025-52565 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-52565">CVE-2025-52565 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252232">SUSE bug 1252232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255063">SUSE bug 1255063</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041462" comment="alloy-1.12.2-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010030590" comment="alloy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039655" comment="buildah-1.39.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266828" comment="buildah is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047314" comment="podman-5.4.2-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266791" comment="podman is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047315" comment="podman-docker-5.4.2-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009707063" comment="podman-docker is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047316" comment="podman-remote-5.4.2-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009707064" comment="podman-remote is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047317" comment="podmansh-5.4.2-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009853422" comment="podmansh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030577" comment="runc-1.3.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153867" comment="runc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20255263" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-5263</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-5263" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5263" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-5263" ref_url="https://www.suse.com/security/cve/CVE-2025-5263" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:8293" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001552.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:8308" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001526.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:8607" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001635.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:8756" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01769-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01814-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01946-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023500.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15174-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TEMWQQR3WLN7ACI6LZQ7KQO5GLIQ3HLM/" source="SUSE-SU"/>
    <description>
    Error handling for script execution was incorrectly isolated from web content, which could have allowed cross-origin leak attacks. This vulnerability was fixed in Firefox 139, Firefox ESR 115.24, Firefox ESR 128.11, Thunderbird 139, and Thunderbird 128.11.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-05"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-5263/">CVE-2025-5263 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5263">CVE-2025-5263 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243353">SUSE bug 1243353</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032507" comment="libmozjs-128-0-128.14.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032510" comment="libmozjs-128-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032508" comment="mozjs128-128.14.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032511" comment="mozjs128 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032509" comment="mozjs128-devel-128.14.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032512" comment="mozjs128-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20255264" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-5264</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-5264" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5264" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-5264" ref_url="https://www.suse.com/security/cve/CVE-2025-5264" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:8293" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001552.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:8308" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001526.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:8607" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001635.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:8756" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01769-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01814-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01946-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023500.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15174-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TEMWQQR3WLN7ACI6LZQ7KQO5GLIQ3HLM/" source="SUSE-SU"/>
    <description>
    Due to insufficient escaping of the newline character in the “Copy as cURL” feature, an attacker could trick a user into using this command, potentially leading to local code execution on the user's system. This vulnerability was fixed in Firefox 139, Firefox ESR 115.24, Firefox ESR 128.11, Thunderbird 139, and Thunderbird 128.11.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-05"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-5264/">CVE-2025-5264 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5264">CVE-2025-5264 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243353">SUSE bug 1243353</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032507" comment="libmozjs-128-0-128.14.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032510" comment="libmozjs-128-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032508" comment="mozjs128-128.14.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032511" comment="mozjs128 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032509" comment="mozjs128-devel-128.14.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032512" comment="mozjs128-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20255265" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-5265</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-5265" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5265" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-5265" ref_url="https://www.suse.com/security/cve/CVE-2025-5265" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:01769-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01814-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01946-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023500.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15174-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TEMWQQR3WLN7ACI6LZQ7KQO5GLIQ3HLM/" source="SUSE-SU"/>
    <description>
    Due to insufficient escaping of the ampersand character in the “Copy as cURL” feature, an attacker could trick a user into using this command, potentially leading to local code execution on the user's system.
*This bug only affects Firefox for Windows. Other versions of Firefox are unaffected.*. This vulnerability was fixed in Firefox 139, Firefox ESR 115.24, Firefox ESR 128.11, Thunderbird 139, and Thunderbird 128.11.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-05"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-5265/">CVE-2025-5265 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5265">CVE-2025-5265 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243353">SUSE bug 1243353</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032507" comment="libmozjs-128-0-128.14.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032510" comment="libmozjs-128-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032508" comment="mozjs128-128.14.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032511" comment="mozjs128 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032509" comment="mozjs128-devel-128.14.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032512" comment="mozjs128-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20255266" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-5266</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-5266" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5266" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-5266" ref_url="https://www.suse.com/security/cve/CVE-2025-5266" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:8293" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001552.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:8308" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001526.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:8607" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001635.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:8756" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01769-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01814-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01946-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023500.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15174-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TEMWQQR3WLN7ACI6LZQ7KQO5GLIQ3HLM/" source="SUSE-SU"/>
    <description>
    Script elements loading cross-origin resources generated load and error events which leaked information enabling XS-Leaks attacks. This vulnerability was fixed in Firefox 139, Firefox ESR 128.11, Thunderbird 139, and Thunderbird 128.11.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-05"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-5266/">CVE-2025-5266 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5266">CVE-2025-5266 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243353">SUSE bug 1243353</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032507" comment="libmozjs-128-0-128.14.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032510" comment="libmozjs-128-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032508" comment="mozjs128-128.14.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032511" comment="mozjs128 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032509" comment="mozjs128-devel-128.14.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032512" comment="mozjs128-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20255267" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-5267</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-5267" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5267" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-5267" ref_url="https://www.suse.com/security/cve/CVE-2025-5267" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:8293" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001552.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:8308" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001526.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:8607" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001635.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:8756" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01769-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01814-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01946-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023500.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15174-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TEMWQQR3WLN7ACI6LZQ7KQO5GLIQ3HLM/" source="SUSE-SU"/>
    <description>
    A clickjacking vulnerability could have been used to trick a user into leaking saved payment card details to a malicious page. This vulnerability was fixed in Firefox 139, Firefox ESR 128.11, Thunderbird 139, and Thunderbird 128.11.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-05"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-5267/">CVE-2025-5267 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5267">CVE-2025-5267 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243353">SUSE bug 1243353</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032507" comment="libmozjs-128-0-128.14.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032510" comment="libmozjs-128-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032508" comment="mozjs128-128.14.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032511" comment="mozjs128 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032509" comment="mozjs128-devel-128.14.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032512" comment="mozjs128-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20255268" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-5268</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-5268" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5268" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-5268" ref_url="https://www.suse.com/security/cve/CVE-2025-5268" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:8293" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001552.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:8308" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001526.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:8607" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001635.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:8756" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01769-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01814-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01946-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023500.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15174-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TEMWQQR3WLN7ACI6LZQ7KQO5GLIQ3HLM/" source="SUSE-SU"/>
    <description>
    Memory safety bugs present in Firefox 138, Thunderbird 138, Firefox ESR 128.10, and Thunderbird 128.10. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability was fixed in Firefox 139, Firefox ESR 128.11, Thunderbird 139, and Thunderbird 128.11.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-05"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-5268/">CVE-2025-5268 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5268">CVE-2025-5268 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243353">SUSE bug 1243353</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032507" comment="libmozjs-128-0-128.14.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032510" comment="libmozjs-128-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032508" comment="mozjs128-128.14.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032511" comment="mozjs128 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032509" comment="mozjs128-devel-128.14.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032512" comment="mozjs128-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20255269" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-5269</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-5269" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5269" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-5269" ref_url="https://www.suse.com/security/cve/CVE-2025-5269" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:8293" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001552.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:8308" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001526.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:8607" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001635.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:8756" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01769-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-May/039459.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01814-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040137.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:01946-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023500.html" source="SUSE-SU"/>
		<reference ref_id="openSUSE-SU-2025:15174-1" ref_url="https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TEMWQQR3WLN7ACI6LZQ7KQO5GLIQ3HLM/" source="SUSE-SU"/>
    <description>
    Memory safety bug present in Firefox ESR 128.10, and Thunderbird 128.10. This bug showed evidence of memory corruption and we presume that with enough effort this could have been exploited to run arbitrary code. This vulnerability was fixed in Firefox ESR 128.11 and Thunderbird 128.11.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-05"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2025-5269/">CVE-2025-5269 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5269">CVE-2025-5269 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243353">SUSE bug 1243353</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032507" comment="libmozjs-128-0-128.14.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032510" comment="libmozjs-128-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032508" comment="mozjs128-128.14.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032511" comment="mozjs128 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032509" comment="mozjs128-devel-128.14.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032512" comment="mozjs128-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20255283" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-5283</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-5283" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5283" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-5283" ref_url="https://www.suse.com/security/cve/CVE-2025-5283" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:9118" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001676.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9119" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-June/001669.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:9331" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023500.html" source="SUSE-SU"/>
    <description>
    Use after free in libvpx in Google Chrome prior to 137.0.7151.55 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-05"/>
	<updated date="2025-12-11"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-5283/">CVE-2025-5283 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-5283">CVE-2025-5283 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243741">SUSE bug 1243741</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032507" comment="libmozjs-128-0-128.14.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032510" comment="libmozjs-128-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032508" comment="mozjs128-128.14.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032511" comment="mozjs128 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032509" comment="mozjs128-devel-128.14.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032512" comment="mozjs128-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202552881" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-52881</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-52881" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-52881" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-52881" ref_url="https://www.suse.com/security/cve/CVE-2025-52881" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:19927" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002207.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20957" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003086.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21232" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002236.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21702" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003127.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22011" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003110.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22030" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002275.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23543" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21036-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023397.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023420.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023432.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21136-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023516.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3950-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023152.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4073-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023325.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023263.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023261.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4079-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023271.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20123-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043749.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024659.html" source="SUSE-SU"/>
    <description>
    runc is a CLI tool for spawning and running containers according to the OCI specification. In versions 1.2.7, 1.3.2 and 1.4.0-rc.2, an attacker can trick runc into misdirecting writes to /proc to other procfs files through the use of a racing container with shared mounts (we have also verified this attack is possible to exploit using a standard Dockerfile with docker buildx build as that also permits triggering parallel execution of containers with custom shared mounts configured). This redirect could be through symbolic links in a tmpfs or theoretically other methods such as regular bind-mounts. While similar, the mitigation applied for the related CVE, CVE-2019-19921, was fairly limited and effectively only caused runc to verify that when LSM labels are written they are actually procfs files. This issue is fixed in versions 1.2.8, 1.3.3, and 1.4.0-rc.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-22"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-52881/">CVE-2025-52881 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-52881">CVE-2025-52881 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252232">SUSE bug 1252232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255063">SUSE bug 1255063</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041462" comment="alloy-1.12.2-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010030590" comment="alloy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039655" comment="buildah-1.39.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266828" comment="buildah is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047314" comment="podman-5.4.2-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266791" comment="podman is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047315" comment="podman-docker-5.4.2-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009707063" comment="podman-docker is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047316" comment="podman-remote-5.4.2-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009707064" comment="podman-remote is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047317" comment="podmansh-5.4.2-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009853422" comment="podmansh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030577" comment="runc-1.3.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153867" comment="runc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202552885" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-52885</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-52885" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-52885" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-52885" ref_url="https://www.suse.com/security/cve/CVE-2025-52885" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21132-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023518.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3779-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023136.html" source="SUSE-SU"/>
    <description>
    Poppler ia a library for rendering PDF files, and examining or modifying their structure. A use-after-free (write) vulnerability has been detected in versions Poppler prior to 25.10.0 within the StructTreeRoot class. The issue arises from the use of raw pointers to elements of a `std::vector`, which can lead to dangling pointers when the vector is resized. The vulnerability stems from the way that refToParentMap stores references to `std::vector` elements using raw pointers. These pointers may become invalid when the vector is resized. This vulnerability is a common security problem involving the use of raw pointers to `std::vectors`. Internally, `std::vector `stores its elements in a dynamically allocated array. When the array reaches its capacity and a new element is added, the vector reallocates a larger block of memory and moves all the existing elements to the new location. At this point if any pointers to elements are stored before a resize occurs, they become dangling pointers once the reallocation happens. Version 25.10.0 contains a patch for the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-22"/>
	<updated date="2025-12-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="7/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-52885/">CVE-2025-52885 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-52885">CVE-2025-52885 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251940">SUSE bug 1251940</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030566" comment="libpoppler-cpp2-25.04.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010030591" comment="libpoppler-cpp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030567" comment="libpoppler-devel-25.04.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151223" comment="libpoppler-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030568" comment="libpoppler-glib-devel-25.04.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153236" comment="libpoppler-glib-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030569" comment="libpoppler-glib8-25.04.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151224" comment="libpoppler-glib8 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030570" comment="libpoppler-qt5-1-25.04.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153238" comment="libpoppler-qt5-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030571" comment="libpoppler-qt5-devel-25.04.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153239" comment="libpoppler-qt5-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030572" comment="libpoppler-qt6-3-25.04.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009742105" comment="libpoppler-qt6-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030573" comment="libpoppler-qt6-devel-25.04.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009742106" comment="libpoppler-qt6-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030574" comment="libpoppler148-25.04.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010030592" comment="libpoppler148 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030575" comment="poppler-tools-25.04.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151227" comment="poppler-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030576" comment="typelib-1_0-Poppler-0_18-25.04.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153243" comment="typelib-1_0-Poppler-0_18 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202553057" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-53057</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-53057" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53057" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-53057" ref_url="https://www.suse.com/security/cve/CVE-2025-53057" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:18814" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002133.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18815" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002124.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18818" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002212.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18821" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002126.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18824" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3965-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4005-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023427.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-02"/>
	<updated date="2025-12-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-53057/">CVE-2025-53057 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53057">CVE-2025-53057 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252414">SUSE bug 1252414</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032334" comment="java-17-openjdk-17.0.17.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009704325" comment="java-17-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032335" comment="java-17-openjdk-demo-17.0.17.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009704327" comment="java-17-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032336" comment="java-17-openjdk-devel-17.0.17.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009704328" comment="java-17-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032337" comment="java-17-openjdk-headless-17.0.17.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009704329" comment="java-17-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032338" comment="java-17-openjdk-javadoc-17.0.17.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009704330" comment="java-17-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032339" comment="java-17-openjdk-jmods-17.0.17.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009704331" comment="java-17-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032340" comment="java-17-openjdk-src-17.0.17.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009704332" comment="java-17-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032327" comment="java-21-openjdk-21.0.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009875276" comment="java-21-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032328" comment="java-21-openjdk-demo-21.0.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009875277" comment="java-21-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032329" comment="java-21-openjdk-devel-21.0.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009875278" comment="java-21-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032330" comment="java-21-openjdk-headless-21.0.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009875279" comment="java-21-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032331" comment="java-21-openjdk-javadoc-21.0.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009875280" comment="java-21-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032332" comment="java-21-openjdk-jmods-21.0.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009875281" comment="java-21-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032333" comment="java-21-openjdk-src-21.0.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009875282" comment="java-21-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202553066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-53066</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-53066" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53066" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-53066" ref_url="https://www.suse.com/security/cve/CVE-2025-53066" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:18814" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002133.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18815" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002124.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18818" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002212.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18821" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002126.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:18824" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21164-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023072.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3965-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3996-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023179.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4005-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023183.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023196.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023195.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023427.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-02"/>
	<updated date="2025-12-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-53066/">CVE-2025-53066 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53066">CVE-2025-53066 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252417">SUSE bug 1252417</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032334" comment="java-17-openjdk-17.0.17.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009704325" comment="java-17-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032335" comment="java-17-openjdk-demo-17.0.17.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009704327" comment="java-17-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032336" comment="java-17-openjdk-devel-17.0.17.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009704328" comment="java-17-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032337" comment="java-17-openjdk-headless-17.0.17.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009704329" comment="java-17-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032338" comment="java-17-openjdk-javadoc-17.0.17.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009704330" comment="java-17-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032339" comment="java-17-openjdk-jmods-17.0.17.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009704331" comment="java-17-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032340" comment="java-17-openjdk-src-17.0.17.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009704332" comment="java-17-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032327" comment="java-21-openjdk-21.0.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009875276" comment="java-21-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032328" comment="java-21-openjdk-demo-21.0.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009875277" comment="java-21-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032329" comment="java-21-openjdk-devel-21.0.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009875278" comment="java-21-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032330" comment="java-21-openjdk-headless-21.0.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009875279" comment="java-21-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032331" comment="java-21-openjdk-javadoc-21.0.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009875280" comment="java-21-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032332" comment="java-21-openjdk-jmods-21.0.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009875281" comment="java-21-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032333" comment="java-21-openjdk-src-21.0.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009875282" comment="java-21-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202553547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-53547</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-53547" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53547" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-53547" ref_url="https://www.suse.com/security/cve/CVE-2025-53547" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:20516-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20595-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023339.html" source="SUSE-SU"/>
    <description>
    Helm is a package manager for Charts for Kubernetes. Prior to 3.18.4, a specially crafted Chart.yaml file along with a specially linked Chart.lock file can lead to local code execution when dependencies are updated. Fields in a Chart.yaml file, that are carried over to a Chart.lock file when dependencies are updated and this file is written, can be crafted in a way that can cause execution if that same content were in a file that is executed (e.g., a bash.rc file or shell script). If the Chart.lock file is symlinked to one of these files updating dependencies will write the lock file content to the symlinked file. This can lead to unwanted execution. Helm warns of the symlinked file but did not stop execution due to symlinking. This issue has been resolved in Helm v3.18.4.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2025-11-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:L/VI:H/VA:H/SC:L/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-53547/">CVE-2025-53547 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-53547">CVE-2025-53547 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246150">SUSE bug 1246150</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032107" comment="trivy-0.66.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698141" comment="trivy is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202553628" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-53628</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-53628" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53628" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-53628" ref_url="https://www.suse.com/security/cve/CVE-2025-53628" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024613.html" source="SUSE-SU"/>
    <description>
    cpp-httplib is a C++11 single-file header-only cross platform HTTP/HTTPS library. Prior to 0.20.1, cpp-httplib does not have a limit for a unique line, permitting an attacker to explore this to allocate memory arbitrarily. This vulnerability is fixed in 0.20.1. NOTE: This vulnerability is related to CVE-2025-53629.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-06"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-53628/">CVE-2025-53628 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-53628">CVE-2025-53628 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246468">SUSE bug 1246468</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047302" comment="cpp-httplib-devel-0.22.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009964479" comment="cpp-httplib-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047303" comment="libcpp-httplib0_22-0.22.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037918" comment="libcpp-httplib0_22 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202553629" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-53629</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-53629" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53629" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-53629" ref_url="https://www.suse.com/security/cve/CVE-2025-53629" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20600-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024613.html" source="SUSE-SU"/>
    <description>
    cpp-httplib is a C++11 single-file header-only cross platform HTTP/HTTPS library. Prior to 0.23.0, incoming requests using Transfer-Encoding: chunked in the header can allocate memory arbitrarily in the server, potentially leading to its exhaustion. This vulnerability is fixed in 0.23.0. NOTE: This vulnerability is related to CVE-2025-53628.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-06"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-53629/">CVE-2025-53629 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53629">CVE-2025-53629 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246471">SUSE bug 1246471</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047302" comment="cpp-httplib-devel-0.22.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009964479" comment="cpp-httplib-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047303" comment="libcpp-httplib0_22-0.22.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037918" comment="libcpp-httplib0_22 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202553643" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-53643</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-53643" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53643" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-53643" ref_url="https://www.suse.com/security/cve/CVE-2025-53643" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03057-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03201-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041685.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024346.html" source="SUSE-SU"/>
    <description>
    AIOHTTP is an asynchronous HTTP client/server framework for asyncio and Python. Prior to version 3.12.14, the Python parser is vulnerable to a request smuggling vulnerability due to not parsing trailer sections of an HTTP request. If a pure Python version of aiohttp is installed (i.e. without the usual C extensions) or AIOHTTP_NO_EXTENSIONS is enabled, then an attacker may be able to execute a request smuggling attack to bypass certain firewalls or proxy protections. Version 3.12.14 contains a patch for this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-15"/>
	<updated date="2026-02-19"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-53643/">CVE-2025-53643 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-53643">CVE-2025-53643 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246517">SUSE bug 1246517</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010043894" comment="python313-Brotli-1.1.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010043908" comment="python313-Brotli is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010043895" comment="python313-aiohttp-3.11.16-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010043909" comment="python313-aiohttp is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202553816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-53816</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-53816" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53816" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-53816" ref_url="https://www.suse.com/security/cve/CVE-2025-53816" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024615.html" source="SUSE-SU"/>
    <description>
    7-Zip is a file archiver with a high compression ratio. Zeroes written outside heap buffer in RAR5 handler may lead to memory corruption and denial of service in versions of 7-Zip prior to 25.0.0. Version 25.0.0 contains a fix for the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-53816/">CVE-2025-53816 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-53816">CVE-2025-53816 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246706">SUSE bug 1246706</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045690" comment="7zip-25.01-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017317" comment="7zip is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202553817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-53817</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-53817" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53817" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-53817" ref_url="https://www.suse.com/security/cve/CVE-2025-53817" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:3791-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024615.html" source="SUSE-SU"/>
    <description>
    7-Zip is a file archiver with a high compression ratio. 7-Zip supports extracting from Compound Documents. Prior to version 25.0.0, a null pointer dereference in the Compound handler may lead to denial of service. Version 25.0.0 contains a fix cor the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-53817/">CVE-2025-53817 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-53817">CVE-2025-53817 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246707">SUSE bug 1246707</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045690" comment="7zip-25.01-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017317" comment="7zip is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202553881" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-53881</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-53881" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53881" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-53881" ref_url="https://www.suse.com/security/cve/CVE-2025-53881" source="SUSE CVE"/>
    <description>
    A UNIX Symbolic Link (Symlink) Following vulnerability in logrotate config in the exim package allowed privilege escalation from mail user/group to root.This issue affects Tumbleweed: from ? before 4.98.2-lp156.248.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-13"/>
	<updated date="2026-01-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-53881/">CVE-2025-53881 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53881">CVE-2025-53881 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246457">SUSE bug 1246457</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035668" comment="exim-4.98.2-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153580" comment="exim is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035669" comment="eximon-4.98.2-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153581" comment="eximon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035670" comment="eximstats-html-4.98.2-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153582" comment="eximstats-html is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202553906" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-53906</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-53906" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-53906" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-53906" ref_url="https://www.suse.com/security/cve/CVE-2025-53906" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:17715" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002070.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:17742" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002089.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20945" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03240-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03299-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03300-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20696-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041757.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20857-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024181.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025100.html" source="SUSE-SU"/>
    <description>
    Vim is an open source, command line text editor. Prior to version 9.1.1551, a path traversal issue in Vim's zip.vim plugin can allow overwriting of arbitrary files when opening specially crafted zip archives. Impact is low because this exploit requires direct user interaction. However, successfully exploitation can lead to overwriting sensitive files or placing executable code in privileged locations, depending on the permissions of the process editing the archive. The victim must edit such a file using Vim which will reveal the filename and the file content, a careful user may suspect some strange things going on. Successful exploitation could results in the ability to execute arbitrary commands on the underlying operating system. Version 9.1.1551 contains a patch for the vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:L" cvss4="1.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:N/VI:L/VA:L/SC:N/SI:L/SA:L" href="https://www.suse.com/security/cve/CVE-2025-53906/">CVE-2025-53906 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-53906">CVE-2025-53906 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246602">SUSE bug 1246602</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050725" comment="gvim-9.2.0110-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151192" comment="gvim is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050726" comment="vim-9.2.0110-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151193" comment="vim is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050727" comment="vim-data-9.2.0110-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151194" comment="vim-data is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050022" comment="vim-data-common-9.2.0110-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050023" comment="vim-small-9.2.0110-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050728" comment="xxd-9.2.0110-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009756472" comment="xxd is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202554080" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-54080</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-54080" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-54080" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-54080" ref_url="https://www.suse.com/security/cve/CVE-2025-54080" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045229.html" source="SUSE-SU"/>
    <description>
    Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and ICC image metadata. An out-of-bounds read was found in Exiv2 versions 0.28.5 and earlier. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. The bug is fixed in version 0.28.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-54080/">CVE-2025-54080 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-54080">CVE-2025-54080 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248962">SUSE bug 1248962</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051765" comment="exiv2-0.28.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154125" comment="exiv2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051766" comment="exiv2-lang-0.28.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154126" comment="exiv2-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050764" comment="libexiv2-28-0.28.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010051915" comment="libexiv2-28 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050765" comment="libexiv2-28-x86-64-v3-0.28.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010051916" comment="libexiv2-28-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051767" comment="libexiv2-devel-0.28.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152552" comment="libexiv2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202554388" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-54388</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-54388" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-54388" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-54388" ref_url="https://www.suse.com/security/cve/CVE-2025-54388" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02912-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02913-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02914-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20565-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-August/022314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20743-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041897.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023877.html" source="SUSE-SU"/>
    <description>
    Moby is an open source container framework developed by Docker Inc. that is distributed as Docker Engine, Mirantis Container Runtime, and various other downstream projects/products. In versions 28.2.0 through 28.3.2, when the firewalld service is reloaded it removes all iptables rules including those created by Docker. While Docker should automatically recreate these rules, versions before 28.3.3 fail to recreate the specific rules that block external access to containers. This means that after a firewalld reload, containers with ports published to localhost (like 127.0.0.1:8080) become accessible from remote machines that have network routing to the Docker bridge, even though they should only be accessible from the host itself. The vulnerability only affects explicitly published ports - unpublished ports remain protected. This issue is fixed in version 28.3.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-18"/>
	<updated date="2026-01-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.2/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2025-54388/">CVE-2025-54388 at SUSE</cve>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-54388">CVE-2025-54388 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247367">SUSE bug 1247367</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037884" comment="docker-28.5.1_ce-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152505" comment="docker is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037885" comment="docker-bash-completion-28.5.1_ce-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152506" comment="docker-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037886" comment="docker-buildx-0.29.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037917" comment="docker-buildx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037887" comment="docker-fish-completion-28.5.1_ce-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009343480" comment="docker-fish-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037888" comment="docker-rootless-extras-28.5.1_ce-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009817681" comment="docker-rootless-extras is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037889" comment="docker-zsh-completion-28.5.1_ce-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152508" comment="docker-zsh-completion is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202554770" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-54770</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-54770" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-54770" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-54770" ref_url="https://www.suse.com/security/cve/CVE-2025-54770" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023439.html" source="SUSE-SU"/>
    <description>
    A vulnerability has been identified in the GRUB2 bootloader's network module that poses an immediate Denial of Service (DoS) risk. This flaw is a Use-after-Free issue, caused because the net_set_vlan command is not properly unregistered when the network module is unloaded from memory. An attacker who can execute this command can force the system to access memory locations that are no longer valid. Successful exploitation leads directly to system instability, which can result in a complete crash and halt system availability
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-18"/>
	<updated date="2025-12-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="2.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-54770/">CVE-2025-54770 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-54770">CVE-2025-54770 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252930">SUSE bug 1252930</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034125" comment="grub2-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153175" comment="grub2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034126" comment="grub2-arm64-efi-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623763" comment="grub2-arm64-efi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034127" comment="grub2-arm64-efi-bls-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010034157" comment="grub2-arm64-efi-bls is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034128" comment="grub2-arm64-efi-debug-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623764" comment="grub2-arm64-efi-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034129" comment="grub2-arm64-efi-extras-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009802512" comment="grub2-arm64-efi-extras is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034130" comment="grub2-branding-upstream-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153176" comment="grub2-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034131" comment="grub2-common-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010034158" comment="grub2-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034132" comment="grub2-i386-pc-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153178" comment="grub2-i386-pc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034133" comment="grub2-i386-pc-debug-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291438" comment="grub2-i386-pc-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034134" comment="grub2-i386-pc-extras-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009802514" comment="grub2-i386-pc-extras is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034135" comment="grub2-powerpc-ieee1275-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623765" comment="grub2-powerpc-ieee1275 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034136" comment="grub2-powerpc-ieee1275-debug-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623766" comment="grub2-powerpc-ieee1275-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034137" comment="grub2-powerpc-ieee1275-extras-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009802516" comment="grub2-powerpc-ieee1275-extras is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034138" comment="grub2-s390x-emu-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623767" comment="grub2-s390x-emu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034139" comment="grub2-s390x-emu-debug-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623768" comment="grub2-s390x-emu-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034140" comment="grub2-s390x-emu-extras-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009802517" comment="grub2-s390x-emu-extras is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034141" comment="grub2-snapper-plugin-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153179" comment="grub2-snapper-plugin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034142" comment="grub2-systemd-sleep-plugin-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154139" comment="grub2-systemd-sleep-plugin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034143" comment="grub2-x86_64-efi-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153180" comment="grub2-x86_64-efi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034144" comment="grub2-x86_64-efi-bls-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010034159" comment="grub2-x86_64-efi-bls is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034145" comment="grub2-x86_64-efi-debug-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291439" comment="grub2-x86_64-efi-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034146" comment="grub2-x86_64-efi-extras-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009802518" comment="grub2-x86_64-efi-extras is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034147" comment="grub2-x86_64-xen-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153181" comment="grub2-x86_64-xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034148" comment="grub2-x86_64-xen-debug-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009964903" comment="grub2-x86_64-xen-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034149" comment="grub2-x86_64-xen-extras-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009802519" comment="grub2-x86_64-xen-extras is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202554771" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-54771</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-54771" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-54771" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-54771" ref_url="https://www.suse.com/security/cve/CVE-2025-54771" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023439.html" source="SUSE-SU"/>
    <description>
    A use-after-free vulnerability has been identified in the GNU GRUB (Grand Unified Bootloader). The flaw occurs because the file-closing process incorrectly retains a memory pointer, leaving an invalid reference to a file system structure. An attacker could exploit this vulnerability to cause grub to crash, leading to a Denial of Service. Possible data integrity or confidentiality compromise is not discarded.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-18"/>
	<updated date="2025-12-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="2.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-54771/">CVE-2025-54771 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-54771">CVE-2025-54771 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252931">SUSE bug 1252931</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034125" comment="grub2-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153175" comment="grub2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034126" comment="grub2-arm64-efi-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623763" comment="grub2-arm64-efi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034127" comment="grub2-arm64-efi-bls-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010034157" comment="grub2-arm64-efi-bls is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034128" comment="grub2-arm64-efi-debug-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623764" comment="grub2-arm64-efi-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034129" comment="grub2-arm64-efi-extras-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009802512" comment="grub2-arm64-efi-extras is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034130" comment="grub2-branding-upstream-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153176" comment="grub2-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034131" comment="grub2-common-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010034158" comment="grub2-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034132" comment="grub2-i386-pc-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153178" comment="grub2-i386-pc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034133" comment="grub2-i386-pc-debug-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291438" comment="grub2-i386-pc-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034134" comment="grub2-i386-pc-extras-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009802514" comment="grub2-i386-pc-extras is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034135" comment="grub2-powerpc-ieee1275-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623765" comment="grub2-powerpc-ieee1275 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034136" comment="grub2-powerpc-ieee1275-debug-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623766" comment="grub2-powerpc-ieee1275-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034137" comment="grub2-powerpc-ieee1275-extras-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009802516" comment="grub2-powerpc-ieee1275-extras is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034138" comment="grub2-s390x-emu-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623767" comment="grub2-s390x-emu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034139" comment="grub2-s390x-emu-debug-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623768" comment="grub2-s390x-emu-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034140" comment="grub2-s390x-emu-extras-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009802517" comment="grub2-s390x-emu-extras is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034141" comment="grub2-snapper-plugin-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153179" comment="grub2-snapper-plugin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034142" comment="grub2-systemd-sleep-plugin-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154139" comment="grub2-systemd-sleep-plugin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034143" comment="grub2-x86_64-efi-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153180" comment="grub2-x86_64-efi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034144" comment="grub2-x86_64-efi-bls-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010034159" comment="grub2-x86_64-efi-bls is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034145" comment="grub2-x86_64-efi-debug-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291439" comment="grub2-x86_64-efi-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034146" comment="grub2-x86_64-efi-extras-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009802518" comment="grub2-x86_64-efi-extras is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034147" comment="grub2-x86_64-xen-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153181" comment="grub2-x86_64-xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034148" comment="grub2-x86_64-xen-debug-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009964903" comment="grub2-x86_64-xen-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034149" comment="grub2-x86_64-xen-extras-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009802519" comment="grub2-x86_64-xen-extras is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202554882" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-54882</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-54882" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-54882" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-54882" ref_url="https://www.suse.com/security/cve/CVE-2025-54882" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2026:20990-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045341.html" source="SUSE-SU"/>
    <description>
    Himmelblau is an interoperability suite for Microsoft Azure Entra ID and Intune. In versions 0.8.0 through 0.9.21 and 1.0.0-beta through 1.1.0, Himmelblau stores the cloud TGT received during logon in the Kerberos credential cache. The created credential cache collection and received credentials are stored as world readable. This is fixed in versions 0.9.22 and 1.2.0. To work around this issue, remove all read access to Himmelblau caches for all users except for owners.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-03"/>
	<updated date="2026-04-10"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-54882/">CVE-2025-54882 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-54882">CVE-2025-54882 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247735">SUSE bug 1247735</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052692" comment="himmelblau-2.3.8+git0.dec3693-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032129" comment="himmelblau is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052693" comment="himmelblau-qr-greeter-2.3.8+git0.dec3693-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032130" comment="himmelblau-qr-greeter is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052694" comment="himmelblau-sshd-config-2.3.8+git0.dec3693-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032131" comment="himmelblau-sshd-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052695" comment="himmelblau-sso-2.3.8+git0.dec3693-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032132" comment="himmelblau-sso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052696" comment="libnss_himmelblau2-2.3.8+git0.dec3693-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032133" comment="libnss_himmelblau2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052697" comment="pam-himmelblau-2.3.8+git0.dec3693-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032134" comment="pam-himmelblau is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202555130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-55130</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-55130" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55130" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-55130" ref_url="https://www.suse.com/security/cve/CVE-2025-55130" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2420" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002499.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2421" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002504.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2422" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002490.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2767" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002552.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2781" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003224.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2782" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003228.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2783" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003252.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2864" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024339.html" source="SUSE-SU"/>
    <description>
    A flaw in Node.js's Permissions model allows attackers to bypass `--allow-fs-read` and `--allow-fs-write` restrictions using crafted relative symlink paths. By chaining directories and symlinks, a script granted access only to the current directory can escape the allowed path and read sensitive files. This breaks the expected isolation guarantees and enables arbitrary file read/write, leading to potential system compromise.
This vulnerability affects users of the permission model on Node.js v20,  v22,  v24, and v25.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-18"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55130/">CVE-2025-55130 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-55130">CVE-2025-55130 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256569">SUSE bug 1256569</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044193" comment="corepack22-22.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961686" comment="corepack22 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044194" comment="nodejs22-22.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961687" comment="nodejs22 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044195" comment="nodejs22-devel-22.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961688" comment="nodejs22-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044196" comment="nodejs22-docs-22.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961689" comment="nodejs22-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044197" comment="npm22-22.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961690" comment="npm22 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202555131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-55131</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-55131" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55131" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-55131" ref_url="https://www.suse.com/security/cve/CVE-2025-55131" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2420" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002499.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2421" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002504.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2422" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002490.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2767" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002552.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2781" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003224.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2782" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003228.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2783" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003252.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2864" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024339.html" source="SUSE-SU"/>
    <description>
    A flaw in Node.js's buffer allocation logic can expose uninitialized memory when allocations are interrupted, when using the `vm` module with the timeout option. Under specific timing conditions, buffers allocated with `Buffer.alloc` and other `TypedArray` instances like `Uint8Array` may contain leftover data from previous operations, allowing in-process secrets like tokens or passwords to leak or causing data corruption. While exploitation typically requires precise timing or in-process code execution, it can become remotely exploitable when untrusted input influences workload and timeouts, leading to potential confidentiality and integrity impact.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-18"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55131/">CVE-2025-55131 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-55131">CVE-2025-55131 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256570">SUSE bug 1256570</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044193" comment="corepack22-22.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961686" comment="corepack22 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044194" comment="nodejs22-22.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961687" comment="nodejs22 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044195" comment="nodejs22-devel-22.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961688" comment="nodejs22-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044196" comment="nodejs22-docs-22.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961689" comment="nodejs22-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044197" comment="npm22-22.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961690" comment="npm22 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202555132" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-55132</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-55132" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55132" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-55132" ref_url="https://www.suse.com/security/cve/CVE-2025-55132" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2420" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002499.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2421" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002504.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2422" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002490.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2781" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003224.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2782" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003228.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2783" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024339.html" source="SUSE-SU"/>
    <description>
    A flaw in Node.js's permission model allows a file's access and modification timestamps to be changed via `futimes()` even when the process has only read permissions. Unlike `utimes()`, `futimes()` does not apply the expected write-permission checks, which means file metadata can be modified in read-only directories. This behavior could be used to alter timestamps in ways that obscure activity, reducing the reliability of logs. This vulnerability affects users of the permission model on Node.js v20,  v22,  v24, and v25.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-18"/>
	<updated date="2026-04-11"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55132/">CVE-2025-55132 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-55132">CVE-2025-55132 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256571">SUSE bug 1256571</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044193" comment="corepack22-22.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961686" comment="corepack22 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044194" comment="nodejs22-22.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961687" comment="nodejs22 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044195" comment="nodejs22-devel-22.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961688" comment="nodejs22-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044196" comment="nodejs22-docs-22.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961689" comment="nodejs22-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044197" comment="npm22-22.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961690" comment="npm22 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202555159" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-55159</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-55159" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55159" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-55159" ref_url="https://www.suse.com/security/cve/CVE-2025-55159" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02957-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02961-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02962-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041342.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20717-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20858-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023169.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3944-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3955-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20686-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024836.html" source="SUSE-SU"/>
    <description>
    slab is a pre-allocated storage for a uniform data type. In version 0.4.10, the get_disjoint_mut method incorrectly checked if indices were within the slab's capacity instead of its length, allowing access to uninitialized memory. This could lead to undefined behavior or potential crashes. This has been fixed in slab 0.4.11. A workaround for this issue involves to avoid using get_disjoint_mut with indices that might be beyond the slab's actual length.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-10-31"/>
	<updated date="2026-03-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55159/">CVE-2025-55159 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-55159">CVE-2025-55159 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248000">SUSE bug 1248000</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010024369" comment="flake-pilot-3.1.22-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010024388" comment="flake-pilot is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010024370" comment="flake-pilot-firecracker-3.1.22-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010024389" comment="flake-pilot-firecracker is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010024371" comment="flake-pilot-firecracker-dracut-netstart-3.1.22-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010024390" comment="flake-pilot-firecracker-dracut-netstart is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010024372" comment="flake-pilot-firecracker-guestvm-tools-3.1.22-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010024391" comment="flake-pilot-firecracker-guestvm-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010024373" comment="flake-pilot-podman-3.1.22-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010024392" comment="flake-pilot-podman is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047574" comment="gstreamer-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154019" comment="gstreamer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047575" comment="gstreamer-devel-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154021" comment="gstreamer-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047576" comment="gstreamer-devtools-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010047679" comment="gstreamer-devtools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047577" comment="gstreamer-devtools-devel-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010047680" comment="gstreamer-devtools-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047578" comment="gstreamer-docs-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010047681" comment="gstreamer-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047579" comment="gstreamer-lang-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154023" comment="gstreamer-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047580" comment="gstreamer-plugins-bad-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153876" comment="gstreamer-plugins-bad is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047581" comment="gstreamer-plugins-bad-chromaprint-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009476859" comment="gstreamer-plugins-bad-chromaprint is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047582" comment="gstreamer-plugins-bad-devel-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153878" comment="gstreamer-plugins-bad-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047583" comment="gstreamer-plugins-bad-lang-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153880" comment="gstreamer-plugins-bad-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047584" comment="gstreamer-plugins-base-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153927" comment="gstreamer-plugins-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047585" comment="gstreamer-plugins-base-devel-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153929" comment="gstreamer-plugins-base-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047586" comment="gstreamer-plugins-base-lang-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153931" comment="gstreamer-plugins-base-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047587" comment="gstreamer-plugins-good-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153915" comment="gstreamer-plugins-good is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047588" comment="gstreamer-plugins-good-extra-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153918" comment="gstreamer-plugins-good-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047589" comment="gstreamer-plugins-good-gtk-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009476863" comment="gstreamer-plugins-good-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047590" comment="gstreamer-plugins-good-jack-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009476864" comment="gstreamer-plugins-good-jack is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047591" comment="gstreamer-plugins-good-lang-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153920" comment="gstreamer-plugins-good-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047592" comment="gstreamer-plugins-good-qtqml6-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010047682" comment="gstreamer-plugins-good-qtqml6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047593" comment="gstreamer-plugins-libav-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010047683" comment="gstreamer-plugins-libav is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047594" comment="gstreamer-plugins-rs-1.26.7+git0.6ab75814-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010022222" comment="gstreamer-plugins-rs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047595" comment="gstreamer-plugins-ugly-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177245" comment="gstreamer-plugins-ugly is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047596" comment="gstreamer-plugins-ugly-lang-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177246" comment="gstreamer-plugins-ugly-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047597" comment="gstreamer-rtsp-server-devel-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281635" comment="gstreamer-rtsp-server-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047598" comment="gstreamer-transcoder-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009813195" comment="gstreamer-transcoder is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047599" comment="gstreamer-transcoder-devel-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009813197" comment="gstreamer-transcoder-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047600" comment="gstreamer-utils-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154024" comment="gstreamer-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049112" comment="keylime-ima-policy-0.2.8+116-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010049138" comment="keylime-ima-policy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047601" comment="libgstadaptivedemux-1_0-0-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154275" comment="libgstadaptivedemux-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047602" comment="libgstallocators-1_0-0-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153932" comment="libgstallocators-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047603" comment="libgstanalytics-1_0-0-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009997376" comment="libgstanalytics-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047604" comment="libgstapp-1_0-0-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153936" comment="libgstapp-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047605" comment="libgstaudio-1_0-0-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153938" comment="libgstaudio-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047606" comment="libgstbadaudio-1_0-0-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154277" comment="libgstbadaudio-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047607" comment="libgstbasecamerabinsrc-1_0-0-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153886" comment="libgstbasecamerabinsrc-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047608" comment="libgstcodecparsers-1_0-0-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153890" comment="libgstcodecparsers-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047609" comment="libgstcodecs-1_0-0-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698063" comment="libgstcodecs-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047610" comment="libgstcuda-1_0-0-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009813277" comment="libgstcuda-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047611" comment="libgstdxva-1_0-0-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009997379" comment="libgstdxva-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047612" comment="libgstfft-1_0-0-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153940" comment="libgstfft-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047613" comment="libgstgl-1_0-0-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153892" comment="libgstgl-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047614" comment="libgstinsertbin-1_0-0-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153894" comment="libgstinsertbin-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047615" comment="libgstisoff-1_0-0-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009476869" comment="libgstisoff-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047616" comment="libgstmpegts-1_0-0-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153896" comment="libgstmpegts-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047617" comment="libgstmse-1_0-0-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009997382" comment="libgstmse-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047618" comment="libgstpbutils-1_0-0-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153944" comment="libgstpbutils-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047619" comment="libgstphotography-1_0-0-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153899" comment="libgstphotography-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047620" comment="libgstplay-1_0-0-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698064" comment="libgstplay-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047621" comment="libgstplayer-1_0-0-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154279" comment="libgstplayer-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047622" comment="libgstreamer-1_0-0-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154025" comment="libgstreamer-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047623" comment="libgstriff-1_0-0-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153946" comment="libgstriff-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047624" comment="libgstrtp-1_0-0-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153948" comment="libgstrtp-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047625" comment="libgstrtsp-1_0-0-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153950" comment="libgstrtsp-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047626" comment="libgstrtspserver-1_0-0-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281636" comment="libgstrtspserver-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047627" comment="libgstsctp-1_0-0-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009476871" comment="libgstsctp-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047628" comment="libgstsdp-1_0-0-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153952" comment="libgstsdp-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047629" comment="libgsttag-1_0-0-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153954" comment="libgsttag-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047630" comment="libgsttranscoder-1_0-0-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009813239" comment="libgsttranscoder-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047631" comment="libgsturidownloader-1_0-0-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153902" comment="libgsturidownloader-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047632" comment="libgstva-1_0-0-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698065" comment="libgstva-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047633" comment="libgstvalidate-1_0-0-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010047684" comment="libgstvalidate-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047634" comment="libgstvideo-1_0-0-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153956" comment="libgstvideo-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047635" comment="libgstvulkan-1_0-0-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698066" comment="libgstvulkan-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047636" comment="libgstwayland-1_0-0-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153905" comment="libgstwayland-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047637" comment="libgstwebrtc-1_0-0-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009476873" comment="libgstwebrtc-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047638" comment="libgstwebrtcnice-1_0-0-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009813280" comment="libgstwebrtcnice-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049113" comment="rust-keylime-0.2.8+116-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010049139" comment="rust-keylime is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047639" comment="typelib-1_0-CudaGst-1_0-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009813283" comment="typelib-1_0-CudaGst-1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047640" comment="typelib-1_0-Gst-1_0-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154027" comment="typelib-1_0-Gst-1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047641" comment="typelib-1_0-GstAllocators-1_0-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153958" comment="typelib-1_0-GstAllocators-1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047642" comment="typelib-1_0-GstAnalytics-1_0-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009997387" comment="typelib-1_0-GstAnalytics-1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047643" comment="typelib-1_0-GstApp-1_0-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153960" comment="typelib-1_0-GstApp-1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047644" comment="typelib-1_0-GstAudio-1_0-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153961" comment="typelib-1_0-GstAudio-1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047645" comment="typelib-1_0-GstBadAudio-1_0-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009813260" comment="typelib-1_0-GstBadAudio-1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047646" comment="typelib-1_0-GstCodecs-1_0-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009813262" comment="typelib-1_0-GstCodecs-1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047647" comment="typelib-1_0-GstCuda-1_0-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009813284" comment="typelib-1_0-GstCuda-1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047648" comment="typelib-1_0-GstDxva-1_0-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009997388" comment="typelib-1_0-GstDxva-1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047649" comment="typelib-1_0-GstGL-1_0-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009476875" comment="typelib-1_0-GstGL-1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047650" comment="typelib-1_0-GstGLEGL-1_0-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009777499" comment="typelib-1_0-GstGLEGL-1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047651" comment="typelib-1_0-GstGLWayland-1_0-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009777500" comment="typelib-1_0-GstGLWayland-1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047652" comment="typelib-1_0-GstGLX11-1_0-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009777501" comment="typelib-1_0-GstGLX11-1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047653" comment="typelib-1_0-GstInsertBin-1_0-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009476876" comment="typelib-1_0-GstInsertBin-1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047654" comment="typelib-1_0-GstMpegts-1_0-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009476877" comment="typelib-1_0-GstMpegts-1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047655" comment="typelib-1_0-GstMse-1_0-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009997389" comment="typelib-1_0-GstMse-1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047656" comment="typelib-1_0-GstPbutils-1_0-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153964" comment="typelib-1_0-GstPbutils-1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047657" comment="typelib-1_0-GstPlay-1_0-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009813266" comment="typelib-1_0-GstPlay-1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047658" comment="typelib-1_0-GstPlayer-1_0-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009476878" comment="typelib-1_0-GstPlayer-1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047659" comment="typelib-1_0-GstRtp-1_0-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153966" comment="typelib-1_0-GstRtp-1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047660" comment="typelib-1_0-GstRtsp-1_0-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153967" comment="typelib-1_0-GstRtsp-1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047661" comment="typelib-1_0-GstRtspServer-1_0-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009281637" comment="typelib-1_0-GstRtspServer-1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047662" comment="typelib-1_0-GstSdp-1_0-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153968" comment="typelib-1_0-GstSdp-1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047663" comment="typelib-1_0-GstTag-1_0-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153969" comment="typelib-1_0-GstTag-1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047664" comment="typelib-1_0-GstTranscoder-1_0-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009813269" comment="typelib-1_0-GstTranscoder-1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047665" comment="typelib-1_0-GstVa-1_0-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009813285" comment="typelib-1_0-GstVa-1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047666" comment="typelib-1_0-GstValidate-1_0-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010047685" comment="typelib-1_0-GstValidate-1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047667" comment="typelib-1_0-GstVideo-1_0-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153970" comment="typelib-1_0-GstVideo-1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047668" comment="typelib-1_0-GstVulkan-1_0-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009813271" comment="typelib-1_0-GstVulkan-1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047669" comment="typelib-1_0-GstVulkanWayland-1_0-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009813273" comment="typelib-1_0-GstVulkanWayland-1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047670" comment="typelib-1_0-GstVulkanXCB-1_0-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009813275" comment="typelib-1_0-GstVulkanXCB-1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047671" comment="typelib-1_0-GstWebRTC-1_0-1.26.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009476879" comment="typelib-1_0-GstWebRTC-1_0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202555193" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-55193</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-55193" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55193" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-55193" ref_url="https://www.suse.com/security/cve/CVE-2025-55193" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023807.html" source="SUSE-SU"/>
    <description>
    Active Record connects classes to relational database tables. Prior to versions 7.1.5.2, 7.2.2.2, and 8.0.2.1, the ID passed to find or similar methods may be logged without escaping. If this is directly to the terminal it may include unescaped ANSI sequences. This issue has been patched in versions 7.1.5.2, 7.2.2.2, and 8.0.2.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-16"/>
	<updated date="2026-01-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55193/">CVE-2025-55193 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-55193">CVE-2025-55193 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248099">SUSE bug 1248099</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037703" comment="hawk2-2.7.0+git.1742310530.bfcd0e2c-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341551" comment="hawk2 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202555197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-55197</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-55197" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55197" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-55197" ref_url="https://www.suse.com/security/cve/CVE-2025-55197" source="SUSE CVE"/>
    <description>
    pypdf is a free and open-source pure-python PDF library. Prior to version 6.0.0, an attacker can craft a PDF which leads to the RAM being exhausted. This requires just reading the file if a series of FlateDecode filters is used on a malicious cross-reference stream. Other content streams are affected on explicit access. This issue has been fixed in 6.0.0. If an update is not possible, a workaround involves including the fixed code from pypdf.filters.decompress into the existing filters file.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-08"/>
	<updated date="2026-03-08"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-55197/">CVE-2025-55197 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-55197">CVE-2025-55197 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248089">SUSE bug 1248089</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047678" comment="python313-PyPDF2-2.11.1-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010047686" comment="python313-PyPDF2 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202555212" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-55212</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-55212" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55212" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-55212" ref_url="https://www.suse.com/security/cve/CVE-2025-55212" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03113-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03150-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03151-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03152-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03164-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023597.html" source="SUSE-SU"/>
    <description>
    ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 6.9.13-28 and 7.1.2-2, passing a geometry string containing only a colon (":") to montage -geometry leads GetGeometry() to set width/height to 0. Later, ThumbnailImage() divides by these zero dimensions, triggering a crash (SIGFPE/abort), resulting in a denial of service. This issue has been patched in versions 6.9.13-28 and 7.1.2-2.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-18"/>
	<updated date="2025-12-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55212/">CVE-2025-55212 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-55212">CVE-2025-55212 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248767">SUSE bug 1248767</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034111" comment="ImageMagick-7.1.2.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034112" comment="ImageMagick-config-7-SUSE-7.1.2.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034113" comment="ImageMagick-config-7-upstream-limited-7.1.2.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977490" comment="ImageMagick-config-7-upstream-limited is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034114" comment="ImageMagick-config-7-upstream-open-7.1.2.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977491" comment="ImageMagick-config-7-upstream-open is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034115" comment="ImageMagick-config-7-upstream-secure-7.1.2.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977492" comment="ImageMagick-config-7-upstream-secure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034116" comment="ImageMagick-config-7-upstream-websafe-7.1.2.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977493" comment="ImageMagick-config-7-upstream-websafe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034117" comment="ImageMagick-devel-7.1.2.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034118" comment="ImageMagick-doc-7.1.2.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034119" comment="ImageMagick-extra-7.1.2.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034120" comment="libMagick++-7_Q16HDRI5-7.1.2.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698047" comment="libMagick++-7_Q16HDRI5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034121" comment="libMagick++-devel-7.1.2.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034122" comment="libMagickCore-7_Q16HDRI10-7.1.2.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698048" comment="libMagickCore-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034123" comment="libMagickWand-7_Q16HDRI10-7.1.2.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698049" comment="libMagickWand-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034124" comment="perl-PerlMagick-7.1.2.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202555298" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-55298</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-55298" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55298" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-55298" ref_url="https://www.suse.com/security/cve/CVE-2025-55298" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03113-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03150-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03151-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03152-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03164-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023597.html" source="SUSE-SU"/>
    <description>
    ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to ImageMagick versions 6.9.13-28 and 7.1.2-2, a format string bug vulnerability exists in InterpretImageFilename function where user input is directly passed to FormatLocaleString without proper sanitization. An attacker can overwrite arbitrary memory regions, enabling a wide range of attacks from heap overflow to remote code execution. This issue has been patched in versions 6.9.13-28 and 7.1.2-2.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-18"/>
	<updated date="2025-12-19"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" cvss4="9/CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-55298/">CVE-2025-55298 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-55298">CVE-2025-55298 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248780">SUSE bug 1248780</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034111" comment="ImageMagick-7.1.2.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034112" comment="ImageMagick-config-7-SUSE-7.1.2.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034113" comment="ImageMagick-config-7-upstream-limited-7.1.2.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977490" comment="ImageMagick-config-7-upstream-limited is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034114" comment="ImageMagick-config-7-upstream-open-7.1.2.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977491" comment="ImageMagick-config-7-upstream-open is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034115" comment="ImageMagick-config-7-upstream-secure-7.1.2.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977492" comment="ImageMagick-config-7-upstream-secure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034116" comment="ImageMagick-config-7-upstream-websafe-7.1.2.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977493" comment="ImageMagick-config-7-upstream-websafe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034117" comment="ImageMagick-devel-7.1.2.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034118" comment="ImageMagick-doc-7.1.2.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034119" comment="ImageMagick-extra-7.1.2.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034120" comment="libMagick++-7_Q16HDRI5-7.1.2.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698047" comment="libMagick++-7_Q16HDRI5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034121" comment="libMagick++-devel-7.1.2.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034122" comment="libMagickCore-7_Q16HDRI10-7.1.2.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698048" comment="libMagickCore-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034123" comment="libMagickWand-7_Q16HDRI10-7.1.2.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698049" comment="libMagickWand-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034124" comment="perl-PerlMagick-7.1.2.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202555304" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-55304</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-55304" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55304" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-55304" ref_url="https://www.suse.com/security/cve/CVE-2025-55304" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045229.html" source="SUSE-SU"/>
    <description>
    Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and ICC image metadata. A denial-of-service was found in Exiv2 version 0.28.5: a quadratic algorithm in the ICC profile parsing code in jpegBase::readMetadata() can cause Exiv2 to run for a long time. The denial-of-service is triggered when Exiv2 is used to read the metadata of a crafted jpg image file. The bug is fixed in version 0.28.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55304/">CVE-2025-55304 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-55304">CVE-2025-55304 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248963">SUSE bug 1248963</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051765" comment="exiv2-0.28.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154125" comment="exiv2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051766" comment="exiv2-lang-0.28.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154126" comment="exiv2-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050764" comment="libexiv2-28-0.28.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010051915" comment="libexiv2-28 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050765" comment="libexiv2-28-x86-64-v3-0.28.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010051916" comment="libexiv2-28-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051767" comment="libexiv2-devel-0.28.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152552" comment="libexiv2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202555752" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-55752</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-55752" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55752" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-55752" ref_url="https://www.suse.com/security/cve/CVE-2025-55752" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23044" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002390.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23048" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002284.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23049" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20982-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045349.html" source="SUSE-SU"/>
    <description>
    Relative Path Traversal vulnerability in Apache Tomcat.

The fix for bug 60013 introduced a regression where the       rewritten URL was normalized before it was decoded. This introduced the       possibility that, for rewrite rules that rewrite query parameters to the       URL, an attacker could manipulate the request URI to bypass security       constraints including the protection for /WEB-INF/ and /META-INF/. If PUT requests were also enabled then malicious files could be uploaded leading to remote code execution. PUT requests are normally limited to trusted users and it is considered unlikely that PUT requests would be enabled in conjunction with a rewrite that manipulated the URI.



This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.10, from 10.1.0-M1 through 10.1.44, from 9.0.0.M11 through 9.0.108.

The following versions were EOL at the time the CVE was created but are 
known to be affected: 8.5.6 though 8.5.100. Other, older, EOL versions may also be affected.
Users are recommended to upgrade to version 11.0.11 or later, 10.1.45 or later or 9.0.109 or later, which fix the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55752/">CVE-2025-55752 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-55752">CVE-2025-55752 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252753">SUSE bug 1252753</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037727" comment="tomcat-9.0.111-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152844" comment="tomcat is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037728" comment="tomcat-admin-webapps-9.0.111-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152845" comment="tomcat-admin-webapps is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037729" comment="tomcat-docs-webapp-9.0.111-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152846" comment="tomcat-docs-webapp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037730" comment="tomcat-el-3_0-api-9.0.111-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152847" comment="tomcat-el-3_0-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037731" comment="tomcat-embed-9.0.111-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152848" comment="tomcat-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037732" comment="tomcat-javadoc-9.0.111-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152849" comment="tomcat-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037733" comment="tomcat-jsp-2_3-api-9.0.111-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152850" comment="tomcat-jsp-2_3-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037734" comment="tomcat-jsvc-9.0.111-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152851" comment="tomcat-jsvc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037735" comment="tomcat-lib-9.0.111-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152852" comment="tomcat-lib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037736" comment="tomcat-servlet-4_0-api-9.0.111-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236693" comment="tomcat-servlet-4_0-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037737" comment="tomcat-webapps-9.0.111-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152854" comment="tomcat-webapps is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052604" comment="tomcat10-10.1.52-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009844333" comment="tomcat10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052605" comment="tomcat10-admin-webapps-10.1.52-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009844334" comment="tomcat10-admin-webapps is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052606" comment="tomcat10-doc-10.1.52-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009872621" comment="tomcat10-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052607" comment="tomcat10-docs-webapp-10.1.52-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009844335" comment="tomcat10-docs-webapp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052608" comment="tomcat10-el-5_0-api-10.1.52-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009844336" comment="tomcat10-el-5_0-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052609" comment="tomcat10-embed-10.1.52-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009844337" comment="tomcat10-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052610" comment="tomcat10-jsp-3_1-api-10.1.52-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009844338" comment="tomcat10-jsp-3_1-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052611" comment="tomcat10-jsvc-10.1.52-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009844339" comment="tomcat10-jsvc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052612" comment="tomcat10-lib-10.1.52-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009844340" comment="tomcat10-lib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052613" comment="tomcat10-servlet-6_0-api-10.1.52-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009844341" comment="tomcat10-servlet-6_0-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052614" comment="tomcat10-webapps-10.1.52-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009844342" comment="tomcat10-webapps is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032075" comment="tomcat11-11.0.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010015348" comment="tomcat11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032076" comment="tomcat11-admin-webapps-11.0.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010015349" comment="tomcat11-admin-webapps is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032077" comment="tomcat11-doc-11.0.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010015350" comment="tomcat11-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032078" comment="tomcat11-docs-webapp-11.0.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010015351" comment="tomcat11-docs-webapp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032079" comment="tomcat11-el-6_0-api-11.0.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010015352" comment="tomcat11-el-6_0-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032080" comment="tomcat11-embed-11.0.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010015353" comment="tomcat11-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032081" comment="tomcat11-jsp-4_0-api-11.0.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010015354" comment="tomcat11-jsp-4_0-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032082" comment="tomcat11-jsvc-11.0.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010015355" comment="tomcat11-jsvc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032083" comment="tomcat11-lib-11.0.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010015356" comment="tomcat11-lib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032084" comment="tomcat11-servlet-6_1-api-11.0.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010015357" comment="tomcat11-servlet-6_1-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032085" comment="tomcat11-webapps-11.0.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010015358" comment="tomcat11-webapps is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202555753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-55753</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-55753" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55753" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-55753" ref_url="https://www.suse.com/security/cve/CVE-2025-55753" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23732" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002326.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23739" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003175.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0094" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4488-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023629.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023669.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023817.html" source="SUSE-SU"/>
    <description>
    An integer overflow in the case of failed ACME certificate renewal leads, after a number of failures (~30 days in default configurations), to the backoff timer becoming 0. Attempts to renew the certificate then are repeated without delays until it succeeds.

This issue affects Apache HTTP Server: from 2.4.30 before 2.4.66.


Users are recommended to upgrade to version 2.4.66, which fixes the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-16"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55753/">CVE-2025-55753 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-55753">CVE-2025-55753 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254511">SUSE bug 1254511</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037713" comment="apache2-2.4.63-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151165" comment="apache2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037714" comment="apache2-devel-2.4.63-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151166" comment="apache2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037715" comment="apache2-event-2.4.63-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153274" comment="apache2-event is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037716" comment="apache2-manual-2.4.63-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009865251" comment="apache2-manual is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037717" comment="apache2-prefork-2.4.63-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151169" comment="apache2-prefork is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037718" comment="apache2-utils-2.4.63-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151170" comment="apache2-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037719" comment="apache2-worker-2.4.63-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153275" comment="apache2-worker is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202555754" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-55754</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-55754" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-55754" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-55754" ref_url="https://www.suse.com/security/cve/CVE-2025-55754" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20982-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045349.html" source="SUSE-SU"/>
    <description>
    Improper Neutralization of Escape, Meta, or Control Sequences vulnerability in Apache Tomcat.

Tomcat did not escape ANSI escape sequences in log messages. If Tomcat was running in a console on a Windows operating system, and the console supported ANSI escape sequences, it was possible for an attacker to use a specially crafted URL to inject ANSI escape sequences to manipulate the console and the clipboard and attempt to trick an administrator into running an attacker controlled command. While no attack vector was found, it may have been possible to mount this attack on other operating systems.



This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.10, from 10.1.0-M1 through 10.1.44, from 9.0.40 through 9.0.108.

The following versions were EOL at the time the CVE was created but are 
known to be affected: 8.5.60 though 8.5.100. Other, older, EOL versions may also be affected.
Users are recommended to upgrade to version 11.0.11 or later, 10.1.45 or later or 9.0.109 or later, which fix the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-04-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-55754/">CVE-2025-55754 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-55754">CVE-2025-55754 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252905">SUSE bug 1252905</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037727" comment="tomcat-9.0.111-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152844" comment="tomcat is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037728" comment="tomcat-admin-webapps-9.0.111-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152845" comment="tomcat-admin-webapps is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037729" comment="tomcat-docs-webapp-9.0.111-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152846" comment="tomcat-docs-webapp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037730" comment="tomcat-el-3_0-api-9.0.111-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152847" comment="tomcat-el-3_0-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037731" comment="tomcat-embed-9.0.111-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152848" comment="tomcat-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037732" comment="tomcat-javadoc-9.0.111-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152849" comment="tomcat-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037733" comment="tomcat-jsp-2_3-api-9.0.111-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152850" comment="tomcat-jsp-2_3-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037734" comment="tomcat-jsvc-9.0.111-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152851" comment="tomcat-jsvc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037735" comment="tomcat-lib-9.0.111-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152852" comment="tomcat-lib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037736" comment="tomcat-servlet-4_0-api-9.0.111-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236693" comment="tomcat-servlet-4_0-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037737" comment="tomcat-webapps-9.0.111-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152854" comment="tomcat-webapps is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052604" comment="tomcat10-10.1.52-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009844333" comment="tomcat10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052605" comment="tomcat10-admin-webapps-10.1.52-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009844334" comment="tomcat10-admin-webapps is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052606" comment="tomcat10-doc-10.1.52-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009872621" comment="tomcat10-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052607" comment="tomcat10-docs-webapp-10.1.52-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009844335" comment="tomcat10-docs-webapp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052608" comment="tomcat10-el-5_0-api-10.1.52-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009844336" comment="tomcat10-el-5_0-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052609" comment="tomcat10-embed-10.1.52-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009844337" comment="tomcat10-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052610" comment="tomcat10-jsp-3_1-api-10.1.52-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009844338" comment="tomcat10-jsp-3_1-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052611" comment="tomcat10-jsvc-10.1.52-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009844339" comment="tomcat10-jsvc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052612" comment="tomcat10-lib-10.1.52-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009844340" comment="tomcat10-lib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052613" comment="tomcat10-servlet-6_0-api-10.1.52-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009844341" comment="tomcat10-servlet-6_0-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052614" comment="tomcat10-webapps-10.1.52-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009844342" comment="tomcat10-webapps is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032075" comment="tomcat11-11.0.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010015348" comment="tomcat11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032076" comment="tomcat11-admin-webapps-11.0.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010015349" comment="tomcat11-admin-webapps is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032077" comment="tomcat11-doc-11.0.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010015350" comment="tomcat11-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032078" comment="tomcat11-docs-webapp-11.0.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010015351" comment="tomcat11-docs-webapp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032079" comment="tomcat11-el-6_0-api-11.0.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010015352" comment="tomcat11-el-6_0-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032080" comment="tomcat11-embed-11.0.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010015353" comment="tomcat11-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032081" comment="tomcat11-jsp-4_0-api-11.0.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010015354" comment="tomcat11-jsp-4_0-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032082" comment="tomcat11-jsvc-11.0.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010015355" comment="tomcat11-jsvc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032083" comment="tomcat11-lib-11.0.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010015356" comment="tomcat11-lib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032084" comment="tomcat11-servlet-6_1-api-11.0.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010015357" comment="tomcat11-servlet-6_1-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032085" comment="tomcat11-webapps-11.0.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010015358" comment="tomcat11-webapps is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202556225" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-56225</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-56225" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-56225" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-56225" ref_url="https://www.suse.com/security/cve/CVE-2025-56225" source="SUSE CVE"/>
    <description>
    fluidsynth-2.4.6 and earlier versions is vulnerable to Null pointer dereference in fluid_synth_monopoly.c, that can be triggered when loading an invalid midi file.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-02"/>
	<updated date="2026-03-02"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-56225/">CVE-2025-56225 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-56225">CVE-2025-56225 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256435">SUSE bug 1256435</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010046322" comment="fluidsynth-2.3.5-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009351203" comment="fluidsynth is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010046323" comment="fluidsynth-devel-2.3.5-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009351204" comment="fluidsynth-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010046324" comment="libfluidsynth3-2.3.5-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010046325" comment="libfluidsynth3 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202557052" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-57052</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-57052" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-57052" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-57052" ref_url="https://www.suse.com/security/cve/CVE-2025-57052" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03520-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042060.html" source="SUSE-SU"/>
    <description>
    cJSON 1.5.0 through 1.7.18 allows out-of-bounds access via the decode_array_index_from_pointer function in cJSON_Utils.c, allowing remote attackers to bypass array bounds checking and access restricted data via malformed JSON pointer strings containing alphanumeric characters.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-13"/>
	<updated date="2026-03-13"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-57052/">CVE-2025-57052 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-57052">CVE-2025-57052 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249112">SUSE bug 1249112</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048391" comment="cJSON-devel-1.7.19-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009862229" comment="cJSON-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048392" comment="libcjson1-1.7.19-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009862230" comment="libcjson1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202557803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-57803</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-57803" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-57803" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-57803" ref_url="https://www.suse.com/security/cve/CVE-2025-57803" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03113-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03150-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03151-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03152-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03164-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023597.html" source="SUSE-SU"/>
    <description>
    ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 6.9.13-28 and 7.1.2-2 for ImageMagick's 32-bit build, a 32-bit integer overflow in the BMP encoder's scanline-stride computation collapses bytes_per_line (stride) to a tiny value while the per-row writer still emits 3 x width bytes for 24-bpp images. The row base pointer advances using the (overflowed) stride, so the first row immediately writes past its slot and into adjacent heap memory with attacker-controlled bytes. This is a classic, powerful primitive for heap corruption in common auto-convert pipelines. This issue has been patched in versions 6.9.13-28 and 7.1.2-2.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-18"/>
	<updated date="2025-12-19"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H" cvss4="9/CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-57803/">CVE-2025-57803 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-57803">CVE-2025-57803 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248784">SUSE bug 1248784</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034111" comment="ImageMagick-7.1.2.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034112" comment="ImageMagick-config-7-SUSE-7.1.2.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034113" comment="ImageMagick-config-7-upstream-limited-7.1.2.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977490" comment="ImageMagick-config-7-upstream-limited is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034114" comment="ImageMagick-config-7-upstream-open-7.1.2.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977491" comment="ImageMagick-config-7-upstream-open is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034115" comment="ImageMagick-config-7-upstream-secure-7.1.2.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977492" comment="ImageMagick-config-7-upstream-secure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034116" comment="ImageMagick-config-7-upstream-websafe-7.1.2.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977493" comment="ImageMagick-config-7-upstream-websafe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034117" comment="ImageMagick-devel-7.1.2.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034118" comment="ImageMagick-doc-7.1.2.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034119" comment="ImageMagick-extra-7.1.2.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034120" comment="libMagick++-7_Q16HDRI5-7.1.2.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698047" comment="libMagick++-7_Q16HDRI5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034121" comment="libMagick++-devel-7.1.2.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034122" comment="libMagickCore-7_Q16HDRI10-7.1.2.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698048" comment="libMagickCore-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034123" comment="libMagickWand-7_Q16HDRI10-7.1.2.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698049" comment="libMagickWand-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034124" comment="perl-PerlMagick-7.1.2.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202557804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-57804</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-57804" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-57804" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-57804" ref_url="https://www.suse.com/security/cve/CVE-2025-57804" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03199-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03273-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20187-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024029.html" source="SUSE-SU"/>
    <description>
    h2 is a pure-Python implementation of a HTTP/2 protocol stack. Prior to version 4.3.0, an HTTP/2 request splitting vulnerability allows attackers to perform request smuggling attacks by injecting CRLF characters into headers. This occurs when servers downgrade HTTP/2 requests to HTTP/1.1 without properly validating header names/values, enabling attackers to manipulate request boundaries and bypass security controls. This issue has been patched in version 4.3.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-02-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-57804/">CVE-2025-57804 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-57804">CVE-2025-57804 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248737">SUSE bug 1248737</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041339" comment="python313-h2-4.2.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041632" comment="python313-h2 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202557807" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-57807</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-57807" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-57807" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-57807" ref_url="https://www.suse.com/security/cve/CVE-2025-57807" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03509-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03510-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03616-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042180.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023597.html" source="SUSE-SU"/>
    <description>
    ImageMagick is free and open-source software used for editing and manipulating digital images. ImageMagick versions lower than 14.8.2 include  insecure functions: SeekBlob(), which permits advancing the stream offset beyond the current end without increasing capacity, and WriteBlob(), which then expands by quantum + length (amortized) instead of offset + length, and copies to data + offset. When offset &gt;&gt; extent, the copy targets memory beyond the allocation, producing a deterministic heap write on 64-bit builds. No 2⁶⁴ arithmetic wrap, external delegates, or policy settings are required. This is fixed in version 14.8.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-18"/>
	<updated date="2025-12-24"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L" cvss4="1/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-57807/">CVE-2025-57807 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-57807">CVE-2025-57807 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249362">SUSE bug 1249362</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034111" comment="ImageMagick-7.1.2.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034112" comment="ImageMagick-config-7-SUSE-7.1.2.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034113" comment="ImageMagick-config-7-upstream-limited-7.1.2.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977490" comment="ImageMagick-config-7-upstream-limited is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034114" comment="ImageMagick-config-7-upstream-open-7.1.2.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977491" comment="ImageMagick-config-7-upstream-open is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034115" comment="ImageMagick-config-7-upstream-secure-7.1.2.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977492" comment="ImageMagick-config-7-upstream-secure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034116" comment="ImageMagick-config-7-upstream-websafe-7.1.2.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977493" comment="ImageMagick-config-7-upstream-websafe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034117" comment="ImageMagick-devel-7.1.2.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034118" comment="ImageMagick-doc-7.1.2.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034119" comment="ImageMagick-extra-7.1.2.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034120" comment="libMagick++-7_Q16HDRI5-7.1.2.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698047" comment="libMagick++-7_Q16HDRI5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034121" comment="libMagick++-devel-7.1.2.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034122" comment="libMagickCore-7_Q16HDRI10-7.1.2.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698048" comment="libMagickCore-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034123" comment="libMagickWand-7_Q16HDRI10-7.1.2.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698049" comment="libMagickWand-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034124" comment="perl-PerlMagick-7.1.2.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202558058" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-58058</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-58058" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58058" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-58058" ref_url="https://www.suse.com/security/cve/CVE-2025-58058" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03448-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/041996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21137-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4121-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024058.html" source="SUSE-SU"/>
    <description>
    xz is a pure golang package for reading and writing xz-compressed files. Prior to version 0.5.14, it is possible to put data in front of an LZMA-encoded byte stream without detecting the situation while reading the header. This can lead to increased memory consumption because the current implementation allocates the full decoding buffer directly after reading the header. The LZMA header doesn't include a magic number or has a checksum to detect such an issue according to the specification. Note that the code recognizes the issue later while reading the stream, but at this time the memory allocation has already been done. This issue has been patched in version 0.5.14.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-10-31"/>
	<updated date="2026-02-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58058/">CVE-2025-58058 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58058">CVE-2025-58058 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248889">SUSE bug 1248889</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030578" comment="alloy-1.11.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010030590" comment="alloy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033446" comment="hauler-1.3.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033447" comment="hauler is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039738" comment="sbctl-0.18-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039767" comment="sbctl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042598" comment="tailscale-1.94.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010042637" comment="tailscale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042599" comment="tailscale-bash-completion-1.94.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010042638" comment="tailscale-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042600" comment="tailscale-fish-completion-1.94.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010042639" comment="tailscale-fish-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042601" comment="tailscale-zsh-completion-1.94.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010042640" comment="tailscale-zsh-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032107" comment="trivy-0.66.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698141" comment="trivy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010024379" comment="warewulf4-4.6.4-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009862595" comment="warewulf4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010024380" comment="warewulf4-dracut-4.6.4-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009974127" comment="warewulf4-dracut is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010024381" comment="warewulf4-man-4.6.4-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009862596" comment="warewulf4-man is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010024382" comment="warewulf4-overlay-4.6.4-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009862597" comment="warewulf4-overlay is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010024383" comment="warewulf4-overlay-rke2-4.6.4-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010024393" comment="warewulf4-overlay-rke2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010024384" comment="warewulf4-overlay-slurm-4.6.4-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009862598" comment="warewulf4-overlay-slurm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010024385" comment="warewulf4-reference-doc-4.6.4-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009974128" comment="warewulf4-reference-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202558060" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-58060</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-58060" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58060" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-58060" ref_url="https://www.suse.com/security/cve/CVE-2025-58060" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:15700" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002001.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:15702" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001997.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:17054" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002112.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03178-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03261-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024560.html" source="SUSE-SU"/>
    <description>
    OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.12 and earlier, when the `AuthType` is set to anything but `Basic`, if the request contains an `Authorization: Basic ...` header, the password is not checked. This results in authentication bypass. Any configuration that allows an `AuthType` that is not `Basic` is affected. Version 2.4.13 fixes the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-06"/>
	<updated date="2026-03-06"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58060/">CVE-2025-58060 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58060">CVE-2025-58060 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249049">SUSE bug 1249049</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042222" comment="cups-2.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151184" comment="cups is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042223" comment="cups-client-2.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151185" comment="cups-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042224" comment="cups-config-2.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177129" comment="cups-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042225" comment="cups-ddk-2.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172754" comment="cups-ddk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042226" comment="cups-devel-2.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151186" comment="cups-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042227" comment="libcups2-2.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177130" comment="libcups2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042228" comment="libcupsimage2-2.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177132" comment="libcupsimage2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202558063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-58063</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-58063" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58063" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-58063" ref_url="https://www.suse.com/security/cve/CVE-2025-58063" source="SUSE CVE"/>
    <description>
    CoreDNS is a DNS server that chains plugins. Starting in version 1.2.0 and prior to version 1.12.4, the CoreDNS etcd plugin contains a TTL confusion vulnerability where lease IDs are incorrectly used as TTL values, enabling DNS cache pinning attacks. This effectively creates a DoS condition for DNS resolution of affected services. The `TTL()` function in `plugin/etcd/etcd.go` incorrectly casts etcd lease IDs (64-bit integers) to uint32 and uses them as TTL values. Large lease IDs become very large TTLs when cast to uint32. This enables cache pinning attacks. Version 1.12.4 contains a fix for the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-25"/>
	<updated date="2026-01-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2025-58063/">CVE-2025-58063 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58063">CVE-2025-58063 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249389">SUSE bug 1249389</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039725" comment="coredns-1.14.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009945102" comment="coredns is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039726" comment="coredns-extras-1.14.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009945103" comment="coredns-extras is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202558098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-58098</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-58098" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58098" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-58098" ref_url="https://www.suse.com/security/cve/CVE-2025-58098" source="SUSE CVE"/>
		<reference ref_id="ESSA-2026:0017" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002434.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23732" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002326.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23919" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003135.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0090" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4488-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023629.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023669.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023817.html" source="SUSE-SU"/>
    <description>
    Apache HTTP Server 2.4.65 and earlier with Server Side Includes (SSI) enabled and mod_cgid (but not mod_cgi) passes the shell-escaped query string to #exec cmd="..." directives.

This issue affects Apache HTTP Server before 2.4.66.

Users are recommended to upgrade to version 2.4.66, which fixes the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-16"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58098/">CVE-2025-58098 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58098">CVE-2025-58098 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254512">SUSE bug 1254512</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037713" comment="apache2-2.4.63-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151165" comment="apache2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037714" comment="apache2-devel-2.4.63-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151166" comment="apache2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037715" comment="apache2-event-2.4.63-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153274" comment="apache2-event is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037716" comment="apache2-manual-2.4.63-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009865251" comment="apache2-manual is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037717" comment="apache2-prefork-2.4.63-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151169" comment="apache2-prefork is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037718" comment="apache2-utils-2.4.63-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151170" comment="apache2-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037719" comment="apache2-worker-2.4.63-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153275" comment="apache2-worker is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202558160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-58160</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-58160" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58160" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-58160" ref_url="https://www.suse.com/security/cve/CVE-2025-58160" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2026:20990-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03082-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023507.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20335-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024263.html" source="SUSE-SU"/>
    <description>
    tracing is a framework for instrumenting Rust programs to collect structured, event-based diagnostic information. Prior to version 0.3.20, tracing-subscriber was vulnerable to ANSI escape sequence injection attacks. Untrusted user input containing ANSI escape sequences could be injected into terminal output when logged, potentially allowing attackers to manipulate terminal title bars, clear screens or modify terminal display, and potentially mislead users through terminal manipulation. tracing-subscriber version 0.3.20 fixes this vulnerability by escaping ANSI control characters when writing events to destinations that may be printed to the terminal. A workaround involves avoiding printing logs to terminal emulators without escaping ANSI control sequences.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-04-10"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58160/">CVE-2025-58160 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58160">CVE-2025-58160 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249007">SUSE bug 1249007</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038432" comment="cargo-c-0.10.15-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009948421" comment="cargo-c is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052692" comment="himmelblau-2.3.8+git0.dec3693-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032129" comment="himmelblau is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052693" comment="himmelblau-qr-greeter-2.3.8+git0.dec3693-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032130" comment="himmelblau-qr-greeter is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052694" comment="himmelblau-sshd-config-2.3.8+git0.dec3693-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032131" comment="himmelblau-sshd-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052695" comment="himmelblau-sso-2.3.8+git0.dec3693-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032132" comment="himmelblau-sso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052696" comment="libnss_himmelblau2-2.3.8+git0.dec3693-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032133" comment="libnss_himmelblau2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052697" comment="pam-himmelblau-2.3.8+git0.dec3693-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032134" comment="pam-himmelblau is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042305" comment="python313-maturin-1.8.7-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010042322" comment="python313-maturin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037704" comment="python313-uv-0.7.18-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037741" comment="python313-uv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037705" comment="python313-uv-bash-completion-0.7.18-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037742" comment="python313-uv-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037706" comment="python313-uv-fish-completion-0.7.18-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037743" comment="python313-uv-fish-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037707" comment="python313-uv-zsh-completion-0.7.18-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037744" comment="python313-uv-zsh-completion is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202558181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-58181</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-58181" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58181" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-58181" ref_url="https://www.suse.com/security/cve/CVE-2025-58181" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0439-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024109.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0666-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0972-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024810.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1118-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20539-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20578-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20651-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044817.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20694-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024729.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025109.html" source="SUSE-SU"/>
    <description>
    SSH servers parsing GSSAPI authentication requests do not validate the number of mechanisms specified in the request, allowing an attacker to cause unbounded memory consumption.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-06"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58181/">CVE-2025-58181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58181">CVE-2025-58181 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253784">SUSE bug 1253784</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035139" comment="cheat-4.4.2-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961128" comment="cheat is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050183" comment="cosign-3.0.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009707674" comment="cosign is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050184" comment="cosign-bash-completion-3.0.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010050218" comment="cosign-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050185" comment="cosign-fish-completion-3.0.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010050219" comment="cosign-fish-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050186" comment="cosign-zsh-completion-3.0.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010050220" comment="cosign-zsh-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044571" comment="docker-28.5.1_ce-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152505" comment="docker is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044572" comment="docker-bash-completion-28.5.1_ce-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152506" comment="docker-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044573" comment="docker-buildx-0.29.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037917" comment="docker-buildx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044574" comment="docker-fish-completion-28.5.1_ce-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009343480" comment="docker-fish-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044575" comment="docker-rootless-extras-28.5.1_ce-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009817681" comment="docker-rootless-extras is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049119" comment="docker-stable-24.0.9_ce-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009956652" comment="docker-stable is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049120" comment="docker-stable-bash-completion-24.0.9_ce-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009956653" comment="docker-stable-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049121" comment="docker-stable-buildx-0.25.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010049137" comment="docker-stable-buildx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049122" comment="docker-stable-fish-completion-24.0.9_ce-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009956654" comment="docker-stable-fish-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049123" comment="docker-stable-rootless-extras-24.0.9_ce-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009956655" comment="docker-stable-rootless-extras is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049124" comment="docker-stable-zsh-completion-24.0.9_ce-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009956656" comment="docker-stable-zsh-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044576" comment="docker-zsh-completion-28.5.1_ce-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152508" comment="docker-zsh-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041418" comment="elemental-register-1.8.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041627" comment="elemental-register is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041419" comment="elemental-support-1.8.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041628" comment="elemental-support is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041420" comment="elemental-toolkit-2.3.2-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041629" comment="elemental-toolkit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032565" comment="git-bug-0.10.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009969399" comment="git-bug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032566" comment="git-bug-bash-completion-0.10.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009969400" comment="git-bug-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032567" comment="git-bug-fish-completion-0.10.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009969401" comment="git-bug-fish-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032568" comment="git-bug-zsh-completion-0.10.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009969402" comment="git-bug-zsh-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037211" comment="trivy-0.68.2-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698141" comment="trivy is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202558183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-58183</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-58183" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58183" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-58183" ref_url="https://www.suse.com/security/cve/CVE-2025-58183" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:21778" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002262.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21815" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003123.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21964" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002266.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22011" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003110.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22030" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002275.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22668" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002272.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23002" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002291.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23087" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003156.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23325" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003132.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23326" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003130.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23394" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002335.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23948" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03547-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024646.html" source="SUSE-SU"/>
    <description>
    tar.Reader does not set a maximum size on the number of sparse region data blocks in GNU tar pax 1.0 sparse files. A maliciously-crafted archive containing a large number of sparse regions can cause a Reader to read an unbounded amount of data from the archive into memory. When reading from a compressed source, a small compressed input can result in large allocations.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-15"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58183/">CVE-2025-58183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58183">CVE-2025-58183 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251261">SUSE bug 1251261</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033432" comment="go1.24-1.24.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961683" comment="go1.24 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033433" comment="go1.24-doc-1.24.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961684" comment="go1.24-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033434" comment="go1.24-libstd-1.24.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033451" comment="go1.24-libstd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047321" comment="go1.24-openssl-1.24.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017809" comment="go1.24-openssl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047322" comment="go1.24-openssl-doc-1.24.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017810" comment="go1.24-openssl-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047323" comment="go1.24-openssl-race-1.24.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017811" comment="go1.24-openssl-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033435" comment="go1.24-race-1.24.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961685" comment="go1.24-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033428" comment="go1.25-1.25.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010014715" comment="go1.25 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033429" comment="go1.25-doc-1.25.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010014716" comment="go1.25-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033430" comment="go1.25-libstd-1.25.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033450" comment="go1.25-libstd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047311" comment="go1.25-openssl-1.25.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017812" comment="go1.25-openssl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047312" comment="go1.25-openssl-doc-1.25.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017813" comment="go1.25-openssl-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047313" comment="go1.25-openssl-race-1.25.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017814" comment="go1.25-openssl-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033431" comment="go1.25-race-1.25.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010014717" comment="go1.25-race is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202558185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-58185</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-58185" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58185" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-58185" ref_url="https://www.suse.com/security/cve/CVE-2025-58185" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03547-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024646.html" source="SUSE-SU"/>
    <description>
    Parsing a maliciously crafted DER payload could allocate large amounts of memory, causing memory exhaustion.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-15"/>
	<updated date="2026-03-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58185/">CVE-2025-58185 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58185">CVE-2025-58185 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251258">SUSE bug 1251258</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033432" comment="go1.24-1.24.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961683" comment="go1.24 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033433" comment="go1.24-doc-1.24.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961684" comment="go1.24-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033434" comment="go1.24-libstd-1.24.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033451" comment="go1.24-libstd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047321" comment="go1.24-openssl-1.24.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017809" comment="go1.24-openssl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047322" comment="go1.24-openssl-doc-1.24.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017810" comment="go1.24-openssl-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047323" comment="go1.24-openssl-race-1.24.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017811" comment="go1.24-openssl-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033435" comment="go1.24-race-1.24.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961685" comment="go1.24-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033428" comment="go1.25-1.25.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010014715" comment="go1.25 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033429" comment="go1.25-doc-1.25.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010014716" comment="go1.25-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033430" comment="go1.25-libstd-1.25.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033450" comment="go1.25-libstd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047311" comment="go1.25-openssl-1.25.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017812" comment="go1.25-openssl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047312" comment="go1.25-openssl-doc-1.25.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017813" comment="go1.25-openssl-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047313" comment="go1.25-openssl-race-1.25.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017814" comment="go1.25-openssl-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033431" comment="go1.25-race-1.25.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010014717" comment="go1.25-race is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202558186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-58186</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-58186" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58186" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-58186" ref_url="https://www.suse.com/security/cve/CVE-2025-58186" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03547-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024646.html" source="SUSE-SU"/>
    <description>
    Despite HTTP headers having a default limit of 1MB, the number of cookies that can be parsed does not have a limit. By sending a lot of very small cookies such as "a=;", an attacker can make an HTTP server allocate a large amount of structs, causing large memory consumption.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-15"/>
	<updated date="2026-03-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58186/">CVE-2025-58186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58186">CVE-2025-58186 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251259">SUSE bug 1251259</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033432" comment="go1.24-1.24.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961683" comment="go1.24 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033433" comment="go1.24-doc-1.24.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961684" comment="go1.24-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033434" comment="go1.24-libstd-1.24.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033451" comment="go1.24-libstd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047321" comment="go1.24-openssl-1.24.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017809" comment="go1.24-openssl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047322" comment="go1.24-openssl-doc-1.24.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017810" comment="go1.24-openssl-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047323" comment="go1.24-openssl-race-1.24.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017811" comment="go1.24-openssl-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033435" comment="go1.24-race-1.24.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961685" comment="go1.24-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033428" comment="go1.25-1.25.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010014715" comment="go1.25 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033429" comment="go1.25-doc-1.25.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010014716" comment="go1.25-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033430" comment="go1.25-libstd-1.25.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033450" comment="go1.25-libstd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047311" comment="go1.25-openssl-1.25.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017812" comment="go1.25-openssl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047312" comment="go1.25-openssl-doc-1.25.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017813" comment="go1.25-openssl-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047313" comment="go1.25-openssl-race-1.25.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017814" comment="go1.25-openssl-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033431" comment="go1.25-race-1.25.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010014717" comment="go1.25-race is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202558187" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-58187</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-58187" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58187" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-58187" ref_url="https://www.suse.com/security/cve/CVE-2025-58187" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03547-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024646.html" source="SUSE-SU"/>
    <description>
    Due to the design of the name constraint checking algorithm, the processing time of some inputs scale non-linearly with respect to the size of the certificate. This affects programs which validate arbitrary certificate chains.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-15"/>
	<updated date="2026-03-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58187/">CVE-2025-58187 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58187">CVE-2025-58187 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251254">SUSE bug 1251254</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033432" comment="go1.24-1.24.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961683" comment="go1.24 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033433" comment="go1.24-doc-1.24.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961684" comment="go1.24-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033434" comment="go1.24-libstd-1.24.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033451" comment="go1.24-libstd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047321" comment="go1.24-openssl-1.24.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017809" comment="go1.24-openssl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047322" comment="go1.24-openssl-doc-1.24.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017810" comment="go1.24-openssl-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047323" comment="go1.24-openssl-race-1.24.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017811" comment="go1.24-openssl-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033435" comment="go1.24-race-1.24.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961685" comment="go1.24-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033428" comment="go1.25-1.25.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010014715" comment="go1.25 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033429" comment="go1.25-doc-1.25.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010014716" comment="go1.25-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033430" comment="go1.25-libstd-1.25.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033450" comment="go1.25-libstd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047311" comment="go1.25-openssl-1.25.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017812" comment="go1.25-openssl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047312" comment="go1.25-openssl-doc-1.25.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017813" comment="go1.25-openssl-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047313" comment="go1.25-openssl-race-1.25.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017814" comment="go1.25-openssl-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033431" comment="go1.25-race-1.25.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010014717" comment="go1.25-race is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202558188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-58188</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-58188" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58188" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-58188" ref_url="https://www.suse.com/security/cve/CVE-2025-58188" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03547-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024646.html" source="SUSE-SU"/>
    <description>
    Validating certificate chains which contain DSA public keys can cause programs to panic, due to a interface cast that assumes they implement the Equal method. This affects programs which validate arbitrary certificate chains.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-15"/>
	<updated date="2026-03-07"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58188/">CVE-2025-58188 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58188">CVE-2025-58188 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251260">SUSE bug 1251260</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033432" comment="go1.24-1.24.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961683" comment="go1.24 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033433" comment="go1.24-doc-1.24.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961684" comment="go1.24-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033434" comment="go1.24-libstd-1.24.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033451" comment="go1.24-libstd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047321" comment="go1.24-openssl-1.24.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017809" comment="go1.24-openssl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047322" comment="go1.24-openssl-doc-1.24.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017810" comment="go1.24-openssl-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047323" comment="go1.24-openssl-race-1.24.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017811" comment="go1.24-openssl-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033435" comment="go1.24-race-1.24.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961685" comment="go1.24-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033428" comment="go1.25-1.25.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010014715" comment="go1.25 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033429" comment="go1.25-doc-1.25.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010014716" comment="go1.25-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033430" comment="go1.25-libstd-1.25.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033450" comment="go1.25-libstd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047311" comment="go1.25-openssl-1.25.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017812" comment="go1.25-openssl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047312" comment="go1.25-openssl-doc-1.25.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017813" comment="go1.25-openssl-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047313" comment="go1.25-openssl-race-1.25.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017814" comment="go1.25-openssl-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033431" comment="go1.25-race-1.25.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010014717" comment="go1.25-race is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202558189" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-58189</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-58189" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58189" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-58189" ref_url="https://www.suse.com/security/cve/CVE-2025-58189" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03547-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024646.html" source="SUSE-SU"/>
    <description>
    When Conn.Handshake fails during ALPN negotiation the error contains attacker controlled information (the ALPN protocols sent by the client) which is not escaped.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-15"/>
	<updated date="2026-03-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58189/">CVE-2025-58189 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58189">CVE-2025-58189 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251255">SUSE bug 1251255</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033432" comment="go1.24-1.24.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961683" comment="go1.24 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033433" comment="go1.24-doc-1.24.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961684" comment="go1.24-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033434" comment="go1.24-libstd-1.24.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033451" comment="go1.24-libstd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047321" comment="go1.24-openssl-1.24.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017809" comment="go1.24-openssl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047322" comment="go1.24-openssl-doc-1.24.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017810" comment="go1.24-openssl-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047323" comment="go1.24-openssl-race-1.24.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017811" comment="go1.24-openssl-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033435" comment="go1.24-race-1.24.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961685" comment="go1.24-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033428" comment="go1.25-1.25.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010014715" comment="go1.25 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033429" comment="go1.25-doc-1.25.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010014716" comment="go1.25-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033430" comment="go1.25-libstd-1.25.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033450" comment="go1.25-libstd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047311" comment="go1.25-openssl-1.25.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017812" comment="go1.25-openssl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047312" comment="go1.25-openssl-doc-1.25.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017813" comment="go1.25-openssl-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047313" comment="go1.25-openssl-race-1.25.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017814" comment="go1.25-openssl-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033431" comment="go1.25-race-1.25.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010014717" comment="go1.25-race is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202558190" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-58190</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-58190" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58190" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-58190" ref_url="https://www.suse.com/security/cve/CVE-2025-58190" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023339.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023608.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4446-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023607.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0403-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023811.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20176-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20244-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024237.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20357-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024326.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20685-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024734.html" source="SUSE-SU"/>
    <description>
    The html.Parse function in golang.org/x/net/html has an infinite parsing loop when processing certain inputs, which can lead to denial of service (DoS) if an attacker provides specially crafted HTML content.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-03-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58190/">CVE-2025-58190 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-58190">CVE-2025-58190 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251309">SUSE bug 1251309</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037881" comment="alloy-1.12.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010030590" comment="alloy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041418" comment="elemental-register-1.8.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041627" comment="elemental-register is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041419" comment="elemental-support-1.8.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041628" comment="elemental-support is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041420" comment="elemental-toolkit-2.3.2-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041629" comment="elemental-toolkit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032565" comment="git-bug-0.10.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009969399" comment="git-bug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032566" comment="git-bug-bash-completion-0.10.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009969400" comment="git-bug-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032567" comment="git-bug-fish-completion-0.10.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009969401" comment="git-bug-fish-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032568" comment="git-bug-zsh-completion-0.10.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009969402" comment="git-bug-zsh-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047338" comment="gitea-tea-0.12.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009968665" comment="gitea-tea is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047339" comment="gitea-tea-bash-completion-0.12.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009968666" comment="gitea-tea-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047340" comment="gitea-tea-zsh-completion-0.12.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009968667" comment="gitea-tea-zsh-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037905" comment="go-sendxmpp-0.15.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010015344" comment="go-sendxmpp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033446" comment="hauler-1.3.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033447" comment="hauler is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047570" comment="helm-3.19.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009718853" comment="helm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047571" comment="helm-bash-completion-3.19.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009718854" comment="helm-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047572" comment="helm-fish-completion-3.19.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009718855" comment="helm-fish-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047573" comment="helm-zsh-completion-3.19.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009718856" comment="helm-zsh-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010043899" comment="kepler-0.11.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010043907" comment="kepler is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039738" comment="sbctl-0.18-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039767" comment="sbctl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037211" comment="trivy-0.68.2-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698141" comment="trivy is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202558266" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-58266</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-58266" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58266" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-58266" ref_url="https://www.suse.com/security/cve/CVE-2025-58266" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02809-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02810-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041229.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02811-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041228.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024836.html" source="SUSE-SU"/>
    <description>
    Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Fumiki Takahashi Gianism gianism allows Stored XSS.This issue affects Gianism: from n/a through &lt;= 6.0.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-58266/">CVE-2025-58266 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58266">CVE-2025-58266 at NVD</cve>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049112" comment="keylime-ima-policy-0.2.8+116-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010049138" comment="keylime-ima-policy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049113" comment="rust-keylime-0.2.8+116-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010049139" comment="rust-keylime is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202558364" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-58364</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-58364" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58364" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-58364" ref_url="https://www.suse.com/security/cve/CVE-2025-58364" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:15700" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002001.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22063" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002257.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03178-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041666.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03261-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024560.html" source="SUSE-SU"/>
    <description>
    OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.12 and earlier, an unsafe deserialization and validation of printer attributes causes null dereference in the libcups library. This is a remote DoS vulnerability available in local subnet in default configurations. It can cause the cups &amp; cups-browsed to crash, on all the machines in local network who are listening for printers (so by default for all regular linux machines). On systems where the vulnerability CVE-2024-47176 (cups-filters 1.x/cups-browsed 2.x vulnerability) was not fixed, and the firewall on the machine does not reject incoming communication to IPP port, and the machine is set to be available to public internet, attack vector "Network" is possible. The current versions of CUPS and cups-browsed projects have the attack vector "Adjacent" in their default configurations. Version 2.4.13 contains a patch for CVE-2025-58364.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-06"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-58364/">CVE-2025-58364 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-58364">CVE-2025-58364 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249128">SUSE bug 1249128</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042222" comment="cups-2.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151184" comment="cups is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042223" comment="cups-client-2.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151185" comment="cups-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042224" comment="cups-config-2.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177129" comment="cups-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042225" comment="cups-ddk-2.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172754" comment="cups-ddk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042226" comment="cups-devel-2.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151186" comment="cups-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042227" comment="libcups2-2.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177130" comment="libcups2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042228" comment="libcupsimage2-2.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177132" comment="libcupsimage2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202558436" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-58436</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-58436" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-58436" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-58436" ref_url="https://www.suse.com/security/cve/CVE-2025-58436" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0312" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003168.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0596" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024560.html" source="SUSE-SU"/>
    <description>
    OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. Prior to version 2.4.15, a client that connects to cupsd but sends slow messages, e.g. only one byte per second, delays cupsd as a whole, such that it becomes unusable by other clients. This issue has been patched in version 2.4.15.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-06"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-58436/">CVE-2025-58436 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-58436">CVE-2025-58436 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244057">SUSE bug 1244057</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042222" comment="cups-2.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151184" comment="cups is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042223" comment="cups-client-2.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151185" comment="cups-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042224" comment="cups-config-2.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177129" comment="cups-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042225" comment="cups-ddk-2.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172754" comment="cups-ddk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042226" comment="cups-devel-2.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151186" comment="cups-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042227" comment="libcups2-2.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177130" comment="libcups2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042228" comment="libcupsimage2-2.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177132" comment="libcupsimage2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202559044" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-59044</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-59044" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59044" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-59044" ref_url="https://www.suse.com/security/cve/CVE-2025-59044" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023507.html" source="SUSE-SU"/>
    <description>
    Himmelblau is an interoperability suite for Microsoft Azure Entra ID and Intune. Himmelblau 0.9.x derives numeric GIDs for Entra ID groups from the group display name when himmelblau.conf `id_attr_map = name` (the default configuration). Because Microsoft Entra ID allows multiple groups with the same `displayName` (including end-user-created personal/O365 groups, depending on tenant policy), distinct directory groups can collapse to the same numeric GID on Linux. This issue only applies to Himmelblau versions 0.9.0 through 0.9.22. Any resource or service on a Himmelblau-joined host that enforces authorization by numeric GID (files/dirs, etc.) can be unintentionally accessible to a user who creates or joins a different Entra/O365 group that happens to share the same `displayName` as a privileged security group. Users should upgrade to 0.9.23, or 1.0.0 or later, to receive a patch. Group to GID mapping now uses Entra ID object IDs (GUIDs) and does not collide on same-name groups. As a workaround, use tenant policy hardening to restrict arbitrary group creation until all hosts are patched.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2025-12-19"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-59044/">CVE-2025-59044 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-59044">CVE-2025-59044 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250687">SUSE bug 1250687</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032094" comment="himmelblau-0.9.23+git.0.9776141-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032129" comment="himmelblau is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032095" comment="himmelblau-qr-greeter-0.9.23+git.0.9776141-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032130" comment="himmelblau-qr-greeter is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032096" comment="himmelblau-sshd-config-0.9.23+git.0.9776141-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032131" comment="himmelblau-sshd-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032097" comment="himmelblau-sso-0.9.23+git.0.9776141-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032132" comment="himmelblau-sso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032098" comment="libnss_himmelblau2-0.9.23+git.0.9776141-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032133" comment="libnss_himmelblau2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032099" comment="pam-himmelblau-0.9.23+git.0.9776141-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032134" comment="pam-himmelblau is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202559362" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-59362</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-59362" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59362" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-59362" ref_url="https://www.suse.com/security/cve/CVE-2025-59362" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03521-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03606-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03607-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042170.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03627-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023819.html" source="SUSE-SU"/>
    <description>
    Squid through 7.1 mishandles ASN.1 encoding of long SNMP OIDs. This occurs in asn_build_objid in lib/snmplib/asn1.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-16"/>
	<updated date="2026-01-22"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-59362/">CVE-2025-59362 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-59362">CVE-2025-59362 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250627">SUSE bug 1250627</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037708" comment="squid-6.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152563" comment="squid is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202559375" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-59375</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-59375" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59375" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-59375" ref_url="https://www.suse.com/security/cve/CVE-2025-59375" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:21773" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002267.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21776" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002247.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21974" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002294.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22175" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003146.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3407" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03508-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03536-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042068.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03537-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042069.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03624-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20868-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20895-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21006-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045353.html" source="SUSE-SU"/>
    <description>
    libexpat in Expat before 2.7.2 allows attackers to trigger large dynamic memory allocations via a small document that is submitted for parsing.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-22"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-59375/">CVE-2025-59375 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-59375">CVE-2025-59375 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249584">SUSE bug 1249584</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052591" comment="MozillaFirefox-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052592" comment="MozillaFirefox-branding-upstream-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052593" comment="MozillaFirefox-devel-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052594" comment="MozillaFirefox-translations-common-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052595" comment="MozillaFirefox-translations-other-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030542" comment="expat-2.7.1-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151330" comment="expat is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030543" comment="libexpat-devel-2.7.1-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151331" comment="libexpat-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030544" comment="libexpat1-2.7.1-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151332" comment="libexpat1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202559432" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-59432</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-59432" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59432" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-59432" ref_url="https://www.suse.com/security/cve/CVE-2025-59432" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4054-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023249.html" source="SUSE-SU"/>
    <description>
    SCRAM (Salted Challenge Response Authentication Mechanism) is part of the family of Simple Authentication and Security Layer (SASL, RFC 4422) authentication mechanisms. Prior to version 3.2, a timing attack vulnerability exists in the SCRAM Java implementation. The issue arises because Arrays.equals was used to compare secret values such as client proofs and server signatures. Since Arrays.equals performs a short-circuit comparison, the execution time varies depending on how many leading bytes match. This behavior could allow an attacker to perform a timing side-channel attack and potentially infer sensitive authentication material. All users relying on SCRAM authentication are impacted. This vulnerability has been patched in version 3.1 by replacing Arrays.equals with MessageDigest.isEqual, which ensures constant-time comparison.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-22"/>
	<updated date="2025-11-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-59432/">CVE-2025-59432 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-59432">CVE-2025-59432 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250399">SUSE bug 1250399</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030558" comment="ongres-scram-3.1-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009706499" comment="ongres-scram is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030559" comment="ongres-scram-client-3.1-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009706500" comment="ongres-scram-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030560" comment="ongres-scram-javadoc-3.1-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009706502" comment="ongres-scram-javadoc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202559438" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-59438</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-59438" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59438" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-59438" ref_url="https://www.suse.com/security/cve/CVE-2025-59438" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21018-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045388.html" source="SUSE-SU"/>
    <description>
    Mbed TLS through 3.6.4 has an Observable Timing Discrepancy.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-13"/>
	<updated date="2026-04-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-59438/">CVE-2025-59438 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-59438">CVE-2025-59438 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252433">SUSE bug 1252433</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025790" comment="micropython-1.26.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025793" comment="micropython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025791" comment="mpremote-1.26.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025794" comment="mpremote is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025792" comment="mpy-tools-1.26.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025795" comment="mpy-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202559465" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-59465</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-59465" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59465" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-59465" ref_url="https://www.suse.com/security/cve/CVE-2025-59465" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2420" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002499.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2421" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002504.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2422" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002490.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2767" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002552.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2781" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003224.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2782" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003228.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2783" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003252.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2864" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024339.html" source="SUSE-SU"/>
    <description>
    A malformed `HTTP/2 HEADERS` frame with oversized, invalid `HPACK` data can cause Node.js to crash by triggering an unhandled `TLSSocket` error `ECONNRESET`. Instead of safely closing the connection, the process crashes, enabling a remote denial of service. This primarily affects applications that do not attach explicit error handlers to secure sockets, for example:
```
server.on('secureConnection', socket =&gt; {
  socket.on('error', err =&gt; {
    console.log(err)
  })
})
```
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-18"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-59465/">CVE-2025-59465 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-59465">CVE-2025-59465 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256573">SUSE bug 1256573</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044193" comment="corepack22-22.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961686" comment="corepack22 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044194" comment="nodejs22-22.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961687" comment="nodejs22 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044195" comment="nodejs22-devel-22.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961688" comment="nodejs22-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044196" comment="nodejs22-docs-22.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961689" comment="nodejs22-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044197" comment="npm22-22.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961690" comment="npm22 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202559466" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-59466</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-59466" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59466" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-59466" ref_url="https://www.suse.com/security/cve/CVE-2025-59466" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2420" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002499.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2421" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002504.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2422" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002490.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2781" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003224.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2782" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003228.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2783" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003252.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024339.html" source="SUSE-SU"/>
    <description>
    We have identified a bug in Node.js error handling where "Maximum call stack size exceeded" errors become uncatchable when `async_hooks.createHook()` is enabled. Instead of reaching `process.on('uncaughtException')`, the process terminates, making the crash unrecoverable. Applications that rely on `AsyncLocalStorage` (v22, v20) or `async_hooks.createHook()` (v24, v22, v20) become vulnerable to denial-of-service crashes triggered by deep recursion under specific conditions.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-18"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-59466/">CVE-2025-59466 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-59466">CVE-2025-59466 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256574">SUSE bug 1256574</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044193" comment="corepack22-22.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961686" comment="corepack22 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044194" comment="nodejs22-22.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961687" comment="nodejs22 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044195" comment="nodejs22-devel-22.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961688" comment="nodejs22-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044196" comment="nodejs22-docs-22.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961689" comment="nodejs22-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044197" comment="npm22-22.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961690" comment="npm22 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202559681" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-59681</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-59681" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59681" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-59681" ref_url="https://www.suse.com/security/cve/CVE-2025-59681" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03446-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/041998.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Django 4.2 before 4.2.25, 5.1 before 5.1.13, and 5.2 before 5.2.7. QuerySet.annotate(), QuerySet.alias(), QuerySet.aggregate(), and QuerySet.extra() are subject to SQL injection in column aliases, when using a suitably crafted dictionary, with dictionary expansion, as the **kwargs passed to these methods (on MySQL and MariaDB).
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2025-11-11"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-59681/">CVE-2025-59681 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-59681">CVE-2025-59681 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250485">SUSE bug 1250485</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025473" comment="python313-Django-5.2.4-bp160.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025481" comment="python313-Django is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202559682" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-59682</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-59682" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59682" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-59682" ref_url="https://www.suse.com/security/cve/CVE-2025-59682" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03446-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/041998.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in Django 4.2 before 4.2.25, 5.1 before 5.1.13, and 5.2 before 5.2.7. The django.utils.archive.extract() function, used by the "startapp --template" and "startproject --template" commands, allows partial directory traversal via an archive with file paths sharing a common prefix with the target directory.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-11"/>
	<updated date="2025-11-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-59682/">CVE-2025-59682 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-59682">CVE-2025-59682 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250487">SUSE bug 1250487</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010025473" comment="python313-Django-5.2.4-bp160.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025481" comment="python313-Django is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202559777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-59777</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-59777" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-59777" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-59777" ref_url="https://www.suse.com/security/cve/CVE-2025-59777" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023745.html" source="SUSE-SU"/>
    <description>
    NULL pointer dereference vulnerability exists in GNU libmicrohttpd v1.0.2 and earlier. The vulnerability was fixed in commit ff13abc on the master branch of the libmicrohttpd Git repository, after the v1.0.2 tag. A specially crafted packet sent by an attacker could cause a denial-of-service (DoS) condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-13"/>
	<updated date="2026-01-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-59777/">CVE-2025-59777 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-59777">CVE-2025-59777 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253177">SUSE bug 1253177</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037183" comment="libmicrohttpd-devel-1.0.1-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009157573" comment="libmicrohttpd-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037184" comment="libmicrohttpd12-1.0.1-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009751539" comment="libmicrohttpd12 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20256032" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-6032</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-6032" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6032" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-6032" ref_url="https://www.suse.com/security/cve/CVE-2025-6032" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:10550" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001767.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10551" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02806-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041233.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02807-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041232.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02808-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041231.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20692-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20805-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024659.html" source="SUSE-SU"/>
    <description>
    A flaw was found in Podman. The podman machine init command fails to verify the TLS certificate when downloading the VM images from an OCI registry. This issue results in a Man In The Middle attack.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" cvss4="9/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-6032/">CVE-2025-6032 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6032">CVE-2025-6032 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245320">SUSE bug 1245320</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047314" comment="podman-5.4.2-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266791" comment="podman is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047315" comment="podman-docker-5.4.2-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009707063" comment="podman-docker is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047316" comment="podman-remote-5.4.2-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009707064" comment="podman-remote is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047317" comment="podmansh-5.4.2-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009853422" comment="podmansh is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20256069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-6069</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-6069" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6069" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-6069" ref_url="https://www.suse.com/security/cve/CVE-2025-6069" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23342" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003140.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23530" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02232-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02297-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02358-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02359-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02427-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040822.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02460-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02523-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02597-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02717-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02767-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02778-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02802-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20492-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20539-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3706-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20125-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023948.html" source="SUSE-SU"/>
    <description>
    The html.parser.HTMLParser class had worse-case quadratic complexity when processing certain crafted malformed inputs potentially leading to amplified denial-of-service.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-25"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2025-6069/">CVE-2025-6069 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6069">CVE-2025-6069 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244705">SUSE bug 1244705</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039656" comment="libpython3_13-1_0-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039739" comment="libpython3_13-1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039657" comment="libpython3_13-1_0-x86-64-v3-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039740" comment="libpython3_13-1_0-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039658" comment="libpython3_13t1_0-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039741" comment="libpython3_13t1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039659" comment="python313-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039742" comment="python313 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039660" comment="python313-base-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039743" comment="python313-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039661" comment="python313-base-x86-64-v3-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039744" comment="python313-base-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039662" comment="python313-curses-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039745" comment="python313-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039663" comment="python313-dbm-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039746" comment="python313-dbm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039664" comment="python313-devel-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039747" comment="python313-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039665" comment="python313-doc-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039748" comment="python313-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039666" comment="python313-doc-devhelp-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039749" comment="python313-doc-devhelp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039667" comment="python313-idle-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039750" comment="python313-idle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039668" comment="python313-nogil-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039751" comment="python313-nogil is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039669" comment="python313-nogil-base-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039752" comment="python313-nogil-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039670" comment="python313-nogil-curses-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039753" comment="python313-nogil-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039671" comment="python313-nogil-dbm-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039754" comment="python313-nogil-dbm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039672" comment="python313-nogil-devel-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039755" comment="python313-nogil-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039673" comment="python313-nogil-idle-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039756" comment="python313-nogil-idle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039674" comment="python313-nogil-testsuite-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039757" comment="python313-nogil-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039675" comment="python313-nogil-tk-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039758" comment="python313-nogil-tk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039676" comment="python313-nogil-tools-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039759" comment="python313-nogil-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039677" comment="python313-testsuite-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039760" comment="python313-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039678" comment="python313-tk-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039761" comment="python313-tk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039679" comment="python313-tools-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039762" comment="python313-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039680" comment="python313-x86-64-v3-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039763" comment="python313-x86-64-v3 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20256075" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-6075</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-6075" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6075" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-6075" ref_url="https://www.suse.com/security/cve/CVE-2025-6075" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23342" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003140.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23530" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4257-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0268-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20125-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024893.html" source="SUSE-SU"/>
    <description>
    If the value passed to os.path.expandvars() is user-controlled a 
performance degradation is possible when expanding environment 
variables.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-25"/>
	<updated date="2026-04-11"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="1.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-6075/">CVE-2025-6075 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-6075">CVE-2025-6075 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252974">SUSE bug 1252974</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039656" comment="libpython3_13-1_0-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039739" comment="libpython3_13-1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039657" comment="libpython3_13-1_0-x86-64-v3-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039740" comment="libpython3_13-1_0-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039658" comment="libpython3_13t1_0-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039741" comment="libpython3_13t1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039659" comment="python313-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039742" comment="python313 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039660" comment="python313-base-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039743" comment="python313-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039661" comment="python313-base-x86-64-v3-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039744" comment="python313-base-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039662" comment="python313-curses-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039745" comment="python313-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039663" comment="python313-dbm-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039746" comment="python313-dbm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039664" comment="python313-devel-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039747" comment="python313-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039665" comment="python313-doc-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039748" comment="python313-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039666" comment="python313-doc-devhelp-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039749" comment="python313-doc-devhelp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039667" comment="python313-idle-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039750" comment="python313-idle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039668" comment="python313-nogil-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039751" comment="python313-nogil is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039669" comment="python313-nogil-base-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039752" comment="python313-nogil-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039670" comment="python313-nogil-curses-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039753" comment="python313-nogil-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039671" comment="python313-nogil-dbm-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039754" comment="python313-nogil-dbm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039672" comment="python313-nogil-devel-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039755" comment="python313-nogil-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039673" comment="python313-nogil-idle-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039756" comment="python313-nogil-idle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039674" comment="python313-nogil-testsuite-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039757" comment="python313-nogil-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039675" comment="python313-nogil-tk-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039758" comment="python313-nogil-tk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039676" comment="python313-nogil-tools-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039759" comment="python313-nogil-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039677" comment="python313-testsuite-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039760" comment="python313-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039678" comment="python313-tk-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039761" comment="python313-tk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039679" comment="python313-tools-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039762" comment="python313-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039680" comment="python313-x86-64-v3-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039763" comment="python313-x86-64-v3 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202560876" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-60876</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-60876" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-60876" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-60876" ref_url="https://www.suse.com/security/cve/CVE-2025-60876" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0235-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0236-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20134-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043737.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024802.html" source="SUSE-SU"/>
    <description>
    BusyBox wget thru 1.3.7 accepted raw CR (0x0D)/LF (0x0A) and other C0 control bytes in the HTTP request-target (path/query), allowing the request line to be split and attacker-controlled headers to be injected. To preserve the HTTP/1.1 request-line shape METHOD SP request-target SP HTTP/1.1, a raw space (0x20) in the request-target must also be rejected (clients should use %20).
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-25"/>
	<updated date="2026-03-24"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N" cvss4="8.8/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:L/SC:H/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2025-60876/">CVE-2025-60876 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-60876">CVE-2025-60876 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253245">SUSE bug 1253245</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039709" comment="busybox-1.37.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152555" comment="busybox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039710" comment="busybox-static-1.37.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009653584" comment="busybox-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039711" comment="busybox-warewulf3-1.37.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009724864" comment="busybox-warewulf3 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202561140" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-61140</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-61140" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61140" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-61140" ref_url="https://www.suse.com/security/cve/CVE-2025-61140" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:1008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024627.html" source="SUSE-SU"/>
    <description>
    The value function in jsonpath 1.1.1 lib/index.js is vulnerable to Prototype Pollution.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-19"/>
	<updated date="2026-03-31"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61140/">CVE-2025-61140 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61140">CVE-2025-61140 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257442">SUSE bug 1257442</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044293" comment="golang-github-prometheus-prometheus-3.5.0-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630838" comment="golang-github-prometheus-prometheus is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202561659" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-61659</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-61659" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61659" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-61659" ref_url="https://www.suse.com/security/cve/CVE-2025-61659" source="SUSE CVE"/>
    <description>
    bash-git-prompt 2.6.1 through 2.7.1 insecurely uses the /tmp/git-index-private$$ file, which has a predictable name.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-02"/>
	<updated date="2026-01-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-61659/">CVE-2025-61659 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61659">CVE-2025-61659 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247489">SUSE bug 1247489</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035667" comment="bash-git-prompt-2.7.1-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032346" comment="bash-git-prompt is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202561661" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-61661</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-61661" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61661" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-61661" ref_url="https://www.suse.com/security/cve/CVE-2025-61661" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023439.html" source="SUSE-SU"/>
    <description>
    A vulnerability has been identified in the GRUB (Grand Unified Bootloader) component. This flaw occurs because the bootloader mishandles string conversion when reading information from a USB device, allowing an attacker to exploit inconsistent length values. A local attacker can connect a maliciously configured USB device during the boot sequence to trigger this issue. A successful exploitation may lead GRUB to crash, leading to a Denial of Service. Data corruption may be also possible, although given the complexity of the exploit the impact is most likely limited.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-18"/>
	<updated date="2025-12-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="4.3/CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61661/">CVE-2025-61661 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61661">CVE-2025-61661 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252932">SUSE bug 1252932</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034125" comment="grub2-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153175" comment="grub2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034126" comment="grub2-arm64-efi-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623763" comment="grub2-arm64-efi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034127" comment="grub2-arm64-efi-bls-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010034157" comment="grub2-arm64-efi-bls is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034128" comment="grub2-arm64-efi-debug-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623764" comment="grub2-arm64-efi-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034129" comment="grub2-arm64-efi-extras-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009802512" comment="grub2-arm64-efi-extras is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034130" comment="grub2-branding-upstream-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153176" comment="grub2-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034131" comment="grub2-common-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010034158" comment="grub2-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034132" comment="grub2-i386-pc-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153178" comment="grub2-i386-pc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034133" comment="grub2-i386-pc-debug-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291438" comment="grub2-i386-pc-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034134" comment="grub2-i386-pc-extras-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009802514" comment="grub2-i386-pc-extras is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034135" comment="grub2-powerpc-ieee1275-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623765" comment="grub2-powerpc-ieee1275 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034136" comment="grub2-powerpc-ieee1275-debug-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623766" comment="grub2-powerpc-ieee1275-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034137" comment="grub2-powerpc-ieee1275-extras-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009802516" comment="grub2-powerpc-ieee1275-extras is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034138" comment="grub2-s390x-emu-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623767" comment="grub2-s390x-emu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034139" comment="grub2-s390x-emu-debug-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623768" comment="grub2-s390x-emu-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034140" comment="grub2-s390x-emu-extras-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009802517" comment="grub2-s390x-emu-extras is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034141" comment="grub2-snapper-plugin-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153179" comment="grub2-snapper-plugin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034142" comment="grub2-systemd-sleep-plugin-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154139" comment="grub2-systemd-sleep-plugin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034143" comment="grub2-x86_64-efi-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153180" comment="grub2-x86_64-efi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034144" comment="grub2-x86_64-efi-bls-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010034159" comment="grub2-x86_64-efi-bls is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034145" comment="grub2-x86_64-efi-debug-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291439" comment="grub2-x86_64-efi-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034146" comment="grub2-x86_64-efi-extras-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009802518" comment="grub2-x86_64-efi-extras is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034147" comment="grub2-x86_64-xen-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153181" comment="grub2-x86_64-xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034148" comment="grub2-x86_64-xen-debug-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009964903" comment="grub2-x86_64-xen-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034149" comment="grub2-x86_64-xen-extras-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009802519" comment="grub2-x86_64-xen-extras is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202561662" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-61662</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-61662" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61662" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-61662" ref_url="https://www.suse.com/security/cve/CVE-2025-61662" source="SUSE CVE"/>
		<reference ref_id="ESSA-2026:0049" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002611.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4148" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002610.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4648" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002582.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4760" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003262.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4823" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023439.html" source="SUSE-SU"/>
    <description>
    A Use-After-Free vulnerability has been discovered in GRUB's gettext module. This flaw stems from a programming error where the gettext command remains registered in memory after its module is unloaded. An attacker can exploit this condition by invoking the orphaned command, causing the application to access a memory location that is no longer valid. An attacker could exploit this vulnerability to cause grub to crash, leading to a Denial of Service. Possible data integrity or confidentiality compromise is not discarded.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-18"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="2.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61662/">CVE-2025-61662 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-61662">CVE-2025-61662 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252933">SUSE bug 1252933</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034125" comment="grub2-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153175" comment="grub2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034126" comment="grub2-arm64-efi-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623763" comment="grub2-arm64-efi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034127" comment="grub2-arm64-efi-bls-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010034157" comment="grub2-arm64-efi-bls is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034128" comment="grub2-arm64-efi-debug-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623764" comment="grub2-arm64-efi-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034129" comment="grub2-arm64-efi-extras-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009802512" comment="grub2-arm64-efi-extras is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034130" comment="grub2-branding-upstream-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153176" comment="grub2-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034131" comment="grub2-common-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010034158" comment="grub2-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034132" comment="grub2-i386-pc-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153178" comment="grub2-i386-pc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034133" comment="grub2-i386-pc-debug-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291438" comment="grub2-i386-pc-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034134" comment="grub2-i386-pc-extras-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009802514" comment="grub2-i386-pc-extras is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034135" comment="grub2-powerpc-ieee1275-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623765" comment="grub2-powerpc-ieee1275 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034136" comment="grub2-powerpc-ieee1275-debug-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623766" comment="grub2-powerpc-ieee1275-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034137" comment="grub2-powerpc-ieee1275-extras-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009802516" comment="grub2-powerpc-ieee1275-extras is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034138" comment="grub2-s390x-emu-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623767" comment="grub2-s390x-emu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034139" comment="grub2-s390x-emu-debug-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623768" comment="grub2-s390x-emu-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034140" comment="grub2-s390x-emu-extras-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009802517" comment="grub2-s390x-emu-extras is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034141" comment="grub2-snapper-plugin-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153179" comment="grub2-snapper-plugin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034142" comment="grub2-systemd-sleep-plugin-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154139" comment="grub2-systemd-sleep-plugin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034143" comment="grub2-x86_64-efi-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153180" comment="grub2-x86_64-efi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034144" comment="grub2-x86_64-efi-bls-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010034159" comment="grub2-x86_64-efi-bls is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034145" comment="grub2-x86_64-efi-debug-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291439" comment="grub2-x86_64-efi-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034146" comment="grub2-x86_64-efi-extras-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009802518" comment="grub2-x86_64-efi-extras is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034147" comment="grub2-x86_64-xen-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153181" comment="grub2-x86_64-xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034148" comment="grub2-x86_64-xen-debug-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009964903" comment="grub2-x86_64-xen-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034149" comment="grub2-x86_64-xen-extras-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009802519" comment="grub2-x86_64-xen-extras is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202561663" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-61663</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-61663" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61663" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-61663" ref_url="https://www.suse.com/security/cve/CVE-2025-61663" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023439.html" source="SUSE-SU"/>
    <description>
    A vulnerability has been identified in the GRUB2 bootloader's normal command that poses an immediate Denial of Service (DoS) risk. This flaw is a Use-after-Free issue, caused because the normal command is not properly unregistered when the module is unloaded. An attacker who can execute this command can force the system to access memory locations that are no longer valid. Successful exploitation leads directly to system instability, which can result in a complete crash and halt system availability. Impact on the data integrity and confidentiality is also not discarded.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-18"/>
	<updated date="2025-12-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="2.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61663/">CVE-2025-61663 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61663">CVE-2025-61663 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252934">SUSE bug 1252934</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034125" comment="grub2-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153175" comment="grub2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034126" comment="grub2-arm64-efi-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623763" comment="grub2-arm64-efi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034127" comment="grub2-arm64-efi-bls-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010034157" comment="grub2-arm64-efi-bls is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034128" comment="grub2-arm64-efi-debug-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623764" comment="grub2-arm64-efi-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034129" comment="grub2-arm64-efi-extras-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009802512" comment="grub2-arm64-efi-extras is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034130" comment="grub2-branding-upstream-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153176" comment="grub2-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034131" comment="grub2-common-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010034158" comment="grub2-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034132" comment="grub2-i386-pc-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153178" comment="grub2-i386-pc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034133" comment="grub2-i386-pc-debug-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291438" comment="grub2-i386-pc-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034134" comment="grub2-i386-pc-extras-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009802514" comment="grub2-i386-pc-extras is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034135" comment="grub2-powerpc-ieee1275-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623765" comment="grub2-powerpc-ieee1275 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034136" comment="grub2-powerpc-ieee1275-debug-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623766" comment="grub2-powerpc-ieee1275-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034137" comment="grub2-powerpc-ieee1275-extras-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009802516" comment="grub2-powerpc-ieee1275-extras is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034138" comment="grub2-s390x-emu-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623767" comment="grub2-s390x-emu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034139" comment="grub2-s390x-emu-debug-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623768" comment="grub2-s390x-emu-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034140" comment="grub2-s390x-emu-extras-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009802517" comment="grub2-s390x-emu-extras is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034141" comment="grub2-snapper-plugin-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153179" comment="grub2-snapper-plugin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034142" comment="grub2-systemd-sleep-plugin-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154139" comment="grub2-systemd-sleep-plugin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034143" comment="grub2-x86_64-efi-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153180" comment="grub2-x86_64-efi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034144" comment="grub2-x86_64-efi-bls-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010034159" comment="grub2-x86_64-efi-bls is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034145" comment="grub2-x86_64-efi-debug-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291439" comment="grub2-x86_64-efi-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034146" comment="grub2-x86_64-efi-extras-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009802518" comment="grub2-x86_64-efi-extras is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034147" comment="grub2-x86_64-xen-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153181" comment="grub2-x86_64-xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034148" comment="grub2-x86_64-xen-debug-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009964903" comment="grub2-x86_64-xen-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034149" comment="grub2-x86_64-xen-extras-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009802519" comment="grub2-x86_64-xen-extras is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202561664" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-61664</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-61664" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61664" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-61664" ref_url="https://www.suse.com/security/cve/CVE-2025-61664" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023310.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4196-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023336.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023335.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4305-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023439.html" source="SUSE-SU"/>
    <description>
    A vulnerability in the GRUB2 bootloader has been identified in the normal module. This flaw, a memory Use After Free issue, occurs because the normal_exit command is not properly unregistered when its related module is unloaded. An attacker can exploit this condition by invoking the command after the module has been removed, causing the system to improperly access a previously freed memory location. This leads to a system crash or possible impacts in data confidentiality and integrity.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-18"/>
	<updated date="2025-12-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="2.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61664/">CVE-2025-61664 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61664">CVE-2025-61664 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252935">SUSE bug 1252935</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034125" comment="grub2-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153175" comment="grub2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034126" comment="grub2-arm64-efi-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623763" comment="grub2-arm64-efi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034127" comment="grub2-arm64-efi-bls-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010034157" comment="grub2-arm64-efi-bls is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034128" comment="grub2-arm64-efi-debug-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623764" comment="grub2-arm64-efi-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034129" comment="grub2-arm64-efi-extras-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009802512" comment="grub2-arm64-efi-extras is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034130" comment="grub2-branding-upstream-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153176" comment="grub2-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034131" comment="grub2-common-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010034158" comment="grub2-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034132" comment="grub2-i386-pc-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153178" comment="grub2-i386-pc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034133" comment="grub2-i386-pc-debug-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291438" comment="grub2-i386-pc-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034134" comment="grub2-i386-pc-extras-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009802514" comment="grub2-i386-pc-extras is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034135" comment="grub2-powerpc-ieee1275-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623765" comment="grub2-powerpc-ieee1275 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034136" comment="grub2-powerpc-ieee1275-debug-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623766" comment="grub2-powerpc-ieee1275-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034137" comment="grub2-powerpc-ieee1275-extras-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009802516" comment="grub2-powerpc-ieee1275-extras is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034138" comment="grub2-s390x-emu-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623767" comment="grub2-s390x-emu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034139" comment="grub2-s390x-emu-debug-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623768" comment="grub2-s390x-emu-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034140" comment="grub2-s390x-emu-extras-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009802517" comment="grub2-s390x-emu-extras is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034141" comment="grub2-snapper-plugin-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153179" comment="grub2-snapper-plugin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034142" comment="grub2-systemd-sleep-plugin-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154139" comment="grub2-systemd-sleep-plugin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034143" comment="grub2-x86_64-efi-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153180" comment="grub2-x86_64-efi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034144" comment="grub2-x86_64-efi-bls-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010034159" comment="grub2-x86_64-efi-bls is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034145" comment="grub2-x86_64-efi-debug-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291439" comment="grub2-x86_64-efi-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034146" comment="grub2-x86_64-efi-extras-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009802518" comment="grub2-x86_64-efi-extras is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034147" comment="grub2-x86_64-xen-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153181" comment="grub2-x86_64-xen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034148" comment="grub2-x86_64-xen-debug-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009964903" comment="grub2-x86_64-xen-debug is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034149" comment="grub2-x86_64-xen-extras-2.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009802519" comment="grub2-x86_64-xen-extras is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202561723" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-61723</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-61723" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61723" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-61723" ref_url="https://www.suse.com/security/cve/CVE-2025-61723" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03547-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024646.html" source="SUSE-SU"/>
    <description>
    The processing time for parsing some invalid inputs scales non-linearly with respect to the size of the input. This affects programs which parse untrusted PEM inputs.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-15"/>
	<updated date="2026-03-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61723/">CVE-2025-61723 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61723">CVE-2025-61723 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251256">SUSE bug 1251256</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033432" comment="go1.24-1.24.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961683" comment="go1.24 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033433" comment="go1.24-doc-1.24.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961684" comment="go1.24-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033434" comment="go1.24-libstd-1.24.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033451" comment="go1.24-libstd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047321" comment="go1.24-openssl-1.24.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017809" comment="go1.24-openssl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047322" comment="go1.24-openssl-doc-1.24.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017810" comment="go1.24-openssl-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047323" comment="go1.24-openssl-race-1.24.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017811" comment="go1.24-openssl-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033435" comment="go1.24-race-1.24.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961685" comment="go1.24-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033428" comment="go1.25-1.25.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010014715" comment="go1.25 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033429" comment="go1.25-doc-1.25.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010014716" comment="go1.25-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033430" comment="go1.25-libstd-1.25.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033450" comment="go1.25-libstd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047311" comment="go1.25-openssl-1.25.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017812" comment="go1.25-openssl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047312" comment="go1.25-openssl-doc-1.25.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017813" comment="go1.25-openssl-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047313" comment="go1.25-openssl-race-1.25.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017814" comment="go1.25-openssl-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033431" comment="go1.25-race-1.25.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010014717" comment="go1.25-race is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202561724" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-61724</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-61724" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61724" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-61724" ref_url="https://www.suse.com/security/cve/CVE-2025-61724" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03547-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024646.html" source="SUSE-SU"/>
    <description>
    The Reader.ReadResponse function constructs a response string through repeated string concatenation of lines. When the number of lines in a response is large, this can cause excessive CPU consumption.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-15"/>
	<updated date="2026-03-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61724/">CVE-2025-61724 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61724">CVE-2025-61724 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251262">SUSE bug 1251262</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033432" comment="go1.24-1.24.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961683" comment="go1.24 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033433" comment="go1.24-doc-1.24.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961684" comment="go1.24-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033434" comment="go1.24-libstd-1.24.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033451" comment="go1.24-libstd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047321" comment="go1.24-openssl-1.24.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017809" comment="go1.24-openssl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047322" comment="go1.24-openssl-doc-1.24.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017810" comment="go1.24-openssl-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047323" comment="go1.24-openssl-race-1.24.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017811" comment="go1.24-openssl-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033435" comment="go1.24-race-1.24.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961685" comment="go1.24-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033428" comment="go1.25-1.25.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010014715" comment="go1.25 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033429" comment="go1.25-doc-1.25.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010014716" comment="go1.25-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033430" comment="go1.25-libstd-1.25.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033450" comment="go1.25-libstd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047311" comment="go1.25-openssl-1.25.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017812" comment="go1.25-openssl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047312" comment="go1.25-openssl-doc-1.25.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017813" comment="go1.25-openssl-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047313" comment="go1.25-openssl-race-1.25.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017814" comment="go1.25-openssl-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033431" comment="go1.25-race-1.25.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010014717" comment="go1.25-race is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202561725" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-61725</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-61725" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61725" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-61725" ref_url="https://www.suse.com/security/cve/CVE-2025-61725" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03547-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3682-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042220.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024646.html" source="SUSE-SU"/>
    <description>
    The ParseAddress function constructs domain-literal address components through repeated string concatenation. When parsing large domain-literal components, this can cause excessive CPU consumption.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-15"/>
	<updated date="2026-03-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61725/">CVE-2025-61725 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61725">CVE-2025-61725 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251253">SUSE bug 1251253</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033432" comment="go1.24-1.24.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961683" comment="go1.24 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033433" comment="go1.24-doc-1.24.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961684" comment="go1.24-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033434" comment="go1.24-libstd-1.24.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033451" comment="go1.24-libstd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047321" comment="go1.24-openssl-1.24.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017809" comment="go1.24-openssl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047322" comment="go1.24-openssl-doc-1.24.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017810" comment="go1.24-openssl-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047323" comment="go1.24-openssl-race-1.24.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017811" comment="go1.24-openssl-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033435" comment="go1.24-race-1.24.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961685" comment="go1.24-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033428" comment="go1.25-1.25.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010014715" comment="go1.25 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033429" comment="go1.25-doc-1.25.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010014716" comment="go1.25-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033430" comment="go1.25-libstd-1.25.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033450" comment="go1.25-libstd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047311" comment="go1.25-openssl-1.25.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017812" comment="go1.25-openssl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047312" comment="go1.25-openssl-doc-1.25.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017813" comment="go1.25-openssl-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047313" comment="go1.25-openssl-race-1.25.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017814" comment="go1.25-openssl-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033431" comment="go1.25-race-1.25.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010014717" comment="go1.25-race is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202561726" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-61726</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-61726" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61726" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-61726" ref_url="https://www.suse.com/security/cve/CVE-2025-61726" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2708" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002515.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2709" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003187.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2920" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003243.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3040" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003189.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3187" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002527.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3188" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002529.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3193" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002526.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3291" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003194.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3298" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003257.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3337" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003238.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3340" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003254.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3341" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003239.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3668" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003195.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3814" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002539.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3817" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002578.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3833" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002555.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3839" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003241.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3928" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003245.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3929" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002554.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3985" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002559.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4672" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20122-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20132-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024646.html" source="SUSE-SU"/>
    <description>
    The net/url package does not set a limit on the number of query parameters in a query. While the maximum size of query parameters in URLs is generally limited by the maximum request header size, the net/http.Request.ParseForm method can parse large URL-encoded forms. Parsing a large form containing many unique query parameters can cause excessive memory consumption.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-25"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61726/">CVE-2025-61726 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61726">CVE-2025-61726 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256817">SUSE bug 1256817</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039651" comment="go1.24-1.24.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961683" comment="go1.24 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039652" comment="go1.24-doc-1.24.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961684" comment="go1.24-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039653" comment="go1.24-libstd-1.24.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033451" comment="go1.24-libstd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047321" comment="go1.24-openssl-1.24.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017809" comment="go1.24-openssl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047322" comment="go1.24-openssl-doc-1.24.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017810" comment="go1.24-openssl-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047323" comment="go1.24-openssl-race-1.24.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017811" comment="go1.24-openssl-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039654" comment="go1.24-race-1.24.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961685" comment="go1.24-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039700" comment="go1.25-1.25.6-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010014715" comment="go1.25 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039701" comment="go1.25-doc-1.25.6-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010014716" comment="go1.25-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039702" comment="go1.25-libstd-1.25.6-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033450" comment="go1.25-libstd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047311" comment="go1.25-openssl-1.25.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017812" comment="go1.25-openssl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047312" comment="go1.25-openssl-doc-1.25.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017813" comment="go1.25-openssl-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047313" comment="go1.25-openssl-race-1.25.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017814" comment="go1.25-openssl-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039703" comment="go1.25-race-1.25.6-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010014717" comment="go1.25-race is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202561727" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-61727</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-61727" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61727" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-61727" ref_url="https://www.suse.com/security/cve/CVE-2025-61727" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024646.html" source="SUSE-SU"/>
    <description>
    An excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate. For example a constraint that excludes the subdomain test.example.com does not prevent a leaf certificate from claiming the SAN *.example.com.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-15"/>
	<updated date="2026-03-07"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61727/">CVE-2025-61727 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61727">CVE-2025-61727 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254430">SUSE bug 1254430</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033432" comment="go1.24-1.24.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961683" comment="go1.24 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033433" comment="go1.24-doc-1.24.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961684" comment="go1.24-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033434" comment="go1.24-libstd-1.24.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033451" comment="go1.24-libstd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047321" comment="go1.24-openssl-1.24.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017809" comment="go1.24-openssl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047322" comment="go1.24-openssl-doc-1.24.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017810" comment="go1.24-openssl-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047323" comment="go1.24-openssl-race-1.24.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017811" comment="go1.24-openssl-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033435" comment="go1.24-race-1.24.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961685" comment="go1.24-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033428" comment="go1.25-1.25.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010014715" comment="go1.25 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033429" comment="go1.25-doc-1.25.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010014716" comment="go1.25-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033430" comment="go1.25-libstd-1.25.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033450" comment="go1.25-libstd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047311" comment="go1.25-openssl-1.25.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017812" comment="go1.25-openssl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047312" comment="go1.25-openssl-doc-1.25.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017813" comment="go1.25-openssl-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047313" comment="go1.25-openssl-race-1.25.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017814" comment="go1.25-openssl-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033431" comment="go1.25-race-1.25.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010014717" comment="go1.25-race is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202561728" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-61728</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-61728" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61728" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-61728" ref_url="https://www.suse.com/security/cve/CVE-2025-61728" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2708" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002515.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2709" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003187.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2920" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003243.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3188" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002529.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3193" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002526.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3337" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003238.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3833" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002555.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4672" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20122-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20132-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024646.html" source="SUSE-SU"/>
    <description>
    archive/zip uses a super-linear file name indexing algorithm that is invoked the first time a file in an archive is opened. This can lead to a denial of service when consuming a maliciously constructed ZIP archive.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-25"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61728/">CVE-2025-61728 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61728">CVE-2025-61728 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256816">SUSE bug 1256816</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039651" comment="go1.24-1.24.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961683" comment="go1.24 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039652" comment="go1.24-doc-1.24.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961684" comment="go1.24-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039653" comment="go1.24-libstd-1.24.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033451" comment="go1.24-libstd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047321" comment="go1.24-openssl-1.24.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017809" comment="go1.24-openssl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047322" comment="go1.24-openssl-doc-1.24.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017810" comment="go1.24-openssl-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047323" comment="go1.24-openssl-race-1.24.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017811" comment="go1.24-openssl-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039654" comment="go1.24-race-1.24.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961685" comment="go1.24-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039700" comment="go1.25-1.25.6-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010014715" comment="go1.25 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039701" comment="go1.25-doc-1.25.6-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010014716" comment="go1.25-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039702" comment="go1.25-libstd-1.25.6-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033450" comment="go1.25-libstd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047311" comment="go1.25-openssl-1.25.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017812" comment="go1.25-openssl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047312" comment="go1.25-openssl-doc-1.25.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017813" comment="go1.25-openssl-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047313" comment="go1.25-openssl-race-1.25.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017814" comment="go1.25-openssl-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039703" comment="go1.25-race-1.25.6-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010014717" comment="go1.25-race is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202561729" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-61729</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-61729" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61729" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-61729" ref_url="https://www.suse.com/security/cve/CVE-2025-61729" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0921" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002407.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0923" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003172.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1344" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002440.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1518" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002439.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2323" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002488.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2920" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003243.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3040" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003189.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3291" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003194.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3298" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003257.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3337" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003238.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3340" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003254.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3341" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003239.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3428" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002535.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3817" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002578.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3833" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002555.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3839" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003241.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3928" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003245.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3929" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21193-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4337-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023492.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024646.html" source="SUSE-SU"/>
    <description>
    Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-15"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61729/">CVE-2025-61729 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61729">CVE-2025-61729 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254431">SUSE bug 1254431</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033432" comment="go1.24-1.24.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961683" comment="go1.24 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033433" comment="go1.24-doc-1.24.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961684" comment="go1.24-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033434" comment="go1.24-libstd-1.24.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033451" comment="go1.24-libstd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047321" comment="go1.24-openssl-1.24.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017809" comment="go1.24-openssl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047322" comment="go1.24-openssl-doc-1.24.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017810" comment="go1.24-openssl-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047323" comment="go1.24-openssl-race-1.24.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017811" comment="go1.24-openssl-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033435" comment="go1.24-race-1.24.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961685" comment="go1.24-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033428" comment="go1.25-1.25.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010014715" comment="go1.25 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033429" comment="go1.25-doc-1.25.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010014716" comment="go1.25-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033430" comment="go1.25-libstd-1.25.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033450" comment="go1.25-libstd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047311" comment="go1.25-openssl-1.25.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017812" comment="go1.25-openssl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047312" comment="go1.25-openssl-doc-1.25.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017813" comment="go1.25-openssl-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047313" comment="go1.25-openssl-race-1.25.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017814" comment="go1.25-openssl-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033431" comment="go1.25-race-1.25.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010014717" comment="go1.25-race is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202561730" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-61730</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-61730" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61730" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-61730" ref_url="https://www.suse.com/security/cve/CVE-2025-61730" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20122-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20132-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024646.html" source="SUSE-SU"/>
    <description>
    During the TLS 1.3 handshake if multiple messages are sent in records that span encryption level boundaries (for instance the Client Hello and Encrypted Extensions messages), the subsequent messages may be processed before the encryption level changes. This can cause some minor information disclosure if a network-local attacker can inject messages during the handshake.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-25"/>
	<updated date="2026-03-07"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61730/">CVE-2025-61730 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61730">CVE-2025-61730 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256821">SUSE bug 1256821</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039651" comment="go1.24-1.24.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961683" comment="go1.24 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039652" comment="go1.24-doc-1.24.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961684" comment="go1.24-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039653" comment="go1.24-libstd-1.24.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033451" comment="go1.24-libstd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047321" comment="go1.24-openssl-1.24.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017809" comment="go1.24-openssl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047322" comment="go1.24-openssl-doc-1.24.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017810" comment="go1.24-openssl-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047323" comment="go1.24-openssl-race-1.24.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017811" comment="go1.24-openssl-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039654" comment="go1.24-race-1.24.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961685" comment="go1.24-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039700" comment="go1.25-1.25.6-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010014715" comment="go1.25 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039701" comment="go1.25-doc-1.25.6-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010014716" comment="go1.25-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039702" comment="go1.25-libstd-1.25.6-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033450" comment="go1.25-libstd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047311" comment="go1.25-openssl-1.25.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017812" comment="go1.25-openssl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047312" comment="go1.25-openssl-doc-1.25.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017813" comment="go1.25-openssl-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047313" comment="go1.25-openssl-race-1.25.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017814" comment="go1.25-openssl-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039703" comment="go1.25-race-1.25.6-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010014717" comment="go1.25-race is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202561731" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-61731</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-61731" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61731" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-61731" ref_url="https://www.suse.com/security/cve/CVE-2025-61731" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:5942" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003279.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5944" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002629.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6949" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20122-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20132-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024646.html" source="SUSE-SU"/>
    <description>
    Building a malicious file with cmd/go can cause can cause a write to an attacker-controlled file with partial control of the file content. The "#cgo pkg-config:" directive in a Go source file provides command-line arguments to provide to the Go pkg-config command. An attacker can provide a "--log-file" argument to this directive, causing pkg-config to write to an attacker-controlled location.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-25"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61731/">CVE-2025-61731 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61731">CVE-2025-61731 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256819">SUSE bug 1256819</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039651" comment="go1.24-1.24.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961683" comment="go1.24 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039652" comment="go1.24-doc-1.24.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961684" comment="go1.24-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039653" comment="go1.24-libstd-1.24.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033451" comment="go1.24-libstd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047321" comment="go1.24-openssl-1.24.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017809" comment="go1.24-openssl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047322" comment="go1.24-openssl-doc-1.24.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017810" comment="go1.24-openssl-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047323" comment="go1.24-openssl-race-1.24.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017811" comment="go1.24-openssl-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039654" comment="go1.24-race-1.24.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961685" comment="go1.24-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039700" comment="go1.25-1.25.6-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010014715" comment="go1.25 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039701" comment="go1.25-doc-1.25.6-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010014716" comment="go1.25-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039702" comment="go1.25-libstd-1.25.6-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033450" comment="go1.25-libstd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047311" comment="go1.25-openssl-1.25.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017812" comment="go1.25-openssl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047312" comment="go1.25-openssl-doc-1.25.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017813" comment="go1.25-openssl-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047313" comment="go1.25-openssl-race-1.25.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017814" comment="go1.25-openssl-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039703" comment="go1.25-race-1.25.6-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010014717" comment="go1.25-race is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202561732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-61732</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-61732" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61732" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-61732" ref_url="https://www.suse.com/security/cve/CVE-2025-61732" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2708" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002515.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2709" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003187.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3193" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0403-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024507.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024646.html" source="SUSE-SU"/>
    <description>
    A discrepancy between how Go and C/C++ comments were parsed allowed for code smuggling into the resulting cgo binary.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-15"/>
	<updated date="2026-04-11"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H" cvss4="9.4/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-61732/">CVE-2025-61732 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61732">CVE-2025-61732 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257692">SUSE bug 1257692</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044008" comment="go1.24-1.24.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961683" comment="go1.24 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044009" comment="go1.24-doc-1.24.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961684" comment="go1.24-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044010" comment="go1.24-libstd-1.24.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033451" comment="go1.24-libstd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047321" comment="go1.24-openssl-1.24.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017809" comment="go1.24-openssl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047322" comment="go1.24-openssl-doc-1.24.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017810" comment="go1.24-openssl-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047323" comment="go1.24-openssl-race-1.24.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017811" comment="go1.24-openssl-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044011" comment="go1.24-race-1.24.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961685" comment="go1.24-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010043900" comment="go1.25-1.25.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010014715" comment="go1.25 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010043901" comment="go1.25-doc-1.25.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010014716" comment="go1.25-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010043902" comment="go1.25-libstd-1.25.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033450" comment="go1.25-libstd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010043903" comment="go1.25-race-1.25.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010014717" comment="go1.25-race is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202561748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-61748</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-61748" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61748" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-61748" ref_url="https://www.suse.com/security/cve/CVE-2025-61748" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:18824" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023079.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3965-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023427.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-02"/>
	<updated date="2025-12-11"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61748/">CVE-2025-61748 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61748">CVE-2025-61748 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252418">SUSE bug 1252418</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032327" comment="java-21-openjdk-21.0.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009875276" comment="java-21-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032328" comment="java-21-openjdk-demo-21.0.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009875277" comment="java-21-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032329" comment="java-21-openjdk-devel-21.0.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009875278" comment="java-21-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032330" comment="java-21-openjdk-headless-21.0.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009875279" comment="java-21-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032331" comment="java-21-openjdk-javadoc-21.0.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009875280" comment="java-21-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032332" comment="java-21-openjdk-jmods-21.0.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009875281" comment="java-21-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032333" comment="java-21-openjdk-src-21.0.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009875282" comment="java-21-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202561795" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-61795</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-61795" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61795" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-61795" ref_url="https://www.suse.com/security/cve/CVE-2025-61795" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21152-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023508.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023270.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4159-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023311.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20084-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023815.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20982-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045349.html" source="SUSE-SU"/>
    <description>
    Improper Resource Shutdown or Release vulnerability in Apache Tomcat.

If an error occurred (including exceeding limits) during the processing of a multipart upload, temporary copies of the uploaded parts written to disc were not cleaned up immediately but left for the garbage collection process to delete. Depending on JVM settings, application memory usage and application load, it was possible that space for the temporary copies of uploaded parts would be filled faster than GC cleared it, leading to a DoS.



This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.11, from 10.1.0-M1 through 10.1.46, from 9.0.0.M1 through 9.0.109.

The following versions were EOL at the time the CVE was created but are 
known to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions may also be affected.
Users are recommended to upgrade to version 11.0.12 or later, 10.1.47 or later or 9.0.110 or later which fixes the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-04-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61795/">CVE-2025-61795 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61795">CVE-2025-61795 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252756">SUSE bug 1252756</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037727" comment="tomcat-9.0.111-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152844" comment="tomcat is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037728" comment="tomcat-admin-webapps-9.0.111-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152845" comment="tomcat-admin-webapps is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037729" comment="tomcat-docs-webapp-9.0.111-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152846" comment="tomcat-docs-webapp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037730" comment="tomcat-el-3_0-api-9.0.111-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152847" comment="tomcat-el-3_0-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037731" comment="tomcat-embed-9.0.111-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152848" comment="tomcat-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037732" comment="tomcat-javadoc-9.0.111-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152849" comment="tomcat-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037733" comment="tomcat-jsp-2_3-api-9.0.111-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152850" comment="tomcat-jsp-2_3-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037734" comment="tomcat-jsvc-9.0.111-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152851" comment="tomcat-jsvc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037735" comment="tomcat-lib-9.0.111-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152852" comment="tomcat-lib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037736" comment="tomcat-servlet-4_0-api-9.0.111-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236693" comment="tomcat-servlet-4_0-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037737" comment="tomcat-webapps-9.0.111-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152854" comment="tomcat-webapps is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052604" comment="tomcat10-10.1.52-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009844333" comment="tomcat10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052605" comment="tomcat10-admin-webapps-10.1.52-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009844334" comment="tomcat10-admin-webapps is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052606" comment="tomcat10-doc-10.1.52-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009872621" comment="tomcat10-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052607" comment="tomcat10-docs-webapp-10.1.52-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009844335" comment="tomcat10-docs-webapp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052608" comment="tomcat10-el-5_0-api-10.1.52-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009844336" comment="tomcat10-el-5_0-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052609" comment="tomcat10-embed-10.1.52-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009844337" comment="tomcat10-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052610" comment="tomcat10-jsp-3_1-api-10.1.52-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009844338" comment="tomcat10-jsp-3_1-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052611" comment="tomcat10-jsvc-10.1.52-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009844339" comment="tomcat10-jsvc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052612" comment="tomcat10-lib-10.1.52-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009844340" comment="tomcat10-lib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052613" comment="tomcat10-servlet-6_0-api-10.1.52-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009844341" comment="tomcat10-servlet-6_0-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052614" comment="tomcat10-webapps-10.1.52-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009844342" comment="tomcat10-webapps is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032075" comment="tomcat11-11.0.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010015348" comment="tomcat11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032076" comment="tomcat11-admin-webapps-11.0.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010015349" comment="tomcat11-admin-webapps is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032077" comment="tomcat11-doc-11.0.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010015350" comment="tomcat11-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032078" comment="tomcat11-docs-webapp-11.0.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010015351" comment="tomcat11-docs-webapp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032079" comment="tomcat11-el-6_0-api-11.0.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010015352" comment="tomcat11-el-6_0-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032080" comment="tomcat11-embed-11.0.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010015353" comment="tomcat11-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032081" comment="tomcat11-jsp-4_0-api-11.0.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010015354" comment="tomcat11-jsp-4_0-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032082" comment="tomcat11-jsvc-11.0.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010015355" comment="tomcat11-jsvc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032083" comment="tomcat11-lib-11.0.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010015356" comment="tomcat11-lib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032084" comment="tomcat11-servlet-6_1-api-11.0.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010015357" comment="tomcat11-servlet-6_1-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032085" comment="tomcat11-webapps-11.0.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010015358" comment="tomcat11-webapps is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202561911" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-61911</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-61911" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61911" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-61911" ref_url="https://www.suse.com/security/cve/CVE-2025-61911" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2025:4454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-December/043250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3695-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20933-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045219.html" source="SUSE-SU"/>
    <description>
    python-ldap is a lightweight directory access protocol (LDAP) client API for Python. In versions prior to 3.4.5, the sanitization method `ldap.filter.escape_filter_chars` can be tricked to skip escaping of special characters when a crafted `list` or `dict` is supplied as the `assertion_value` parameter, and the non-default `escape_mode=1` is configured. The method `ldap.filter.escape_filter_chars` supports 3 different escaping modes. `escape_mode=0` (default) and `escape_mode=2` happen to raise exceptions when a `list` or `dict` object is supplied as the `assertion_value` parameter. However, `escape_mode=1` computes without performing adequate logic to ensure a fully escaped return value. If an application relies on the vulnerable method in the `python-ldap` library to escape untrusted user input, an attacker might be able to abuse the vulnerability to launch ldap injection attacks which could potentially disclose or manipulate ldap data meant to be inaccessible to them. Version 3.4.5 fixes the issue by adding a type check at the start of the `ldap.filter.escape_filter_chars` method to raise an exception when the supplied `assertion_value` parameter is not of type `str`.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="5.5/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-61911/">CVE-2025-61911 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-61911">CVE-2025-61911 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251912">SUSE bug 1251912</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051893" comment="python313-ldap-3.4.4-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010051918" comment="python313-ldap is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202561912" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-61912</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-61912" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61912" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-61912" ref_url="https://www.suse.com/security/cve/CVE-2025-61912" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2025:4454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-December/043250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3695-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042225.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3714-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022964.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20933-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045219.html" source="SUSE-SU"/>
    <description>
    python-ldap is a lightweight directory access protocol (LDAP) client API for Python. In versions prior to 3.4.5, ldap.dn.escape_dn_chars() escapes \x00 incorrectly by emitting a backslash followed by a literal NUL byte instead of the RFC-4514 hex form \00. Any application that uses this helper to construct DNs from untrusted input can be made to consistently fail before a request is sent to the LDAP server (e.g., AD), resulting in a client-side denial of service. Version 3.4.5 contains a patch for the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="5.5/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-61912/">CVE-2025-61912 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-61912">CVE-2025-61912 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251913">SUSE bug 1251913</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051893" comment="python313-ldap-3.4.4-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010051918" comment="python313-ldap is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202561915" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-61915</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-61915" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61915" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-61915" ref_url="https://www.suse.com/security/cve/CVE-2025-61915" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0312" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003168.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0596" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4289-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4290-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20231-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024096.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20528-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024526.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20535-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024560.html" source="SUSE-SU"/>
    <description>
    OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. Prior to version 2.4.15, a user in the lpadmin group can use the cups web ui to change the config and insert a malicious line. Then the cupsd process which runs as root will parse the new config and cause an out-of-bound write. This issue has been patched in version 2.4.15.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-06"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61915/">CVE-2025-61915 at SUSE</cve>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-61915">CVE-2025-61915 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253783">SUSE bug 1253783</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042222" comment="cups-2.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151184" comment="cups is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042223" comment="cups-client-2.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151185" comment="cups-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042224" comment="cups-config-2.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177129" comment="cups-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042225" comment="cups-ddk-2.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172754" comment="cups-ddk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042226" comment="cups-devel-2.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151186" comment="cups-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042227" comment="libcups2-2.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177130" comment="libcups2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042228" comment="libcupsimage2-2.4.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177132" comment="libcupsimage2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202561919" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-61919</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-61919" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61919" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-61919" ref_url="https://www.suse.com/security/cve/CVE-2025-61919" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:19512" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002167.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19719" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002181.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20962" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003125.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4273-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20091-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20093-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023807.html" source="SUSE-SU"/>
    <description>
    Rack is a modular Ruby web server interface. Prior to versions 2.2.20, 3.1.18, and 3.2.3, `Rack::Request#POST` reads the entire request body into memory for `Content-Type: application/x-www-form-urlencoded`, calling `rack.input.read(nil)` without enforcing a length or cap. Large request bodies can therefore be buffered completely into process memory before parsing, leading to denial of service (DoS) through memory exhaustion. Users should upgrade to Rack version 2.2.20, 3.1.18, or 3.2.3, anu of which enforces form parameter limits using `query_parser.bytesize_limit`, preventing unbounded reads of `application/x-www-form-urlencoded` bodies. Additionally, enforce strict maximum body size at the proxy or web server layer (e.g., Nginx `client_max_body_size`, Apache `LimitRequestBody`).
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-16"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61919/">CVE-2025-61919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61919">CVE-2025-61919 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251934">SUSE bug 1251934</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037703" comment="hawk2-2.7.0+git.1742310530.bfcd0e2c-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009341551" comment="hawk2 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202561962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-61962</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-61962" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61962" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-61962" ref_url="https://www.suse.com/security/cve/CVE-2025-61962" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:3845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023075.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3966-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023165.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20935-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045217.html" source="SUSE-SU"/>
    <description>
    In fetchmail before 6.5.6, the SMTP client can crash when authenticating upon receiving a 334 status code in a malformed context.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-03"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-61962/">CVE-2025-61962 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61962">CVE-2025-61962 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251194">SUSE bug 1251194</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052264" comment="fetchmail-6.5.2-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151334" comment="fetchmail is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052587" comment="fetchmailconf-6.5.2-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009631524" comment="fetchmailconf is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202561984" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-61984</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-61984" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61984" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-61984" ref_url="https://www.suse.com/security/cve/CVE-2025-61984" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23480" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003138.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23481" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002307.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0693" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023391.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4097-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024750.html" source="SUSE-SU"/>
    <description>
    ssh in OpenSSH before 10.1 allows control characters in usernames that originate from certain possibly untrusted sources, potentially leading to code execution when a ProxyCommand is used. The untrusted sources are the command line and %-sequence expansion of a configuration file. (A configuration file that provides a complete literal username is not categorized as an untrusted source.)
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-02"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61984/">CVE-2025-61984 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61984">CVE-2025-61984 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251198">SUSE bug 1251198</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032319" comment="openssh-10.0p2-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152110" comment="openssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032320" comment="openssh-askpass-gnome-10.0p2-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153167" comment="openssh-askpass-gnome is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032321" comment="openssh-cavs-10.0p2-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153168" comment="openssh-cavs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032322" comment="openssh-clients-10.0p2-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009659235" comment="openssh-clients is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032323" comment="openssh-common-10.0p2-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009659236" comment="openssh-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032324" comment="openssh-helpers-10.0p2-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152111" comment="openssh-helpers is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032325" comment="openssh-server-10.0p2-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009659237" comment="openssh-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032326" comment="openssh-server-config-rootlogin-10.0p2-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032347" comment="openssh-server-config-rootlogin is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202561985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-61985</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-61985" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-61985" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-61985" ref_url="https://www.suse.com/security/cve/CVE-2025-61985" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23480" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003138.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23481" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002307.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0693" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023391.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21128-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21161-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4098-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023284.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4112-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024750.html" source="SUSE-SU"/>
    <description>
    ssh in OpenSSH before 10.1 allows the '\0' character in an ssh:// URI, potentially leading to code execution when a ProxyCommand is used.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-02"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-61985/">CVE-2025-61985 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-61985">CVE-2025-61985 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251199">SUSE bug 1251199</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032319" comment="openssh-10.0p2-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152110" comment="openssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032320" comment="openssh-askpass-gnome-10.0p2-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153167" comment="openssh-askpass-gnome is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032321" comment="openssh-cavs-10.0p2-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153168" comment="openssh-cavs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032322" comment="openssh-clients-10.0p2-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009659235" comment="openssh-clients is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032323" comment="openssh-common-10.0p2-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009659236" comment="openssh-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032324" comment="openssh-helpers-10.0p2-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152111" comment="openssh-helpers is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032325" comment="openssh-server-10.0p2-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009659237" comment="openssh-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032326" comment="openssh-server-config-rootlogin-10.0p2-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032347" comment="openssh-server-config-rootlogin is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20256199" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-6199</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-6199" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6199" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-6199" ref_url="https://www.suse.com/security/cve/CVE-2025-6199" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02954-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02963-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03373-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20694-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20748-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20128-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023946.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the GIF parser of GdkPixbuf's LZW decoder. When an invalid symbol is encountered during decompression, the decoder sets the reported output size to the full buffer length rather than the actual number of written bytes. This logic error results in uninitialized sections of the buffer being included in the output, potentially leaking arbitrary memory contents in the processed image.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-25"/>
	<updated date="2026-01-29"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6199/">CVE-2025-6199 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-6199">CVE-2025-6199 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1245227">SUSE bug 1245227</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039693" comment="gdk-pixbuf-devel-2.42.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151614" comment="gdk-pixbuf-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039694" comment="gdk-pixbuf-lang-2.42.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151615" comment="gdk-pixbuf-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039695" comment="gdk-pixbuf-query-loaders-2.42.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151616" comment="gdk-pixbuf-query-loaders is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039696" comment="gdk-pixbuf-thumbnailer-2.42.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177170" comment="gdk-pixbuf-thumbnailer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039697" comment="libgdk_pixbuf-2_0-0-2.42.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151618" comment="libgdk_pixbuf-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039698" comment="typelib-1_0-GdkPixbuf-2_0-2.42.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151620" comment="typelib-1_0-GdkPixbuf-2_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039699" comment="typelib-1_0-GdkPixdata-2_0-2.42.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342391" comment="typelib-1_0-GdkPixdata-2_0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202562168" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-62168</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-62168" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62168" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-62168" ref_url="https://www.suse.com/security/cve/CVE-2025-62168" source="SUSE CVE"/>
		<reference ref_id="GHSA-c8cc-phh7-xmxr" ref_url="https://github.com/squid-cache/squid/security/advisories//GHSA-c8cc-phh7-xmxr" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19107" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002130.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20935" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023190.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023283.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023819.html" source="SUSE-SU"/>
    <description>
    Squid is a caching proxy for the Web. In Squid versions prior to 7.2, a failure to redact HTTP authentication credentials in error handling allows information disclosure. The vulnerability allows a script to bypass browser security protections and learn the credentials a trusted client uses to authenticate. This potentially allows a remote client to identify security tokens or credentials used internally by a web application using Squid for backend load balancing. These attacks do not require Squid to be configured with HTTP authentication. The vulnerability is fixed in version 7.2. As a workaround, disable debug information in administrator mailto links generated by Squid by configuring squid.conf with email_err_data off.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-16"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-62168/">CVE-2025-62168 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-62168">CVE-2025-62168 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252281">SUSE bug 1252281</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037708" comment="squid-6.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152563" comment="squid is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202562171" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-62171</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-62171" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62171" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-62171" ref_url="https://www.suse.com/security/cve/CVE-2025-62171" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3844-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023141.html" source="SUSE-SU"/>
    <description>
    ImageMagick is an open source software suite for displaying, converting, and editing raster image files. In ImageMagick versions prior to 7.1.2-7 and 6.9.13-32, an integer overflow vulnerability exists in the BMP decoder on 32-bit systems. The vulnerability occurs in coders/bmp.c when calculating the extent value by multiplying image columns by bits per pixel. On 32-bit systems with size_t of 4 bytes, a malicious BMP file with specific dimensions can cause this multiplication to overflow and wrap to zero. The overflow check added to address CVE-2025-57803 is placed after the overflow occurs, making it ineffective. A specially crafted 58-byte BMP file with width set to 536,870,912 and 32 bits per pixel can trigger this overflow, causing the bytes_per_line calculation to become zero. This vulnerability only affects 32-bit builds of ImageMagick where default resource limits for width, height, and area have been manually increased beyond their defaults. 64-bit systems with size_t of 8 bytes are not vulnerable, and systems using default ImageMagick resource limits are not vulnerable. The vulnerability is fixed in versions 7.1.2-7 and 6.9.13-32.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-18"/>
	<updated date="2025-12-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-62171/">CVE-2025-62171 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-62171">CVE-2025-62171 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252282">SUSE bug 1252282</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034111" comment="ImageMagick-7.1.2.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034112" comment="ImageMagick-config-7-SUSE-7.1.2.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034113" comment="ImageMagick-config-7-upstream-limited-7.1.2.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977490" comment="ImageMagick-config-7-upstream-limited is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034114" comment="ImageMagick-config-7-upstream-open-7.1.2.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977491" comment="ImageMagick-config-7-upstream-open is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034115" comment="ImageMagick-config-7-upstream-secure-7.1.2.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977492" comment="ImageMagick-config-7-upstream-secure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034116" comment="ImageMagick-config-7-upstream-websafe-7.1.2.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977493" comment="ImageMagick-config-7-upstream-websafe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034117" comment="ImageMagick-devel-7.1.2.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034118" comment="ImageMagick-doc-7.1.2.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034119" comment="ImageMagick-extra-7.1.2.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034120" comment="libMagick++-7_Q16HDRI5-7.1.2.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698047" comment="libMagick++-7_Q16HDRI5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034121" comment="libMagick++-devel-7.1.2.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034122" comment="libMagickCore-7_Q16HDRI10-7.1.2.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698048" comment="libMagickCore-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034123" comment="libMagickWand-7_Q16HDRI10-7.1.2.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698049" comment="libMagickWand-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034124" comment="perl-PerlMagick-7.1.2.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202562229" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-62229</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-62229" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62229" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-62229" ref_url="https://www.suse.com/security/cve/CVE-2025-62229" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:19432" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002149.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19433" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002166.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19434" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002154.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19489" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002197.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19623" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002198.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19909" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002201.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20958" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003111.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20960" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003083.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20961" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003105.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22096" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023137.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the X.Org X server and Xwayland when processing X11 Present extension notifications. Improper error handling during notification creation can leave dangling pointers that lead to a use-after-free condition. This can cause memory corruption or a crash, potentially allowing an attacker to execute arbitrary code or cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-62229/">CVE-2025-62229 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-62229">CVE-2025-62229 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251958">SUSE bug 1251958</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010043200" comment="xorg-x11-server-21.1.15-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151420" comment="xorg-x11-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010043201" comment="xorg-x11-server-Xvfb-21.1.15-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009807388" comment="xorg-x11-server-Xvfb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010043202" comment="xorg-x11-server-extra-21.1.15-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151421" comment="xorg-x11-server-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010043203" comment="xorg-x11-server-sdk-21.1.15-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151422" comment="xorg-x11-server-sdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010043204" comment="xorg-x11-server-source-21.1.15-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009157107" comment="xorg-x11-server-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010043205" comment="xorg-x11-server-wrapper-21.1.15-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010043209" comment="xorg-x11-server-wrapper is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032041" comment="xwayland-24.1.6-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698123" comment="xwayland is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032042" comment="xwayland-devel-24.1.6-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009724867" comment="xwayland-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202562230" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-62230</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-62230" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62230" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-62230" ref_url="https://www.suse.com/security/cve/CVE-2025-62230" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:19432" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002149.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19433" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002166.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19434" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002154.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19489" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002197.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19623" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002198.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19909" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002201.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20958" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003111.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20960" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003083.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20961" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003105.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22096" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023137.html" source="SUSE-SU"/>
    <description>
    A flaw was discovered in the X.Org X server's X Keyboard (Xkb) extension when handling client resource cleanup. The software frees certain data structures without properly detaching related resources, leading to a use-after-free condition. This can cause memory corruption or a crash when affected clients disconnect.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-62230/">CVE-2025-62230 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-62230">CVE-2025-62230 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251959">SUSE bug 1251959</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010043200" comment="xorg-x11-server-21.1.15-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151420" comment="xorg-x11-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010043201" comment="xorg-x11-server-Xvfb-21.1.15-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009807388" comment="xorg-x11-server-Xvfb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010043202" comment="xorg-x11-server-extra-21.1.15-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151421" comment="xorg-x11-server-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010043203" comment="xorg-x11-server-sdk-21.1.15-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151422" comment="xorg-x11-server-sdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010043204" comment="xorg-x11-server-source-21.1.15-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009157107" comment="xorg-x11-server-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010043205" comment="xorg-x11-server-wrapper-21.1.15-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010043209" comment="xorg-x11-server-wrapper is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032041" comment="xwayland-24.1.6-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698123" comment="xwayland is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032042" comment="xwayland-devel-24.1.6-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009724867" comment="xwayland-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202562231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-62231</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-62231" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62231" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-62231" ref_url="https://www.suse.com/security/cve/CVE-2025-62231" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:19432" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002149.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19433" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002166.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19434" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002154.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19489" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002197.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19623" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002198.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19909" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002201.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20958" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003111.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20960" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003083.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20961" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003105.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22096" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023510.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023080.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3909-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023137.html" source="SUSE-SU"/>
    <description>
    A flaw was identified in the X.Org X server's X Keyboard (Xkb) extension where improper bounds checking in the XkbSetCompatMap() function can cause an unsigned short overflow. If an attacker sends specially crafted input data, the value calculation may overflow, leading to memory corruption or a crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-62231/">CVE-2025-62231 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-62231">CVE-2025-62231 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251960">SUSE bug 1251960</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010043200" comment="xorg-x11-server-21.1.15-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151420" comment="xorg-x11-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010043201" comment="xorg-x11-server-Xvfb-21.1.15-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009807388" comment="xorg-x11-server-Xvfb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010043202" comment="xorg-x11-server-extra-21.1.15-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151421" comment="xorg-x11-server-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010043203" comment="xorg-x11-server-sdk-21.1.15-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151422" comment="xorg-x11-server-sdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010043204" comment="xorg-x11-server-source-21.1.15-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009157107" comment="xorg-x11-server-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010043205" comment="xorg-x11-server-wrapper-21.1.15-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010043209" comment="xorg-x11-server-wrapper is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032041" comment="xwayland-24.1.6-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698123" comment="xwayland is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032042" comment="xwayland-devel-24.1.6-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009724867" comment="xwayland-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202562291" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-62291</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-62291" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62291" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-62291" ref_url="https://www.suse.com/security/cve/CVE-2025-62291" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023073.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023082.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023081.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023086.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023139.html" source="SUSE-SU"/>
    <description>
    In the eap-mschapv2 plugin (client-side) in strongSwan before 6.0.3, a malicious EAP-MSCHAPv2 server can send a crafted message of size 6 through 8, and cause an integer underflow that potentially results in a heap-based buffer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-03"/>
	<updated date="2026-01-17"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-62291/">CVE-2025-62291 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-62291">CVE-2025-62291 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251941">SUSE bug 1251941</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032401" comment="strongswan-6.0.1-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153116" comment="strongswan is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032402" comment="strongswan-doc-6.0.1-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153117" comment="strongswan-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032403" comment="strongswan-fips-6.0.1-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032410" comment="strongswan-fips is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032404" comment="strongswan-ipsec-6.0.1-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153119" comment="strongswan-ipsec is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032405" comment="strongswan-mysql-6.0.1-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153121" comment="strongswan-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032406" comment="strongswan-nm-6.0.1-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153122" comment="strongswan-nm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032407" comment="strongswan-sqlite-6.0.1-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153123" comment="strongswan-sqlite is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202562348" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-62348</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-62348" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62348" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-62348" ref_url="https://www.suse.com/security/cve/CVE-2025-62348" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2025:4454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-December/043250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202511:15317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202511:15318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202511:15319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023586.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4448-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023601.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202603:15322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202603:15324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024903.html" source="SUSE-SU"/>
    <description>
    Salt's junos execution module contained an unsafe YAML decode/load usage. A specially crafted YAML payload processed by the junos module could lead to unintended code execution under the context of the Salt process.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-03"/>
	<updated date="2026-03-31"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-62348/">CVE-2025-62348 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-62348">CVE-2025-62348 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254256">SUSE bug 1254256</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035613" comment="python313-salt-3006.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010035674" comment="python313-salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035614" comment="python313-salt-testsuite-3006.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010035675" comment="python313-salt-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035615" comment="salt-3006.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153592" comment="salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035616" comment="salt-api-3006.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153593" comment="salt-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035617" comment="salt-bash-completion-3006.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153594" comment="salt-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035618" comment="salt-cloud-3006.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153595" comment="salt-cloud is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035619" comment="salt-doc-3006.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153596" comment="salt-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035620" comment="salt-fish-completion-3006.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153597" comment="salt-fish-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035621" comment="salt-master-3006.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153598" comment="salt-master is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035622" comment="salt-minion-3006.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153599" comment="salt-minion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035623" comment="salt-proxy-3006.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153600" comment="salt-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035624" comment="salt-ssh-3006.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153602" comment="salt-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035625" comment="salt-standalone-formulas-configuration-3006.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280429" comment="salt-standalone-formulas-configuration is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035626" comment="salt-syndic-3006.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153603" comment="salt-syndic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035627" comment="salt-transactional-update-3006.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009479908" comment="salt-transactional-update is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035628" comment="salt-zsh-completion-3006.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153604" comment="salt-zsh-completion is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202562349" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-62349</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-62349" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62349" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-62349" ref_url="https://www.suse.com/security/cve/CVE-2025-62349" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2025:4454-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-December/043250.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202511:15317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023625.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202511:15318-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202511:15319-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023592.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023586.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023606.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4448-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4450-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023602.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4451-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023601.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023599.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4466-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4467-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023621.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023620.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4478-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023617.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023616.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202603:15322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202603:15324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024903.html" source="SUSE-SU"/>
    <description>
    Salt contains an authentication protocol version downgrade weakness that can allow a malicious minion to bypass newer authentication/security features by using an older request payload format, enabling minion impersonation and circumventing protections introduced in response to prior issues.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:L" cvss4="7.5/CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-62349/">CVE-2025-62349 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-62349">CVE-2025-62349 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254257">SUSE bug 1254257</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035613" comment="python313-salt-3006.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010035674" comment="python313-salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035614" comment="python313-salt-testsuite-3006.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010035675" comment="python313-salt-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035615" comment="salt-3006.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153592" comment="salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035616" comment="salt-api-3006.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153593" comment="salt-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035617" comment="salt-bash-completion-3006.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153594" comment="salt-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035618" comment="salt-cloud-3006.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153595" comment="salt-cloud is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035619" comment="salt-doc-3006.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153596" comment="salt-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035620" comment="salt-fish-completion-3006.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153597" comment="salt-fish-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035621" comment="salt-master-3006.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153598" comment="salt-master is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035622" comment="salt-minion-3006.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153599" comment="salt-minion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035623" comment="salt-proxy-3006.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153600" comment="salt-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035624" comment="salt-ssh-3006.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153602" comment="salt-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035625" comment="salt-standalone-formulas-configuration-3006.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280429" comment="salt-standalone-formulas-configuration is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035626" comment="salt-syndic-3006.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153603" comment="salt-syndic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035627" comment="salt-transactional-update-3006.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009479908" comment="salt-transactional-update is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035628" comment="salt-zsh-completion-3006.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153604" comment="salt-zsh-completion is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202562507" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-62507</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-62507" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62507" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-62507" ref_url="https://www.suse.com/security/cve/CVE-2025-62507" source="SUSE CVE"/>
    <description>
    Redis is an open source, in-memory database that persists on disk. In versions 8.2.0 and above, a user can run the XACKDEL command with multiple ID's and trigger a stack buffer overflow, which may potentially lead to remote code execution. This issue is fixed in version 8.2.3. To workaround this issue without patching the redis-server executable is to prevent users from executing XACKDEL operation. This can be done using ACL to restrict XACKDEL command.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-01-03"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-62507/">CVE-2025-62507 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-62507">CVE-2025-62507 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252996">SUSE bug 1252996</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010035662" comment="redis-8.2.3-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152049" comment="redis is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202562518" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-62518</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-62518" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62518" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-62518" ref_url="https://www.suse.com/security/cve/CVE-2025-62518" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023820.html" source="SUSE-SU"/>
    <description>
    astral-tokio-tar is a tar archive reading/writing library for async Rust. Versions of astral-tokio-tar prior to 0.5.6 contain a boundary parsing vulnerability that allows attackers to smuggle additional archive entries by exploiting inconsistent PAX/ustar header handling. When processing archives with PAX-extended headers containing size overrides, the parser incorrectly advances stream position based on ustar header size (often zero) instead of the PAX-specified size, causing it to interpret file content as legitimate tar headers. This issue has been patched in version 0.5.6. There are no workarounds.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-16"/>
	<updated date="2026-01-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-62518/">CVE-2025-62518 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-62518">CVE-2025-62518 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252399">SUSE bug 1252399</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037704" comment="python313-uv-0.7.18-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037741" comment="python313-uv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037705" comment="python313-uv-bash-completion-0.7.18-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037742" comment="python313-uv-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037706" comment="python313-uv-fish-completion-0.7.18-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037743" comment="python313-uv-fish-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037707" comment="python313-uv-zsh-completion-0.7.18-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037744" comment="python313-uv-zsh-completion is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202562594" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-62594</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-62594" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62594" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-62594" ref_url="https://www.suse.com/security/cve/CVE-2025-62594" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3956-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3978-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023175.html" source="SUSE-SU"/>
    <description>
    ImageMagick is a software suite to create, edit, compose, or convert bitmap images. ImageMagick versions prior to 7.1.2-8 are vulnerable to denial-of-service due to unsigned integer underflow and division-by-zero in the CLAHEImage function. When tile width or height is zero, unsigned underflow occurs in pointer arithmetic, leading to out-of-bounds memory access, and division-by-zero causes immediate crashes. This issue has been patched in version 7.1.2-8.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-18"/>
	<updated date="2025-12-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-62594/">CVE-2025-62594 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-62594">CVE-2025-62594 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252749">SUSE bug 1252749</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034111" comment="ImageMagick-7.1.2.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034112" comment="ImageMagick-config-7-SUSE-7.1.2.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034113" comment="ImageMagick-config-7-upstream-limited-7.1.2.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977490" comment="ImageMagick-config-7-upstream-limited is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034114" comment="ImageMagick-config-7-upstream-open-7.1.2.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977491" comment="ImageMagick-config-7-upstream-open is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034115" comment="ImageMagick-config-7-upstream-secure-7.1.2.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977492" comment="ImageMagick-config-7-upstream-secure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034116" comment="ImageMagick-config-7-upstream-websafe-7.1.2.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977493" comment="ImageMagick-config-7-upstream-websafe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034117" comment="ImageMagick-devel-7.1.2.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034118" comment="ImageMagick-doc-7.1.2.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034119" comment="ImageMagick-extra-7.1.2.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034120" comment="libMagick++-7_Q16HDRI5-7.1.2.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698047" comment="libMagick++-7_Q16HDRI5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034121" comment="libMagick++-devel-7.1.2.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034122" comment="libMagickCore-7_Q16HDRI10-7.1.2.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698048" comment="libMagickCore-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034123" comment="libMagickWand-7_Q16HDRI10-7.1.2.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698049" comment="libMagickWand-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034124" comment="perl-PerlMagick-7.1.2.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202562689" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-62689</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-62689" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62689" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-62689" ref_url="https://www.suse.com/security/cve/CVE-2025-62689" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023775.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20057-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023745.html" source="SUSE-SU"/>
    <description>
    NULL pointer dereference vulnerability exists in GNU libmicrohttpd v1.0.2 and earlier. The vulnerability was fixed in commit ff13abc on the master branch of the libmicrohttpd Git repository, after the v1.0.2 tag. A specially crafted packet sent by an attacker could cause a denial-of-service (DoS) condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-13"/>
	<updated date="2026-01-16"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-62689/">CVE-2025-62689 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-62689">CVE-2025-62689 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253178">SUSE bug 1253178</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037183" comment="libmicrohttpd-devel-1.0.1-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009157573" comment="libmicrohttpd-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037184" comment="libmicrohttpd12-1.0.1-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009751539" comment="libmicrohttpd12 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202562725" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-62725</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-62725" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-62725" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-62725" ref_url="https://www.suse.com/security/cve/CVE-2025-62725" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20949-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045253.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20976-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045355.html" source="SUSE-SU"/>
    <description>
    Docker Compose trusts the path information embedded in remote OCI compose artifacts. When a layer includes the annotations com.docker.compose.extends or com.docker.compose.envfile, Compose joins the attacker-supplied value from com.docker.compose.file/com.docker.compose.envfile with its local cache directory and writes the file there. This affects any platform or workflow that resolves remote OCI compose artifacts, Docker Desktop, standalone Compose binaries on Linux, CI/CD runners, cloud dev environments is affected. An attacker can escape the cache directory and overwrite arbitrary files on the machine running docker compose, even if the user only runs read-only commands such as docker compose config or docker compose ps. This issue is fixed in v2.40.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-03"/>
	<updated date="2026-04-10"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" cvss4="8.9/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2025-62725/">CVE-2025-62725 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-62725">CVE-2025-62725 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252752">SUSE bug 1252752</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052590" comment="docker-compose-2.33.1-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010052706" comment="docker-compose is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202563757" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-63757</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-63757" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-63757" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-63757" ref_url="https://www.suse.com/security/cve/CVE-2025-63757" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023830.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0229-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023856.html" source="SUSE-SU"/>
    <description>
    Integer overflow vulnerability in the yuv2ya16_X_c_template function in libswscale/output.c in FFmpeg 8.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-20"/>
	<updated date="2026-01-24"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-63757/">CVE-2025-63757 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-63757">CVE-2025-63757 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255392">SUSE bug 1255392</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038060" comment="ffmpeg-4-4.4.5-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234593" comment="ffmpeg-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038061" comment="ffmpeg-4-libavcodec-devel-4.4.5-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234594" comment="ffmpeg-4-libavcodec-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038062" comment="ffmpeg-4-libavdevice-devel-4.4.5-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234595" comment="ffmpeg-4-libavdevice-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038063" comment="ffmpeg-4-libavfilter-devel-4.4.5-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234596" comment="ffmpeg-4-libavfilter-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038064" comment="ffmpeg-4-libavformat-devel-4.4.5-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234597" comment="ffmpeg-4-libavformat-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038065" comment="ffmpeg-4-libavresample-devel-4.4.5-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234598" comment="ffmpeg-4-libavresample-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038066" comment="ffmpeg-4-libavutil-devel-4.4.5-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234599" comment="ffmpeg-4-libavutil-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038067" comment="ffmpeg-4-libpostproc-devel-4.4.5-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234600" comment="ffmpeg-4-libpostproc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038068" comment="ffmpeg-4-libswresample-devel-4.4.5-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234601" comment="ffmpeg-4-libswresample-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038069" comment="ffmpeg-4-libswscale-devel-4.4.5-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234602" comment="ffmpeg-4-libswscale-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038070" comment="ffmpeg-4-private-devel-4.4.5-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009234603" comment="ffmpeg-4-private-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038071" comment="libavcodec58_134-4.4.5-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009695527" comment="libavcodec58_134 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038072" comment="libavdevice58_13-4.4.5-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009695528" comment="libavdevice58_13 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038073" comment="libavfilter7_110-4.4.5-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009695529" comment="libavfilter7_110 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038074" comment="libavformat58_76-4.4.5-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009695530" comment="libavformat58_76 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038075" comment="libavresample4_0-4.4.5-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009695531" comment="libavresample4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038076" comment="libavutil56_70-4.4.5-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009695532" comment="libavutil56_70 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038077" comment="libpostproc55_9-4.4.5-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009695533" comment="libpostproc55_9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038078" comment="libswresample3_9-4.4.5-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009695534" comment="libswresample3_9 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038079" comment="libswscale5_9-4.4.5-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009695535" comment="libswscale5_9 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202564076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-64076</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-64076" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64076" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-64076" ref_url="https://www.suse.com/security/cve/CVE-2025-64076" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21168-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023501.html" source="SUSE-SU"/>
    <description>
    Multiple vulnerabilities exist in cbor2 through version 5.7.0 in the decode_definite_long_string() function of the C extension decoder (source/decoder.c): (1) Integer Underflow Leading to Out-of-Bounds Read (CWE-191, CWE-125): An incorrect variable reference and missing state reset in the chunk processing loop causes buffer_length to not be reset to zero after UTF-8 character consumption. This results in subsequent chunk_length calculations producing negative values (e.g., chunk_length = 65536 - buffer_length), which are passed as signed integers to the read() method, potentially triggering unlimited read operations and resource exhaustion. (2) Memory Leak via Missing Reference Count Release (CWE-401): The main processing loop fails to release Python object references (Py_DECREF) for chunk objects allocated in each iteration. For CBOR strings longer than 65536 bytes, this causes cumulative memory leaks proportional to the payload size, enabling memory exhaustion attacks through repeated processing of large CBOR payloads. Both vulnerabilities can be exploited remotely without authentication by sending specially-crafted CBOR data containing definite-length text strings with multi-byte UTF-8 characters positioned at 65536-byte chunk boundaries. Successful exploitation results in denial of service through process crashes (CBORDecodeEOF exceptions) or memory exhaustion. The vulnerabilities affect all applications using cbor2's C extension to process untrusted CBOR data, including web APIs, IoT data collectors, and message queue processors. Fixed in commit 851473490281f82d82560b2368284ef33cf6e8f9 pushed with released version 5.7.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-03"/>
	<updated date="2025-12-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:H" cvss4="5.2/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:L/VI:N/VA:H/SC:L/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-64076/">CVE-2025-64076 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-64076">CVE-2025-64076 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253746">SUSE bug 1253746</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032408" comment="python313-cbor2-5.6.5-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032409" comment="python313-cbor2 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202564181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-64181</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-64181" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64181" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-64181" ref_url="https://www.suse.com/security/cve/CVE-2025-64181" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023382.html" source="SUSE-SU"/>
    <description>
    OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry. In versions 3.3.0 through 3.3.5 and 3.4.0 through 3.4.2, while fuzzing `openexr_exrcheck_fuzzer`, Valgrind reports a conditional branch depending on uninitialized data inside `generic_unpack`. This indicates a use of uninitialized memory. The issue can result in undefined behavior and/or a potential crash/denial of service. Versions 3.3.6 and 3.4.3 fix the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-22"/>
	<updated date="2025-12-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="5.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-64181/">CVE-2025-64181 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-64181">CVE-2025-64181 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253233">SUSE bug 1253233</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030545" comment="libIex-3_2-31-3.2.2-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010030593" comment="libIex-3_2-31 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030546" comment="libIex-3_2-31-x86-64-v3-3.2.2-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010030594" comment="libIex-3_2-31-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030547" comment="libIlmThread-3_2-31-3.2.2-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010030595" comment="libIlmThread-3_2-31 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030548" comment="libIlmThread-3_2-31-x86-64-v3-3.2.2-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010030596" comment="libIlmThread-3_2-31-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030549" comment="libOpenEXR-3_2-31-3.2.2-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010030597" comment="libOpenEXR-3_2-31 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030550" comment="libOpenEXR-3_2-31-x86-64-v3-3.2.2-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010030598" comment="libOpenEXR-3_2-31-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030551" comment="libOpenEXRCore-3_2-31-3.2.2-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010030599" comment="libOpenEXRCore-3_2-31 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030552" comment="libOpenEXRCore-3_2-31-x86-64-v3-3.2.2-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010030600" comment="libOpenEXRCore-3_2-31-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030553" comment="libOpenEXRUtil-3_2-31-3.2.2-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010030601" comment="libOpenEXRUtil-3_2-31 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030554" comment="libOpenEXRUtil-3_2-31-x86-64-v3-3.2.2-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010030602" comment="libOpenEXRUtil-3_2-31-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030555" comment="openexr-3.2.2-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172752" comment="openexr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030556" comment="openexr-devel-3.2.2-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151255" comment="openexr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030557" comment="openexr-doc-3.2.2-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172753" comment="openexr-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20256424" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-6424</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-6424" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6424" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-6424" ref_url="https://www.suse.com/security/cve/CVE-2025-6424" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:10072" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001748.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10074" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001747.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10246" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02122-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02123-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02339-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02368-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02529-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02546-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023500.html" source="SUSE-SU"/>
    <description>
    A use-after-free in FontFaceSet resulted in a potentially exploitable crash. This vulnerability was fixed in Firefox 140, Firefox ESR 115.25, Firefox ESR 128.12, Thunderbird 140, and Thunderbird 128.12.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-05"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6424/">CVE-2025-6424 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6424">CVE-2025-6424 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244670">SUSE bug 1244670</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032507" comment="libmozjs-128-0-128.14.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032510" comment="libmozjs-128-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032508" comment="mozjs128-128.14.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032511" comment="mozjs128 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032509" comment="mozjs128-devel-128.14.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032512" comment="mozjs128-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20256425" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-6425</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-6425" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6425" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-6425" ref_url="https://www.suse.com/security/cve/CVE-2025-6425" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:10072" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001748.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10074" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001747.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10246" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02122-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02123-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02339-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02368-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02529-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02546-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023500.html" source="SUSE-SU"/>
    <description>
    An attacker who enumerated resources from the WebCompat extension could have obtained a persistent UUID that identified the browser, and persisted between containers and normal/private browsing mode, but not profiles. This vulnerability was fixed in Firefox 140, Firefox ESR 115.25, Firefox ESR 128.12, Thunderbird 140, and Thunderbird 128.12.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-05"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6425/">CVE-2025-6425 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6425">CVE-2025-6425 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244670">SUSE bug 1244670</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032507" comment="libmozjs-128-0-128.14.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032510" comment="libmozjs-128-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032508" comment="mozjs128-128.14.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032511" comment="mozjs128 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032509" comment="mozjs128-devel-128.14.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032512" comment="mozjs128-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20256426" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-6426</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-6426" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6426" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-6426" ref_url="https://www.suse.com/security/cve/CVE-2025-6426" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02122-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02123-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02339-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02368-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02529-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02546-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023500.html" source="SUSE-SU"/>
    <description>
    The executable file warning did not warn users before opening files with the `terminal` extension. 
*This bug only affects Firefox for macOS. Other versions of Firefox are unaffected.*. This vulnerability was fixed in Firefox 140, Firefox ESR 128.12, Thunderbird 140, and Thunderbird 128.12.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-05"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:N/VI:N/VA:N/SC:H/SI:H/SA:L" href="https://www.suse.com/security/cve/CVE-2025-6426/">CVE-2025-6426 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6426">CVE-2025-6426 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244670">SUSE bug 1244670</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032507" comment="libmozjs-128-0-128.14.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032510" comment="libmozjs-128-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032508" comment="mozjs128-128.14.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032511" comment="mozjs128 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032509" comment="mozjs128-devel-128.14.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032512" comment="mozjs128-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20256429" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-6429</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-6429" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6429" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-6429" ref_url="https://www.suse.com/security/cve/CVE-2025-6429" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:10072" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001748.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10074" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001747.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10246" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02122-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02123-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02339-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02368-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02529-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02546-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023500.html" source="SUSE-SU"/>
    <description>
    Firefox could have incorrectly parsed a URL and rewritten it to the youtube.com domain when parsing the URL specified in an `embed` tag.  This could have bypassed website security checks that restricted which domains users were allowed to embed. This vulnerability was fixed in Firefox 140, Firefox ESR 128.12, Thunderbird 140, and Thunderbird 128.12.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-05"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6429/">CVE-2025-6429 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6429">CVE-2025-6429 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244670">SUSE bug 1244670</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032507" comment="libmozjs-128-0-128.14.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032510" comment="libmozjs-128-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032508" comment="mozjs128-128.14.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032511" comment="mozjs128 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032509" comment="mozjs128-devel-128.14.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032512" comment="mozjs128-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20256430" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-6430</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-6430" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6430" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-6430" ref_url="https://www.suse.com/security/cve/CVE-2025-6430" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:10072" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001748.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10074" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001747.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:10246" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02122-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02123-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-June/040490.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02339-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040754.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02368-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02529-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02546-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023500.html" source="SUSE-SU"/>
    <description>
    When a file download is specified via the `Content-Disposition` header, that directive would be ignored if the file was included via a `&amp;lt;embed&amp;gt;` or `&amp;lt;object&amp;gt;` tag, potentially making a website vulnerable to a cross-site scripting attack. This vulnerability was fixed in Firefox 140, Firefox ESR 128.12, Thunderbird 140, and Thunderbird 128.12.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-05"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-6430/">CVE-2025-6430 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-6430">CVE-2025-6430 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1244670">SUSE bug 1244670</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032507" comment="libmozjs-128-0-128.14.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032510" comment="libmozjs-128-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032508" comment="mozjs128-128.14.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032511" comment="mozjs128 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032509" comment="mozjs128-devel-128.14.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032512" comment="mozjs128-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202564324" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-64324</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-64324" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64324" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-64324" ref_url="https://www.suse.com/security/cve/CVE-2025-64324" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024607.html" source="SUSE-SU"/>
    <description>
    KubeVirt is a virtual machine management add-on for Kubernetes. The `hostDisk` feature in KubeVirt allows mounting a host file or directory owned by the user with UID 107 into a VM. However, prior to version 1.6.1 and 1.7.0, the implementation of this feature and more specifically the `DiskOrCreate` option (which creates a file if it doesn't exist) has a logic bug that allows an attacker to read and write arbitrary files owned by more privileged users on the host system. Versions 1.6.1 and 1.7.0 fix the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-06"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-64324/">CVE-2025-64324 at SUSE</cve>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-64324">CVE-2025-64324 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253748">SUSE bug 1253748</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045700" comment="kubevirt-container-disk-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624367" comment="kubevirt-container-disk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045701" comment="kubevirt-manifests-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624368" comment="kubevirt-manifests is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045702" comment="kubevirt-pr-helper-conf-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009871691" comment="kubevirt-pr-helper-conf is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045703" comment="kubevirt-sidecar-shim-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010045808" comment="kubevirt-sidecar-shim is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045704" comment="kubevirt-tests-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624369" comment="kubevirt-tests is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045705" comment="kubevirt-virt-api-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624370" comment="kubevirt-virt-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045706" comment="kubevirt-virt-controller-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624371" comment="kubevirt-virt-controller is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045707" comment="kubevirt-virt-exportproxy-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009814386" comment="kubevirt-virt-exportproxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045708" comment="kubevirt-virt-exportserver-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009814387" comment="kubevirt-virt-exportserver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045709" comment="kubevirt-virt-handler-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624372" comment="kubevirt-virt-handler is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045710" comment="kubevirt-virt-launcher-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624373" comment="kubevirt-virt-launcher is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045711" comment="kubevirt-virt-operator-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624374" comment="kubevirt-virt-operator is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045712" comment="kubevirt-virt-synchronization-controller-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010045809" comment="kubevirt-virt-synchronization-controller is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045713" comment="kubevirt-virtctl-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624375" comment="kubevirt-virtctl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045714" comment="obs-service-kubevirt_containers_meta-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009662899" comment="obs-service-kubevirt_containers_meta is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202564432" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-64432</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-64432" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64432" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-64432" ref_url="https://www.suse.com/security/cve/CVE-2025-64432" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024607.html" source="SUSE-SU"/>
    <description>
    KubeVirt is a virtual machine management add-on for Kubernetes. Versions 1.5.3 and below, and 1.6.0 contained a flawed implementation of the Kubernetes aggregation layer's authentication flow which could enable bypass of RBAC controls. It was discovered that the virt-api component fails to correctly authenticate the client when receiving API requests over mTLS. In particular, it fails to validate the CN (Common Name) field in the received client TLS certificates against the set of allowed values defined in the extension-apiserver-authentication configmap. Failre to validate certain fields in the client TLS certificate may allow an attacker to bypass existing RBAC controls by directly communicating with the aggregated API server, impersonating the Kubernetes API server and its aggregator component. This issue is fixed in versions 1.5.3 and 1.6.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-64432/">CVE-2025-64432 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-64432">CVE-2025-64432 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253181">SUSE bug 1253181</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045700" comment="kubevirt-container-disk-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624367" comment="kubevirt-container-disk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045701" comment="kubevirt-manifests-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624368" comment="kubevirt-manifests is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045702" comment="kubevirt-pr-helper-conf-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009871691" comment="kubevirt-pr-helper-conf is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045703" comment="kubevirt-sidecar-shim-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010045808" comment="kubevirt-sidecar-shim is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045704" comment="kubevirt-tests-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624369" comment="kubevirt-tests is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045705" comment="kubevirt-virt-api-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624370" comment="kubevirt-virt-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045706" comment="kubevirt-virt-controller-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624371" comment="kubevirt-virt-controller is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045707" comment="kubevirt-virt-exportproxy-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009814386" comment="kubevirt-virt-exportproxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045708" comment="kubevirt-virt-exportserver-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009814387" comment="kubevirt-virt-exportserver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045709" comment="kubevirt-virt-handler-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624372" comment="kubevirt-virt-handler is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045710" comment="kubevirt-virt-launcher-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624373" comment="kubevirt-virt-launcher is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045711" comment="kubevirt-virt-operator-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624374" comment="kubevirt-virt-operator is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045712" comment="kubevirt-virt-synchronization-controller-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010045809" comment="kubevirt-virt-synchronization-controller is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045713" comment="kubevirt-virtctl-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624375" comment="kubevirt-virtctl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045714" comment="obs-service-kubevirt_containers_meta-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009662899" comment="obs-service-kubevirt_containers_meta is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202564433" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-64433</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-64433" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64433" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-64433" ref_url="https://www.suse.com/security/cve/CVE-2025-64433" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024607.html" source="SUSE-SU"/>
    <description>
    KubeVirt is a virtual machine management add-on for Kubernetes. Prior to 1.5.3 and 1.6.1, a vulnerability was discovered that allows a VM to read arbitrary files from the virt-launcher pod's file system. This issue stems from improper symlink handling when mounting PVC disks into a VM. Specifically, if a malicious user has full or partial control over the contents of a PVC, they can create a symbolic link that points to a file within the virt-launcher pod's file system. Since libvirt can treat regular files as block devices, any file on the pod's file system that is symlinked in this way can be mounted into the VM and subsequently read. Although a security mechanism exists where VMs are executed as an unprivileged user with UID 107 inside the virt-launcher container, limiting the scope of accessible resources, this restriction is bypassed due to a second vulnerability. The latter causes the ownership of any file intended for mounting to be changed to the unprivileged user with UID 107 prior to mounting. As a result, an attacker can gain access to and read arbitrary files located within the virt-launcher pod's file system or on a mounted PVC from within the guest VM. This vulnerability is fixed in 1.5.3 and 1.6.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-64433/">CVE-2025-64433 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-64433">CVE-2025-64433 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253185">SUSE bug 1253185</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045700" comment="kubevirt-container-disk-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624367" comment="kubevirt-container-disk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045701" comment="kubevirt-manifests-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624368" comment="kubevirt-manifests is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045702" comment="kubevirt-pr-helper-conf-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009871691" comment="kubevirt-pr-helper-conf is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045703" comment="kubevirt-sidecar-shim-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010045808" comment="kubevirt-sidecar-shim is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045704" comment="kubevirt-tests-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624369" comment="kubevirt-tests is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045705" comment="kubevirt-virt-api-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624370" comment="kubevirt-virt-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045706" comment="kubevirt-virt-controller-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624371" comment="kubevirt-virt-controller is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045707" comment="kubevirt-virt-exportproxy-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009814386" comment="kubevirt-virt-exportproxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045708" comment="kubevirt-virt-exportserver-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009814387" comment="kubevirt-virt-exportserver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045709" comment="kubevirt-virt-handler-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624372" comment="kubevirt-virt-handler is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045710" comment="kubevirt-virt-launcher-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624373" comment="kubevirt-virt-launcher is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045711" comment="kubevirt-virt-operator-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624374" comment="kubevirt-virt-operator is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045712" comment="kubevirt-virt-synchronization-controller-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010045809" comment="kubevirt-virt-synchronization-controller is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045713" comment="kubevirt-virtctl-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624375" comment="kubevirt-virtctl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045714" comment="obs-service-kubevirt_containers_meta-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009662899" comment="obs-service-kubevirt_containers_meta is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202564434" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-64434</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-64434" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64434" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-64434" ref_url="https://www.suse.com/security/cve/CVE-2025-64434" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024607.html" source="SUSE-SU"/>
    <description>
    KubeVirt is a virtual machine management add-on for Kubernetes. Prior to 1.5.3 and 1.6.1, due to the peer verification logic in virt-handler (via verifyPeerCert), an attacker who compromises a virt-handler instance, could exploit these shared credentials to impersonate virt-api and execute privileged operations against other virt-handler instances potentially compromising the integrity and availability of the VM managed by it. This vulnerability is fixed in 1.5.3 and 1.6.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-64434/">CVE-2025-64434 at SUSE</cve>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-64434">CVE-2025-64434 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253186">SUSE bug 1253186</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045700" comment="kubevirt-container-disk-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624367" comment="kubevirt-container-disk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045701" comment="kubevirt-manifests-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624368" comment="kubevirt-manifests is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045702" comment="kubevirt-pr-helper-conf-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009871691" comment="kubevirt-pr-helper-conf is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045703" comment="kubevirt-sidecar-shim-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010045808" comment="kubevirt-sidecar-shim is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045704" comment="kubevirt-tests-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624369" comment="kubevirt-tests is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045705" comment="kubevirt-virt-api-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624370" comment="kubevirt-virt-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045706" comment="kubevirt-virt-controller-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624371" comment="kubevirt-virt-controller is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045707" comment="kubevirt-virt-exportproxy-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009814386" comment="kubevirt-virt-exportproxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045708" comment="kubevirt-virt-exportserver-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009814387" comment="kubevirt-virt-exportserver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045709" comment="kubevirt-virt-handler-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624372" comment="kubevirt-virt-handler is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045710" comment="kubevirt-virt-launcher-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624373" comment="kubevirt-virt-launcher is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045711" comment="kubevirt-virt-operator-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624374" comment="kubevirt-virt-operator is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045712" comment="kubevirt-virt-synchronization-controller-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010045809" comment="kubevirt-virt-synchronization-controller is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045713" comment="kubevirt-virtctl-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624375" comment="kubevirt-virtctl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045714" comment="obs-service-kubevirt_containers_meta-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009662899" comment="obs-service-kubevirt_containers_meta is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202564435" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-64435</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-64435" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64435" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-64435" ref_url="https://www.suse.com/security/cve/CVE-2025-64435" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024146.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024607.html" source="SUSE-SU"/>
    <description>
    KubeVirt is a virtual machine management add-on for Kubernetes. Prior to 1.7.0-beta.0, a logic flaw in the virt-controller allows an attacker to disrupt the control over a running VMI by creating a pod with the same labels as the legitimate virt-launcher pod associated with the VMI. This can mislead the virt-controller into associating the fake pod with the VMI, resulting in incorrect status updates and potentially causing a DoS (Denial-of-Service). This vulnerability is fixed in 1.7.0-beta.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-64435/">CVE-2025-64435 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-64435">CVE-2025-64435 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253189">SUSE bug 1253189</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045700" comment="kubevirt-container-disk-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624367" comment="kubevirt-container-disk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045701" comment="kubevirt-manifests-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624368" comment="kubevirt-manifests is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045702" comment="kubevirt-pr-helper-conf-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009871691" comment="kubevirt-pr-helper-conf is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045703" comment="kubevirt-sidecar-shim-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010045808" comment="kubevirt-sidecar-shim is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045704" comment="kubevirt-tests-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624369" comment="kubevirt-tests is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045705" comment="kubevirt-virt-api-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624370" comment="kubevirt-virt-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045706" comment="kubevirt-virt-controller-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624371" comment="kubevirt-virt-controller is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045707" comment="kubevirt-virt-exportproxy-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009814386" comment="kubevirt-virt-exportproxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045708" comment="kubevirt-virt-exportserver-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009814387" comment="kubevirt-virt-exportserver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045709" comment="kubevirt-virt-handler-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624372" comment="kubevirt-virt-handler is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045710" comment="kubevirt-virt-launcher-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624373" comment="kubevirt-virt-launcher is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045711" comment="kubevirt-virt-operator-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624374" comment="kubevirt-virt-operator is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045712" comment="kubevirt-virt-synchronization-controller-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010045809" comment="kubevirt-virt-synchronization-controller is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045713" comment="kubevirt-virtctl-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624375" comment="kubevirt-virtctl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045714" comment="obs-service-kubevirt_containers_meta-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009662899" comment="obs-service-kubevirt_containers_meta is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202564437" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-64437</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-64437" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64437" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-64437" ref_url="https://www.suse.com/security/cve/CVE-2025-64437" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4330-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20551-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20571-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20610-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024607.html" source="SUSE-SU"/>
    <description>
    KubeVirt is a virtual machine management add-on for Kubernetes. In versions before 1.5.3 and 1.6.1, the virt-handler does not verify whether the launcher-sock is a symlink or a regular file. This oversight can be exploited, for example, to change the ownership of arbitrary files on the host node to the unprivileged user with UID 107 (the same user used by virt-launcher) thus, compromising the CIA (Confidentiality, Integrity and Availability) of data on the host. To successfully exploit this vulnerability, an attacker should be in control of the file system of the virt-launcher pod. This vulnerability is fixed in 1.5.3 and 1.6.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-06"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.9/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L" cvss4="1.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-64437/">CVE-2025-64437 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-64437">CVE-2025-64437 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1253194">SUSE bug 1253194</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045700" comment="kubevirt-container-disk-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624367" comment="kubevirt-container-disk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045701" comment="kubevirt-manifests-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624368" comment="kubevirt-manifests is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045702" comment="kubevirt-pr-helper-conf-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009871691" comment="kubevirt-pr-helper-conf is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045703" comment="kubevirt-sidecar-shim-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010045808" comment="kubevirt-sidecar-shim is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045704" comment="kubevirt-tests-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624369" comment="kubevirt-tests is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045705" comment="kubevirt-virt-api-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624370" comment="kubevirt-virt-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045706" comment="kubevirt-virt-controller-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624371" comment="kubevirt-virt-controller is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045707" comment="kubevirt-virt-exportproxy-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009814386" comment="kubevirt-virt-exportproxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045708" comment="kubevirt-virt-exportserver-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009814387" comment="kubevirt-virt-exportserver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045709" comment="kubevirt-virt-handler-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624372" comment="kubevirt-virt-handler is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045710" comment="kubevirt-virt-launcher-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624373" comment="kubevirt-virt-launcher is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045711" comment="kubevirt-virt-operator-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624374" comment="kubevirt-virt-operator is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045712" comment="kubevirt-virt-synchronization-controller-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010045809" comment="kubevirt-virt-synchronization-controller is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045713" comment="kubevirt-virtctl-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009624375" comment="kubevirt-virtctl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045714" comment="obs-service-kubevirt_containers_meta-1.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009662899" comment="obs-service-kubevirt_containers_meta is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202564459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-64459</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-64459" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64459" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-64459" ref_url="https://www.suse.com/security/cve/CVE-2025-64459" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023282.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in 5.1 before 5.1.14, 4.2 before 4.2.26, and 5.2 before 5.2.8.
The methods `QuerySet.filter()`, `QuerySet.exclude()`, and `QuerySet.get()`, and the class `Q()`, are subject to SQL injection when using a suitably crafted dictionary, with dictionary expansion, as the `_connector` argument.
Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected.
Django would like to thank cyberstan for reporting this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-13"/>
	<updated date="2025-12-13"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-64459/">CVE-2025-64459 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-64459">CVE-2025-64459 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252926">SUSE bug 1252926</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033371" comment="python313-Django-5.2.4-bp160.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025481" comment="python313-Django is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202564460" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-64460</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-64460" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64460" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-64460" ref_url="https://www.suse.com/security/cve/CVE-2025-64460" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023533.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in 5.2 before 5.2.9, 5.1 before 5.1.15, and 4.2 before 4.2.27.
Algorithmic complexity in `django.core.serializers.xml_serializer.getInnerText()` allows a remote attacker to cause a potential denial-of-service attack triggering CPU and memory exhaustion via specially crafted XML input processed by the XML `Deserializer`.
Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected.
Django would like to thank Seokchan Yoon for reporting this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-13"/>
	<updated date="2025-12-13"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-64460/">CVE-2025-64460 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-64460">CVE-2025-64460 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254437">SUSE bug 1254437</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033371" comment="python313-Django-5.2.4-bp160.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025481" comment="python313-Django is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202564505" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-64505</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-64505" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64505" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-64505" ref_url="https://www.suse.com/security/cve/CVE-2025-64505" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4383-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023535.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4432-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0898-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024694.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023744.html" source="SUSE-SU"/>
    <description>
    LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. Prior to version 1.6.51, a heap buffer over-read vulnerability exists in libpng's png_do_quantize function when processing PNG files with malformed palette indices. The vulnerability occurs when palette_lookup array bounds are not validated against externally-supplied image data, allowing an attacker to craft a PNG file with out-of-range palette indices that trigger out-of-bounds memory access. This issue has been patched in version 1.6.51.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-13"/>
	<updated date="2026-03-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-64505/">CVE-2025-64505 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-64505">CVE-2025-64505 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254157">SUSE bug 1254157</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037185" comment="libpng16-16-1.6.44-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151414" comment="libpng16-16 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037186" comment="libpng16-16-x86-64-v3-1.6.44-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037228" comment="libpng16-16-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037187" comment="libpng16-compat-devel-1.6.44-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151416" comment="libpng16-compat-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037188" comment="libpng16-compat-devel-x86-64-v3-1.6.44-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037229" comment="libpng16-compat-devel-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037189" comment="libpng16-devel-1.6.44-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151417" comment="libpng16-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037190" comment="libpng16-devel-x86-64-v3-1.6.44-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037230" comment="libpng16-devel-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037191" comment="libpng16-tools-1.6.44-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153137" comment="libpng16-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202564506" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-64506</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-64506" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64506" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-64506" ref_url="https://www.suse.com/security/cve/CVE-2025-64506" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023744.html" source="SUSE-SU"/>
    <description>
    LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From version 1.6.0 to before 1.6.51, a heap buffer over-read vulnerability exists in libpng's png_write_image_8bit function when processing 8-bit images through the simplified write API with convert_to_8bit enabled. The vulnerability affects 8-bit grayscale+alpha, RGB/RGBA, and images with incomplete row data. A conditional guard incorrectly allows 8-bit input to enter code expecting 16-bit input, causing reads up to 2 bytes beyond allocated buffer boundaries. This issue has been patched in version 1.6.51.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-13"/>
	<updated date="2026-01-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-64506/">CVE-2025-64506 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-64506">CVE-2025-64506 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254158">SUSE bug 1254158</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037185" comment="libpng16-16-1.6.44-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151414" comment="libpng16-16 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037186" comment="libpng16-16-x86-64-v3-1.6.44-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037228" comment="libpng16-16-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037187" comment="libpng16-compat-devel-1.6.44-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151416" comment="libpng16-compat-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037188" comment="libpng16-compat-devel-x86-64-v3-1.6.44-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037229" comment="libpng16-compat-devel-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037189" comment="libpng16-devel-1.6.44-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151417" comment="libpng16-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037190" comment="libpng16-devel-x86-64-v3-1.6.44-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037230" comment="libpng16-devel-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037191" comment="libpng16-tools-1.6.44-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153137" comment="libpng16-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202564702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-64702</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-64702" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64702" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-64702" ref_url="https://www.suse.com/security/cve/CVE-2025-64702" source="SUSE CVE"/>
    <description>
    quic-go is an implementation of the QUIC protocol in Go. Versions 0.56.0 and below are vulnerable to excessive memory allocation through quic-go's HTTP/3 client and server implementations by sending a QPACK-encoded HEADERS frame that decodes into a large header field section (many unique header names and/or large values). The implementation builds an http.Header (used on the http.Request and http.Response, respectively), while only enforcing limits on the size of the (QPACK-compressed) HEADERS frame, but not on the decoded header, leading to memory exhaustion. This issue is fixed in version 0.57.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-11"/>
	<updated date="2026-02-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-64702/">CVE-2025-64702 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-64702">CVE-2025-64702 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255365">SUSE bug 1255365</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042597" comment="trivy-0.69.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698141" comment="trivy is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202564718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-64718</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-64718" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64718" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-64718" ref_url="https://www.suse.com/security/cve/CVE-2025-64718" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20182-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024033.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20540-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024597.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20580-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024623.html" source="SUSE-SU"/>
    <description>
    js-yaml is a JavaScript YAML parser and dumper. In js-yaml before 4.1.1 and 3.14.2, it's possible for an attacker to modify the prototype of the result of a parsed yaml document via prototype pollution (`__proto__`). All users who parse untrusted yaml documents may be impacted. The problem is patched in js-yaml 4.1.1 and 3.14.2. Users can protect against this kind of attack on the server by using `node --disable-proto=delete` or `deno` (in Deno, pollution protection is on by default).
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-64718/">CVE-2025-64718 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-64718">CVE-2025-64718 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255407">SUSE bug 1255407</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044577" comment="cockpit-repos-4.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010044612" comment="cockpit-repos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041320" comment="cockpit-subscriptions-12.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041633" comment="cockpit-subscriptions is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202564720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-64720</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-64720" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-64720" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-64720" ref_url="https://www.suse.com/security/cve/CVE-2025-64720" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0125" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002348.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0210" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002416.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0238" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003141.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0241" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002359.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0847" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002501.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0927" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002409.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0928" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002427.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0932" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002431.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0933" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023744.html" source="SUSE-SU"/>
    <description>
    LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From version 1.6.0 to before 1.6.51, an out-of-bounds read vulnerability exists in png_image_read_composite when processing palette images with PNG_FLAG_OPTIMIZE_ALPHA enabled. The palette compositing code in png_init_read_transformations incorrectly applies background compositing during premultiplication, violating the invariant component ≤ alpha x 257 required by the simplified PNG API. This issue has been patched in version 1.6.51.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-13"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-64720/">CVE-2025-64720 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-64720">CVE-2025-64720 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254159">SUSE bug 1254159</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037185" comment="libpng16-16-1.6.44-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151414" comment="libpng16-16 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037186" comment="libpng16-16-x86-64-v3-1.6.44-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037228" comment="libpng16-16-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037187" comment="libpng16-compat-devel-1.6.44-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151416" comment="libpng16-compat-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037188" comment="libpng16-compat-devel-x86-64-v3-1.6.44-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037229" comment="libpng16-compat-devel-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037189" comment="libpng16-devel-1.6.44-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151417" comment="libpng16-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037190" comment="libpng16-devel-x86-64-v3-1.6.44-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037230" comment="libpng16-devel-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037191" comment="libpng16-tools-1.6.44-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153137" comment="libpng16-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202565018" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-65018</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-65018" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-65018" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-65018" ref_url="https://www.suse.com/security/cve/CVE-2025-65018" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0125" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002348.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0210" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002416.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0238" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003141.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0241" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002359.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0847" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002501.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0927" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002409.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0928" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002427.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0932" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002431.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0933" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4533-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023661.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023744.html" source="SUSE-SU"/>
    <description>
    LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From version 1.6.0 to before 1.6.51, there is a heap buffer overflow vulnerability in the libpng simplified API function png_image_finish_read when processing 16-bit interlaced PNGs with 8-bit output format. Attacker-crafted interlaced PNG files cause heap writes beyond allocated buffer bounds. This issue has been patched in version 1.6.51.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-13"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-65018/">CVE-2025-65018 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-65018">CVE-2025-65018 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254160">SUSE bug 1254160</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037185" comment="libpng16-16-1.6.44-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151414" comment="libpng16-16 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037186" comment="libpng16-16-x86-64-v3-1.6.44-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037228" comment="libpng16-16-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037187" comment="libpng16-compat-devel-1.6.44-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151416" comment="libpng16-compat-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037188" comment="libpng16-compat-devel-x86-64-v3-1.6.44-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037229" comment="libpng16-compat-devel-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037189" comment="libpng16-devel-1.6.44-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151417" comment="libpng16-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037190" comment="libpng16-devel-x86-64-v3-1.6.44-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037230" comment="libpng16-devel-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037191" comment="libpng16-tools-1.6.44-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153137" comment="libpng16-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202565082" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-65082</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-65082" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-65082" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-65082" ref_url="https://www.suse.com/security/cve/CVE-2025-65082" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23732" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002326.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23919" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4488-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023629.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023669.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023817.html" source="SUSE-SU"/>
    <description>
    Improper Neutralization of Escape, Meta, or Control Sequences vulnerability in Apache HTTP Server through environment variables set via the Apache configuration unexpectedly superseding variables calculated by the server for CGI programs.

This issue affects Apache HTTP Server from 2.4.0 through 2.4.65.

Users are recommended to upgrade to version 2.4.66 which fixes the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-16"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-65082/">CVE-2025-65082 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-65082">CVE-2025-65082 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254514">SUSE bug 1254514</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037713" comment="apache2-2.4.63-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151165" comment="apache2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037714" comment="apache2-devel-2.4.63-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151166" comment="apache2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037715" comment="apache2-event-2.4.63-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153274" comment="apache2-event is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037716" comment="apache2-manual-2.4.63-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009865251" comment="apache2-manual is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037717" comment="apache2-prefork-2.4.63-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151169" comment="apache2-prefork is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037718" comment="apache2-utils-2.4.63-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151170" comment="apache2-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037719" comment="apache2-worker-2.4.63-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153275" comment="apache2-worker is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202565955" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-65955</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-65955" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-65955" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-65955" ref_url="https://www.suse.com/security/cve/CVE-2025-65955" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024032.html" source="SUSE-SU"/>
    <description>
    ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to 7.1.2-9 and 6.9.13-34, there is a vulnerability in ImageMagick's Magick++ layer that manifests when Options::fontFamily is invoked with an empty string. Clearing a font family calls RelinquishMagickMemory on _drawInfo-&gt;font, freeing the font string but leaving _drawInfo-&gt;font pointing to freed memory while _drawInfo-&gt;family is set to that (now-invalid) pointer. Any later cleanup or reuse of _drawInfo-&gt;font re-frees or dereferences dangling memory. DestroyDrawInfo and other setters (Options::font, Image::font) assume _drawInfo-&gt;font remains valid, so destruction or subsequent updates trigger crashes or heap corruption. This vulnerability is fixed in 7.1.2-9 and 6.9.13-34.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-02-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="2.1/CVSS:4.0/AV:L/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-65955/">CVE-2025-65955 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-65955">CVE-2025-65955 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254435">SUSE bug 1254435</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041321" comment="ImageMagick-7.1.2.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041322" comment="ImageMagick-config-7-SUSE-7.1.2.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041323" comment="ImageMagick-config-7-upstream-limited-7.1.2.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977490" comment="ImageMagick-config-7-upstream-limited is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041324" comment="ImageMagick-config-7-upstream-open-7.1.2.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977491" comment="ImageMagick-config-7-upstream-open is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041325" comment="ImageMagick-config-7-upstream-secure-7.1.2.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977492" comment="ImageMagick-config-7-upstream-secure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041326" comment="ImageMagick-config-7-upstream-websafe-7.1.2.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977493" comment="ImageMagick-config-7-upstream-websafe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041327" comment="ImageMagick-devel-7.1.2.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041328" comment="ImageMagick-doc-7.1.2.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041329" comment="ImageMagick-extra-7.1.2.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041330" comment="libMagick++-7_Q16HDRI5-7.1.2.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698047" comment="libMagick++-7_Q16HDRI5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041331" comment="libMagick++-devel-7.1.2.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041332" comment="libMagickCore-7_Q16HDRI10-7.1.2.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698048" comment="libMagickCore-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041333" comment="libMagickWand-7_Q16HDRI10-7.1.2.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698049" comment="libMagickWand-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041334" comment="perl-PerlMagick-7.1.2.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202566034" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-66034</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-66034" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66034" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-66034" ref_url="https://www.suse.com/security/cve/CVE-2025-66034" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023829.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20184-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024031.html" source="SUSE-SU"/>
    <description>
    fontTools is a library for manipulating fonts, written in Python. In versions from 4.33.0 to before 4.60.2, the fonttools varLib (or python3 -m fontTools.varLib) script has an arbitrary file write vulnerability that leads to remote code execution when a malicious .designspace file is processed. The vulnerability affects the main() code path of fontTools.varLib, used by the fonttools varLib CLI and any code that invokes fontTools.varLib.main(). This issue has been patched in version 4.60.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-02-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:L" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:A/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-66034/">CVE-2025-66034 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-66034">CVE-2025-66034 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254366">SUSE bug 1254366</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041335" comment="python313-FontTools-4.53.1-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041634" comment="python313-FontTools is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202566199" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-66199</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-66199" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66199" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-66199" ref_url="https://www.suse.com/security/cve/CVE-2025-66199" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1473" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024331.html" source="SUSE-SU"/>
    <description>
    Issue summary: A TLS 1.3 connection using certificate compression can be
forced to allocate a large buffer before decompression without checking
against the configured certificate size limit.

Impact summary: An attacker can cause per-connection memory allocations of
up to approximately 22 MiB and extra CPU work, potentially leading to
service degradation or resource exhaustion (Denial of Service).

In affected configurations, the peer-supplied uncompressed certificate
length from a CompressedCertificate message is used to grow a heap buffer
prior to decompression. This length is not bounded by the max_cert_list
setting, which otherwise constrains certificate message sizes. An attacker
can exploit this to cause large per-connection allocations followed by
handshake failure. No memory corruption or information disclosure occurs.

This issue only affects builds where TLS 1.3 certificate compression is
compiled in (i.e., not OPENSSL_NO_COMP_ALG) and at least one compression
algorithm (brotli, zlib, or zstd) is available, and where the compression
extension is negotiated. Both clients receiving a server CompressedCertificate
and servers in mutual TLS scenarios receiving a client CompressedCertificate
are affected. Servers that do not request client certificates are not
vulnerable to client-initiated attacks.

Users can mitigate this issue by setting SSL_OP_NO_RX_CERTIFICATE_COMPRESSION
to disable receiving compressed certificates.

The FIPS modules in 3.6, 3.5, 3.4 and 3.3 are not affected by this issue,
as the TLS implementation is outside the OpenSSL FIPS module boundary.

OpenSSL 3.6, 3.5, 3.4 and 3.3 are vulnerable to this issue.

OpenSSL 3.0, 1.1.1 and 1.0.2 are not affected by this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-66199/">CVE-2025-66199 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-66199">CVE-2025-66199 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256833">SUSE bug 1256833</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041595" comment="libopenssl-3-devel-3.5.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700693" comment="libopenssl-3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041596" comment="libopenssl-3-fips-provider-3.5.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009868077" comment="libopenssl-3-fips-provider is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041597" comment="libopenssl-3-fips-provider-x86-64-v3-3.5.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010034160" comment="libopenssl-3-fips-provider-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041598" comment="libopenssl3-3.5.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700695" comment="libopenssl3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041599" comment="libopenssl3-x86-64-v3-3.5.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010034161" comment="libopenssl3-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041600" comment="openssl-3-3.5.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700697" comment="openssl-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041601" comment="openssl-3-doc-3.5.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700698" comment="openssl-3-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202566200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-66200</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-66200" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66200" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-66200" ref_url="https://www.suse.com/security/cve/CVE-2025-66200" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23732" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002326.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23919" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003135.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4488-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023629.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4518-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0019-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023669.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0020-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023668.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023817.html" source="SUSE-SU"/>
    <description>
    mod_userdir+suexec bypass via AllowOverride FileInfo vulnerability in Apache HTTP Server. Users with access to use the RequestHeader directive in htaccess can cause some CGI scripts to run under an unexpected userid.

This issue affects Apache HTTP Server: from 2.4.7 through 2.4.65.

Users are recommended to upgrade to version 2.4.66, which fixes the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-16"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-66200/">CVE-2025-66200 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-66200">CVE-2025-66200 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254515">SUSE bug 1254515</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037713" comment="apache2-2.4.63-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151165" comment="apache2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037714" comment="apache2-devel-2.4.63-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151166" comment="apache2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037715" comment="apache2-event-2.4.63-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153274" comment="apache2-event is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037716" comment="apache2-manual-2.4.63-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009865251" comment="apache2-manual is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037717" comment="apache2-prefork-2.4.63-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151169" comment="apache2-prefork is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037718" comment="apache2-utils-2.4.63-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151170" comment="apache2-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037719" comment="apache2-worker-2.4.63-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153275" comment="apache2-worker is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202566287" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-66287</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-66287" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66287" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-66287" ref_url="https://www.suse.com/security/cve/CVE-2025-66287" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:22789" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002280.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:22790" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003113.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23110" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002337.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4416-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023572.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0021-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023667.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023882.html" source="SUSE-SU"/>
    <description>
    A flaw was found in WebKitGTK. Processing malicious web content can cause an unexpected process crash due to improper memory handling.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-22"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.5/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-66287/">CVE-2025-66287 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-66287">CVE-2025-66287 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254509">SUSE bug 1254509</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038439" comment="WebKitGTK-4.0-lang-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779926" comment="WebKitGTK-4.0-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038440" comment="WebKitGTK-4.1-lang-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779927" comment="WebKitGTK-4.1-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038441" comment="WebKitGTK-6.0-lang-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779928" comment="WebKitGTK-6.0-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038442" comment="libjavascriptcoregtk-4_0-18-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152638" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038443" comment="libjavascriptcoregtk-4_1-0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698039" comment="libjavascriptcoregtk-4_1-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038444" comment="libjavascriptcoregtk-6_0-1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779930" comment="libjavascriptcoregtk-6_0-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038445" comment="libwebkit2gtk-4_0-37-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152640" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038446" comment="libwebkit2gtk-4_1-0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698041" comment="libwebkit2gtk-4_1-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038447" comment="libwebkitgtk-6_0-4-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779932" comment="libwebkitgtk-6_0-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038448" comment="typelib-1_0-JavaScriptCore-4_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152643" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038449" comment="typelib-1_0-JavaScriptCore-4_1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698148" comment="typelib-1_0-JavaScriptCore-4_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038450" comment="typelib-1_0-JavaScriptCore-6_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779933" comment="typelib-1_0-JavaScriptCore-6_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038451" comment="typelib-1_0-WebKit-6_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779934" comment="typelib-1_0-WebKit-6_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038452" comment="typelib-1_0-WebKit2-4_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152644" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038453" comment="typelib-1_0-WebKit2-4_1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698149" comment="typelib-1_0-WebKit2-4_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038454" comment="typelib-1_0-WebKit2WebExtension-4_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152645" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038455" comment="typelib-1_0-WebKit2WebExtension-4_1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698150" comment="typelib-1_0-WebKit2WebExtension-4_1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038456" comment="typelib-1_0-WebKitWebProcessExtension-6_0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779935" comment="typelib-1_0-WebKitWebProcessExtension-6_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038457" comment="webkit-jsc-4-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152646" comment="webkit-jsc-4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038458" comment="webkit-jsc-4.1-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698152" comment="webkit-jsc-4.1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038459" comment="webkit-jsc-6.0-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779936" comment="webkit-jsc-6.0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038460" comment="webkit2gtk-4_0-injected-bundles-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152647" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038461" comment="webkit2gtk-4_1-injected-bundles-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698045" comment="webkit2gtk-4_1-injected-bundles is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038462" comment="webkit2gtk3-devel-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152649" comment="webkit2gtk3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038463" comment="webkit2gtk3-minibrowser-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243274" comment="webkit2gtk3-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038464" comment="webkit2gtk3-soup2-devel-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698154" comment="webkit2gtk3-soup2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038465" comment="webkit2gtk3-soup2-minibrowser-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698155" comment="webkit2gtk3-soup2-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038466" comment="webkit2gtk4-devel-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698156" comment="webkit2gtk4-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038467" comment="webkit2gtk4-minibrowser-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698157" comment="webkit2gtk4-minibrowser is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038468" comment="webkitgtk-6_0-injected-bundles-2.50.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009779937" comment="webkitgtk-6_0-injected-bundles is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202566293" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-66293</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-66293" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66293" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-66293" ref_url="https://www.suse.com/security/cve/CVE-2025-66293" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0125" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002348.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0210" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002416.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0238" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003141.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0241" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023579.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4494-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023744.html" source="SUSE-SU"/>
    <description>
    LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. Prior to 1.6.52, an out-of-bounds read vulnerability in libpng's simplified API allows reading up to 1012 bytes beyond the png_sRGB_base[512] array when processing valid palette PNG images with partial transparency and gamma correction. The PNG files that trigger this vulnerability are valid per the PNG specification; the bug is in libpng's internal state management. Upgrade to libpng 1.6.52 or later.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-13"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-66293/">CVE-2025-66293 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-66293">CVE-2025-66293 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254480">SUSE bug 1254480</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037185" comment="libpng16-16-1.6.44-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151414" comment="libpng16-16 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037186" comment="libpng16-16-x86-64-v3-1.6.44-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037228" comment="libpng16-16-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037187" comment="libpng16-compat-devel-1.6.44-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151416" comment="libpng16-compat-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037188" comment="libpng16-compat-devel-x86-64-v3-1.6.44-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037229" comment="libpng16-compat-devel-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037189" comment="libpng16-devel-1.6.44-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151417" comment="libpng16-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037190" comment="libpng16-devel-x86-64-v3-1.6.44-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037230" comment="libpng16-devel-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037191" comment="libpng16-tools-1.6.44-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153137" comment="libpng16-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202566418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-66418</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-66418" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66418" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-66418" ref_url="https://www.suse.com/security/cve/CVE-2025-66418" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1087" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003188.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1088" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003216.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1089" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003205.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1239" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003190.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1240" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002454.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1332" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002445.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1619" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002467.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1704" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002462.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1729" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0635-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024616.html" source="SUSE-SU"/>
    <description>
    urllib3 is a user-friendly HTTP client library for Python. Starting in version 1.24 and prior to 2.6.0, the number of links in the decompression chain was unbounded allowing a malicious server to insert a virtually unlimited number of compression steps leading to high CPU usage and massive memory allocation for the decompressed data. This vulnerability is fixed in 2.6.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-66418/">CVE-2025-66418 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-66418">CVE-2025-66418 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254866">SUSE bug 1254866</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041351" comment="python313-urllib3-2.5.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039777" comment="python313-urllib3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045689" comment="python313-urllib3_1-1.26.20-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010045810" comment="python313-urllib3_1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202566453" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-66453</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-66453" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66453" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-66453" ref_url="https://www.suse.com/security/cve/CVE-2025-66453" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023537.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20603-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024612.html" source="SUSE-SU"/>
    <description>
    Rhino is an open-source implementation of JavaScript written entirely in Java. Prior to 1.8.1, 1.7.15.1, and 1.7.14.1, when an application passed an attacker controlled float poing number into the toFixed() function, it might lead to high CPU consumption and a potential Denial of Service. Small numbers go through this call stack: NativeNumber.numTo &gt; DToA.JS_dtostr &gt; DToA.JS_dtoa &gt; DToA.pow5mult where pow5mult attempts to raise 5 to a ridiculous power. This vulnerability is fixed in 1.8.1, 1.7.15.1, and 1.7.14.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="5.5/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2025-66453/">CVE-2025-66453 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-66453">CVE-2025-66453 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254481">SUSE bug 1254481</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047304" comment="rhino-1.7.15.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009746731" comment="rhino is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047305" comment="rhino-demo-1.7.15.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009746733" comment="rhino-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047306" comment="rhino-engine-1.7.15.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033323" comment="rhino-engine is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047307" comment="rhino-javadoc-1.7.15.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033324" comment="rhino-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047308" comment="rhino-runtime-1.7.15.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033325" comment="rhino-runtime is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202566471" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-66471</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-66471" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66471" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-66471" ref_url="https://www.suse.com/security/cve/CVE-2025-66471" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1087" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003188.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1088" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003216.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1089" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003205.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1239" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003190.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1240" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002454.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1619" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002467.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1704" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002462.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1706" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002464.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1729" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0367-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024039.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0635-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1067-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024942.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20175-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20189-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024027.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20485-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024485.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024616.html" source="SUSE-SU"/>
    <description>
    urllib3 is a user-friendly HTTP client library for Python. Starting in version 1.0 and prior to 2.6.0, the Streaming API improperly handles highly compressed data. urllib3's streaming API is designed for the efficient handling of large HTTP responses by reading the content in chunks, rather than loading the entire response body into memory at once. When streaming a compressed response, urllib3 can perform decoding or decompression based on the HTTP Content-Encoding header (e.g., gzip, deflate, br, or zstd). The library must read compressed data from the network and decompress it until the requested chunk size is met. Any resulting decompressed data that exceeds the requested amount is held in an internal buffer for the next read operation. The decompression logic could cause urllib3 to fully decode a small amount of highly compressed data in a single operation. This can result in excessive resource consumption (high CPU usage and massive memory allocation for the decompressed data.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-66471/">CVE-2025-66471 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-66471">CVE-2025-66471 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254867">SUSE bug 1254867</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041351" comment="python313-urllib3-2.5.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039777" comment="python313-urllib3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045689" comment="python313-urllib3_1-1.26.20-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010045810" comment="python313-urllib3_1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202566564" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-66564</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-66564" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66564" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-66564" ref_url="https://www.suse.com/security/cve/CVE-2025-66564" source="SUSE CVE"/>
    <description>
    Sigstore Timestamp Authority is a service for issuing RFC 3161 timestamps. Prior to 2.0.3, Function api.ParseJSONRequest currently splits (via a call to strings.Split) an optionally-provided OID (which is untrusted data) on periods. Similarly, function api.getContentType splits the Content-Type header (which is also untrusted data) on an application string. As a result, in the face of a malicious request with either an excessively long OID in the payload containing many period characters or a malformed Content-Type header, a call to api.ParseJSONRequest or api.getContentType incurs allocations of O(n) bytes (where n stands for the length of the function's argument). This vulnerability is fixed in 2.0.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-11"/>
	<updated date="2026-02-11"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-66564/">CVE-2025-66564 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-66564">CVE-2025-66564 at NVD</cve>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042597" comment="trivy-0.69.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698141" comment="trivy is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202566570" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-66570</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-66570" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66570" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-66570" ref_url="https://www.suse.com/security/cve/CVE-2025-66570" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023810.html" source="SUSE-SU"/>
    <description>
    cpp-httplib is a C++11 single-file header-only cross platform HTTP/HTTPS library. Prior to 0.27.0, a vulnerability allows attacker-controlled HTTP headers to influence server-visible metadata, logging, and authorization decisions. An attacker can inject headers named REMOTE_ADDR, REMOTE_PORT, LOCAL_ADDR, LOCAL_PORT that are parsed into the request header multimap via read_headers() in httplib.h (headers.emplace), then the server later appends its own internal metadata using the same header names in Server::process_request without erasing duplicates. Because Request::get_header_value returns the first entry for a header key (id == 0) and the client-supplied headers are parsed before server-inserted headers, downstream code that uses these header names may inadvertently use attacker-controlled values. Affected files/locations: cpp-httplib/httplib.h (read_headers, Server::process_request, Request::get_header_value, get_header_value_u64) and cpp-httplib/docker/main.cc (get_client_ip, nginx_access_logger, nginx_error_logger). Attack surface: attacker-controlled HTTP headers in incoming requests flow into the Request.headers multimap and into logging code that reads forwarded headers, enabling IP spoofing, log poisoning, and authorization bypass via header shadowing. This vulnerability is fixed in 0.27.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-18"/>
	<updated date="2026-01-22"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N" cvss4="9.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-66570/">CVE-2025-66570 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-66570">CVE-2025-66570 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254734">SUSE bug 1254734</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037882" comment="cpp-httplib-devel-0.22.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009964479" comment="cpp-httplib-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037883" comment="libcpp-httplib0_22-0.22.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037918" comment="libcpp-httplib0_22 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202566577" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-66577</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-66577" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66577" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-66577" ref_url="https://www.suse.com/security/cve/CVE-2025-66577" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023810.html" source="SUSE-SU"/>
    <description>
    cpp-httplib is a C++11 single-file header-only cross platform HTTP/HTTPS library. Prior to 0.27.0, a vulnerability allows attacker-controlled HTTP headers to influence server-visible metadata, logging, and authorization decisions. An attacker can supply X-Forwarded-For or X-Real-IP headers which get accepted unconditionally by get_client_ip() in docker/main.cc, causing access and error logs (nginx_access_logger / nginx_error_logger) to record spoofed client IPs (log poisoning / audit evasion). This vulnerability is fixed in 0.27.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-18"/>
	<updated date="2026-01-22"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-66577/">CVE-2025-66577 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-66577">CVE-2025-66577 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254735">SUSE bug 1254735</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037882" comment="cpp-httplib-devel-0.22.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009964479" comment="cpp-httplib-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037883" comment="libcpp-httplib0_22-0.22.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037918" comment="libcpp-httplib0_22 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202566614" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-66614</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-66614" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66614" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-66614" ref_url="https://www.suse.com/security/cve/CVE-2025-66614" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20926-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20982-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045349.html" source="SUSE-SU"/>
    <description>
    Improper Input Validation vulnerability.

This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.14, from 10.1.0-M1 through 10.1.49, from 9.0.0-M1 through 9.0.112.

The following versions were EOL at the time the CVE was created but are 
known to be affected: 8.5.0 through 8.5.100. Older EOL versions are not affected.
Tomcat did not validate that the host name provided via the SNI 
extension was the same as the host name provided in the HTTP host header 
field. If Tomcat was configured with more than one virtual host and the 
TLS configuration for one of those hosts did not require client 
certificate authentication but another one did, it was possible for a 
client to bypass the client certificate authentication by sending 
different host names in the SNI extension and the HTTP host header field.



The vulnerability only applies if client certificate authentication is 
only enforced at the Connector. It does not apply if client certificate 
authentication is enforced at the web application.


Users are recommended to upgrade to version 11.0.15 or later, 10.1.50 or later or 9.0.113 or later, which fix the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-14"/>
	<updated date="2026-04-10"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-66614/">CVE-2025-66614 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-66614">CVE-2025-66614 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258371">SUSE bug 1258371</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048642" comment="tomcat-9.0.115-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152844" comment="tomcat is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048643" comment="tomcat-admin-webapps-9.0.115-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152845" comment="tomcat-admin-webapps is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048644" comment="tomcat-docs-webapp-9.0.115-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152846" comment="tomcat-docs-webapp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048645" comment="tomcat-el-3_0-api-9.0.115-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152847" comment="tomcat-el-3_0-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048646" comment="tomcat-embed-9.0.115-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152848" comment="tomcat-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048647" comment="tomcat-javadoc-9.0.115-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152849" comment="tomcat-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048648" comment="tomcat-jsp-2_3-api-9.0.115-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152850" comment="tomcat-jsp-2_3-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048649" comment="tomcat-jsvc-9.0.115-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152851" comment="tomcat-jsvc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048650" comment="tomcat-lib-9.0.115-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152852" comment="tomcat-lib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048651" comment="tomcat-servlet-4_0-api-9.0.115-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236693" comment="tomcat-servlet-4_0-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048652" comment="tomcat-webapps-9.0.115-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152854" comment="tomcat-webapps is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052604" comment="tomcat10-10.1.52-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009844333" comment="tomcat10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052605" comment="tomcat10-admin-webapps-10.1.52-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009844334" comment="tomcat10-admin-webapps is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052606" comment="tomcat10-doc-10.1.52-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009872621" comment="tomcat10-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052607" comment="tomcat10-docs-webapp-10.1.52-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009844335" comment="tomcat10-docs-webapp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052608" comment="tomcat10-el-5_0-api-10.1.52-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009844336" comment="tomcat10-el-5_0-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052609" comment="tomcat10-embed-10.1.52-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009844337" comment="tomcat10-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052610" comment="tomcat10-jsp-3_1-api-10.1.52-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009844338" comment="tomcat10-jsp-3_1-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052611" comment="tomcat10-jsvc-10.1.52-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009844339" comment="tomcat10-jsvc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052612" comment="tomcat10-lib-10.1.52-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009844340" comment="tomcat10-lib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052613" comment="tomcat10-servlet-6_0-api-10.1.52-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009844341" comment="tomcat10-servlet-6_0-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052614" comment="tomcat10-webapps-10.1.52-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009844342" comment="tomcat10-webapps is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051787" comment="tomcat11-11.0.18-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010015348" comment="tomcat11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051788" comment="tomcat11-admin-webapps-11.0.18-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010015349" comment="tomcat11-admin-webapps is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051789" comment="tomcat11-doc-11.0.18-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010015350" comment="tomcat11-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051790" comment="tomcat11-docs-webapp-11.0.18-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010015351" comment="tomcat11-docs-webapp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051791" comment="tomcat11-el-6_0-api-11.0.18-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010015352" comment="tomcat11-el-6_0-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051792" comment="tomcat11-embed-11.0.18-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010015353" comment="tomcat11-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051793" comment="tomcat11-jsp-4_0-api-11.0.18-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010015354" comment="tomcat11-jsp-4_0-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051794" comment="tomcat11-jsvc-11.0.18-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010015355" comment="tomcat11-jsvc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051795" comment="tomcat11-lib-11.0.18-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010015356" comment="tomcat11-lib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051796" comment="tomcat11-servlet-6_1-api-11.0.18-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010015357" comment="tomcat11-servlet-6_1-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051797" comment="tomcat11-webapps-11.0.18-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010015358" comment="tomcat11-webapps is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202566628" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-66628</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-66628" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-66628" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-66628" ref_url="https://www.suse.com/security/cve/CVE-2025-66628" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023568.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0011-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023675.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024032.html" source="SUSE-SU"/>
    <description>
    ImageMagick is a software suite to create, edit, compose, or convert bitmap images. In versions 7.1.2-9 and prior, the TIM (PSX TIM) image parser contains a critical integer overflow vulnerability in its ReadTIMImage function (coders/tim.c). The code reads width and height (16-bit values) from the file header and calculates image_size = 2 * width * height without checking for overflow. On 32-bit systems (or where size_t is 32-bit), this calculation can overflow if width and height are large (e.g., 65535), wrapping around to a small value. This results in a small heap allocation via AcquireQuantumMemory and later operations relying on the dimensions can trigger an out of bounds read. This issue is fixed in version 7.1.2-10.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-02-04"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-66628/">CVE-2025-66628 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-66628">CVE-2025-66628 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254820">SUSE bug 1254820</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041321" comment="ImageMagick-7.1.2.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041322" comment="ImageMagick-config-7-SUSE-7.1.2.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041323" comment="ImageMagick-config-7-upstream-limited-7.1.2.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977490" comment="ImageMagick-config-7-upstream-limited is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041324" comment="ImageMagick-config-7-upstream-open-7.1.2.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977491" comment="ImageMagick-config-7-upstream-open is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041325" comment="ImageMagick-config-7-upstream-secure-7.1.2.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977492" comment="ImageMagick-config-7-upstream-secure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041326" comment="ImageMagick-config-7-upstream-websafe-7.1.2.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977493" comment="ImageMagick-config-7-upstream-websafe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041327" comment="ImageMagick-devel-7.1.2.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041328" comment="ImageMagick-doc-7.1.2.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041329" comment="ImageMagick-extra-7.1.2.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041330" comment="libMagick++-7_Q16HDRI5-7.1.2.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698047" comment="libMagick++-7_Q16HDRI5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041331" comment="libMagick++-devel-7.1.2.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041332" comment="libMagickCore-7_Q16HDRI10-7.1.2.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698048" comment="libMagickCore-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041333" comment="libMagickWand-7_Q16HDRI10-7.1.2.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698049" comment="libMagickWand-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041334" comment="perl-PerlMagick-7.1.2.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202567221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-67221</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-67221" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-67221" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-67221" ref_url="https://www.suse.com/security/cve/CVE-2025-67221" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20920-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025096.html" source="SUSE-SU"/>
    <description>
    The orjson.dumps function in orjson thru 3.11.4 does not limit recursion for deeply nested JSON documents.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-67221/">CVE-2025-67221 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-67221">CVE-2025-67221 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257121">SUSE bug 1257121</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050747" comment="python313-orjson-3.10.15-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010051919" comment="python313-orjson is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202567724" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-67724</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-67724" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-67724" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-67724" ref_url="https://www.suse.com/security/cve/CVE-2025-67724" source="SUSE CVE"/>
		<reference ref_id="SUSE-RU-2026:0624-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2026:0632-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2026:0634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202603:15322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202603:15324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0010-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024391.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024640.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023776.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024938.html" source="SUSE-SU"/>
    <description>
    Tornado is a Python web framework and asynchronous networking library. In versions 6.5.2 and below, the supplied reason phrase is used unescaped in HTTP headers (where it could be used for header injection) or in HTML in the default error page (where it could be used for XSS) and can be exploited by passing untrusted or malicious data into the reason argument. Used by both RequestHandler.set_status and tornado.web.HTTPError, the argument is designed to allow applications to pass custom "reason" phrases (the "Not Found" in HTTP/1.1 404 Not Found) to the HTTP status line (mainly for non-standard status codes). This issue is fixed in version 6.5.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-13"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-67724/">CVE-2025-67724 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-67724">CVE-2025-67724 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254903">SUSE bug 1254903</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051768" comment="python313-salt-3006.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010035674" comment="python313-salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051769" comment="python313-salt-testsuite-3006.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010035675" comment="python313-salt-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037182" comment="python313-tornado6-6.5-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037231" comment="python313-tornado6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051770" comment="salt-3006.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153592" comment="salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051771" comment="salt-api-3006.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153593" comment="salt-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051772" comment="salt-bash-completion-3006.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153594" comment="salt-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051773" comment="salt-cloud-3006.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153595" comment="salt-cloud is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051774" comment="salt-doc-3006.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153596" comment="salt-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051775" comment="salt-fish-completion-3006.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153597" comment="salt-fish-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051776" comment="salt-master-3006.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153598" comment="salt-master is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051777" comment="salt-minion-3006.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153599" comment="salt-minion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051778" comment="salt-proxy-3006.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153600" comment="salt-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051779" comment="salt-ssh-3006.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153602" comment="salt-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051780" comment="salt-standalone-formulas-configuration-3006.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280429" comment="salt-standalone-formulas-configuration is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051781" comment="salt-syndic-3006.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153603" comment="salt-syndic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051782" comment="salt-transactional-update-3006.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009479908" comment="salt-transactional-update is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051783" comment="salt-zsh-completion-3006.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153604" comment="salt-zsh-completion is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202567725" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-67725</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-67725" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-67725" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-67725" ref_url="https://www.suse.com/security/cve/CVE-2025-67725" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0930" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2026:0624-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2026:0632-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2026:0634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202603:15322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202603:15324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0010-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024391.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023776.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024938.html" source="SUSE-SU"/>
    <description>
    Tornado is a Python web framework and asynchronous networking library. In versions 6.5.2 and below, a single maliciously crafted HTTP request can block the server's event loop for an extended period, caused by the HTTPHeaders.add method. The function accumulates values using string concatenation when the same header name is repeated, causing a Denial of Service (DoS).  Due to Python string immutability, each concatenation copies the entire string, resulting in O(n^2) time complexity. The severity can vary from high if max_header_size has been increased from its default, to low if it has its default value of 64KB. This issue is fixed in version 6.5.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-13"/>
	<updated date="2026-04-02"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-67725/">CVE-2025-67725 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-67725">CVE-2025-67725 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254905">SUSE bug 1254905</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051768" comment="python313-salt-3006.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010035674" comment="python313-salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051769" comment="python313-salt-testsuite-3006.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010035675" comment="python313-salt-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037182" comment="python313-tornado6-6.5-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037231" comment="python313-tornado6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051770" comment="salt-3006.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153592" comment="salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051771" comment="salt-api-3006.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153593" comment="salt-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051772" comment="salt-bash-completion-3006.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153594" comment="salt-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051773" comment="salt-cloud-3006.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153595" comment="salt-cloud is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051774" comment="salt-doc-3006.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153596" comment="salt-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051775" comment="salt-fish-completion-3006.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153597" comment="salt-fish-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051776" comment="salt-master-3006.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153598" comment="salt-master is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051777" comment="salt-minion-3006.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153599" comment="salt-minion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051778" comment="salt-proxy-3006.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153600" comment="salt-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051779" comment="salt-ssh-3006.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153602" comment="salt-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051780" comment="salt-standalone-formulas-configuration-3006.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280429" comment="salt-standalone-formulas-configuration is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051781" comment="salt-syndic-3006.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153603" comment="salt-syndic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051782" comment="salt-transactional-update-3006.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009479908" comment="salt-transactional-update is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051783" comment="salt-zsh-completion-3006.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153604" comment="salt-zsh-completion is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202567726" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-67726</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-67726" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-67726" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-67726" ref_url="https://www.suse.com/security/cve/CVE-2025-67726" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0930" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2026:0624-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2026:0632-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-RU-2026:0634-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-February/044290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202603:15322-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-202603:15324-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024913.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0010-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023863.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0625-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024395.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024394.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024393.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024391.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024389.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0633-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024388.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1012-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024918.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1014-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1016-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1027-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024910.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1029-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024909.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1030-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024908.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1140-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025062.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1141-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1142-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025060.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1144-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1146-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025056.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1149-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20007-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023717.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20028-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023776.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20071-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20820-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024901.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024903.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20825-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024938.html" source="SUSE-SU"/>
    <description>
    Tornado is a Python web framework and asynchronous networking library. Versions 6.5.2 and below use an inefficient algorithm when parsing parameters for HTTP header values, potentially causing a DoS. The _parseparam function in httputil.py is used to parse specific HTTP header values, such as those in multipart/form-data and repeatedly calls string.count() within a nested loop while processing quoted semicolons. If an attacker sends a request with a large number of maliciously crafted parameters in a Content-Disposition header, the server's CPU usage increases quadratically (O(n^2)) during parsing. Due to Tornado's single event loop architecture, a single malicious request can cause the entire server to become unresponsive for an extended period. This issue is fixed in version 6.5.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-13"/>
	<updated date="2026-03-31"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-67726/">CVE-2025-67726 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-67726">CVE-2025-67726 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254904">SUSE bug 1254904</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051768" comment="python313-salt-3006.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010035674" comment="python313-salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051769" comment="python313-salt-testsuite-3006.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010035675" comment="python313-salt-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037182" comment="python313-tornado6-6.5-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037231" comment="python313-tornado6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051770" comment="salt-3006.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153592" comment="salt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051771" comment="salt-api-3006.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153593" comment="salt-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051772" comment="salt-bash-completion-3006.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153594" comment="salt-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051773" comment="salt-cloud-3006.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153595" comment="salt-cloud is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051774" comment="salt-doc-3006.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153596" comment="salt-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051775" comment="salt-fish-completion-3006.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153597" comment="salt-fish-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051776" comment="salt-master-3006.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153598" comment="salt-master is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051777" comment="salt-minion-3006.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153599" comment="salt-minion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051778" comment="salt-proxy-3006.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153600" comment="salt-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051779" comment="salt-ssh-3006.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153602" comment="salt-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051780" comment="salt-standalone-formulas-configuration-3006.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009280429" comment="salt-standalone-formulas-configuration is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051781" comment="salt-syndic-3006.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153603" comment="salt-syndic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051782" comment="salt-transactional-update-3006.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009479908" comment="salt-transactional-update is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051783" comment="salt-zsh-completion-3006.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153604" comment="salt-zsh-completion is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568119" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68119</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68119" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68119" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68119" ref_url="https://www.suse.com/security/cve/CVE-2025-68119" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0354-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024507.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20122-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20132-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024646.html" source="SUSE-SU"/>
    <description>
    Downloading and building modules with malicious version strings can cause local code execution. On systems with Mercurial (hg) installed, downloading modules from non-standard sources (e.g., custom domains) can cause unexpected code execution due to how external VCS commands are constructed. This issue can also be triggered by providing a malicious version string to the toolchain. On systems with Git installed, downloading and building modules with malicious version strings can allow an attacker to write to arbitrary files on the filesystem. This can only be triggered by explicitly providing the malicious version strings to the toolchain and does not affect usage of @latest or bare module paths.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-25"/>
	<updated date="2026-03-07"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68119/">CVE-2025-68119 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68119">CVE-2025-68119 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256820">SUSE bug 1256820</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044008" comment="go1.24-1.24.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961683" comment="go1.24 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044009" comment="go1.24-doc-1.24.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961684" comment="go1.24-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044010" comment="go1.24-libstd-1.24.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033451" comment="go1.24-libstd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047321" comment="go1.24-openssl-1.24.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017809" comment="go1.24-openssl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047322" comment="go1.24-openssl-doc-1.24.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017810" comment="go1.24-openssl-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047323" comment="go1.24-openssl-race-1.24.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017811" comment="go1.24-openssl-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044011" comment="go1.24-race-1.24.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961685" comment="go1.24-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039700" comment="go1.25-1.25.6-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010014715" comment="go1.25 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039701" comment="go1.25-doc-1.25.6-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010014716" comment="go1.25-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039702" comment="go1.25-libstd-1.25.6-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033450" comment="go1.25-libstd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047311" comment="go1.25-openssl-1.25.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017812" comment="go1.25-openssl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047312" comment="go1.25-openssl-doc-1.25.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017813" comment="go1.25-openssl-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047313" comment="go1.25-openssl-race-1.25.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017814" comment="go1.25-openssl-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039703" comment="go1.25-race-1.25.6-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010014717" comment="go1.25-race is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568121" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68121</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68121" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68121" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68121" ref_url="https://www.suse.com/security/cve/CVE-2025-68121" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2708" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002515.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2709" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003187.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2920" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003243.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3040" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003189.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3187" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002527.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3188" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002529.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3193" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002526.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3291" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003194.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3298" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003257.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3337" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003238.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3340" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003254.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3341" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003239.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3817" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002578.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3833" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002555.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3839" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003241.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3842" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003200.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3928" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003245.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3929" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002554.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3985" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002559.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4672" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0218-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0219-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0296-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023920.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0298-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023923.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0403-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0426-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024120.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0427-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024119.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0687-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024507.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024529.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024528.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20122-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20132-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043739.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20428-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024344.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20429-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024343.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20623-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20629-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024646.html" source="SUSE-SU"/>
    <description>
    During session resumption in crypto/tls, if the underlying Config has its ClientCAs or RootCAs fields mutated between the initial handshake and the resumed handshake, the resumed handshake may succeed when it should have failed. This may happen when a user calls Config.Clone and mutates the returned Config, or uses Config.GetConfigForClient. This can cause a client to resume a session with a server that it would not have resumed with during the initial handshake, or cause a server to resume a session with a client that it would not have resumed with during the initial handshake.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-25"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="7.6/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68121/">CVE-2025-68121 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68121">CVE-2025-68121 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256818">SUSE bug 1256818</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044008" comment="go1.24-1.24.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961683" comment="go1.24 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044009" comment="go1.24-doc-1.24.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961684" comment="go1.24-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044010" comment="go1.24-libstd-1.24.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033451" comment="go1.24-libstd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047321" comment="go1.24-openssl-1.24.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017809" comment="go1.24-openssl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047322" comment="go1.24-openssl-doc-1.24.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017810" comment="go1.24-openssl-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047323" comment="go1.24-openssl-race-1.24.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017811" comment="go1.24-openssl-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044011" comment="go1.24-race-1.24.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961685" comment="go1.24-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010043900" comment="go1.25-1.25.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010014715" comment="go1.25 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010043901" comment="go1.25-doc-1.25.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010014716" comment="go1.25-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010043902" comment="go1.25-libstd-1.25.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033450" comment="go1.25-libstd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047311" comment="go1.25-openssl-1.25.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017812" comment="go1.25-openssl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047312" comment="go1.25-openssl-doc-1.25.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017813" comment="go1.25-openssl-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047313" comment="go1.25-openssl-race-1.25.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017814" comment="go1.25-openssl-race is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010043903" comment="go1.25-race-1.25.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010014717" comment="go1.25-race is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68131</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68131" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68131" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68131" ref_url="https://www.suse.com/security/cve/CVE-2025-68131" source="SUSE CVE"/>
    <description>
    cbor2 provides encoding and decoding for the Concise Binary Object Representation (CBOR) serialization format. Starting in version 3.0.0 and prior to version 5.8.0, whhen a CBORDecoder instance is reused across multiple decode operations, values marked with the shareable tag (28) persist in memory and can be accessed by subsequent CBOR messages using the sharedref tag (29). This allows an attacker-controlled message to read data from previously decoded messages if the decoder is reused across trust boundaries. Version 5.8.0 patches the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-10"/>
	<updated date="2026-04-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68131/">CVE-2025-68131 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68131">CVE-2025-68131 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255783">SUSE bug 1255783</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010053367" comment="python313-cbor2-5.6.5-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032409" comment="python313-cbor2 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68146</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68146" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68146" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68146" ref_url="https://www.suse.com/security/cve/CVE-2025-68146" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0082-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023719.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024068.html" source="SUSE-SU"/>
    <description>
    filelock is a platform-independent file lock for Python. In versions prior to 3.20.1, a Time-of-Check-Time-of-Use (TOCTOU) race condition allows local attackers to corrupt or truncate arbitrary user files through symlink attacks. The vulnerability exists in both Unix and Windows lock file creation where filelock checks if a file exists before opening it with O_TRUNC. An attacker can create a symlink pointing to a victim file in the time gap between the check and open, causing os.open() to follow the symlink and truncate the target file. All users of filelock on Unix, Linux, macOS, and Windows systems are impacted. The vulnerability cascades to dependent libraries. The attack requires local filesystem access and ability to create symlinks (standard user permissions on Unix; Developer Mode on Windows 10+). Exploitation succeeds within 1-3 attempts when lock file paths are predictable. The issue is fixed in version 3.20.1. If immediate upgrade is not possible, use SoftFileLock instead of UnixFileLock/WindowsFileLock (note: different locking semantics, may not be suitable for all use cases); ensure lock file directories have restrictive permissions (chmod 0700) to prevent untrusted users from creating symlinks; and/or monitor lock file directories for suspicious symlinks before running trusted applications. These workarounds provide only partial mitigation. The race condition remains exploitable. Upgrading to version 3.20.1 is strongly recommended.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-07"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68146/">CVE-2025-68146 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68146">CVE-2025-68146 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255244">SUSE bug 1255244</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041485" comment="python313-filelock-3.18.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041635" comment="python313-filelock is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68156</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68156" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68156" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68156" ref_url="https://www.suse.com/security/cve/CVE-2025-68156" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0327-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0628-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024392.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0630-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024390.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024072.html" source="SUSE-SU"/>
    <description>
    Expr is an expression language and expression evaluation for Go. Prior to version 1.17.7, several builtin functions in Expr, including `flatten`, `min`, `max`, `mean`, and `median`, perform recursive traversal over user-provided data structures without enforcing a maximum recursion depth. If the evaluation environment contains deeply nested or cyclic data structures, these functions may recurse indefinitely until exceed the Go runtime stack limit. This results in a stack overflow panic, causing the host application to crash. While exploitability depends on whether an attacker can influence or inject cyclic or pathologically deep data into the
evaluation environment, this behavior represents a denial-of-service (DoS) risk and affects overall library robustness. Instead of returning a recoverable evaluation error, the process may terminate unexpectedly. In affected versions, evaluation of expressions that invoke certain builtin functions on untrusted or insufficiently validated data structures can lead to a process-level crash due to stack exhaustion. This issue is most relevant in scenarios where Expr is used to evaluate expressions against externally supplied or dynamically constructed environments; cyclic references (directly or indirectly) can be introduced into arrays, maps, or structs; and there are no application-level safeguards preventing deeply nested input data. In typical use cases with controlled, acyclic data, the issue may not manifest. However, when present, the resulting panic can be used to reliably crash the application, constituting a denial of service. The issue has been fixed in the v1.17.7 versions of Expr. The patch introduces a maximum recursion depth limit for affected builtin functions. When this limit is exceeded, evaluation aborts gracefully and returns a descriptive error instead of panicking. Additionally, the maximum depth can be customized by users via `builtin.MaxDepth`, allowing applications with legitimate deep structures to raise the limit in a controlled manner. Users are strongly encouraged to upgrade to the patched release, which includes both the recursion guard and comprehensive test coverage to prevent regressions. For users who cannot immediately upgrade, some mitigations are recommended. Ensure that evaluation environments cannot contain cyclic references, validate or sanitize externally supplied data structures before passing them to Expr, and/or wrap expression evaluation with panic recovery to prevent a full process crash (as a last-resort defensive measure). These workarounds reduce risk but do not fully eliminate the issue without the patch.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-25"/>
	<updated date="2026-03-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68156/">CVE-2025-68156 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68156">CVE-2025-68156 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255330">SUSE bug 1255330</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041462" comment="alloy-1.12.2-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010030590" comment="alloy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039725" comment="coredns-1.14.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009945102" comment="coredns is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039726" comment="coredns-extras-1.14.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009945103" comment="coredns-extras is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568158" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68158</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68158" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68158" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68158" ref_url="https://www.suse.com/security/cve/CVE-2025-68158" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024631.html" source="SUSE-SU"/>
    <description>
    Authlib is a Python library which builds OAuth and OpenID Connect servers. In versions 1.0.0 through 1.6.5, cache-backed state/request-token storage is not tied to the initiating user session, so CSRF is possible for any attacker that has a valid state (easily obtainable via an attacker-initiated authentication flow). When a cache is supplied to the OAuth client registry, FrameworkIntegration.set_state_data writes the entire state blob under _state_{app}_{state}, and get_state_data ignores the caller's session altogether. This issue has been patched in version 1.6.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-22"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68158/">CVE-2025-68158 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68158">CVE-2025-68158 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256414">SUSE bug 1256414</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044609" comment="python313-Authlib-1.5.2-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010044613" comment="python313-Authlib is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568160" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68160</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68160" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68160" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68160" ref_url="https://www.suse.com/security/cve/CVE-2025-68160" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1473" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024331.html" source="SUSE-SU"/>
    <description>
    Issue summary: Writing large, newline-free data into a BIO chain using the
line-buffering filter where the next BIO performs short writes can trigger
a heap-based out-of-bounds write.

Impact summary: This out-of-bounds write can cause memory corruption which
typically results in a crash, leading to Denial of Service for an application.

The line-buffering BIO filter (BIO_f_linebuffer) is not used by default in
TLS/SSL data paths. In OpenSSL command-line applications, it is typically
only pushed onto stdout/stderr on VMS systems. Third-party applications that
explicitly use this filter with a BIO chain that can short-write and that
write large, newline-free data influenced by an attacker would be affected.
However, the circumstances where this could happen are unlikely to be under
attacker control, and BIO_f_linebuffer is unlikely to be handling non-curated
data controlled by an attacker. For that reason the issue was assessed as
Low severity.

The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,
as the BIO implementation is outside the OpenSSL FIPS module boundary.

OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are vulnerable to this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68160/">CVE-2025-68160 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68160">CVE-2025-68160 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256834">SUSE bug 1256834</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041595" comment="libopenssl-3-devel-3.5.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700693" comment="libopenssl-3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041596" comment="libopenssl-3-fips-provider-3.5.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009868077" comment="libopenssl-3-fips-provider is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041597" comment="libopenssl-3-fips-provider-x86-64-v3-3.5.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010034160" comment="libopenssl-3-fips-provider-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041598" comment="libopenssl3-3.5.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700695" comment="libopenssl3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041599" comment="libopenssl3-x86-64-v3-3.5.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010034161" comment="libopenssl3-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041600" comment="openssl-3-3.5.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700697" comment="openssl-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041601" comment="openssl-3-doc-3.5.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700698" comment="openssl-3-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568161" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68161</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68161" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68161" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68161" ref_url="https://www.suse.com/security/cve/CVE-2025-68161" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0254-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023894.html" source="SUSE-SU"/>
    <description>
    The Socket Appender in Apache Log4j Core versions 2.0-beta9 through 2.25.2 does not perform TLS hostname verification of the peer certificate, even when the  verifyHostName https://logging.apache.org/log4j/2.x/manual/appenders/network.html#SslConfiguration-attr-verifyHostName  configuration attribute or the  log4j2.sslVerifyHostName https://logging.apache.org/log4j/2.x/manual/systemproperties.html#log4j2.sslVerifyHostName  system property is set to true.

This issue may allow a man-in-the-middle attacker to intercept or redirect log traffic under the following conditions:

  *  The attacker is able to intercept or redirect network traffic between the client and the log receiver.
  *  The attacker can present a server certificate issued by a certification authority trusted by the Socket Appender's configured trust store (or by the default Java trust store if no custom trust store is configured).


Users are advised to upgrade to Apache Log4j Core version 2.25.3, which addresses this issue.

As an alternative mitigation, the Socket Appender may be configured to use a private or restricted trust root to limit the set of trusted certificates.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-25"/>
	<updated date="2026-01-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68161/">CVE-2025-68161 at SUSE</cve>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68161">CVE-2025-68161 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255427">SUSE bug 1255427</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039725" comment="coredns-1.14.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009945102" comment="coredns is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039726" comment="coredns-extras-1.14.0-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009945103" comment="coredns-extras is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68167</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68167" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68167" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68167" ref_url="https://www.suse.com/security/cve/CVE-2025-68167" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gpiolib: fix invalid pointer access in debugfs

If the memory allocation in gpiolib_seq_start() fails, the s-&gt;private
field remains uninitialized and is later dereferenced without checking
in gpiolib_seq_stop(). Initialize s-&gt;private to NULL before calling
kzalloc() and check it before dereferencing it.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68167/">CVE-2025-68167 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68167">CVE-2025-68167 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255099">SUSE bug 1255099</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68170</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68170" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68170" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68170" ref_url="https://www.suse.com/security/cve/CVE-2025-68170" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/radeon: Do not kfree() devres managed rdev

Since the allocation of the drivers main structure was changed to
devm_drm_dev_alloc() rdev is managed by devres and we shouldn't be calling
kfree() on it.

This fixes things exploding if the driver probe fails and devres cleans up
the rdev after we already free'd it.

(cherry picked from commit 16c0681617b8a045773d4d87b6140002fa75b03b)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68170/">CVE-2025-68170 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68170">CVE-2025-68170 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255256">SUSE bug 1255256</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568171" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68171</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68171" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68171" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68171" ref_url="https://www.suse.com/security/cve/CVE-2025-68171" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/fpu: Ensure XFD state on signal delivery

Sean reported [1] the following splat when running KVM tests:

   WARNING: CPU: 232 PID: 15391 at xfd_validate_state+0x65/0x70
   Call Trace:
    &lt;TASK&gt;
    fpu__clear_user_states+0x9c/0x100
    arch_do_signal_or_restart+0x142/0x210
    exit_to_user_mode_loop+0x55/0x100
    do_syscall_64+0x205/0x2c0
    entry_SYSCALL_64_after_hwframe+0x4b/0x53

Chao further identified [2] a reproducible scenario involving signal
delivery: a non-AMX task is preempted by an AMX-enabled task which
modifies the XFD MSR.

When the non-AMX task resumes and reloads XSTATE with init values,
a warning is triggered due to a mismatch between fpstate::xfd and the
CPU's current XFD state. fpu__clear_user_states() does not currently
re-synchronize the XFD state after such preemption.

Invoke xfd_update_state() which detects and corrects the mismatch if
there is a dynamic feature.

This also benefits the sigreturn path, as fpu__restore_sig() may call
fpu__clear_user_states() when the sigframe is inaccessible.

[ dhansen: minor changelog munging ]
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68171/">CVE-2025-68171 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68171">CVE-2025-68171 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255255">SUSE bug 1255255</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568172" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68172</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68172" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68172" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68172" ref_url="https://www.suse.com/security/cve/CVE-2025-68172" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: aspeed - fix double free caused by devm

The clock obtained via devm_clk_get_enabled() is automatically managed
by devres and will be disabled and freed on driver detach. Manually
calling clk_disable_unprepare() in error path and remove function
causes double free.

Remove the manual clock cleanup in both aspeed_acry_probe()'s error
path and aspeed_acry_remove().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68172/">CVE-2025-68172 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68172">CVE-2025-68172 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255253">SUSE bug 1255253</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568173" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68173</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68173" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68173" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68173" ref_url="https://www.suse.com/security/cve/CVE-2025-68173" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ftrace: Fix softlockup in ftrace_module_enable

A soft lockup was observed when loading amdgpu module.
If a module has a lot of tracable functions, multiple calls
to kallsyms_lookup can spend too much time in RCU critical
section and with disabled preemption, causing kernel panic.
This is the same issue that was fixed in
commit d0b24b4e91fc ("ftrace: Prevent RCU stall on PREEMPT_VOLUNTARY
kernels") and commit 42ea22e754ba ("ftrace: Add cond_resched() to
ftrace_graph_set_hash()").

Fix it the same way by adding cond_resched() in ftrace_module_enable.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68173/">CVE-2025-68173 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68173">CVE-2025-68173 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255311">SUSE bug 1255311</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568174" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68174</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68174" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68174" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68174" ref_url="https://www.suse.com/security/cve/CVE-2025-68174" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

amd/amdkfd: enhance kfd process check in switch partition

current switch partition only check if kfd_processes_table is empty.
kfd_prcesses_table entry is deleted in kfd_process_notifier_release, but
kfd_process tear down is in kfd_process_wq_release.

consider two processes:

Process A (workqueue) -&gt; kfd_process_wq_release -&gt; Access kfd_node member
Process B switch partition -&gt; amdgpu_xcp_pre_partition_switch -&gt; amdgpu_amdkfd_device_fini_sw
-&gt; kfd_node tear down.

Process A and B may trigger a race as shown in dmesg log.

This patch is to resolve the race by adding an atomic kfd_process counter
kfd_processes_count, it increment as create kfd process, decrement as
finish kfd_process_wq_release.

v2: Put kfd_processes_count per kfd_dev, move decrement to kfd_process_destroy_pdds
and bug fix. (Philip Yang)

[3966658.307702] divide error: 0000 [#1] SMP NOPTI
[3966658.350818]  i10nm_edac
[3966658.356318] CPU: 124 PID: 38435 Comm: kworker/124:0 Kdump: loaded Tainted
[3966658.356890] Workqueue: kfd_process_wq kfd_process_wq_release [amdgpu]
[3966658.362839]  nfit
[3966658.366457] RIP: 0010:kfd_get_num_sdma_engines+0x17/0x40 [amdgpu]
[3966658.366460] Code: 00 00 e9 ac 81 02 00 66 66 2e 0f 1f 84 00 00 00 00 00 90 0f 1f 44 00 00 48 8b 4f 08 48 8b b7 00 01 00 00 8b 81 58 26 03 00 99 &lt;f7&gt; be b8 01 00 00 80 b9 70 2e 00 00 00 74 0b 83 f8 02 ba 02 00 00
[3966658.380967]  x86_pkg_temp_thermal
[3966658.391529] RSP: 0018:ffffc900a0edfdd8 EFLAGS: 00010246
[3966658.391531] RAX: 0000000000000008 RBX: ffff8974e593b800 RCX: ffff888645900000
[3966658.391531] RDX: 0000000000000000 RSI: ffff888129154400 RDI: ffff888129151c00
[3966658.391532] RBP: ffff8883ad79d400 R08: 0000000000000000 R09: ffff8890d2750af4
[3966658.391532] R10: 0000000000000018 R11: 0000000000000018 R12: 0000000000000000
[3966658.391533] R13: ffff8883ad79d400 R14: ffffe87ff662ba00 R15: ffff8974e593b800
[3966658.391533] FS:  0000000000000000(0000) GS:ffff88fe7f600000(0000) knlGS:0000000000000000
[3966658.391534] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[3966658.391534] CR2: 0000000000d71000 CR3: 000000dd0e970004 CR4: 0000000002770ee0
[3966658.391535] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[3966658.391535] DR3: 0000000000000000 DR6: 00000000fffe07f0 DR7: 0000000000000400
[3966658.391536] PKRU: 55555554
[3966658.391536] Call Trace:
[3966658.391674]  deallocate_sdma_queue+0x38/0xa0 [amdgpu]
[3966658.391762]  process_termination_cpsch+0x1ed/0x480 [amdgpu]
[3966658.399754]  intel_powerclamp
[3966658.402831]  kfd_process_dequeue_from_all_devices+0x5b/0xc0 [amdgpu]
[3966658.402908]  kfd_process_wq_release+0x1a/0x1a0 [amdgpu]
[3966658.410516]  coretemp
[3966658.434016]  process_one_work+0x1ad/0x380
[3966658.434021]  worker_thread+0x49/0x310
[3966658.438963]  kvm_intel
[3966658.446041]  ? process_one_work+0x380/0x380
[3966658.446045]  kthread+0x118/0x140
[3966658.446047]  ? __kthread_bind_mask+0x60/0x60
[3966658.446050]  ret_from_fork+0x1f/0x30
[3966658.446053] Modules linked in: kpatch_20765354(OEK)
[3966658.455310]  kvm
[3966658.464534]  mptcp_diag xsk_diag raw_diag unix_diag af_packet_diag netlink_diag udp_diag act_pedit act_mirred act_vlan cls_flower kpatch_21951273(OEK) kpatch_18424469(OEK) kpatch_19749756(OEK)
[3966658.473462]  idxd_mdev
[3966658.482306]  kpatch_17971294(OEK) sch_ingress xt_conntrack amdgpu(OE) amdxcp(OE) amddrm_buddy(OE) amd_sched(OE) amdttm(OE) amdkcl(OE) intel_ifs iptable_mangle tcm_loop target_core_pscsi tcp_diag target_core_file inet_diag target_core_iblock target_core_user target_core_mod coldpgs kpatch_18383292(OEK) ip6table_nat ip6table_filter ip6_tables ip_set_hash_ipportip ip_set_hash_ipportnet ip_set_hash_ipport ip_set_bitmap_port xt_comment iptable_nat nf_nat iptable_filter ip_tables ip_set ip_vs_sh ip_vs_wrr ip_vs_rr ip_vs nf_conntrack nf_defrag_ipv6 nf_defrag_ipv4 sn_core_odd(OE) i40e overlay binfmt_misc tun bonding(OE) aisqos(OE) aisqo
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68174/">CVE-2025-68174 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68174">CVE-2025-68174 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255327">SUSE bug 1255327</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68176</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68176" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68176" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68176" ref_url="https://www.suse.com/security/cve/CVE-2025-68176" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

PCI: cadence: Check for the existence of cdns_pcie::ops before using it

cdns_pcie::ops might not be populated by all the Cadence glue drivers. This
is going to be true for the upcoming Sophgo platform which doesn't set the
ops.

Hence, add a check to prevent NULL pointer dereference.

[mani: reworded subject and description]
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68176/">CVE-2025-68176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68176">CVE-2025-68176 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255329">SUSE bug 1255329</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68178</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68178" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68178" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68178" ref_url="https://www.suse.com/security/cve/CVE-2025-68178" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

blk-cgroup: fix possible deadlock while configuring policy

Following deadlock can be triggered easily by lockdep:

WARNING: possible circular locking dependency detected
6.17.0-rc3-00124-ga12c2658ced0 #1665 Not tainted
------------------------------------------------------
check/1334 is trying to acquire lock:
ff1100011d9d0678 (&amp;q-&gt;sysfs_lock){+.+.}-{4:4}, at: blk_unregister_queue+0x53/0x180

but task is already holding lock:
ff1100011d9d00e0 (&amp;q-&gt;q_usage_counter(queue)#3){++++}-{0:0}, at: del_gendisk+0xba/0x110

which lock already depends on the new lock.

the existing dependency chain (in reverse order) is:

-&gt; #2 (&amp;q-&gt;q_usage_counter(queue)#3){++++}-{0:0}:
       blk_queue_enter+0x40b/0x470
       blkg_conf_prep+0x7b/0x3c0
       tg_set_limit+0x10a/0x3e0
       cgroup_file_write+0xc6/0x420
       kernfs_fop_write_iter+0x189/0x280
       vfs_write+0x256/0x490
       ksys_write+0x83/0x190
       __x64_sys_write+0x21/0x30
       x64_sys_call+0x4608/0x4630
       do_syscall_64+0xdb/0x6b0
       entry_SYSCALL_64_after_hwframe+0x76/0x7e

-&gt; #1 (&amp;q-&gt;rq_qos_mutex){+.+.}-{4:4}:
       __mutex_lock+0xd8/0xf50
       mutex_lock_nested+0x2b/0x40
       wbt_init+0x17e/0x280
       wbt_enable_default+0xe9/0x140
       blk_register_queue+0x1da/0x2e0
       __add_disk+0x38c/0x5d0
       add_disk_fwnode+0x89/0x250
       device_add_disk+0x18/0x30
       virtblk_probe+0x13a3/0x1800
       virtio_dev_probe+0x389/0x610
       really_probe+0x136/0x620
       __driver_probe_device+0xb3/0x230
       driver_probe_device+0x2f/0xe0
       __driver_attach+0x158/0x250
       bus_for_each_dev+0xa9/0x130
       driver_attach+0x26/0x40
       bus_add_driver+0x178/0x3d0
       driver_register+0x7d/0x1c0
       __register_virtio_driver+0x2c/0x60
       virtio_blk_init+0x6f/0xe0
       do_one_initcall+0x94/0x540
       kernel_init_freeable+0x56a/0x7b0
       kernel_init+0x2b/0x270
       ret_from_fork+0x268/0x4c0
       ret_from_fork_asm+0x1a/0x30

-&gt; #0 (&amp;q-&gt;sysfs_lock){+.+.}-{4:4}:
       __lock_acquire+0x1835/0x2940
       lock_acquire+0xf9/0x450
       __mutex_lock+0xd8/0xf50
       mutex_lock_nested+0x2b/0x40
       blk_unregister_queue+0x53/0x180
       __del_gendisk+0x226/0x690
       del_gendisk+0xba/0x110
       sd_remove+0x49/0xb0 [sd_mod]
       device_remove+0x87/0xb0
       device_release_driver_internal+0x11e/0x230
       device_release_driver+0x1a/0x30
       bus_remove_device+0x14d/0x220
       device_del+0x1e1/0x5a0
       __scsi_remove_device+0x1ff/0x2f0
       scsi_remove_device+0x37/0x60
       sdev_store_delete+0x77/0x100
       dev_attr_store+0x1f/0x40
       sysfs_kf_write+0x65/0x90
       kernfs_fop_write_iter+0x189/0x280
       vfs_write+0x256/0x490
       ksys_write+0x83/0x190
       __x64_sys_write+0x21/0x30
       x64_sys_call+0x4608/0x4630
       do_syscall_64+0xdb/0x6b0
       entry_SYSCALL_64_after_hwframe+0x76/0x7e

other info that might help us debug this:

Chain exists of:
  &amp;q-&gt;sysfs_lock --&gt; &amp;q-&gt;rq_qos_mutex --&gt; &amp;q-&gt;q_usage_counter(queue)#3

 Possible unsafe locking scenario:

       CPU0                    CPU1
       ----                    ----
  lock(&amp;q-&gt;q_usage_counter(queue)#3);
                               lock(&amp;q-&gt;rq_qos_mutex);
                               lock(&amp;q-&gt;q_usage_counter(queue)#3);
  lock(&amp;q-&gt;sysfs_lock);

Root cause is that queue_usage_counter is grabbed with rq_qos_mutex
held in blkg_conf_prep(), while queue should be freezed before
rq_qos_mutex from other context.

The blk_queue_enter() from blkg_conf_prep() is used to protect against
policy deactivation, which is already protected with blkcg_mutex, hence
convert blk_queue_enter() to blkcg_mutex to fix this problem. Meanwhile,
consider that blkcg_mutex is held after queue is freezed from policy
deactivation, also convert blkg_alloc() to use GFP_NOIO.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68178/">CVE-2025-68178 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68178">CVE-2025-68178 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255266">SUSE bug 1255266</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68180</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68180" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68180" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68180" ref_url="https://www.suse.com/security/cve/CVE-2025-68180" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Fix NULL deref in debugfs odm_combine_segments

When a connector is connected but inactive (e.g., disabled by desktop
environments), pipe_ctx-&gt;stream_res.tg will be destroyed. Then, reading
odm_combine_segments causes kernel NULL pointer dereference.

 BUG: kernel NULL pointer dereference, address: 0000000000000000
 #PF: supervisor read access in kernel mode
 #PF: error_code(0x0000) - not-present page
 PGD 0 P4D 0
 Oops: Oops: 0000 [#1] SMP NOPTI
 CPU: 16 UID: 0 PID: 26474 Comm: cat Not tainted 6.17.0+ #2 PREEMPT(lazy)  e6a17af9ee6db7c63e9d90dbe5b28ccab67520c6
 Hardware name: LENOVO 21Q4/LNVNB161216, BIOS PXCN25WW 03/27/2025
 RIP: 0010:odm_combine_segments_show+0x93/0xf0 [amdgpu]
 Code: 41 83 b8 b0 00 00 00 01 75 6e 48 98 ba a1 ff ff ff 48 c1 e0 0c 48 8d 8c 07 d8 02 00 00 48 85 c9 74 2d 48 8b bc 07 f0 08 00 00 &lt;48&gt; 8b 07 48 8b 80 08 02 00&gt;
 RSP: 0018:ffffd1bf4b953c58 EFLAGS: 00010286
 RAX: 0000000000005000 RBX: ffff8e35976b02d0 RCX: ffff8e3aeed052d8
 RDX: 00000000ffffffa1 RSI: ffff8e35a3120800 RDI: 0000000000000000
 RBP: 0000000000000000 R08: ffff8e3580eb0000 R09: ffff8e35976b02d0
 R10: ffffd1bf4b953c78 R11: 0000000000000000 R12: ffffd1bf4b953d08
 R13: 0000000000040000 R14: 0000000000000001 R15: 0000000000000001
 FS:  00007f44d3f9f740(0000) GS:ffff8e3caa47f000(0000) knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: 0000000000000000 CR3: 00000006485c2000 CR4: 0000000000f50ef0
 PKRU: 55555554
 Call Trace:
  &lt;TASK&gt;
  seq_read_iter+0x125/0x490
  ? __alloc_frozen_pages_noprof+0x18f/0x350
  seq_read+0x12c/0x170
  full_proxy_read+0x51/0x80
  vfs_read+0xbc/0x390
  ? __handle_mm_fault+0xa46/0xef0
  ? do_syscall_64+0x71/0x900
  ksys_read+0x73/0xf0
  do_syscall_64+0x71/0x900
  ? count_memcg_events+0xc2/0x190
  ? handle_mm_fault+0x1d7/0x2d0
  ? do_user_addr_fault+0x21a/0x690
  ? exc_page_fault+0x7e/0x1a0
  entry_SYSCALL_64_after_hwframe+0x6c/0x74
 RIP: 0033:0x7f44d4031687
 Code: 48 89 fa 4c 89 df e8 58 b3 00 00 8b 93 08 03 00 00 59 5e 48 83 f8 fc 74 1a 5b c3 0f 1f 84 00 00 00 00 00 48 8b 44 24 10 0f 05 &lt;5b&gt; c3 0f 1f 80 00 00 00 00&gt;
 RSP: 002b:00007ffdb4b5f0b0 EFLAGS: 00000202 ORIG_RAX: 0000000000000000
 RAX: ffffffffffffffda RBX: 00007f44d3f9f740 RCX: 00007f44d4031687
 RDX: 0000000000040000 RSI: 00007f44d3f5e000 RDI: 0000000000000003
 RBP: 0000000000040000 R08: 0000000000000000 R09: 0000000000000000
 R10: 0000000000000000 R11: 0000000000000202 R12: 00007f44d3f5e000
 R13: 0000000000000003 R14: 0000000000000000 R15: 0000000000040000
  &lt;/TASK&gt;
 Modules linked in: tls tcp_diag inet_diag xt_mark ccm snd_hrtimer snd_seq_dummy snd_seq_midi snd_seq_oss snd_seq_midi_event snd_rawmidi snd_seq snd_seq_device x&gt;
  snd_hda_codec_atihdmi snd_hda_codec_realtek_lib lenovo_wmi_helpers think_lmi snd_hda_codec_generic snd_hda_codec_hdmi snd_soc_core kvm snd_compress uvcvideo sn&gt;
  platform_profile joydev amd_pmc mousedev mac_hid sch_fq_codel uinput i2c_dev parport_pc ppdev lp parport nvme_fabrics loop nfnetlink ip_tables x_tables dm_cryp&gt;
 CR2: 0000000000000000
 ---[ end trace 0000000000000000 ]---
 RIP: 0010:odm_combine_segments_show+0x93/0xf0 [amdgpu]
 Code: 41 83 b8 b0 00 00 00 01 75 6e 48 98 ba a1 ff ff ff 48 c1 e0 0c 48 8d 8c 07 d8 02 00 00 48 85 c9 74 2d 48 8b bc 07 f0 08 00 00 &lt;48&gt; 8b 07 48 8b 80 08 02 00&gt;
 RSP: 0018:ffffd1bf4b953c58 EFLAGS: 00010286
 RAX: 0000000000005000 RBX: ffff8e35976b02d0 RCX: ffff8e3aeed052d8
 RDX: 00000000ffffffa1 RSI: ffff8e35a3120800 RDI: 0000000000000000
 RBP: 0000000000000000 R08: ffff8e3580eb0000 R09: ffff8e35976b02d0
 R10: ffffd1bf4b953c78 R11: 0000000000000000 R12: ffffd1bf4b953d08
 R13: 0000000000040000 R14: 0000000000000001 R15: 0000000000000001
 FS:  00007f44d3f9f740(0000) GS:ffff8e3caa47f000(0000) knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: 0000000000000000 CR3: 00000006485c2000 CR4: 0000000000f50ef0
 PKRU: 55555554

Fix this by checking pipe_ctx-&gt;
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68180/">CVE-2025-68180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68180">CVE-2025-68180 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255252">SUSE bug 1255252</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68181</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68181" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68181" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68181" ref_url="https://www.suse.com/security/cve/CVE-2025-68181" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/radeon: Remove calls to drm_put_dev()

Since the allocation of the drivers main structure was changed to
devm_drm_dev_alloc() drm_put_dev()'ing to trigger it to be free'd
should be done by devres.

However, drm_put_dev() is still in the probe error and device remove
paths. When the driver fails to probe warnings like the following are
shown because devres is trying to drm_put_dev() after the driver
already did it.

[    5.642230] radeon 0000:01:05.0: probe with driver radeon failed with error -22
[    5.649605] ------------[ cut here ]------------
[    5.649607] refcount_t: underflow; use-after-free.
[    5.649620] WARNING: CPU: 0 PID: 357 at lib/refcount.c:28 refcount_warn_saturate+0xbe/0x110

(cherry picked from commit 3eb8c0b4c091da0a623ade0d3ee7aa4a93df1ea4)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68181/">CVE-2025-68181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68181">CVE-2025-68181 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255247">SUSE bug 1255247</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68183</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68183" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68183" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68183" ref_url="https://www.suse.com/security/cve/CVE-2025-68183" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ima: don't clear IMA_DIGSIG flag when setting or removing non-IMA xattr

Currently when both IMA and EVM are in fix mode, the IMA signature will
be reset to IMA hash if a program first stores IMA signature in
security.ima and then writes/removes some other security xattr for the
file.

For example, on Fedora, after booting the kernel with "ima_appraise=fix
evm=fix ima_policy=appraise_tcb" and installing rpm-plugin-ima,
installing/reinstalling a package will not make good reference IMA
signature generated. Instead IMA hash is generated,

    # getfattr -m - -d -e hex /usr/bin/bash
    # file: usr/bin/bash
    security.ima=0x0404...

This happens because when setting security.selinux, the IMA_DIGSIG flag
that had been set early was cleared. As a result, IMA hash is generated
when the file is closed.

Similarly, IMA signature can be cleared on file close after removing
security xattr like security.evm or setting/removing ACL.

Prevent replacing the IMA file signature with a file hash, by preventing
the IMA_DIGSIG flag from being reset.

Here's a minimal C reproducer which sets security.selinux as the last
step which can also replaced by removing security.evm or setting ACL,

    #include &lt;stdio.h&gt;
    #include &lt;sys/xattr.h&gt;
    #include &lt;fcntl.h&gt;
    #include &lt;unistd.h&gt;
    #include &lt;string.h&gt;
    #include &lt;stdlib.h&gt;

    int main() {
        const char* file_path = "/usr/sbin/test_binary";
        const char* hex_string = "030204d33204490066306402304";
        int length = strlen(hex_string);
        char* ima_attr_value;
        int fd;

        fd = open(file_path, O_WRONLY|O_CREAT|O_EXCL, 0644);
        if (fd == -1) {
            perror("Error opening file");
            return 1;
        }

        ima_attr_value = (char*)malloc(length / 2 );
        for (int i = 0, j = 0; i &lt; length; i += 2, j++) {
            sscanf(hex_string + i, "%2hhx", &amp;ima_attr_value[j]);
        }

        if (fsetxattr(fd, "security.ima", ima_attr_value, length/2, 0) == -1) {
            perror("Error setting extended attribute");
            close(fd);
            return 1;
        }

        const char* selinux_value= "system_u:object_r:bin_t:s0";
        if (fsetxattr(fd, "security.selinux", selinux_value, strlen(selinux_value), 0) == -1) {
            perror("Error setting extended attribute");
            close(fd);
            return 1;
        }

        close(fd);

        return 0;
    }
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68183/">CVE-2025-68183 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68183">CVE-2025-68183 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255251">SUSE bug 1255251</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568184" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68184</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68184" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68184" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68184" ref_url="https://www.suse.com/security/cve/CVE-2025-68184" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/mediatek: Disable AFBC support on Mediatek DRM driver

Commit c410fa9b07c3 ("drm/mediatek: Add AFBC support to Mediatek DRM
driver") added AFBC support to Mediatek DRM and enabled the
32x8/split/sparse modifier.

However, this is currently broken on Mediatek MT8188 (Genio 700 EVK
platform); tested using upstream Kernel and Mesa (v25.2.1), AFBC is used by
default since Mesa v25.0.

Kernel trace reports vblank timeouts constantly, and the render is garbled:

```
[CRTC:62:crtc-0] vblank wait timed out
WARNING: CPU: 7 PID: 70 at drivers/gpu/drm/drm_atomic_helper.c:1835 drm_atomic_helper_wait_for_vblanks.part.0+0x24c/0x27c
[...]
Hardware name: MediaTek Genio-700 EVK (DT)
Workqueue: events_unbound commit_work
pstate: 60400009 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : drm_atomic_helper_wait_for_vblanks.part.0+0x24c/0x27c
lr : drm_atomic_helper_wait_for_vblanks.part.0+0x24c/0x27c
sp : ffff80008337bca0
x29: ffff80008337bcd0 x28: 0000000000000061 x27: 0000000000000000
x26: 0000000000000001 x25: 0000000000000000 x24: ffff0000c9dcc000
x23: 0000000000000001 x22: 0000000000000000 x21: ffff0000c66f2f80
x20: ffff0000c0d7d880 x19: 0000000000000000 x18: 000000000000000a
x17: 000000040044ffff x16: 005000f2b5503510 x15: 0000000000000000
x14: 0000000000000000 x13: 74756f2064656d69 x12: 742074696177206b
x11: 0000000000000058 x10: 0000000000000018 x9 : ffff800082396a70
x8 : 0000000000057fa8 x7 : 0000000000000cce x6 : ffff8000823eea70
x5 : ffff0001fef5f408 x4 : ffff80017ccee000 x3 : ffff0000c12cb480
x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff0000c12cb480
Call trace:
 drm_atomic_helper_wait_for_vblanks.part.0+0x24c/0x27c (P)
 drm_atomic_helper_commit_tail_rpm+0x64/0x80
 commit_tail+0xa4/0x1a4
 commit_work+0x14/0x20
 process_one_work+0x150/0x290
 worker_thread+0x2d0/0x3ec
 kthread+0x12c/0x210
 ret_from_fork+0x10/0x20
---[ end trace 0000000000000000 ]---
```

Until this gets fixed upstream, disable AFBC support on this platform, as
it's currently broken with upstream Mesa.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68184/">CVE-2025-68184 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68184">CVE-2025-68184 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255220">SUSE bug 1255220</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68185</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68185" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68185" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68185" ref_url="https://www.suse.com/security/cve/CVE-2025-68185" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfs4_setup_readdir(): insufficient locking for -&gt;d_parent-&gt;d_inode dereferencing

Theoretically it's an oopsable race, but I don't believe one can manage
to hit it on real hardware; might become doable on a KVM, but it still
won't be easy to attack.

Anyway, it's easy to deal with - since xdr_encode_hyper() is just a call of
put_unaligned_be64(), we can put that under -&gt;d_lock and be done with that.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68185/">CVE-2025-68185 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68185">CVE-2025-68185 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255135">SUSE bug 1255135</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68186</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68186" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68186" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68186" ref_url="https://www.suse.com/security/cve/CVE-2025-68186" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ring-buffer: Do not warn in ring_buffer_map_get_reader() when reader catches up

The function ring_buffer_map_get_reader() is a bit more strict than the
other get reader functions, and except for certain situations the
rb_get_reader_page() should not return NULL. If it does, it triggers a
warning.

This warning was triggering but after looking at why, it was because
another acceptable situation was happening and it wasn't checked for.

If the reader catches up to the writer and there's still data to be read
on the reader page, then the rb_get_reader_page() will return NULL as
there's no new page to get.

In this situation, the reader page should not be updated and no warning
should trigger.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68186/">CVE-2025-68186 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68186">CVE-2025-68186 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255144">SUSE bug 1255144</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68188</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68188" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68188" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68188" ref_url="https://www.suse.com/security/cve/CVE-2025-68188" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tcp: use dst_dev_rcu() in tcp_fastopen_active_disable_ofo_check()

Use RCU to avoid a pair of atomic operations and a potential
UAF on dst_dev()-&gt;flags.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68188/">CVE-2025-68188 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68188">CVE-2025-68188 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255269">SUSE bug 1255269</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568190" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68190</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68190" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68190" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68190" ref_url="https://www.suse.com/security/cve/CVE-2025-68190" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu/atom: Check kcalloc() for WS buffer in amdgpu_atom_execute_table_locked()

kcalloc() may fail. When WS is non-zero and allocation fails, ectx.ws
remains NULL while ectx.ws_size is set, leading to a potential NULL
pointer dereference in atom_get_src_int() when accessing WS entries.

Return -ENOMEM on allocation failure to avoid the NULL dereference.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68190/">CVE-2025-68190 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68190">CVE-2025-68190 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255131">SUSE bug 1255131</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568192" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68192</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68192" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68192" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68192" ref_url="https://www.suse.com/security/cve/CVE-2025-68192" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: usb: qmi_wwan: initialize MAC header offset in qmimux_rx_fixup

Raw IP packets have no MAC header, leaving skb-&gt;mac_header uninitialized.
This can trigger kernel panics on ARM64 when xfrm or other subsystems
access the offset due to strict alignment checks.

Initialize the MAC header to prevent such crashes.

This can trigger kernel panics on ARM when running IPsec over the
qmimux0 interface.

Example trace:

    Internal error: Oops: 000000009600004f [#1] SMP
    CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Not tainted 6.12.34-gbe78e49cb433 #1
    Hardware name: LS1028A RDB Board (DT)
    pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
    pc : xfrm_input+0xde8/0x1318
    lr : xfrm_input+0x61c/0x1318
    sp : ffff800080003b20
    Call trace:
     xfrm_input+0xde8/0x1318
     xfrm6_rcv+0x38/0x44
     xfrm6_esp_rcv+0x48/0xa8
     ip6_protocol_deliver_rcu+0x94/0x4b0
     ip6_input_finish+0x44/0x70
     ip6_input+0x44/0xc0
     ipv6_rcv+0x6c/0x114
     __netif_receive_skb_one_core+0x5c/0x8c
     __netif_receive_skb+0x18/0x60
     process_backlog+0x78/0x17c
     __napi_poll+0x38/0x180
     net_rx_action+0x168/0x2f0
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68192/">CVE-2025-68192 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68192">CVE-2025-68192 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255246">SUSE bug 1255246</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568194" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68194</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68194" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68194" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68194" ref_url="https://www.suse.com/security/cve/CVE-2025-68194" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: imon: make send_packet() more robust

syzbot is reporting that imon has three problems which result in
hung tasks due to forever holding device lock [1].

First problem is that when usb_rx_callback_intf0() once got -EPROTO error
after ictx-&gt;dev_present_intf0 became true, usb_rx_callback_intf0()
resubmits urb after printk(), and resubmitted urb causes
usb_rx_callback_intf0() to again get -EPROTO error. This results in
printk() flooding (RCU stalls).

Alan Stern commented [2] that

  In theory it's okay to resubmit _if_ the driver has a robust
  error-recovery scheme (such as giving up after some fixed limit on the
  number of errors or after some fixed time has elapsed, perhaps with a
  time delay to prevent a flood of errors).  Most drivers don't bother to
  do this; they simply give up right away.  This makes them more
  vulnerable to short-term noise interference during USB transfers, but in
  reality such interference is quite rare.  There's nothing really wrong
  with giving up right away.

but imon has a poor error-recovery scheme which just retries forever;
this behavior should be fixed.

Since I'm not sure whether it is safe for imon users to give up upon any
error code, this patch takes care of only union of error codes chosen from
modules in drivers/media/rc/ directory which handle -EPROTO error (i.e.
ir_toy, mceusb and igorplugusb).

Second problem is that when usb_rx_callback_intf0() once got -EPROTO error
before ictx-&gt;dev_present_intf0 becomes true, usb_rx_callback_intf0() always
resubmits urb due to commit 8791d63af0cf ("[media] imon: don't wedge
hardware after early callbacks"). Move the ictx-&gt;dev_present_intf0 test
introduced by commit 6f6b90c9231a ("[media] imon: don't parse scancodes
until intf configured") to immediately before imon_incoming_packet(), or
the first problem explained above happens without printk() flooding (i.e.
hung task).

Third problem is that when usb_rx_callback_intf0() is not called for some
reason (e.g. flaky hardware; the reproducer for this problem sometimes
prevents usb_rx_callback_intf0() from being called),
wait_for_completion_interruptible() in send_packet() never returns (i.e.
hung task). As a workaround for such situation, change send_packet() to
wait for completion with timeout of 10 seconds.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68194/">CVE-2025-68194 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68194">CVE-2025-68194 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255325">SUSE bug 1255325</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68195</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68195" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68195" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68195" ref_url="https://www.suse.com/security/cve/CVE-2025-68195" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/CPU/AMD: Add missing terminator for zen5_rdseed_microcode

Running x86_match_min_microcode_rev() on a Zen5 CPU trips up KASAN for an out
of bounds access.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68195/">CVE-2025-68195 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68195">CVE-2025-68195 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255259">SUSE bug 1255259</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68197</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68197" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68197" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68197" ref_url="https://www.suse.com/security/cve/CVE-2025-68197" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bnxt_en: Fix null pointer dereference in bnxt_bs_trace_check_wrap()

With older FW, we may get the ASYNC_EVENT_CMPL_EVENT_ID_DBG_BUF_PRODUCER
for FW trace data type that has not been initialized.  This will result
in a crash in bnxt_bs_trace_type_wrap().  Add a guard to check for a
valid magic_byte pointer before proceeding.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68197/">CVE-2025-68197 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68197">CVE-2025-68197 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255242">SUSE bug 1255242</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68198</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68198" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68198" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68198" ref_url="https://www.suse.com/security/cve/CVE-2025-68198" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crash: fix crashkernel resource shrink

When crashkernel is configured with a high reservation, shrinking its
value below the low crashkernel reservation causes two issues:

1. Invalid crashkernel resource objects
2. Kernel crash if crashkernel shrinking is done twice

For example, with crashkernel=200M,high, the kernel reserves 200MB of high
memory and some default low memory (say 256MB).  The reservation appears
as:

cat /proc/iomem | grep -i crash
af000000-beffffff : Crash kernel
433000000-43f7fffff : Crash kernel

If crashkernel is then shrunk to 50MB (echo 52428800 &gt;
/sys/kernel/kexec_crash_size), /proc/iomem still shows 256MB reserved:
af000000-beffffff : Crash kernel

Instead, it should show 50MB:
af000000-b21fffff : Crash kernel

Further shrinking crashkernel to 40MB causes a kernel crash with the
following trace (x86):

BUG: kernel NULL pointer dereference, address: 0000000000000038
PGD 0 P4D 0
Oops: 0000 [#1] PREEMPT SMP NOPTI
&lt;snip...&gt;
Call Trace: &lt;TASK&gt;
? __die_body.cold+0x19/0x27
? page_fault_oops+0x15a/0x2f0
? search_module_extables+0x19/0x60
? search_bpf_extables+0x5f/0x80
? exc_page_fault+0x7e/0x180
? asm_exc_page_fault+0x26/0x30
? __release_resource+0xd/0xb0
release_resource+0x26/0x40
__crash_shrink_memory+0xe5/0x110
crash_shrink_memory+0x12a/0x190
kexec_crash_size_store+0x41/0x80
kernfs_fop_write_iter+0x141/0x1f0
vfs_write+0x294/0x460
ksys_write+0x6d/0xf0
&lt;snip...&gt;

This happens because __crash_shrink_memory()/kernel/crash_core.c
incorrectly updates the crashk_res resource object even when
crashk_low_res should be updated.

Fix this by ensuring the correct crashkernel resource object is updated
when shrinking crashkernel memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68198/">CVE-2025-68198 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68198">CVE-2025-68198 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255243">SUSE bug 1255243</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68200</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68200" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68200" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68200" ref_url="https://www.suse.com/security/cve/CVE-2025-68200" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Add bpf_prog_run_data_pointers()

syzbot found that cls_bpf_classify() is able to change
tc_skb_cb(skb)-&gt;drop_reason triggering a warning in sk_skb_reason_drop().

WARNING: CPU: 0 PID: 5965 at net/core/skbuff.c:1192 __sk_skb_reason_drop net/core/skbuff.c:1189 [inline]
WARNING: CPU: 0 PID: 5965 at net/core/skbuff.c:1192 sk_skb_reason_drop+0x76/0x170 net/core/skbuff.c:1214

struct tc_skb_cb has been added in commit ec624fe740b4 ("net/sched:
Extend qdisc control block with tc control block"), which added a wrong
interaction with db58ba459202 ("bpf: wire in data and data_end for
cls_act_bpf").

drop_reason was added later.

Add bpf_prog_run_data_pointers() helper to save/restore the net_sched
storage colliding with BPF data_meta/data_end.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68200/">CVE-2025-68200 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68200">CVE-2025-68200 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255241">SUSE bug 1255241</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568201" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68201</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68201" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68201" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68201" ref_url="https://www.suse.com/security/cve/CVE-2025-68201" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: remove two invalid BUG_ON()s

Those can be triggered trivially by userspace.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68201/">CVE-2025-68201 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68201">CVE-2025-68201 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255136">SUSE bug 1255136</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68202</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68202" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68202" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68202" ref_url="https://www.suse.com/security/cve/CVE-2025-68202" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

sched_ext: Fix unsafe locking in the scx_dump_state()

For built with CONFIG_PREEMPT_RT=y kernels, the dump_lock will be converted
sleepable spinlock and not disable-irq, so the following scenarios occur:

inconsistent {IN-HARDIRQ-W} -&gt; {HARDIRQ-ON-W} usage.
irq_work/0/27 [HC0[0]:SC0[0]:HE1:SE1] takes:
(&amp;rq-&gt;__lock){?...}-{2:2}, at: raw_spin_rq_lock_nested+0x2b/0x40
{IN-HARDIRQ-W} state was registered at:
   lock_acquire+0x1e1/0x510
   _raw_spin_lock_nested+0x42/0x80
   raw_spin_rq_lock_nested+0x2b/0x40
   sched_tick+0xae/0x7b0
   update_process_times+0x14c/0x1b0
   tick_periodic+0x62/0x1f0
   tick_handle_periodic+0x48/0xf0
   timer_interrupt+0x55/0x80
   __handle_irq_event_percpu+0x20a/0x5c0
   handle_irq_event_percpu+0x18/0xc0
   handle_irq_event+0xb5/0x150
   handle_level_irq+0x220/0x460
   __common_interrupt+0xa2/0x1e0
   common_interrupt+0xb0/0xd0
   asm_common_interrupt+0x2b/0x40
   _raw_spin_unlock_irqrestore+0x45/0x80
   __setup_irq+0xc34/0x1a30
   request_threaded_irq+0x214/0x2f0
   hpet_time_init+0x3e/0x60
   x86_late_time_init+0x5b/0xb0
   start_kernel+0x308/0x410
   x86_64_start_reservations+0x1c/0x30
   x86_64_start_kernel+0x96/0xa0
   common_startup_64+0x13e/0x148

 other info that might help us debug this:
 Possible unsafe locking scenario:

        CPU0
        ----
   lock(&amp;rq-&gt;__lock);
   &lt;Interrupt&gt;
     lock(&amp;rq-&gt;__lock);

  *** DEADLOCK ***

 stack backtrace:
 CPU: 0 UID: 0 PID: 27 Comm: irq_work/0
 Call Trace:
  &lt;TASK&gt;
  dump_stack_lvl+0x8c/0xd0
  dump_stack+0x14/0x20
  print_usage_bug+0x42e/0x690
  mark_lock.part.44+0x867/0xa70
  ? __pfx_mark_lock.part.44+0x10/0x10
  ? string_nocheck+0x19c/0x310
  ? number+0x739/0x9f0
  ? __pfx_string_nocheck+0x10/0x10
  ? __pfx_check_pointer+0x10/0x10
  ? kvm_sched_clock_read+0x15/0x30
  ? sched_clock_noinstr+0xd/0x20
  ? local_clock_noinstr+0x1c/0xe0
  __lock_acquire+0xc4b/0x62b0
  ? __pfx_format_decode+0x10/0x10
  ? __pfx_string+0x10/0x10
  ? __pfx___lock_acquire+0x10/0x10
  ? __pfx_vsnprintf+0x10/0x10
  lock_acquire+0x1e1/0x510
  ? raw_spin_rq_lock_nested+0x2b/0x40
  ? __pfx_lock_acquire+0x10/0x10
  ? dump_line+0x12e/0x270
  ? raw_spin_rq_lock_nested+0x20/0x40
  _raw_spin_lock_nested+0x42/0x80
  ? raw_spin_rq_lock_nested+0x2b/0x40
  raw_spin_rq_lock_nested+0x2b/0x40
  scx_dump_state+0x3b3/0x1270
  ? finish_task_switch+0x27e/0x840
  scx_ops_error_irq_workfn+0x67/0x80
  irq_work_single+0x113/0x260
  irq_work_run_list.part.3+0x44/0x70
  run_irq_workd+0x6b/0x90
  ? __pfx_run_irq_workd+0x10/0x10
  smpboot_thread_fn+0x529/0x870
  ? __pfx_smpboot_thread_fn+0x10/0x10
  kthread+0x305/0x3f0
  ? __pfx_kthread+0x10/0x10
  ret_from_fork+0x40/0x70
  ? __pfx_kthread+0x10/0x10
  ret_from_fork_asm+0x1a/0x30
  &lt;/TASK&gt;

This commit therefore use rq_lock_irqsave/irqrestore() to replace
rq_lock/unlock() in the scx_dump_state().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68202/">CVE-2025-68202 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68202">CVE-2025-68202 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255223">SUSE bug 1255223</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568206" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68206</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68206" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68206" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68206" ref_url="https://www.suse.com/security/cve/CVE-2025-68206" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nft_ct: add seqadj extension for natted connections

Sequence adjustment may be required for FTP traffic with PASV/EPSV modes.
due to need to re-write packet payload (IP, port) on the ftp control
connection. This can require changes to the TCP length and expected
seq / ack_seq.

The easiest way to reproduce this issue is with PASV mode.
Example ruleset:
table inet ftp_nat {
        ct helper ftp_helper {
                type "ftp" protocol tcp
                l3proto inet
        }

        chain prerouting {
                type filter hook prerouting priority 0; policy accept;
                tcp dport 21 ct state new ct helper set "ftp_helper"
        }
}
table ip nat {
        chain prerouting {
                type nat hook prerouting priority -100; policy accept;
                tcp dport 21 dnat ip prefix to ip daddr map {
			192.168.100.1 : 192.168.13.2/32 }
        }

        chain postrouting {
                type nat hook postrouting priority 100 ; policy accept;
                tcp sport 21 snat ip prefix to ip saddr map {
			192.168.13.2 : 192.168.100.1/32 }
        }
}

Note that the ftp helper gets assigned *after* the dnat setup.

The inverse (nat after helper assign) is handled by an existing
check in nf_nat_setup_info() and will not show the problem.

Topoloy:

 +-------------------+     +----------------------------------+
 | FTP: 192.168.13.2 | &lt;-&gt; | NAT: 192.168.13.3, 192.168.100.1 |
 +-------------------+     +----------------------------------+
                                      |
                         +-----------------------+
                         | Client: 192.168.100.2 |
                         +-----------------------+

ftp nat changes do not work as expected in this case:
Connected to 192.168.100.1.
[..]
ftp&gt; epsv
EPSV/EPRT on IPv4 off.
ftp&gt; ls
227 Entering passive mode (192,168,100,1,209,129).
421 Service not available, remote server has closed connection.

Kernel logs:
Missing nfct_seqadj_ext_add() setup call
WARNING: CPU: 1 PID: 0 at net/netfilter/nf_conntrack_seqadj.c:41
[..]
 __nf_nat_mangle_tcp_packet+0x100/0x160 [nf_nat]
 nf_nat_ftp+0x142/0x280 [nf_nat_ftp]
 help+0x4d1/0x880 [nf_conntrack_ftp]
 nf_confirm+0x122/0x2e0 [nf_conntrack]
 nf_hook_slow+0x3c/0xb0
 ..

Fix this by adding the required extension when a conntrack helper is assigned
to a connection that has a nat binding.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68206/">CVE-2025-68206 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68206">CVE-2025-68206 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255142">SUSE bug 1255142</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68207</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68207" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68207" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68207" ref_url="https://www.suse.com/security/cve/CVE-2025-68207" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/xe/guc: Synchronize Dead CT worker with unbind

Cancel and wait for any Dead CT worker to complete before continuing
with device unbinding. Else the worker will end up using resources freed
by the undind operation.

(cherry picked from commit 492671339114e376aaa38626d637a2751cdef263)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68207/">CVE-2025-68207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68207">CVE-2025-68207 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255234">SUSE bug 1255234</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68208</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68208" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68208" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68208" ref_url="https://www.suse.com/security/cve/CVE-2025-68208" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: account for current allocated stack depth in widen_imprecise_scalars()

The usage pattern for widen_imprecise_scalars() looks as follows:

    prev_st = find_prev_entry(env, ...);
    queued_st = push_stack(...);
    widen_imprecise_scalars(env, prev_st, queued_st);

Where prev_st is an ancestor of the queued_st in the explored states
tree. This ancestor is not guaranteed to have same allocated stack
depth as queued_st. E.g. in the following case:

    def main():
      for i in 1..2:
        foo(i)        // same callsite, differnt param

    def foo(i):
      if i == 1:
        use 128 bytes of stack
      iterator based loop

Here, for a second 'foo' call prev_st-&gt;allocated_stack is 128,
while queued_st-&gt;allocated_stack is much smaller.
widen_imprecise_scalars() needs to take this into account and avoid
accessing bpf_verifier_state-&gt;frame[*]-&gt;stack out of bounds.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68208/">CVE-2025-68208 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68208">CVE-2025-68208 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255227">SUSE bug 1255227</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68209</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68209" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68209" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68209" ref_url="https://www.suse.com/security/cve/CVE-2025-68209" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mlx5: Fix default values in create CQ

Currently, CQs without a completion function are assigned the
mlx5_add_cq_to_tasklet function by default. This is problematic since
only user CQs created through the mlx5_ib driver are intended to use
this function.

Additionally, all CQs that will use doorbells instead of polling for
completions must call mlx5_cq_arm. However, the default CQ creation flow
leaves a valid value in the CQ's arm_db field, allowing FW to send
interrupts to polling-only CQs in certain corner cases.

These two factors would allow a polling-only kernel CQ to be triggered
by an EQ interrupt and call a completion function intended only for user
CQs, causing a null pointer exception.

Some areas in the driver have prevented this issue with one-off fixes
but did not address the root cause.

This patch fixes the described issue by adding defaults to the create CQ
flow. It adds a default dummy completion function to protect against
null pointer exceptions, and it sets an invalid command sequence number
by default in kernel CQs to prevent the FW from sending an interrupt to
the CQ until it is armed. User CQs are responsible for their own
initialization values.

Callers of mlx5_core_create_cq are responsible for changing the
completion function and arming the CQ per their needs.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68209/">CVE-2025-68209 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68209">CVE-2025-68209 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255230">SUSE bug 1255230</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68210</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68210" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68210" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68210" ref_url="https://www.suse.com/security/cve/CVE-2025-68210" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

erofs: avoid infinite loop due to incomplete zstd-compressed data

Currently, the decompression logic incorrectly spins if compressed
data is truncated in crafted (deliberately corrupted) images.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68210/">CVE-2025-68210 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68210">CVE-2025-68210 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255231">SUSE bug 1255231</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568211" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68211</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68211" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68211" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68211" ref_url="https://www.suse.com/security/cve/CVE-2025-68211" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ksm: use range-walk function to jump over holes in scan_get_next_rmap_item

Currently, scan_get_next_rmap_item() walks every page address in a VMA to
locate mergeable pages.  This becomes highly inefficient when scanning
large virtual memory areas that contain mostly unmapped regions, causing
ksmd to use large amount of cpu without deduplicating much pages.

This patch replaces the per-address lookup with a range walk using
walk_page_range().  The range walker allows KSM to skip over entire
unmapped holes in a VMA, avoiding unnecessary lookups.  This problem was
previously discussed in [1].

Consider the following test program which creates a 32 TiB mapping in the
virtual address space but only populates a single page:

#include &lt;unistd.h&gt;
#include &lt;stdio.h&gt;
#include &lt;sys/mman.h&gt;

/* 32 TiB */
const size_t size = 32ul * 1024 * 1024 * 1024 * 1024;

int main() {
        char *area = mmap(NULL, size, PROT_READ | PROT_WRITE,
                          MAP_NORESERVE | MAP_PRIVATE | MAP_ANON, -1, 0);

        if (area == MAP_FAILED) {
                perror("mmap() failed\n");
                return -1;
        }

        /* Populate a single page such that we get an anon_vma. */
        *area = 0;

        /* Enable KSM. */
        madvise(area, size, MADV_MERGEABLE);
        pause();
        return 0;
}

$ ./ksm-sparse  &amp;
$ echo 1 &gt; /sys/kernel/mm/ksm/run 

Without this patch ksmd uses 100% of the cpu for a long time (more then 1
hour in my test machine) scanning all the 32 TiB virtual address space
that contain only one mapped page.  This makes ksmd essentially deadlocked
not able to deduplicate anything of value.  With this patch ksmd walks
only the one mapped page and skips the rest of the 32 TiB virtual address
space, making the scan fast using little cpu.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68211/">CVE-2025-68211 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68211">CVE-2025-68211 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255319">SUSE bug 1255319</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568213" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68213</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68213" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68213" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68213" ref_url="https://www.suse.com/security/cve/CVE-2025-68213" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

idpf: fix possible vport_config NULL pointer deref in remove

Attempting to remove the driver will cause a crash in cases where
the vport failed to initialize. Following trace is from an instance where
the driver failed during an attempt to create a VF:
[ 1661.543624] idpf 0000:84:00.7: Device HW Reset initiated
[ 1722.923726] idpf 0000:84:00.7: Transaction timed-out (op:1 cookie:2900 vc_op:1 salt:29 timeout:60000ms)
[ 1723.353263] BUG: kernel NULL pointer dereference, address: 0000000000000028
...
[ 1723.358472] RIP: 0010:idpf_remove+0x11c/0x200 [idpf]
...
[ 1723.364973] Call Trace:
[ 1723.365475]  &lt;TASK&gt;
[ 1723.365972]  pci_device_remove+0x42/0xb0
[ 1723.366481]  device_release_driver_internal+0x1a9/0x210
[ 1723.366987]  pci_stop_bus_device+0x6d/0x90
[ 1723.367488]  pci_stop_and_remove_bus_device+0x12/0x20
[ 1723.367971]  pci_iov_remove_virtfn+0xbd/0x120
[ 1723.368309]  sriov_disable+0x34/0xe0
[ 1723.368643]  idpf_sriov_configure+0x58/0x140 [idpf]
[ 1723.368982]  sriov_numvfs_store+0xda/0x1c0

Avoid the NULL pointer dereference by adding NULL pointer check for
vport_config[i], before freeing user_config.q_coalesce.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68213/">CVE-2025-68213 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68213">CVE-2025-68213 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255228">SUSE bug 1255228</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568215" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68215</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68215" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68215" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68215" ref_url="https://www.suse.com/security/cve/CVE-2025-68215" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: fix PTP cleanup on driver removal in error path

Improve the cleanup on releasing PTP resources in error path.
The error case might happen either at the driver probe and PTP
feature initialization or on PTP restart (errors in reset handling, NVM
update etc). In both cases, calls to PF PTP cleanup (ice_ptp_cleanup_pf
function) and 'ps_lock' mutex deinitialization were missed.
Additionally, ptp clock was not unregistered in the latter case.

Keep PTP state as 'uninitialized' on init to distinguish between error
scenarios and to avoid resource release duplication at driver removal.

The consequence of missing ice_ptp_cleanup_pf call is the following call
trace dumped when ice_adapter object is freed (port list is not empty,
as it is required at this stage):

[  T93022] ------------[ cut here ]------------
[  T93022] WARNING: CPU: 10 PID: 93022 at
ice/ice_adapter.c:67 ice_adapter_put+0xef/0x100 [ice]
...
[  T93022] RIP: 0010:ice_adapter_put+0xef/0x100 [ice]
...
[  T93022] Call Trace:
[  T93022]  &lt;TASK&gt;
[  T93022]  ? ice_adapter_put+0xef/0x100 [ice
33d2647ad4f6d866d41eefff1806df37c68aef0c]
[  T93022]  ? __warn.cold+0xb0/0x10e
[  T93022]  ? ice_adapter_put+0xef/0x100 [ice
33d2647ad4f6d866d41eefff1806df37c68aef0c]
[  T93022]  ? report_bug+0xd8/0x150
[  T93022]  ? handle_bug+0xe9/0x110
[  T93022]  ? exc_invalid_op+0x17/0x70
[  T93022]  ? asm_exc_invalid_op+0x1a/0x20
[  T93022]  ? ice_adapter_put+0xef/0x100 [ice
33d2647ad4f6d866d41eefff1806df37c68aef0c]
[  T93022]  pci_device_remove+0x42/0xb0
[  T93022]  device_release_driver_internal+0x19f/0x200
[  T93022]  driver_detach+0x48/0x90
[  T93022]  bus_remove_driver+0x70/0xf0
[  T93022]  pci_unregister_driver+0x42/0xb0
[  T93022]  ice_module_exit+0x10/0xdb0 [ice
33d2647ad4f6d866d41eefff1806df37c68aef0c]
...
[  T93022] ---[ end trace 0000000000000000 ]---
[  T93022] ice: module unloaded
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68215/">CVE-2025-68215 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68215">CVE-2025-68215 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255226">SUSE bug 1255226</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568217" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68217</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68217" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68217" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68217" ref_url="https://www.suse.com/security/cve/CVE-2025-68217" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Input: pegasus-notetaker - fix potential out-of-bounds access

In the pegasus_notetaker driver, the pegasus_probe() function allocates
the URB transfer buffer using the wMaxPacketSize value from
the endpoint descriptor. An attacker can use a malicious USB descriptor
to force the allocation of a very small buffer.

Subsequently, if the device sends an interrupt packet with a specific
pattern (e.g., where the first byte is 0x80 or 0x42),
the pegasus_parse_packet() function parses the packet without checking
the allocated buffer size. This leads to an out-of-bounds memory access.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68217/">CVE-2025-68217 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68217">CVE-2025-68217 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255221">SUSE bug 1255221</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568218" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68218</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68218" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68218" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68218" ref_url="https://www.suse.com/security/cve/CVE-2025-68218" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvme-multipath: fix lockdep WARN due to partition scan work

Blktests test cases nvme/014, 057 and 058 fail occasionally due to a
lockdep WARN. As reported in the Closes tag URL, the WARN indicates that
a deadlock can happen due to the dependency among disk-&gt;open_mutex,
kblockd workqueue completion and partition_scan_work completion.

To avoid the lockdep WARN and the potential deadlock, cut the dependency
by running the partition_scan_work not by kblockd workqueue but by
nvme_wq.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68218/">CVE-2025-68218 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68218">CVE-2025-68218 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255245">SUSE bug 1255245</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568222" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68222</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68222" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68222" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68222" ref_url="https://www.suse.com/security/cve/CVE-2025-68222" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pinctrl: s32cc: fix uninitialized memory in s32_pinctrl_desc

s32_pinctrl_desc is allocated with devm_kmalloc(), but not all of its
fields are initialized. Notably, num_custom_params is used in
pinconf_generic_parse_dt_config(), resulting in intermittent allocation
errors, such as the following splat when probing i2c-imx:

        WARNING: CPU: 0 PID: 176 at mm/page_alloc.c:4795 __alloc_pages_noprof+0x290/0x300
        [...]
        Hardware name: NXP S32G3 Reference Design Board 3 (S32G-VNP-RDB3) (DT)
        [...]
        Call trace:
         __alloc_pages_noprof+0x290/0x300 (P)
         ___kmalloc_large_node+0x84/0x168
         __kmalloc_large_node_noprof+0x34/0x120
         __kmalloc_noprof+0x2ac/0x378
         pinconf_generic_parse_dt_config+0x68/0x1a0
         s32_dt_node_to_map+0x104/0x248
         dt_to_map_one_config+0x154/0x1d8
         pinctrl_dt_to_map+0x12c/0x280
         create_pinctrl+0x6c/0x270
         pinctrl_get+0xc0/0x170
         devm_pinctrl_get+0x50/0xa0
         pinctrl_bind_pins+0x60/0x2a0
         really_probe+0x60/0x3a0
        [...]
         __platform_driver_register+0x2c/0x40
         i2c_adap_imx_init+0x28/0xff8 [i2c_imx]
        [...]

This results in later parse failures that can cause issues in dependent
drivers:

        s32g-siul2-pinctrl 4009c240.pinctrl: /soc@0/pinctrl@4009c240/i2c0-pins/i2c0-grp0: could not parse node property
        s32g-siul2-pinctrl 4009c240.pinctrl: /soc@0/pinctrl@4009c240/i2c0-pins/i2c0-grp0: could not parse node property
        [...]
        pca953x 0-0022: failed writing register: -6
        i2c i2c-0: IMX I2C adapter registered
        s32g-siul2-pinctrl 4009c240.pinctrl: /soc@0/pinctrl@4009c240/i2c2-pins/i2c2-grp0: could not parse node property
        s32g-siul2-pinctrl 4009c240.pinctrl: /soc@0/pinctrl@4009c240/i2c2-pins/i2c2-grp0: could not parse node property
        i2c i2c-1: IMX I2C adapter registered
        s32g-siul2-pinctrl 4009c240.pinctrl: /soc@0/pinctrl@4009c240/i2c4-pins/i2c4-grp0: could not parse node property
        s32g-siul2-pinctrl 4009c240.pinctrl: /soc@0/pinctrl@4009c240/i2c4-pins/i2c4-grp0: could not parse node property
        i2c i2c-2: IMX I2C adapter registered

Fix this by initializing s32_pinctrl_desc with devm_kzalloc() instead of
devm_kmalloc() in s32_pinctrl_probe(), which sets the previously
uninitialized fields to zero.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68222/">CVE-2025-68222 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68222">CVE-2025-68222 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255218">SUSE bug 1255218</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568223" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68223</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68223" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68223" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68223" ref_url="https://www.suse.com/security/cve/CVE-2025-68223" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/radeon: delete radeon_fence_process in is_signaled, no deadlock

Delete the attempt to progress the queue when checking if fence is
signaled. This avoids deadlock.

dma-fence_ops::signaled can be called with the fence lock in unknown
state. For radeon, the fence lock is also the wait queue lock. This can
cause a self deadlock when signaled() tries to make forward progress on
the wait queue. But advancing the queue is unneeded because incorrectly
returning false from signaled() is perfectly acceptable.

(cherry picked from commit 527ba26e50ec2ca2be9c7c82f3ad42998a75d0db)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68223/">CVE-2025-68223 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68223">CVE-2025-68223 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255357">SUSE bug 1255357</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255358">SUSE bug 1255358</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568227" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68227</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68227" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68227" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68227" ref_url="https://www.suse.com/security/cve/CVE-2025-68227" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mptcp: Fix proto fallback detection with BPF

The sockmap feature allows bpf syscall from userspace, or based
on bpf sockops, replacing the sk_prot of sockets during protocol stack
processing with sockmap's custom read/write interfaces.
'''
tcp_rcv_state_process()
  syn_recv_sock()/subflow_syn_recv_sock()
    tcp_init_transfer(BPF_SOCK_OPS_PASSIVE_ESTABLISHED_CB)
      bpf_skops_established       &lt;== sockops
        bpf_sock_map_update(sk)   &lt;== call bpf helper
          tcp_bpf_update_proto()  &lt;== update sk_prot
'''

When the server has MPTCP enabled but the client sends a TCP SYN
without MPTCP, subflow_syn_recv_sock() performs a fallback on the
subflow, replacing the subflow sk's sk_prot with the native sk_prot.
'''
subflow_syn_recv_sock()
  subflow_ulp_fallback()
    subflow_drop_ctx()
      mptcp_subflow_ops_undo_override()
'''

Then, this subflow can be normally used by sockmap, which replaces the
native sk_prot with sockmap's custom sk_prot. The issue occurs when the
user executes accept::mptcp_stream_accept::mptcp_fallback_tcp_ops().
Here, it uses sk-&gt;sk_prot to compare with the native sk_prot, but this
is incorrect when sockmap is used, as we may incorrectly set
sk-&gt;sk_socket-&gt;ops.

This fix uses the more generic sk_family for the comparison instead.

Additionally, this also prevents a WARNING from occurring:

result from ./scripts/decode_stacktrace.sh:
------------[ cut here ]------------
WARNING: CPU: 0 PID: 337 at net/mptcp/protocol.c:68 mptcp_stream_accept \
(net/mptcp/protocol.c:4005)
Modules linked in:
...

PKRU: 55555554
Call Trace:
&lt;TASK&gt;
do_accept (net/socket.c:1989)
__sys_accept4 (net/socket.c:2028 net/socket.c:2057)
__x64_sys_accept (net/socket.c:2067)
x64_sys_call (arch/x86/entry/syscall_64.c:41)
do_syscall_64 (arch/x86/entry/syscall_64.c:63 arch/x86/entry/syscall_64.c:94)
entry_SYSCALL_64_after_hwframe (arch/x86/entry/entry_64.S:130)
RIP: 0033:0x7f87ac92b83d

---[ end trace 0000000000000000 ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68227/">CVE-2025-68227 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68227">CVE-2025-68227 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255216">SUSE bug 1255216</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568230" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68230</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68230" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68230" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68230" ref_url="https://www.suse.com/security/cve/CVE-2025-68230" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: fix gpu page fault after hibernation on PF passthrough

On PF passthrough environment, after hibernate and then resume, coralgemm
will cause gpu page fault.

Mode1 reset happens during hibernate, but partition mode is not restored
on resume, register mmCP_HYP_XCP_CTL and mmCP_PSP_XCP_CTL is not right
after resume. When CP access the MQD BO, wrong stride size is used,
this will cause out of bound access on the MQD BO, resulting page fault.

The fix is to ensure gfx_v9_4_3_switch_compute_partition() is called
when resume from a hibernation.
KFD resume is called separately during a reset recovery or resume from
suspend sequence. Hence it's not required to be called as part of
partition switch.

(cherry picked from commit 5d1b32cfe4a676fe552416cb5ae847b215463a1a)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68230/">CVE-2025-68230 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68230">CVE-2025-68230 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255134">SUSE bug 1255134</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68233</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68233" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68233" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68233" ref_url="https://www.suse.com/security/cve/CVE-2025-68233" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/tegra: Add call to put_pid()

Add a call to put_pid() corresponding to get_task_pid().
host1x_memory_context_alloc() does not take ownership of the PID so we
need to free it here to avoid leaking.

[mperttunen@nvidia.com: reword commit message]
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68233/">CVE-2025-68233 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68233">CVE-2025-68233 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255206">SUSE bug 1255206</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68235</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68235" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68235" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68235" ref_url="https://www.suse.com/security/cve/CVE-2025-68235" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nouveau/firmware: Add missing kfree() of nvkm_falcon_fw::boot

nvkm_falcon_fw::boot is allocated, but no one frees it. This causes a
kmemleak warning.

Make sure this data is deallocated.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68235/">CVE-2025-68235 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68235">CVE-2025-68235 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255209">SUSE bug 1255209</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568237" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68237</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68237" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68237" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68237" ref_url="https://www.suse.com/security/cve/CVE-2025-68237" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mtdchar: fix integer overflow in read/write ioctls

The "req.start" and "req.len" variables are u64 values that come from the
user at the start of the function.  We mask away the high 32 bits of
"req.len" so that's capped at U32_MAX but the "req.start" variable can go
up to U64_MAX which means that the addition can still integer overflow.

Use check_add_overflow() to fix this bug.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68237/">CVE-2025-68237 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68237">CVE-2025-68237 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255203">SUSE bug 1255203</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568238" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68238</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68238" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68238" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68238" ref_url="https://www.suse.com/security/cve/CVE-2025-68238" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mtd: rawnand: cadence: fix DMA device NULL pointer dereference

The DMA device pointer `dma_dev` was being dereferenced before ensuring
that `cdns_ctrl-&gt;dmac` is properly initialized.

Move the assignment of `dma_dev` after successfully acquiring the DMA
channel to ensure the pointer is valid before use.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68238/">CVE-2025-68238 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68238">CVE-2025-68238 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255202">SUSE bug 1255202</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568239" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68239</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68239" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68239" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68239" ref_url="https://www.suse.com/security/cve/CVE-2025-68239" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

binfmt_misc: restore write access before closing files opened by open_exec()

bm_register_write() opens an executable file using open_exec(), which
internally calls do_open_execat() and denies write access on the file to
avoid modification while it is being executed.

However, when an error occurs, bm_register_write() closes the file using
filp_close() directly. This does not restore the write permission, which
may cause subsequent write operations on the same file to fail.

Fix this by calling exe_file_allow_write_access() before filp_close() to
restore the write permission properly.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68239/">CVE-2025-68239 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68239">CVE-2025-68239 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255272">SUSE bug 1255272</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568241" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68241</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68241" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68241" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68241" ref_url="https://www.suse.com/security/cve/CVE-2025-68241" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv4: route: Prevent rt_bind_exception() from rebinding stale fnhe

The sit driver's packet transmission path calls: sit_tunnel_xmit() -&gt;
update_or_create_fnhe(), which lead to fnhe_remove_oldest() being called
to delete entries exceeding FNHE_RECLAIM_DEPTH+random.

The race window is between fnhe_remove_oldest() selecting fnheX for
deletion and the subsequent kfree_rcu(). During this time, the
concurrent path's __mkroute_output() -&gt; find_exception() can fetch the
soon-to-be-deleted fnheX, and rt_bind_exception() then binds it with a
new dst using a dst_hold(). When the original fnheX is freed via RCU,
the dst reference remains permanently leaked.

CPU 0                             CPU 1
__mkroute_output()
  find_exception() [fnheX]
                                  update_or_create_fnhe()
                                    fnhe_remove_oldest() [fnheX]
  rt_bind_exception() [bind dst]
                                  RCU callback [fnheX freed, dst leak]

This issue manifests as a device reference count leak and a warning in
dmesg when unregistering the net device:

  unregister_netdevice: waiting for sitX to become free. Usage count = N

Ido Schimmel provided the simple test validation method [1].

The fix clears 'oldest-&gt;fnhe_daddr' before calling fnhe_flush_routes().
Since rt_bind_exception() checks this field, setting it to zero prevents
the stale fnhe from being reused and bound to a new dst just before it
is freed.

[1]
ip netns add ns1
ip -n ns1 link set dev lo up
ip -n ns1 address add 192.0.2.1/32 dev lo
ip -n ns1 link add name dummy1 up type dummy
ip -n ns1 route add 192.0.2.2/32 dev dummy1
ip -n ns1 link add name gretap1 up arp off type gretap \
    local 192.0.2.1 remote 192.0.2.2
ip -n ns1 route add 198.51.0.0/16 dev gretap1
taskset -c 0 ip netns exec ns1 mausezahn gretap1 \
    -A 198.51.100.1 -B 198.51.0.0/16 -t udp -p 1000 -c 0 -q &amp;
taskset -c 2 ip netns exec ns1 mausezahn gretap1 \
    -A 198.51.100.1 -B 198.51.0.0/16 -t udp -p 1000 -c 0 -q &amp;
sleep 10
ip netns pids ns1 | xargs kill
ip netns del ns1
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68241/">CVE-2025-68241 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68241">CVE-2025-68241 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255157">SUSE bug 1255157</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568242" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68242</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68242" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68242" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68242" ref_url="https://www.suse.com/security/cve/CVE-2025-68242" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFS: Fix LTP test failures when timestamps are delegated

The utimes01 and utime06 tests fail when delegated timestamps are
enabled, specifically in subtests that modify the atime and mtime
fields using the 'nobody' user ID.

The problem can be reproduced as follow:

# echo "/media *(rw,no_root_squash,sync)" &gt;&gt; /etc/exports
# export -ra
# mount -o rw,nfsvers=4.2 127.0.0.1:/media /tmpdir
# cd /opt/ltp
# ./runltp -d /tmpdir -s utimes01
# ./runltp -d /tmpdir -s utime06

This issue occurs because nfs_setattr does not verify the inode's
UID against the caller's fsuid when delegated timestamps are
permitted for the inode.

This patch adds the UID check and if it does not match then the
request is sent to the server for permission checking.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68242/">CVE-2025-68242 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68242">CVE-2025-68242 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255186">SUSE bug 1255186</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568244" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68244</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68244" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68244" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68244" ref_url="https://www.suse.com/security/cve/CVE-2025-68244" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/i915: Avoid lock inversion when pinning to GGTT on CHV/BXT+VTD

On completion of i915_vma_pin_ww(), a synchronous variant of
dma_fence_work_commit() is called.  When pinning a VMA to GGTT address
space on a Cherry View family processor, or on a Broxton generation SoC
with VTD enabled, i.e., when stop_machine() is then called from
intel_ggtt_bind_vma(), that can potentially lead to lock inversion among
reservation_ww and cpu_hotplug locks.

[86.861179] ======================================================
[86.861193] WARNING: possible circular locking dependency detected
[86.861209] 6.15.0-rc5-CI_DRM_16515-gca0305cadc2d+ #1 Tainted: G     U
[86.861226] ------------------------------------------------------
[86.861238] i915_module_loa/1432 is trying to acquire lock:
[86.861252] ffffffff83489090 (cpu_hotplug_lock){++++}-{0:0}, at: stop_machine+0x1c/0x50
[86.861290]
but task is already holding lock:
[86.861303] ffffc90002e0b4c8 (reservation_ww_class_mutex){+.+.}-{3:3}, at: i915_vma_pin.constprop.0+0x39/0x1d0 [i915]
[86.862233]
which lock already depends on the new lock.
[86.862251]
the existing dependency chain (in reverse order) is:
[86.862265]
-&gt; #5 (reservation_ww_class_mutex){+.+.}-{3:3}:
[86.862292]        dma_resv_lockdep+0x19a/0x390
[86.862315]        do_one_initcall+0x60/0x3f0
[86.862334]        kernel_init_freeable+0x3cd/0x680
[86.862353]        kernel_init+0x1b/0x200
[86.862369]        ret_from_fork+0x47/0x70
[86.862383]        ret_from_fork_asm+0x1a/0x30
[86.862399]
-&gt; #4 (reservation_ww_class_acquire){+.+.}-{0:0}:
[86.862425]        dma_resv_lockdep+0x178/0x390
[86.862440]        do_one_initcall+0x60/0x3f0
[86.862454]        kernel_init_freeable+0x3cd/0x680
[86.862470]        kernel_init+0x1b/0x200
[86.862482]        ret_from_fork+0x47/0x70
[86.862495]        ret_from_fork_asm+0x1a/0x30
[86.862509]
-&gt; #3 (&amp;mm-&gt;mmap_lock){++++}-{3:3}:
[86.862531]        down_read_killable+0x46/0x1e0
[86.862546]        lock_mm_and_find_vma+0xa2/0x280
[86.862561]        do_user_addr_fault+0x266/0x8e0
[86.862578]        exc_page_fault+0x8a/0x2f0
[86.862593]        asm_exc_page_fault+0x27/0x30
[86.862607]        filldir64+0xeb/0x180
[86.862620]        kernfs_fop_readdir+0x118/0x480
[86.862635]        iterate_dir+0xcf/0x2b0
[86.862648]        __x64_sys_getdents64+0x84/0x140
[86.862661]        x64_sys_call+0x1058/0x2660
[86.862675]        do_syscall_64+0x91/0xe90
[86.862689]        entry_SYSCALL_64_after_hwframe+0x76/0x7e
[86.862703]
-&gt; #2 (&amp;root-&gt;kernfs_rwsem){++++}-{3:3}:
[86.862725]        down_write+0x3e/0xf0
[86.862738]        kernfs_add_one+0x30/0x3c0
[86.862751]        kernfs_create_dir_ns+0x53/0xb0
[86.862765]        internal_create_group+0x134/0x4c0
[86.862779]        sysfs_create_group+0x13/0x20
[86.862792]        topology_add_dev+0x1d/0x30
[86.862806]        cpuhp_invoke_callback+0x4b5/0x850
[86.862822]        cpuhp_issue_call+0xbf/0x1f0
[86.862836]        __cpuhp_setup_state_cpuslocked+0x111/0x320
[86.862852]        __cpuhp_setup_state+0xb0/0x220
[86.862866]        topology_sysfs_init+0x30/0x50
[86.862879]        do_one_initcall+0x60/0x3f0
[86.862893]        kernel_init_freeable+0x3cd/0x680
[86.862908]        kernel_init+0x1b/0x200
[86.862921]        ret_from_fork+0x47/0x70
[86.862934]        ret_from_fork_asm+0x1a/0x30
[86.862947]
-&gt; #1 (cpuhp_state_mutex){+.+.}-{3:3}:
[86.862969]        __mutex_lock+0xaa/0xed0
[86.862982]        mutex_lock_nested+0x1b/0x30
[86.862995]        __cpuhp_setup_state_cpuslocked+0x67/0x320
[86.863012]        __cpuhp_setup_state+0xb0/0x220
[86.863026]        page_alloc_init_cpuhp+0x2d/0x60
[86.863041]        mm_core_init+0x22/0x2d0
[86.863054]        start_kernel+0x576/0xbd0
[86.863068]        x86_64_start_reservations+0x18/0x30
[86.863084]        x86_64_start_kernel+0xbf/0x110
[86.863098]        common_startup_64+0x13e/0x141
[86.863114]
-&gt; #0 (cpu_hotplug_lock){++++}-{0:0}:
[86.863135]        __lock_acquire+0x16
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68244/">CVE-2025-68244 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68244">CVE-2025-68244 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255190">SUSE bug 1255190</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568245" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68245</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68245" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68245" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68245" ref_url="https://www.suse.com/security/cve/CVE-2025-68245" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: netpoll: fix incorrect refcount handling causing incorrect cleanup

commit efa95b01da18 ("netpoll: fix use after free") incorrectly
ignored the refcount and prematurely set dev-&gt;npinfo to NULL during
netpoll cleanup, leading to improper behavior and memory leaks.

Scenario causing lack of proper cleanup:

1) A netpoll is associated with a NIC (e.g., eth0) and netdev-&gt;npinfo is
   allocated, and refcnt = 1
   - Keep in mind that npinfo is shared among all netpoll instances. In
     this case, there is just one.

2) Another netpoll is also associated with the same NIC and
   npinfo-&gt;refcnt += 1.
   - Now dev-&gt;npinfo-&gt;refcnt = 2;
   - There is just one npinfo associated to the netdev.

3) When the first netpolls goes to clean up:
   - The first cleanup succeeds and clears np-&gt;dev-&gt;npinfo, ignoring
     refcnt.
     - It basically calls `RCU_INIT_POINTER(np-&gt;dev-&gt;npinfo, NULL);`
   - Set dev-&gt;npinfo = NULL, without proper cleanup
   - No -&gt;ndo_netpoll_cleanup() is either called

4) Now the second target tries to clean up
   - The second cleanup fails because np-&gt;dev-&gt;npinfo is already NULL.
     * In this case, ops-&gt;ndo_netpoll_cleanup() was never called, and
       the skb pool is not cleaned as well (for the second netpoll
       instance)
  - This leaks npinfo and skbpool skbs, which is clearly reported by
    kmemleak.

Revert commit efa95b01da18 ("netpoll: fix use after free") and adds
clarifying comments emphasizing that npinfo cleanup should only happen
once the refcount reaches zero, ensuring stable and correct netpoll
behavior.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68245/">CVE-2025-68245 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68245">CVE-2025-68245 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255268">SUSE bug 1255268</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568249" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68249</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68249" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68249" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68249" ref_url="https://www.suse.com/security/cve/CVE-2025-68249" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

most: usb: hdm_probe: Fix calling put_device() before device initialization

The early error path in hdm_probe() can jump to err_free_mdev before
&amp;mdev-&gt;dev has been initialized with device_initialize(). Calling
put_device(&amp;mdev-&gt;dev) there triggers a device core WARN and ends up
invoking kref_put(&amp;kobj-&gt;kref, kobject_release) on an uninitialized
kobject.

In this path the private struct was only kmalloc'ed and the intended
release is effectively kfree(mdev) anyway, so free it directly instead
of calling put_device() on an uninitialized device.

This removes the WARNING and fixes the pre-initialization error path.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68249/">CVE-2025-68249 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68249">CVE-2025-68249 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255233">SUSE bug 1255233</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568252" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68252</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68252" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68252" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68252" ref_url="https://www.suse.com/security/cve/CVE-2025-68252" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

misc: fastrpc: Fix dma_buf object leak in fastrpc_map_lookup

In fastrpc_map_lookup, dma_buf_get is called to obtain a reference to
the dma_buf for comparison purposes. However, this reference is never
released when the function returns, leading to a dma_buf memory leak.

Fix this by adding dma_buf_put before returning from the function,
ensuring that the temporarily acquired reference is properly released
regardless of whether a matching map is found.

Rule: add
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68252/">CVE-2025-68252 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68252">CVE-2025-68252 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255197">SUSE bug 1255197</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568254" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68254</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68254" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68254" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68254" ref_url="https://www.suse.com/security/cve/CVE-2025-68254" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

staging: rtl8723bs: fix out-of-bounds read in OnBeacon ESR IE parsing

The Extended Supported Rates (ESR) IE handling in OnBeacon accessed
*(p + 1 + ielen) and *(p + 2 + ielen) without verifying that these
offsets lie within the received frame buffer. A malformed beacon with
an ESR IE positioned at the end of the buffer could cause an
out-of-bounds read, potentially triggering a kernel panic.

Add a boundary check to ensure that the ESR IE body and the subsequent
bytes are within the limits of the frame before attempting to access
them.

This prevents OOB reads caused by malformed beacon frames.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68254/">CVE-2025-68254 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68254">CVE-2025-68254 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255140">SUSE bug 1255140</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568255" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68255</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68255" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68255" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68255" ref_url="https://www.suse.com/security/cve/CVE-2025-68255" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

staging: rtl8723bs: fix stack buffer overflow in OnAssocReq IE parsing

The Supported Rates IE length from an incoming Association Request frame
was used directly as the memcpy() length when copying into a fixed-size
16-byte stack buffer (supportRate). A malicious station can advertise an
IE length larger than 16 bytes, causing a stack buffer overflow.

Clamp ie_len to the buffer size before copying the Supported Rates IE,
and correct the bounds check when merging Extended Supported Rates to
prevent a second potential overflow.

This prevents kernel stack corruption triggered by malformed association
requests.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68255/">CVE-2025-68255 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68255">CVE-2025-68255 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255395">SUSE bug 1255395</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568256" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68256</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68256" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68256" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68256" ref_url="https://www.suse.com/security/cve/CVE-2025-68256" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

staging: rtl8723bs: fix out-of-bounds read in rtw_get_ie() parser

The Information Element (IE) parser rtw_get_ie() trusted the length
byte of each IE without validating that the IE body (len bytes after
the 2-byte header) fits inside the remaining frame buffer. A malformed
frame can advertise an IE length larger than the available data, causing
the parser to increment its pointer beyond the buffer end. This results
in out-of-bounds reads or, depending on the pattern, an infinite loop.

Fix by validating that (offset + 2 + len) does not exceed the limit
before accepting the IE or advancing to the next element.

This prevents OOB reads and ensures the parser terminates safely on
malformed frames.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68256/">CVE-2025-68256 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68256">CVE-2025-68256 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255138">SUSE bug 1255138</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568257" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68257</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68257" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68257" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68257" ref_url="https://www.suse.com/security/cve/CVE-2025-68257" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

comedi: check device's attached status in compat ioctls

Syzbot identified an issue [1] that crashes kernel, seemingly due to
unexistent callback dev-&gt;get_valid_routes(). By all means, this should
not occur as said callback must always be set to
get_zero_valid_routes() in __comedi_device_postconfig().

As the crash seems to appear exclusively in i386 kernels, at least,
judging from [1] reports, the blame lies with compat versions
of standard IOCTL handlers. Several of them are modified and
do not use comedi_unlocked_ioctl(). While functionality of these
ioctls essentially copy their original versions, they do not
have required sanity check for device's attached status. This,
in turn, leads to a possibility of calling select IOCTLs on a
device that has not been properly setup, even via COMEDI_DEVCONFIG.

Doing so on unconfigured devices means that several crucial steps
are missed, for instance, specifying dev-&gt;get_valid_routes()
callback.

Fix this somewhat crudely by ensuring device's attached status before
performing any ioctls, improving logic consistency between modern
and compat functions.

[1] Syzbot report:
BUG: kernel NULL pointer dereference, address: 0000000000000000
...
CR2: ffffffffffffffd6 CR3: 000000006c717000 CR4: 0000000000352ef0
Call Trace:
 &lt;TASK&gt;
 get_valid_routes drivers/comedi/comedi_fops.c:1322 [inline]
 parse_insn+0x78c/0x1970 drivers/comedi/comedi_fops.c:1401
 do_insnlist_ioctl+0x272/0x700 drivers/comedi/comedi_fops.c:1594
 compat_insnlist drivers/comedi/comedi_fops.c:3208 [inline]
 comedi_compat_ioctl+0x810/0x990 drivers/comedi/comedi_fops.c:3273
 __do_compat_sys_ioctl fs/ioctl.c:695 [inline]
 __se_compat_sys_ioctl fs/ioctl.c:638 [inline]
 __ia32_compat_sys_ioctl+0x242/0x370 fs/ioctl.c:638
 do_syscall_32_irqs_on arch/x86/entry/syscall_32.c:83 [inline]
...
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68257/">CVE-2025-68257 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68257">CVE-2025-68257 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255167">SUSE bug 1255167</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568258" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68258</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68258" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68258" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68258" ref_url="https://www.suse.com/security/cve/CVE-2025-68258" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

comedi: multiq3: sanitize config options in multiq3_attach()

Syzbot identified an issue [1] in multiq3_attach() that induces a
task timeout due to open() or COMEDI_DEVCONFIG ioctl operations,
specifically, in the case of multiq3 driver.

This problem arose when syzkaller managed to craft weird configuration
options used to specify the number of channels in encoder subdevice.
If a particularly great number is passed to s-&gt;n_chan in
multiq3_attach() via it-&gt;options[2], then multiple calls to
multiq3_encoder_reset() at the end of driver-specific attach() method
will be running for minutes, thus blocking tasks and affected devices
as well.

While this issue is most likely not too dangerous for real-life
devices, it still makes sense to sanitize configuration inputs. Enable
a sensible limit on the number of encoder chips (4 chips max, each
with 2 channels) to stop this behaviour from manifesting.

[1] Syzbot crash:
INFO: task syz.2.19:6067 blocked for more than 143 seconds.
...
Call Trace:
 &lt;TASK&gt;
 context_switch kernel/sched/core.c:5254 [inline]
 __schedule+0x17c4/0x4d60 kernel/sched/core.c:6862
 __schedule_loop kernel/sched/core.c:6944 [inline]
 schedule+0x165/0x360 kernel/sched/core.c:6959
 schedule_preempt_disabled+0x13/0x30 kernel/sched/core.c:7016
 __mutex_lock_common kernel/locking/mutex.c:676 [inline]
 __mutex_lock+0x7e6/0x1350 kernel/locking/mutex.c:760
 comedi_open+0xc0/0x590 drivers/comedi/comedi_fops.c:2868
 chrdev_open+0x4cc/0x5e0 fs/char_dev.c:414
 do_dentry_open+0x953/0x13f0 fs/open.c:965
 vfs_open+0x3b/0x340 fs/open.c:1097
...
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68258/">CVE-2025-68258 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68258">CVE-2025-68258 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255182">SUSE bug 1255182</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568259" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68259</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68259" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68259" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68259" ref_url="https://www.suse.com/security/cve/CVE-2025-68259" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: SVM: Don't skip unrelated instruction if INT3/INTO is replaced

When re-injecting a soft interrupt from an INT3, INT0, or (select) INTn
instruction, discard the exception and retry the instruction if the code
stream is changed (e.g. by a different vCPU) between when the CPU
executes the instruction and when KVM decodes the instruction to get the
next RIP.

As effectively predicted by commit 6ef88d6e36c2 ("KVM: SVM: Re-inject
INT3/INTO instead of retrying the instruction"), failure to verify that
the correct INTn instruction was decoded can effectively clobber guest
state due to decoding the wrong instruction and thus specifying the
wrong next RIP.

The bug most often manifests as "Oops: int3" panics on static branch
checks in Linux guests.  Enabling or disabling a static branch in Linux
uses the kernel's "text poke" code patching mechanism.  To modify code
while other CPUs may be executing that code, Linux (temporarily)
replaces the first byte of the original instruction with an int3 (opcode
0xcc), then patches in the new code stream except for the first byte,
and finally replaces the int3 with the first byte of the new code
stream.  If a CPU hits the int3, i.e. executes the code while it's being
modified, then the guest kernel must look up the RIP to determine how to
handle the #BP, e.g. by emulating the new instruction.  If the RIP is
incorrect, then this lookup fails and the guest kernel panics.

The bug reproduces almost instantly by hacking the guest kernel to
repeatedly check a static branch[1] while running a drgn script[2] on
the host to constantly swap out the memory containing the guest's TSS.

[1]: https://gist.github.com/osandov/44d17c51c28c0ac998ea0334edf90b5a
[2]: https://gist.github.com/osandov/10e45e45afa29b11e0c7209247afc00b
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68259/">CVE-2025-68259 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68259">CVE-2025-68259 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255199">SUSE bug 1255199</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568261" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68261</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68261" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68261" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68261" ref_url="https://www.suse.com/security/cve/CVE-2025-68261" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: add i_data_sem protection in ext4_destroy_inline_data_nolock()

Fix a race between inline data destruction and block mapping.

The function ext4_destroy_inline_data_nolock() changes the inode data
layout by clearing EXT4_INODE_INLINE_DATA and setting EXT4_INODE_EXTENTS.
At the same time, another thread may execute ext4_map_blocks(), which
tests EXT4_INODE_EXTENTS to decide whether to call ext4_ext_map_blocks()
or ext4_ind_map_blocks().

Without i_data_sem protection, ext4_ind_map_blocks() may receive inode
with EXT4_INODE_EXTENTS flag and triggering assert.

kernel BUG at fs/ext4/indirect.c:546!
EXT4-fs (loop2): unmounting filesystem.
invalid opcode: 0000 [#1] PREEMPT SMP KASAN NOPTI
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
RIP: 0010:ext4_ind_map_blocks.cold+0x2b/0x5a fs/ext4/indirect.c:546

Call Trace:
 &lt;TASK&gt;
 ext4_map_blocks+0xb9b/0x16f0 fs/ext4/inode.c:681
 _ext4_get_block+0x242/0x590 fs/ext4/inode.c:822
 ext4_block_write_begin+0x48b/0x12c0 fs/ext4/inode.c:1124
 ext4_write_begin+0x598/0xef0 fs/ext4/inode.c:1255
 ext4_da_write_begin+0x21e/0x9c0 fs/ext4/inode.c:3000
 generic_perform_write+0x259/0x5d0 mm/filemap.c:3846
 ext4_buffered_write_iter+0x15b/0x470 fs/ext4/file.c:285
 ext4_file_write_iter+0x8e0/0x17f0 fs/ext4/file.c:679
 call_write_iter include/linux/fs.h:2271 [inline]
 do_iter_readv_writev+0x212/0x3c0 fs/read_write.c:735
 do_iter_write+0x186/0x710 fs/read_write.c:861
 vfs_iter_write+0x70/0xa0 fs/read_write.c:902
 iter_file_splice_write+0x73b/0xc90 fs/splice.c:685
 do_splice_from fs/splice.c:763 [inline]
 direct_splice_actor+0x10f/0x170 fs/splice.c:950
 splice_direct_to_actor+0x33a/0xa10 fs/splice.c:896
 do_splice_direct+0x1a9/0x280 fs/splice.c:1002
 do_sendfile+0xb13/0x12c0 fs/read_write.c:1255
 __do_sys_sendfile64 fs/read_write.c:1323 [inline]
 __se_sys_sendfile64 fs/read_write.c:1309 [inline]
 __x64_sys_sendfile64+0x1cf/0x210 fs/read_write.c:1309
 do_syscall_x64 arch/x86/entry/common.c:51 [inline]
 do_syscall_64+0x35/0x80 arch/x86/entry/common.c:81
 entry_SYSCALL_64_after_hwframe+0x6e/0xd8
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68261/">CVE-2025-68261 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68261">CVE-2025-68261 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255164">SUSE bug 1255164</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568264" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68264</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68264" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68264" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68264" ref_url="https://www.suse.com/security/cve/CVE-2025-68264" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: refresh inline data size before write operations

The cached ei-&gt;i_inline_size can become stale between the initial size
check and when ext4_update_inline_data()/ext4_create_inline_data() use
it. Although ext4_get_max_inline_size() reads the correct value at the
time of the check, concurrent xattr operations can modify i_inline_size
before ext4_write_lock_xattr() is acquired.

This causes ext4_update_inline_data() and ext4_create_inline_data() to
work with stale capacity values, leading to a BUG_ON() crash in
ext4_write_inline_data():

  kernel BUG at fs/ext4/inline.c:1331!
  BUG_ON(pos + len &gt; EXT4_I(inode)-&gt;i_inline_size);

The race window:
1. ext4_get_max_inline_size() reads i_inline_size = 60 (correct)
2. Size check passes for 50-byte write
3. [Another thread adds xattr, i_inline_size changes to 40]
4. ext4_write_lock_xattr() acquires lock
5. ext4_update_inline_data() uses stale i_inline_size = 60
6. Attempts to write 50 bytes but only 40 bytes actually available
7. BUG_ON() triggers

Fix this by recalculating i_inline_size via ext4_find_inline_data_nolock()
immediately after acquiring xattr_sem. This ensures ext4_update_inline_data()
and ext4_create_inline_data() work with current values that are protected
from concurrent modifications.

This is similar to commit a54c4613dac1 ("ext4: fix race writing to an
inline_data file while its xattrs are changing") which fixed i_inline_off
staleness. This patch addresses the related i_inline_size staleness issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68264/">CVE-2025-68264 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68264">CVE-2025-68264 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255380">SUSE bug 1255380</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568276" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68276</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68276" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68276" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68276" ref_url="https://www.suse.com/security/cve/CVE-2025-68276" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024497.html" source="SUSE-SU"/>
    <description>
    Avahi is a system which facilitates service discovery on a local network via the mDNS/DNS-SD protocol suite. In 0.9-rc2 and earlier, an unprivileged local users can crash avahi-daemon (with wide-area disabled) by creating record browsers with the AVAHI_LOOKUP_USE_WIDE_AREA flag set via D-Bus. This can be done by either calling
the RecordBrowserNew method directly or creating hostname/address/service resolvers/browsers that create those browsers internally themselves.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-27"/>
	<updated date="2026-03-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68276/">CVE-2025-68276 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68276">CVE-2025-68276 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256498">SUSE bug 1256498</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040025" comment="avahi-0.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151208" comment="avahi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040026" comment="avahi-autoipd-0.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151209" comment="avahi-autoipd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040027" comment="avahi-compat-howl-devel-0.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243729" comment="avahi-compat-howl-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040028" comment="avahi-compat-mDNSResponder-devel-0.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151210" comment="avahi-compat-mDNSResponder-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040029" comment="avahi-lang-0.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151211" comment="avahi-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040030" comment="avahi-utils-0.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243733" comment="avahi-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040031" comment="avahi-utils-gtk-0.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243734" comment="avahi-utils-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040032" comment="libavahi-client3-0.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151212" comment="libavahi-client3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040033" comment="libavahi-common3-0.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151214" comment="libavahi-common3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040034" comment="libavahi-core7-0.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151216" comment="libavahi-core7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040035" comment="libavahi-devel-0.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151217" comment="libavahi-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040036" comment="libavahi-glib-devel-0.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243735" comment="libavahi-glib-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040037" comment="libavahi-glib1-0.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243736" comment="libavahi-glib1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040038" comment="libavahi-gobject-devel-0.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243738" comment="libavahi-gobject-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040039" comment="libavahi-gobject0-0.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243739" comment="libavahi-gobject0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040040" comment="libavahi-libevent1-0.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009755253" comment="libavahi-libevent1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040041" comment="libavahi-qt6-1-0.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037217" comment="libavahi-qt6-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040042" comment="libavahi-qt6-devel-0.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037218" comment="libavahi-qt6-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040043" comment="libavahi-ui-gtk3-0-0.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243742" comment="libavahi-ui-gtk3-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040044" comment="libdns_sd-0.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151218" comment="libdns_sd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040045" comment="libhowl0-0.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243745" comment="libhowl0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040046" comment="python3-avahi-gtk-0.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009346637" comment="python3-avahi-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040047" comment="python313-avahi-0.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037219" comment="python313-avahi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040048" comment="typelib-1_0-Avahi-0_6-0.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243748" comment="typelib-1_0-Avahi-0_6 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568283" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68283</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68283" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68283" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68283" ref_url="https://www.suse.com/security/cve/CVE-2025-68283" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

libceph: replace BUG_ON with bounds check for map-&gt;max_osd

OSD indexes come from untrusted network packets. Boundary checks are
added to validate these against map-&gt;max_osd.

[ idryomov: drop BUG_ON in ceph_get_primary_affinity(), minor cosmetic
  edits ]
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68283/">CVE-2025-68283 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68283">CVE-2025-68283 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255379">SUSE bug 1255379</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568284" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68284</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68284" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68284" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68284" ref_url="https://www.suse.com/security/cve/CVE-2025-68284" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0944-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0992-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1132-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1136-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20817-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20887-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20888-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20889-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20897-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20898-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20899-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20900-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20944-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20945-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20946-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045205.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

libceph: prevent potential out-of-bounds writes in handle_auth_session_key()

The len field originates from untrusted network packets. Boundary
checks have been added to prevent potential out-of-bounds writes when
decrypting the connection secret or processing service tickets.

[ idryomov: changelog ]
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-04-02"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="7/CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68284/">CVE-2025-68284 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68284">CVE-2025-68284 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255377">SUSE bug 1255377</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255378">SUSE bug 1255378</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68285</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68285" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68285" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68285" ref_url="https://www.suse.com/security/cve/CVE-2025-68285" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0755" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002421.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0793" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0944-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0970-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024807.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0992-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024930.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1132-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1136-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20817-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20887-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20888-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20889-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20897-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20898-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20899-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20900-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20944-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20945-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20946-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045205.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

libceph: fix potential use-after-free in have_mon_and_osd_map()

The wait loop in __ceph_open_session() can race with the client
receiving a new monmap or osdmap shortly after the initial map is
received.  Both ceph_monc_handle_map() and handle_one_map() install
a new map immediately after freeing the old one

    kfree(monc-&gt;monmap);
    monc-&gt;monmap = monmap;

    ceph_osdmap_destroy(osdc-&gt;osdmap);
    osdc-&gt;osdmap = newmap;

under client-&gt;monc.mutex and client-&gt;osdc.lock respectively, but
because neither is taken in have_mon_and_osd_map() it's possible for
client-&gt;monc.monmap-&gt;epoch and client-&gt;osdc.osdmap-&gt;epoch arms in

    client-&gt;monc.monmap &amp;&amp; client-&gt;monc.monmap-&gt;epoch &amp;&amp;
        client-&gt;osdc.osdmap &amp;&amp; client-&gt;osdc.osdmap-&gt;epoch;

condition to dereference an already freed map.  This happens to be
reproducible with generic/395 and generic/397 with KASAN enabled:

    BUG: KASAN: slab-use-after-free in have_mon_and_osd_map+0x56/0x70
    Read of size 4 at addr ffff88811012d810 by task mount.ceph/13305
    CPU: 2 UID: 0 PID: 13305 Comm: mount.ceph Not tainted 6.14.0-rc2-build2+ #1266
    ...
    Call Trace:
    &lt;TASK&gt;
    have_mon_and_osd_map+0x56/0x70
    ceph_open_session+0x182/0x290
    ceph_get_tree+0x333/0x680
    vfs_get_tree+0x49/0x180
    do_new_mount+0x1a3/0x2d0
    path_mount+0x6dd/0x730
    do_mount+0x99/0xe0
    __do_sys_mount+0x141/0x180
    do_syscall_64+0x9f/0x100
    entry_SYSCALL_64_after_hwframe+0x76/0x7e
    &lt;/TASK&gt;

    Allocated by task 13305:
    ceph_osdmap_alloc+0x16/0x130
    ceph_osdc_init+0x27a/0x4c0
    ceph_create_client+0x153/0x190
    create_fs_client+0x50/0x2a0
    ceph_get_tree+0xff/0x680
    vfs_get_tree+0x49/0x180
    do_new_mount+0x1a3/0x2d0
    path_mount+0x6dd/0x730
    do_mount+0x99/0xe0
    __do_sys_mount+0x141/0x180
    do_syscall_64+0x9f/0x100
    entry_SYSCALL_64_after_hwframe+0x76/0x7e

    Freed by task 9475:
    kfree+0x212/0x290
    handle_one_map+0x23c/0x3b0
    ceph_osdc_handle_map+0x3c9/0x590
    mon_dispatch+0x655/0x6f0
    ceph_con_process_message+0xc3/0xe0
    ceph_con_v1_try_read+0x614/0x760
    ceph_con_workfn+0x2de/0x650
    process_one_work+0x486/0x7c0
    process_scheduled_works+0x73/0x90
    worker_thread+0x1c8/0x2a0
    kthread+0x2ec/0x300
    ret_from_fork+0x24/0x40
    ret_from_fork_asm+0x1a/0x30

Rewrite the wait loop to check the above condition directly with
client-&gt;monc.mutex and client-&gt;osdc.lock taken as appropriate.  While
at it, improve the timeout handling (previously mount_timeout could be
exceeded in case wait_event_interruptible_timeout() slept more than
once) and access client-&gt;auth_err under client-&gt;monc.mutex to match
how it's set in finish_auth().

monmap_show() and osdmap_show() now take the respective lock before
accessing the map as well.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68285/">CVE-2025-68285 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68285">CVE-2025-68285 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255401">SUSE bug 1255401</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255402">SUSE bug 1255402</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568286" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68286</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68286" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68286" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68286" ref_url="https://www.suse.com/security/cve/CVE-2025-68286" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/display: Check NULL before accessing

[WHAT]
IGT kms_cursor_legacy's long-nonblocking-modeset-vs-cursor-atomic
fails with NULL pointer dereference. This can be reproduced with
both an eDP panel and a DP monitors connected.

 BUG: kernel NULL pointer dereference, address: 0000000000000000
 #PF: supervisor read access in kernel mode
 #PF: error_code(0x0000) - not-present page
 PGD 0 P4D 0
 Oops: Oops: 0000 [#1] SMP NOPTI
 CPU: 13 UID: 0 PID: 2960 Comm: kms_cursor_lega Not tainted
6.16.0-99-custom #8 PREEMPT(voluntary)
 Hardware name: AMD ........
 RIP: 0010:dc_stream_get_scanoutpos+0x34/0x130 [amdgpu]
 Code: 57 4d 89 c7 41 56 49 89 ce 41 55 49 89 d5 41 54 49
 89 fc 53 48 83 ec 18 48 8b 87 a0 64 00 00 48 89 75 d0 48 c7 c6 e0 41 30
 c2 &lt;48&gt; 8b 38 48 8b 9f 68 06 00 00 e8 8d d7 fd ff 31 c0 48 81 c3 e0 02
 RSP: 0018:ffffd0f3c2bd7608 EFLAGS: 00010292
 RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffd0f3c2bd7668
 RDX: ffffd0f3c2bd7664 RSI: ffffffffc23041e0 RDI: ffff8b32494b8000
 RBP: ffffd0f3c2bd7648 R08: ffffd0f3c2bd766c R09: ffffd0f3c2bd7760
 R10: ffffd0f3c2bd7820 R11: 0000000000000000 R12: ffff8b32494b8000
 R13: ffffd0f3c2bd7664 R14: ffffd0f3c2bd7668 R15: ffffd0f3c2bd766c
 FS:  000071f631b68700(0000) GS:ffff8b399f114000(0000)
knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: 0000000000000000 CR3: 00000001b8105000 CR4: 0000000000f50ef0
 PKRU: 55555554
 Call Trace:
 &lt;TASK&gt;
 dm_crtc_get_scanoutpos+0xd7/0x180 [amdgpu]
 amdgpu_display_get_crtc_scanoutpos+0x86/0x1c0 [amdgpu]
 ? __pfx_amdgpu_crtc_get_scanout_position+0x10/0x10[amdgpu]
 amdgpu_crtc_get_scanout_position+0x27/0x50 [amdgpu]
 drm_crtc_vblank_helper_get_vblank_timestamp_internal+0xf7/0x400
 drm_crtc_vblank_helper_get_vblank_timestamp+0x1c/0x30
 drm_crtc_get_last_vbltimestamp+0x55/0x90
 drm_crtc_next_vblank_start+0x45/0xa0
 drm_atomic_helper_wait_for_fences+0x81/0x1f0
 ...

(cherry picked from commit 621e55f1919640acab25383362b96e65f2baea3c)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68286/">CVE-2025-68286 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68286">CVE-2025-68286 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255351">SUSE bug 1255351</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568287" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68287</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68287" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68287" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68287" ref_url="https://www.suse.com/security/cve/CVE-2025-68287" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0793" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: dwc3: Fix race condition between concurrent dwc3_remove_requests() call paths

This patch addresses a race condition caused by unsynchronized
execution of multiple call paths invoking `dwc3_remove_requests()`,
leading to premature freeing of USB requests and subsequent crashes.

Three distinct execution paths interact with `dwc3_remove_requests()`:
Path 1:
Triggered via `dwc3_gadget_reset_interrupt()` during USB reset
handling. The call stack includes:
- `dwc3_ep0_reset_state()`
- `dwc3_ep0_stall_and_restart()`
- `dwc3_ep0_out_start()`
- `dwc3_remove_requests()`
- `dwc3_gadget_del_and_unmap_request()`

Path 2:
Also initiated from `dwc3_gadget_reset_interrupt()`, but through
`dwc3_stop_active_transfers()`. The call stack includes:
- `dwc3_stop_active_transfers()`
- `dwc3_remove_requests()`
- `dwc3_gadget_del_and_unmap_request()`

Path 3:
Occurs independently during `adb root` execution, which triggers
USB function unbind and bind operations. The sequence includes:
- `gserial_disconnect()`
- `usb_ep_disable()`
- `dwc3_gadget_ep_disable()`
- `dwc3_remove_requests()` with `-ESHUTDOWN` status

Path 3 operates asynchronously and lacks synchronization with Paths
1 and 2. When Path 3 completes, it disables endpoints and frees 'out'
requests. If Paths 1 or 2 are still processing these requests,
accessing freed memory leads to a crash due to use-after-free conditions.

To fix this added check for request completion and skip processing
if already completed and added the request status for ep0 while queue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68287/">CVE-2025-68287 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68287">CVE-2025-68287 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255152">SUSE bug 1255152</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568289" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68289</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68289" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68289" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68289" ref_url="https://www.suse.com/security/cve/CVE-2025-68289" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: gadget: f_eem: Fix memory leak in eem_unwrap

The existing code did not handle the failure case of usb_ep_queue in the
command path, potentially leading to memory leaks.

Improve error handling to free all allocated resources on usb_ep_queue
failure. This patch continues to use goto logic for error handling, as the
existing error handling is complex and not easily adaptable to auto-cleanup
helpers.

kmemleak results:
  unreferenced object 0xffffff895a512300 (size 240):
    backtrace:
      slab_post_alloc_hook+0xbc/0x3a4
      kmem_cache_alloc+0x1b4/0x358
      skb_clone+0x90/0xd8
      eem_unwrap+0x1cc/0x36c
  unreferenced object 0xffffff8a157f4000 (size 256):
    backtrace:
      slab_post_alloc_hook+0xbc/0x3a4
      __kmem_cache_alloc_node+0x1b4/0x2dc
      kmalloc_trace+0x48/0x140
      dwc3_gadget_ep_alloc_request+0x58/0x11c
      usb_ep_alloc_request+0x40/0xe4
      eem_unwrap+0x204/0x36c
  unreferenced object 0xffffff8aadbaac00 (size 128):
    backtrace:
      slab_post_alloc_hook+0xbc/0x3a4
      __kmem_cache_alloc_node+0x1b4/0x2dc
      __kmalloc+0x64/0x1a8
      eem_unwrap+0x218/0x36c
  unreferenced object 0xffffff89ccef3500 (size 64):
    backtrace:
      slab_post_alloc_hook+0xbc/0x3a4
      __kmem_cache_alloc_node+0x1b4/0x2dc
      kmalloc_trace+0x48/0x140
      eem_unwrap+0x238/0x36c
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68289/">CVE-2025-68289 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68289">CVE-2025-68289 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255155">SUSE bug 1255155</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568290" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68290</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68290" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68290" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68290" ref_url="https://www.suse.com/security/cve/CVE-2025-68290" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

most: usb: fix double free on late probe failure

The MOST subsystem has a non-standard registration function which frees
the interface on registration failures and on deregistration.

This unsurprisingly leads to bugs in the MOST drivers, and a couple of
recent changes turned a reference underflow and use-after-free in the
USB driver into several double free and a use-after-free on late probe
failures.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68290/">CVE-2025-68290 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68290">CVE-2025-68290 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255154">SUSE bug 1255154</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568292" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68292</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68292" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68292" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68292" ref_url="https://www.suse.com/security/cve/CVE-2025-68292" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/memfd: fix information leak in hugetlb folios

When allocating hugetlb folios for memfd, three initialization steps are
missing:

1. Folios are not zeroed, leading to kernel memory disclosure to userspace
2. Folios are not marked uptodate before adding to page cache
3. hugetlb_fault_mutex is not taken before hugetlb_add_to_page_cache()

The memfd allocation path bypasses the normal page fault handler
(hugetlb_no_page) which would handle all of these initialization steps. 
This is problematic especially for udmabuf use cases where folios are
pinned and directly accessed by userspace via DMA.

Fix by matching the initialization pattern used in hugetlb_no_page():
- Zero the folio using folio_zero_user() which is optimized for huge pages
- Mark it uptodate with folio_mark_uptodate()
- Take hugetlb_fault_mutex before adding to page cache to prevent races

The folio_zero_user() change also fixes a potential security issue where
uninitialized kernel memory could be disclosed to userspace through read()
or mmap() operations on the memfd.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68292/">CVE-2025-68292 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68292">CVE-2025-68292 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255148">SUSE bug 1255148</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568293" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68293</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68293" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68293" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68293" ref_url="https://www.suse.com/security/cve/CVE-2025-68293" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/huge_memory: fix NULL pointer deference when splitting folio

Commit c010d47f107f ("mm: thp: split huge page to any lower order pages")
introduced an early check on the folio's order via mapping-&gt;flags before
proceeding with the split work.

This check introduced a bug: for shmem folios in the swap cache and
truncated folios, the mapping pointer can be NULL.  Accessing
mapping-&gt;flags in this state leads directly to a NULL pointer dereference.

This commit fixes the issue by moving the check for mapping != NULL before
any attempt to access mapping-&gt;flags.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68293/">CVE-2025-68293 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68293">CVE-2025-68293 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255150">SUSE bug 1255150</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568295" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68295</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68295" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68295" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68295" ref_url="https://www.suse.com/security/cve/CVE-2025-68295" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: client: fix memory leak in cifs_construct_tcon()

When having a multiuser mount with domain= specified and using
cifscreds, cifs_set_cifscreds() will end up setting @ctx-&gt;domainname,
so it needs to be freed before leaving cifs_construct_tcon().

This fixes the following memory leak reported by kmemleak:

  mount.cifs //srv/share /mnt -o domain=ZELDA,multiuser,...
  su - testuser
  cifscreds add -d ZELDA -u testuser
  ...
  ls /mnt/1
  ...
  umount /mnt
  echo scan &gt; /sys/kernel/debug/kmemleak
  cat /sys/kernel/debug/kmemleak
  unreferenced object 0xffff8881203c3f08 (size 8):
    comm "ls", pid 5060, jiffies 4307222943
    hex dump (first 8 bytes):
      5a 45 4c 44 41 00 cc cc                          ZELDA...
    backtrace (crc d109a8cf):
      __kmalloc_node_track_caller_noprof+0x572/0x710
      kstrdup+0x3a/0x70
      cifs_sb_tlink+0x1209/0x1770 [cifs]
      cifs_get_fattr+0xe1/0xf50 [cifs]
      cifs_get_inode_info+0xb5/0x240 [cifs]
      cifs_revalidate_dentry_attr+0x2d1/0x470 [cifs]
      cifs_getattr+0x28e/0x450 [cifs]
      vfs_getattr_nosec+0x126/0x180
      vfs_statx+0xf6/0x220
      do_statx+0xab/0x110
      __x64_sys_statx+0xd5/0x130
      do_syscall_64+0xbb/0x380
      entry_SYSCALL_64_after_hwframe+0x77/0x7f
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68295/">CVE-2025-68295 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68295">CVE-2025-68295 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255129">SUSE bug 1255129</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568296" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68296</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68296" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68296" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68296" ref_url="https://www.suse.com/security/cve/CVE-2025-68296" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm, fbcon, vga_switcheroo: Avoid race condition in fbcon setup

Protect vga_switcheroo_client_fb_set() with console lock. Avoids OOB
access in fbcon_remap_all(). Without holding the console lock the call
races with switching outputs.

VGA switcheroo calls fbcon_remap_all() when switching clients. The fbcon
function uses struct fb_info.node, which is set by register_framebuffer().
As the fb-helper code currently sets up VGA switcheroo before registering
the framebuffer, the value of node is -1 and therefore not a legal value.
For example, fbcon uses the value within set_con2fb_map() [1] as an index
into an array.

Moving vga_switcheroo_client_fb_set() after register_framebuffer() can
result in VGA switching that does not switch fbcon correctly.

Therefore move vga_switcheroo_client_fb_set() under fbcon_fb_registered(),
which already holds the console lock. Fbdev calls fbcon_fb_registered()
from within register_framebuffer(). Serializes the helper with VGA
switcheroo's call to fbcon_remap_all().

Although vga_switcheroo_client_fb_set() takes an instance of struct fb_info
as parameter, it really only needs the contained fbcon state. Moving the
call to fbcon initialization is therefore cleaner than before. Only amdgpu,
i915, nouveau and radeon support vga_switcheroo. For all other drivers,
this change does nothing.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68296/">CVE-2025-68296 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68296">CVE-2025-68296 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255128">SUSE bug 1255128</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568297" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68297</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68297" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68297" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68297" ref_url="https://www.suse.com/security/cve/CVE-2025-68297" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ceph: fix crash in process_v2_sparse_read() for encrypted directories

The crash in process_v2_sparse_read() for fscrypt-encrypted directories
has been reported. Issue takes place for Ceph msgr2 protocol in secure
mode. It can be reproduced by the steps:

sudo mount -t ceph :/ /mnt/cephfs/ -o name=admin,fs=cephfs,ms_mode=secure

(1) mkdir /mnt/cephfs/fscrypt-test-3
(2) cp area_decrypted.tar /mnt/cephfs/fscrypt-test-3
(3) fscrypt encrypt --source=raw_key --key=./my.key /mnt/cephfs/fscrypt-test-3
(4) fscrypt lock /mnt/cephfs/fscrypt-test-3
(5) fscrypt unlock --key=my.key /mnt/cephfs/fscrypt-test-3
(6) cat /mnt/cephfs/fscrypt-test-3/area_decrypted.tar
(7) Issue has been triggered

[  408.072247] ------------[ cut here ]------------
[  408.072251] WARNING: CPU: 1 PID: 392 at net/ceph/messenger_v2.c:865
ceph_con_v2_try_read+0x4b39/0x72f0
[  408.072267] Modules linked in: intel_rapl_msr intel_rapl_common
intel_uncore_frequency_common intel_pmc_core pmt_telemetry pmt_discovery
pmt_class intel_pmc_ssram_telemetry intel_vsec kvm_intel joydev kvm irqbypass
polyval_clmulni ghash_clmulni_intel aesni_intel rapl input_leds psmouse
serio_raw i2c_piix4 vga16fb bochs vgastate i2c_smbus floppy mac_hid qemu_fw_cfg
pata_acpi sch_fq_codel rbd msr parport_pc ppdev lp parport efi_pstore
[  408.072304] CPU: 1 UID: 0 PID: 392 Comm: kworker/1:3 Not tainted 6.17.0-rc7+
[  408.072307] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS
1.17.0-5.fc42 04/01/2014
[  408.072310] Workqueue: ceph-msgr ceph_con_workfn
[  408.072314] RIP: 0010:ceph_con_v2_try_read+0x4b39/0x72f0
[  408.072317] Code: c7 c1 20 f0 d4 ae 50 31 d2 48 c7 c6 60 27 d5 ae 48 c7 c7 f8
8e 6f b0 68 60 38 d5 ae e8 00 47 61 fe 48 83 c4 18 e9 ac fc ff ff &lt;0f&gt; 0b e9 06
fe ff ff 4c 8b 9d 98 fd ff ff 0f 84 64 e7 ff ff 89 85
[  408.072319] RSP: 0018:ffff88811c3e7a30 EFLAGS: 00010246
[  408.072322] RAX: ffffed1024874c6f RBX: ffffea00042c2b40 RCX: 0000000000000f38
[  408.072324] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[  408.072325] RBP: ffff88811c3e7ca8 R08: 0000000000000000 R09: 00000000000000c8
[  408.072326] R10: 00000000000000c8 R11: 0000000000000000 R12: 00000000000000c8
[  408.072327] R13: dffffc0000000000 R14: ffff8881243a6030 R15: 0000000000003000
[  408.072329] FS:  0000000000000000(0000) GS:ffff88823eadf000(0000)
knlGS:0000000000000000
[  408.072331] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[  408.072332] CR2: 000000c0003c6000 CR3: 000000010c106005 CR4: 0000000000772ef0
[  408.072336] PKRU: 55555554
[  408.072337] Call Trace:
[  408.072338]  &lt;TASK&gt;
[  408.072340]  ? sched_clock_noinstr+0x9/0x10
[  408.072344]  ? __pfx_ceph_con_v2_try_read+0x10/0x10
[  408.072347]  ? _raw_spin_unlock+0xe/0x40
[  408.072349]  ? finish_task_switch.isra.0+0x15d/0x830
[  408.072353]  ? __kasan_check_write+0x14/0x30
[  408.072357]  ? mutex_lock+0x84/0xe0
[  408.072359]  ? __pfx_mutex_lock+0x10/0x10
[  408.072361]  ceph_con_workfn+0x27e/0x10e0
[  408.072364]  ? metric_delayed_work+0x311/0x2c50
[  408.072367]  process_one_work+0x611/0xe20
[  408.072371]  ? __kasan_check_write+0x14/0x30
[  408.072373]  worker_thread+0x7e3/0x1580
[  408.072375]  ? __pfx__raw_spin_lock_irqsave+0x10/0x10
[  408.072378]  ? __pfx_worker_thread+0x10/0x10
[  408.072381]  kthread+0x381/0x7a0
[  408.072383]  ? __pfx__raw_spin_lock_irq+0x10/0x10
[  408.072385]  ? __pfx_kthread+0x10/0x10
[  408.072387]  ? __kasan_check_write+0x14/0x30
[  408.072389]  ? recalc_sigpending+0x160/0x220
[  408.072392]  ? _raw_spin_unlock_irq+0xe/0x50
[  408.072394]  ? calculate_sigpending+0x78/0xb0
[  408.072395]  ? __pfx_kthread+0x10/0x10
[  408.072397]  ret_from_fork+0x2b6/0x380
[  408.072400]  ? __pfx_kthread+0x10/0x10
[  408.072402]  ret_from_fork_asm+0x1a/0x30
[  408.072406]  &lt;/TASK&gt;
[  408.072407] ---[ end trace 0000000000000000 ]---
[  408.072418] Oops: general protection fault, probably for non-canonical
address 0xdffffc00000000
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68297/">CVE-2025-68297 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68297">CVE-2025-68297 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255403">SUSE bug 1255403</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568298" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68298</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68298" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68298" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68298" ref_url="https://www.suse.com/security/cve/CVE-2025-68298" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: btusb: mediatek: Avoid btusb_mtk_claim_iso_intf() NULL deref

In btusb_mtk_setup(), we set `btmtk_data-&gt;isopkt_intf` to:
  usb_ifnum_to_if(data-&gt;udev, MTK_ISO_IFNUM)

That function can return NULL in some cases. Even when it returns
NULL, though, we still go on to call btusb_mtk_claim_iso_intf().

As of commit e9087e828827 ("Bluetooth: btusb: mediatek: Add locks for
usb_driver_claim_interface()"), calling btusb_mtk_claim_iso_intf()
when `btmtk_data-&gt;isopkt_intf` is NULL will cause a crash because
we'll end up passing a bad pointer to device_lock(). Prior to that
commit we'd pass the NULL pointer directly to
usb_driver_claim_interface() which would detect it and return an
error, which was handled.

Resolve the crash in btusb_mtk_claim_iso_intf() by adding a NULL check
at the start of the function. This makes the code handle a NULL
`btmtk_data-&gt;isopkt_intf` the same way it did before the problematic
commit (just with a slight change to the error message printed).
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68298/">CVE-2025-68298 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68298">CVE-2025-68298 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255124">SUSE bug 1255124</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568301" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68301</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68301" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68301" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68301" ref_url="https://www.suse.com/security/cve/CVE-2025-68301" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0759" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002404.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1143" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003191.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1703" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: atlantic: fix fragment overflow handling in RX path

The atlantic driver can receive packets with more than MAX_SKB_FRAGS (17)
fragments when handling large multi-descriptor packets. This causes an
out-of-bounds write in skb_add_rx_frag_netmem() leading to kernel panic.

The issue occurs because the driver doesn't check the total number of
fragments before calling skb_add_rx_frag(). When a packet requires more
than MAX_SKB_FRAGS fragments, the fragment index exceeds the array bounds.

Fix by assuming there will be an extra frag if buff-&gt;len &gt; AQ_CFG_RX_HDR_SIZE,
then all fragments are accounted for. And reusing the existing check to
prevent the overflow earlier in the code path.

This crash occurred in production with an Aquantia AQC113 10G NIC.

Stack trace from production environment:
```
RIP: 0010:skb_add_rx_frag_netmem+0x29/0xd0
Code: 90 f3 0f 1e fa 0f 1f 44 00 00 48 89 f8 41 89
ca 48 89 d7 48 63 ce 8b 90 c0 00 00 00 48 c1 e1 04 48 01 ca 48 03 90
c8 00 00 00 &lt;48&gt; 89 7a 30 44 89 52 3c 44 89 42 38 40 f6 c7 01 75 74 48
89 fa 83
RSP: 0018:ffffa9bec02a8d50 EFLAGS: 00010287
RAX: ffff925b22e80a00 RBX: ffff925ad38d2700 RCX:
fffffffe0a0c8000
RDX: ffff9258ea95bac0 RSI: ffff925ae0a0c800 RDI:
0000000000037a40
RBP: 0000000000000024 R08: 0000000000000000 R09:
0000000000000021
R10: 0000000000000848 R11: 0000000000000000 R12:
ffffa9bec02a8e24
R13: ffff925ad8615570 R14: 0000000000000000 R15:
ffff925b22e80a00
FS: 0000000000000000(0000)
GS:ffff925e47880000(0000) knlGS:0000000000000000
CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffff9258ea95baf0 CR3: 0000000166022004 CR4:
0000000000f72ef0
PKRU: 55555554
Call Trace:
&lt;IRQ&gt;
aq_ring_rx_clean+0x175/0xe60 [atlantic]
? aq_ring_rx_clean+0x14d/0xe60 [atlantic]
? aq_ring_tx_clean+0xdf/0x190 [atlantic]
? kmem_cache_free+0x348/0x450
? aq_vec_poll+0x81/0x1d0 [atlantic]
? __napi_poll+0x28/0x1c0
? net_rx_action+0x337/0x420
```

Changes in v4:
- Add Fixes: tag to satisfy patch validation requirements.

Changes in v3:
- Fix by assuming there will be an extra frag if buff-&gt;len &gt; AQ_CFG_RX_HDR_SIZE,
  then all fragments are accounted for.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68301/">CVE-2025-68301 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68301">CVE-2025-68301 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255120">SUSE bug 1255120</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568302" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68302</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68302" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68302" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68302" ref_url="https://www.suse.com/security/cve/CVE-2025-68302" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: sxgbe: fix potential NULL dereference in sxgbe_rx()

Currently, when skb is null, the driver prints an error and then
dereferences skb on the next line.

To fix this, let's add a 'break' after the error message to switch
to sxgbe_rx_refill(), which is similar to the approach taken by the
other drivers in this particular case, e.g. calxeda with xgmac_rx().

Found during a code review.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68302/">CVE-2025-68302 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68302">CVE-2025-68302 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255121">SUSE bug 1255121</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568303" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68303</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68303" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68303" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68303" ref_url="https://www.suse.com/security/cve/CVE-2025-68303" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

platform/x86: intel: punit_ipc: fix memory corruption

This passes the address of the pointer "&amp;punit_ipcdev" when the intent
was to pass the pointer itself "punit_ipcdev" (without the ampersand).
This means that the:

	complete(&amp;ipcdev-&gt;cmd_complete);

in intel_punit_ioc() will write to a wrong memory address corrupting it.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68303/">CVE-2025-68303 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68303">CVE-2025-68303 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255122">SUSE bug 1255122</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568305" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68305</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68305" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68305" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68305" ref_url="https://www.suse.com/security/cve/CVE-2025-68305" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1143" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: hci_sock: Prevent race in socket write iter and sock bind

There is a potential race condition between sock bind and socket write
iter. bind may free the same cmd via mgmt_pending before write iter sends
the cmd, just as syzbot reported in UAF[1].

Here we use hci_dev_lock to synchronize the two, thereby avoiding the
UAF mentioned in [1].

[1]
syzbot reported:
BUG: KASAN: slab-use-after-free in mgmt_pending_remove+0x3b/0x210 net/bluetooth/mgmt_util.c:316
Read of size 8 at addr ffff888077164818 by task syz.0.17/5989
Call Trace:
 mgmt_pending_remove+0x3b/0x210 net/bluetooth/mgmt_util.c:316
 set_link_security+0x5c2/0x710 net/bluetooth/mgmt.c:1918
 hci_mgmt_cmd+0x9c9/0xef0 net/bluetooth/hci_sock.c:1719
 hci_sock_sendmsg+0x6ca/0xef0 net/bluetooth/hci_sock.c:1839
 sock_sendmsg_nosec net/socket.c:727 [inline]
 __sock_sendmsg+0x21c/0x270 net/socket.c:742
 sock_write_iter+0x279/0x360 net/socket.c:1195

Allocated by task 5989:
 mgmt_pending_add+0x35/0x140 net/bluetooth/mgmt_util.c:296
 set_link_security+0x557/0x710 net/bluetooth/mgmt.c:1910
 hci_mgmt_cmd+0x9c9/0xef0 net/bluetooth/hci_sock.c:1719
 hci_sock_sendmsg+0x6ca/0xef0 net/bluetooth/hci_sock.c:1839
 sock_sendmsg_nosec net/socket.c:727 [inline]
 __sock_sendmsg+0x21c/0x270 net/socket.c:742
 sock_write_iter+0x279/0x360 net/socket.c:1195

Freed by task 5991:
 mgmt_pending_free net/bluetooth/mgmt_util.c:311 [inline]
 mgmt_pending_foreach+0x30d/0x380 net/bluetooth/mgmt_util.c:257
 mgmt_index_removed+0x112/0x2f0 net/bluetooth/mgmt.c:9477
 hci_sock_bind+0xbe9/0x1000 net/bluetooth/hci_sock.c:1314
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68305/">CVE-2025-68305 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68305">CVE-2025-68305 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255169">SUSE bug 1255169</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568306" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68306</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68306" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68306" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68306" ref_url="https://www.suse.com/security/cve/CVE-2025-68306" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: btusb: mediatek: Fix kernel crash when releasing mtk iso interface

When performing reset tests and encountering abnormal card drop issues
that lead to a kernel crash, it is necessary to perform a null check
before releasing resources to avoid attempting to release a null pointer.

&lt;4&gt;[   29.158070] Hardware name: Google Quigon sku196612/196613 board (DT)
&lt;4&gt;[   29.158076] Workqueue: hci0 hci_cmd_sync_work [bluetooth]
&lt;4&gt;[   29.158154] pstate: 20400009 (nzCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
&lt;4&gt;[   29.158162] pc : klist_remove+0x90/0x158
&lt;4&gt;[   29.158174] lr : klist_remove+0x88/0x158
&lt;4&gt;[   29.158180] sp : ffffffc0846b3c00
&lt;4&gt;[   29.158185] pmr_save: 000000e0
&lt;4&gt;[   29.158188] x29: ffffffc0846b3c30 x28: ffffff80cd31f880 x27: ffffff80c1bdc058
&lt;4&gt;[   29.158199] x26: dead000000000100 x25: ffffffdbdc624ea3 x24: ffffff80c1bdc4c0
&lt;4&gt;[   29.158209] x23: ffffffdbdc62a3e6 x22: ffffff80c6c07000 x21: ffffffdbdc829290
&lt;4&gt;[   29.158219] x20: 0000000000000000 x19: ffffff80cd3e0648 x18: 000000031ec97781
&lt;4&gt;[   29.158229] x17: ffffff80c1bdc4a8 x16: ffffffdc10576548 x15: ffffff80c1180428
&lt;4&gt;[   29.158238] x14: 0000000000000000 x13: 000000000000e380 x12: 0000000000000018
&lt;4&gt;[   29.158248] x11: ffffff80c2a7fd10 x10: 0000000000000000 x9 : 0000000100000000
&lt;4&gt;[   29.158257] x8 : 0000000000000000 x7 : 7f7f7f7f7f7f7f7f x6 : 2d7223ff6364626d
&lt;4&gt;[   29.158266] x5 : 0000008000000000 x4 : 0000000000000020 x3 : 2e7325006465636e
&lt;4&gt;[   29.158275] x2 : ffffffdc11afeff8 x1 : 0000000000000000 x0 : ffffffdc11be4d0c
&lt;4&gt;[   29.158285] Call trace:
&lt;4&gt;[   29.158290]  klist_remove+0x90/0x158
&lt;4&gt;[   29.158298]  device_release_driver_internal+0x20c/0x268
&lt;4&gt;[   29.158308]  device_release_driver+0x1c/0x30
&lt;4&gt;[   29.158316]  usb_driver_release_interface+0x70/0x88
&lt;4&gt;[   29.158325]  btusb_mtk_release_iso_intf+0x68/0xd8 [btusb (HASH:e8b6 5)]
&lt;4&gt;[   29.158347]  btusb_mtk_reset+0x5c/0x480 [btusb (HASH:e8b6 5)]
&lt;4&gt;[   29.158361]  hci_cmd_sync_work+0x10c/0x188 [bluetooth (HASH:a4fa 6)]
&lt;4&gt;[   29.158430]  process_scheduled_works+0x258/0x4e8
&lt;4&gt;[   29.158441]  worker_thread+0x300/0x428
&lt;4&gt;[   29.158448]  kthread+0x108/0x1d0
&lt;4&gt;[   29.158455]  ret_from_fork+0x10/0x20
&lt;0&gt;[   29.158467] Code: 91343000 940139d1 f9400268 927ff914 (f9401297)
&lt;4&gt;[   29.158474] ---[ end trace 0000000000000000 ]---
&lt;0&gt;[   29.167129] Kernel panic - not syncing: Oops: Fatal exception
&lt;2&gt;[   29.167144] SMP: stopping secondary CPUs
&lt;4&gt;[   29.167158] ------------[ cut here ]------------
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68306/">CVE-2025-68306 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68306">CVE-2025-68306 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255145">SUSE bug 1255145</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568307" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68307</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68307" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68307" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68307" ref_url="https://www.suse.com/security/cve/CVE-2025-68307" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: gs_usb: gs_usb_xmit_callback(): fix handling of failed transmitted URBs

The driver lacks the cleanup of failed transfers of URBs. This reduces the
number of available URBs per error by 1. This leads to reduced performance
and ultimately to a complete stop of the transmission.

If the sending of a bulk URB fails do proper cleanup:
- increase netdev stats
- mark the echo_sbk as free
- free the driver's context and do accounting
- wake the send queue
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68307/">CVE-2025-68307 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68307">CVE-2025-68307 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255146">SUSE bug 1255146</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568308" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68308</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68308" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68308" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68308" ref_url="https://www.suse.com/security/cve/CVE-2025-68308" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: kvaser_usb: leaf: Fix potential infinite loop in command parsers

The `kvaser_usb_leaf_wait_cmd()` and `kvaser_usb_leaf_read_bulk_callback`
functions contain logic to zero-length commands. These commands are used
to align data to the USB endpoint's wMaxPacketSize boundary.

The driver attempts to skip these placeholders by aligning the buffer
position `pos` to the next packet boundary using `round_up()` function.

However, if zero-length command is found exactly on a packet boundary
(i.e., `pos` is a multiple of wMaxPacketSize, including 0), `round_up`
function will return the unchanged value of `pos`. This prevents `pos`
to be increased, causing an infinite loop in the parsing logic.

This patch fixes this in the function by using `pos + 1` instead.
This ensures that even if `pos` is on a boundary, the calculation is
based on `pos + 1`, forcing `round_up()` to always return the next
aligned boundary.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68308/">CVE-2025-68308 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68308">CVE-2025-68308 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255149">SUSE bug 1255149</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568311" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68311</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68311" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68311" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68311" ref_url="https://www.suse.com/security/cve/CVE-2025-68311" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tty: serial: ip22zilog: Use platform device for probing

After commit 84a9582fd203 ("serial: core: Start managing serial controllers
to enable runtime PM") serial drivers need to provide a device in
struct uart_port.dev otherwise an oops happens. To fix this issue
for ip22zilog driver switch driver to a platform driver and setup
the serial device in sgi-ip22 code.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68311/">CVE-2025-68311 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68311">CVE-2025-68311 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255161">SUSE bug 1255161</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568312" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68312</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68312" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68312" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68312" ref_url="https://www.suse.com/security/cve/CVE-2025-68312" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1131-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usbnet: Prevents free active kevent

The root cause of this issue are:
1. When probing the usbnet device, executing usbnet_link_change(dev, 0, 0);
put the kevent work in global workqueue. However, the kevent has not yet
been scheduled when the usbnet device is unregistered. Therefore, executing
free_netdev() results in the "free active object (kevent)" error reported
here.

2. Another factor is that when calling usbnet_disconnect()-&gt;unregister_netdev(),
if the usbnet device is up, ndo_stop() is executed to cancel the kevent.
However, because the device is not up, ndo_stop() is not executed.

The solution to this problem is to cancel the kevent before executing
free_netdev().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68312/">CVE-2025-68312 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68312">CVE-2025-68312 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255171">SUSE bug 1255171</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568313" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68313</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68313" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68313" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68313" ref_url="https://www.suse.com/security/cve/CVE-2025-68313" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/CPU/AMD: Add RDSEED fix for Zen5

There's an issue with RDSEED's 16-bit and 32-bit register output
variants on Zen5 which return a random value of 0 "at a rate inconsistent
with randomness while incorrectly signaling success (CF=1)". Search the
web for AMD-SB-7055 for more detail.

Add a fix glue which checks microcode revisions.

  [ bp: Add microcode revisions checking, rewrite. ]
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68313/">CVE-2025-68313 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68313">CVE-2025-68313 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255415">SUSE bug 1255415</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568317" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68317</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68317" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68317" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68317" ref_url="https://www.suse.com/security/cve/CVE-2025-68317" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

io_uring/zctx: check chained notif contexts

Send zc only links ubuf_info for requests coming from the same context.
There are some ambiguous syz reports, so let's check the assumption on
notification completion.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68317/">CVE-2025-68317 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68317">CVE-2025-68317 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255354">SUSE bug 1255354</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568320" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68320</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68320" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68320" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68320" ref_url="https://www.suse.com/security/cve/CVE-2025-68320" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

lan966x: Fix sleeping in atomic context

The following warning was seen when we try to connect using ssh to the device.

BUG: sleeping function called from invalid context at kernel/locking/mutex.c:575
in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 104, name: dropbear
preempt_count: 1, expected: 0
INFO: lockdep is turned off.
CPU: 0 UID: 0 PID: 104 Comm: dropbear Tainted: G        W           6.18.0-rc2-00399-g6f1ab1b109b9-dirty #530 NONE
Tainted: [W]=WARN
Hardware name: Generic DT based system
Call trace:
 unwind_backtrace from show_stack+0x10/0x14
 show_stack from dump_stack_lvl+0x7c/0xac
 dump_stack_lvl from __might_resched+0x16c/0x2b0
 __might_resched from __mutex_lock+0x64/0xd34
 __mutex_lock from mutex_lock_nested+0x1c/0x24
 mutex_lock_nested from lan966x_stats_get+0x5c/0x558
 lan966x_stats_get from dev_get_stats+0x40/0x43c
 dev_get_stats from dev_seq_printf_stats+0x3c/0x184
 dev_seq_printf_stats from dev_seq_show+0x10/0x30
 dev_seq_show from seq_read_iter+0x350/0x4ec
 seq_read_iter from seq_read+0xfc/0x194
 seq_read from proc_reg_read+0xac/0x100
 proc_reg_read from vfs_read+0xb0/0x2b0
 vfs_read from ksys_read+0x6c/0xec
 ksys_read from ret_fast_syscall+0x0/0x1c
Exception stack(0xf0b11fa8 to 0xf0b11ff0)
1fa0:                   00000001 00001000 00000008 be9048d8 00001000 00000001
1fc0: 00000001 00001000 00000008 00000003 be905920 0000001e 00000000 00000001
1fe0: 0005404c be9048c0 00018684 b6ec2cd8

It seems that we are using a mutex in a atomic context which is wrong.
Change the mutex with a spinlock.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68320/">CVE-2025-68320 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68320">CVE-2025-68320 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255172">SUSE bug 1255172</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568325" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68325</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68325" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68325" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68325" ref_url="https://www.suse.com/security/cve/CVE-2025-68325" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: sch_cake: Fix incorrect qlen reduction in cake_drop

In cake_drop(), qdisc_tree_reduce_backlog() is used to update the qlen
and backlog of the qdisc hierarchy. Its caller, cake_enqueue(), assumes
that the parent qdisc will enqueue the current packet. However, this
assumption breaks when cake_enqueue() returns NET_XMIT_CN: the parent
qdisc stops enqueuing current packet, leaving the tree qlen/backlog
accounting inconsistent. This mismatch can lead to a NULL dereference
(e.g., when the parent Qdisc is qfq_qdisc).

This patch computes the qlen/backlog delta in a more robust way by
observing the difference before and after the series of cake_drop()
calls, and then compensates the qdisc tree accounting if cake_enqueue()
returns NET_XMIT_CN.

To ensure correct compensation when ACK thinning is enabled, a new
variable is introduced to keep qlen unchanged.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68325/">CVE-2025-68325 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68325">CVE-2025-68325 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255417">SUSE bug 1255417</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568327" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68327</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68327" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68327" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68327" ref_url="https://www.suse.com/security/cve/CVE-2025-68327" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: renesas_usbhs: Fix synchronous external abort on unbind

A synchronous external abort occurs on the Renesas RZ/G3S SoC if unbind is
executed after the configuration sequence described above:

modprobe usb_f_ecm
modprobe libcomposite
modprobe configfs
cd /sys/kernel/config/usb_gadget
mkdir -p g1
cd g1
echo "0x1d6b" &gt; idVendor
echo "0x0104" &gt; idProduct
mkdir -p strings/0x409
echo "0123456789" &gt; strings/0x409/serialnumber
echo "Renesas." &gt; strings/0x409/manufacturer
echo "Ethernet Gadget" &gt; strings/0x409/product
mkdir -p functions/ecm.usb0
mkdir -p configs/c.1
mkdir -p configs/c.1/strings/0x409
echo "ECM" &gt; configs/c.1/strings/0x409/configuration

if [ ! -L configs/c.1/ecm.usb0 ]; then
        ln -s functions/ecm.usb0 configs/c.1
fi

echo 11e20000.usb &gt; UDC
echo 11e20000.usb &gt; /sys/bus/platform/drivers/renesas_usbhs/unbind

The displayed trace is as follows:

 Internal error: synchronous external abort: 0000000096000010 [#1] SMP
 CPU: 0 UID: 0 PID: 188 Comm: sh Tainted: G M 6.17.0-rc7-next-20250922-00010-g41050493b2bd #55 PREEMPT
 Tainted: [M]=MACHINE_CHECK
 Hardware name: Renesas SMARC EVK version 2 based on r9a08g045s33 (DT)
 pstate: 604000c5 (nZCv daIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
 pc : usbhs_sys_function_pullup+0x10/0x40 [renesas_usbhs]
 lr : usbhsg_update_pullup+0x3c/0x68 [renesas_usbhs]
 sp : ffff8000838b3920
 x29: ffff8000838b3920 x28: ffff00000d585780 x27: 0000000000000000
 x26: 0000000000000000 x25: 0000000000000000 x24: ffff00000c3e3810
 x23: ffff00000d5e5c80 x22: ffff00000d5e5d40 x21: 0000000000000000
 x20: 0000000000000000 x19: ffff00000d5e5c80 x18: 0000000000000020
 x17: 2e30303230316531 x16: 312d7968703a7968 x15: 3d454d414e5f4344
 x14: 000000000000002c x13: 0000000000000000 x12: 0000000000000000
 x11: ffff00000f358f38 x10: ffff00000f358db0 x9 : ffff00000b41f418
 x8 : 0101010101010101 x7 : 7f7f7f7f7f7f7f7f x6 : fefefeff6364626d
 x5 : 8080808000000000 x4 : 000000004b5ccb9d x3 : 0000000000000000
 x2 : 0000000000000000 x1 : ffff800083790000 x0 : ffff00000d5e5c80
 Call trace:
 usbhs_sys_function_pullup+0x10/0x40 [renesas_usbhs] (P)
 usbhsg_pullup+0x4c/0x7c [renesas_usbhs]
 usb_gadget_disconnect_locked+0x48/0xd4
 gadget_unbind_driver+0x44/0x114
 device_remove+0x4c/0x80
 device_release_driver_internal+0x1c8/0x224
 device_release_driver+0x18/0x24
 bus_remove_device+0xcc/0x10c
 device_del+0x14c/0x404
 usb_del_gadget+0x88/0xc0
 usb_del_gadget_udc+0x18/0x30
 usbhs_mod_gadget_remove+0x24/0x44 [renesas_usbhs]
 usbhs_mod_remove+0x20/0x30 [renesas_usbhs]
 usbhs_remove+0x98/0xdc [renesas_usbhs]
 platform_remove+0x20/0x30
 device_remove+0x4c/0x80
 device_release_driver_internal+0x1c8/0x224
 device_driver_detach+0x18/0x24
 unbind_store+0xb4/0xb8
 drv_attr_store+0x24/0x38
 sysfs_kf_write+0x7c/0x94
 kernfs_fop_write_iter+0x128/0x1b8
 vfs_write+0x2ac/0x350
 ksys_write+0x68/0xfc
 __arm64_sys_write+0x1c/0x28
 invoke_syscall+0x48/0x110
 el0_svc_common.constprop.0+0xc0/0xe0
 do_el0_svc+0x1c/0x28
 el0_svc+0x34/0xf0
 el0t_64_sync_handler+0xa0/0xe4
 el0t_64_sync+0x198/0x19c
 Code: 7100003f 1a9f07e1 531c6c22 f9400001 (79400021)
 ---[ end trace 0000000000000000 ]---
 note: sh[188] exited with irqs disabled
 note: sh[188] exited with preempt_count 1

The issue occurs because usbhs_sys_function_pullup(), which accesses the IP
registers, is executed after the USBHS clocks have been disabled. The
problem is reproducible on the Renesas RZ/G3S SoC starting with the
addition of module stop in the clock enable/disable APIs. With module stop
functionality enabled, a bus error is expected if a master accesses a
module whose clock has been stopped and module stop activated.

Disable the IP clocks at the end of remove.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68327/">CVE-2025-68327 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68327">CVE-2025-68327 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255488">SUSE bug 1255488</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568328" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68328</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68328" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68328" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68328" ref_url="https://www.suse.com/security/cve/CVE-2025-68328" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

firmware: stratix10-svc: fix bug in saving controller data

Fix the incorrect usage of platform_set_drvdata and dev_set_drvdata. They
both are of the same data and overrides each other. This resulted in the
rmmod of the svc driver to fail and throw a kernel panic for kthread_stop
and fifo free.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68328/">CVE-2025-68328 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68328">CVE-2025-68328 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255489">SUSE bug 1255489</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568329" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68329</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68329" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68329" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68329" ref_url="https://www.suse.com/security/cve/CVE-2025-68329" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tracing: Fix WARN_ON in tracing_buffers_mmap_close for split VMAs

When a VMA is split (e.g., by partial munmap or MAP_FIXED), the kernel
calls vm_ops-&gt;close on each portion. For trace buffer mappings, this
results in ring_buffer_unmap() being called multiple times while
ring_buffer_map() was only called once.

This causes ring_buffer_unmap() to return -ENODEV on subsequent calls
because user_mapped is already 0, triggering a WARN_ON.

Trace buffer mappings cannot support partial mappings because the ring
buffer structure requires the complete buffer including the meta page.

Fix this by adding a may_split callback that returns -EINVAL to prevent
VMA splits entirely.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68329/">CVE-2025-68329 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68329">CVE-2025-68329 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255490">SUSE bug 1255490</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568330" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68330</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68330" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68330" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68330" ref_url="https://www.suse.com/security/cve/CVE-2025-68330" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iio: accel: bmc150: Fix irq assumption regression

The code in bmc150-accel-core.c unconditionally calls
bmc150_accel_set_interrupt() in the iio_buffer_setup_ops,
such as on the runtime PM resume path giving a kernel
splat like this if the device has no interrupts:

Unable to handle kernel NULL pointer dereference at virtual
  address 00000001 when read

PC is at bmc150_accel_set_interrupt+0x98/0x194
LR is at __pm_runtime_resume+0x5c/0x64
(...)
Call trace:
bmc150_accel_set_interrupt from bmc150_accel_buffer_postenable+0x40/0x108
bmc150_accel_buffer_postenable from __iio_update_buffers+0xbe0/0xcbc
__iio_update_buffers from enable_store+0x84/0xc8
enable_store from kernfs_fop_write_iter+0x154/0x1b4

This bug seems to have been in the driver since the beginning,
but it only manifests recently, I do not know why.

Store the IRQ number in the state struct, as this is a common
pattern in other drivers, then use this to determine if we have
IRQ support or not.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68330/">CVE-2025-68330 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68330">CVE-2025-68330 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255493">SUSE bug 1255493</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568331" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68331</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68331" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68331" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68331" ref_url="https://www.suse.com/security/cve/CVE-2025-68331" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: uas: fix urb unmapping issue when the uas device is remove during ongoing data transfer

When a UAS device is unplugged during data transfer, there is
a probability of a system panic occurring. The root cause is
an access to an invalid memory address during URB callback handling.
Specifically, this happens when the dma_direct_unmap_sg() function
is called within the usb_hcd_unmap_urb_for_dma() interface, but the
sg-&gt;dma_address field is 0 and the sg data structure has already been
freed.

The SCSI driver sends transfer commands by invoking uas_queuecommand_lck()
in uas.c, using the uas_submit_urbs() function to submit requests to USB.
Within the uas_submit_urbs() implementation, three URBs (sense_urb,
data_urb, and cmd_urb) are sequentially submitted. Device removal may
occur at any point during uas_submit_urbs execution, which may result
in URB submission failure. However, some URBs might have been successfully
submitted before the failure, and uas_submit_urbs will return the -ENODEV
error code in this case. The current error handling directly calls
scsi_done(). In the SCSI driver, this eventually triggers scsi_complete()
to invoke scsi_end_request() for releasing the sgtable. The successfully
submitted URBs, when being unlinked to giveback, call
usb_hcd_unmap_urb_for_dma() in hcd.c, leading to exceptions during sg
unmapping operations since the sg data structure has already been freed.

This patch modifies the error condition check in the uas_submit_urbs()
function. When a UAS device is removed but one or more URBs have already
been successfully submitted to USB, it avoids immediately invoking
scsi_done() and save the cmnd to devinfo-&gt;cmnd array. If the successfully
submitted URBs is completed before devinfo-&gt;resetting being set, then
the scsi_done() function will be called within uas_try_complete() after
all pending URB operations are finalized. Otherwise, the scsi_done()
function will be called within uas_zap_pending(), which is executed after
usb_kill_anchored_urbs().

The error handling only takes effect when uas_queuecommand_lck() calls
uas_submit_urbs() and returns the error value -ENODEV . In this case,
the device is disconnected, and the flow proceeds to uas_disconnect(),
where uas_zap_pending() is invoked to call uas_try_complete().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="5.4/CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68331/">CVE-2025-68331 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68331">CVE-2025-68331 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255495">SUSE bug 1255495</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568332" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68332</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68332" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68332" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68332" ref_url="https://www.suse.com/security/cve/CVE-2025-68332" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

comedi: c6xdigio: Fix invalid PNP driver unregistration

The Comedi low-level driver "c6xdigio" seems to be for a parallel port
connected device.  When the Comedi core calls the driver's Comedi
"attach" handler `c6xdigio_attach()` to configure a Comedi to use this
driver, it tries to enable the parallel port PNP resources by
registering a PNP driver with `pnp_register_driver()`, but ignores the
return value.  (The `struct pnp_driver` it uses has only the `name` and
`id_table` members filled in.)  The driver's Comedi "detach" handler
`c6xdigio_detach()` unconditionally unregisters the PNP driver with
`pnp_unregister_driver()`.

It is possible for `c6xdigio_attach()` to return an error before it
calls `pnp_register_driver()` and it is possible for the call to
`pnp_register_driver()` to return an error (that is ignored).  In both
cases, the driver should not be calling `pnp_unregister_driver()` as it
does in `c6xdigio_detach()`.  (Note that `c6xdigio_detach()` will be
called by the Comedi core if `c6xdigio_attach()` returns an error, or if
the Comedi core decides to detach the Comedi device from the driver for
some other reason.)

The unconditional call to `pnp_unregister_driver()` without a previous
successful call to `pnp_register_driver()` will cause
`driver_unregister()` to issue a warning "Unexpected driver
unregister!".  This was detected by Syzbot [1].

Also, the PNP driver registration and unregistration should be done at
module init and exit time, respectively, not when attaching or detaching
Comedi devices to the driver.  (There might be more than one Comedi
device being attached to the driver, although that is unlikely.)

Change the driver to do the PNP driver registration at module init time,
and the unregistration at module exit time.  Since `c6xdigio_detach()`
now only calls `comedi_legacy_detach()`, remove the function and change
the Comedi driver "detach" handler to `comedi_legacy_detach`.

-------------------------------------------
[1] Syzbot sample crash report:
Unexpected driver unregister!
WARNING: CPU: 0 PID: 5970 at drivers/base/driver.c:273 driver_unregister drivers/base/driver.c:273 [inline]
WARNING: CPU: 0 PID: 5970 at drivers/base/driver.c:273 driver_unregister+0x90/0xb0 drivers/base/driver.c:270
Modules linked in:
CPU: 0 UID: 0 PID: 5970 Comm: syz.0.17 Not tainted syzkaller #0 PREEMPT(full)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025
RIP: 0010:driver_unregister drivers/base/driver.c:273 [inline]
RIP: 0010:driver_unregister+0x90/0xb0 drivers/base/driver.c:270
Code: 48 89 ef e8 c2 e6 82 fc 48 89 df e8 3a 93 ff ff 5b 5d e9 c3 6d d9 fb e8 be 6d d9 fb 90 48 c7 c7 e0 f8 1f 8c e8 51 a2 97 fb 90 &lt;0f&gt; 0b 90 90 5b 5d e9 a5 6d d9 fb e8 e0 f4 41 fc eb 94 e8 d9 f4 41
RSP: 0018:ffffc9000373f9a0 EFLAGS: 00010282
RAX: 0000000000000000 RBX: ffffffff8ff24720 RCX: ffffffff817b6ee8
RDX: ffff88807c932480 RSI: ffffffff817b6ef5 RDI: 0000000000000001
RBP: 0000000000000000 R08: 0000000000000001 R09: 0000000000000000
R10: 0000000000000001 R11: 0000000000000001 R12: ffffffff8ff24660
R13: dffffc0000000000 R14: 0000000000000000 R15: ffff88814cca0000
FS:  000055556dab1500(0000) GS:ffff8881249d9000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000055f77f285cd0 CR3: 000000007d871000 CR4: 00000000003526f0
Call Trace:
 &lt;TASK&gt;
 comedi_device_detach_locked+0x12f/0xa50 drivers/comedi/drivers.c:207
 comedi_device_detach+0x67/0xb0 drivers/comedi/drivers.c:215
 comedi_device_attach+0x43d/0x900 drivers/comedi/drivers.c:1011
 do_devconfig_ioctl+0x1b1/0x710 drivers/comedi/comedi_fops.c:872
 comedi_unlocked_ioctl+0x165d/0x2f00 drivers/comedi/comedi_fops.c:2178
 vfs_ioctl fs/ioctl.c:51 [inline]
 __do_sys_ioctl fs/ioctl.c:597 [inline]
 __se_sys_ioctl fs/ioctl.c:583 [inline]
 __x64_sys_ioctl+0x18e/0x210 fs/ioctl.c:583
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_sys
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68332/">CVE-2025-68332 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68332">CVE-2025-68332 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255483">SUSE bug 1255483</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568335" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68335</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68335" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68335" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68335" ref_url="https://www.suse.com/security/cve/CVE-2025-68335" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

comedi: pcl818: fix null-ptr-deref in pcl818_ai_cancel()

Syzbot identified an issue [1] in pcl818_ai_cancel(), which stems from
the fact that in case of early device detach via pcl818_detach(),
subdevice dev-&gt;read_subdev may not have initialized its pointer to
&amp;struct comedi_async as intended. Thus, any such dereferencing of
&amp;s-&gt;async-&gt;cmd will lead to general protection fault and kernel crash.

Mitigate this problem by removing a call to pcl818_ai_cancel() from
pcl818_detach() altogether. This way, if the subdevice setups its
support for async commands, everything async-related will be
handled via subdevice's own -&gt;cancel() function in
comedi_device_detach_locked() even before pcl818_detach(). If no
support for asynchronous commands is provided, there is no need
to cancel anything either.

[1] Syzbot crash:
Oops: general protection fault, probably for non-canonical address 0xdffffc0000000005: 0000 [#1] SMP KASAN PTI
KASAN: null-ptr-deref in range [0x0000000000000028-0x000000000000002f]
CPU: 1 UID: 0 PID: 6050 Comm: syz.0.18 Not tainted syzkaller #0 PREEMPT(full)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025
RIP: 0010:pcl818_ai_cancel+0x69/0x3f0 drivers/comedi/drivers/pcl818.c:762
...
Call Trace:
 &lt;TASK&gt;
 pcl818_detach+0x66/0xd0 drivers/comedi/drivers/pcl818.c:1115
 comedi_device_detach_locked+0x178/0x750 drivers/comedi/drivers.c:207
 do_devconfig_ioctl drivers/comedi/comedi_fops.c:848 [inline]
 comedi_unlocked_ioctl+0xcde/0x1020 drivers/comedi/comedi_fops.c:2178
 vfs_ioctl fs/ioctl.c:51 [inline]
 __do_sys_ioctl fs/ioctl.c:597 [inline]
...
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68335/">CVE-2025-68335 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68335">CVE-2025-68335 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255480">SUSE bug 1255480</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568337" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68337</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68337" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68337" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68337" ref_url="https://www.suse.com/security/cve/CVE-2025-68337" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

jbd2: avoid bug_on in jbd2_journal_get_create_access() when file system corrupted

There's issue when file system corrupted:
------------[ cut here ]------------
kernel BUG at fs/jbd2/transaction.c:1289!
Oops: invalid opcode: 0000 [#1] SMP KASAN PTI
CPU: 5 UID: 0 PID: 2031 Comm: mkdir Not tainted 6.18.0-rc1-next
RIP: 0010:jbd2_journal_get_create_access+0x3b6/0x4d0
RSP: 0018:ffff888117aafa30 EFLAGS: 00010202
RAX: 0000000000000000 RBX: ffff88811a86b000 RCX: ffffffff89a63534
RDX: 1ffff110200ec602 RSI: 0000000000000004 RDI: ffff888100763010
RBP: ffff888100763000 R08: 0000000000000001 R09: ffff888100763028
R10: 0000000000000003 R11: 0000000000000000 R12: 0000000000000000
R13: ffff88812c432000 R14: ffff88812c608000 R15: ffff888120bfc000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f91d6970c99 CR3: 00000001159c4000 CR4: 00000000000006f0
Call Trace:
 &lt;TASK&gt;
 __ext4_journal_get_create_access+0x42/0x170
 ext4_getblk+0x319/0x6f0
 ext4_bread+0x11/0x100
 ext4_append+0x1e6/0x4a0
 ext4_init_new_dir+0x145/0x1d0
 ext4_mkdir+0x326/0x920
 vfs_mkdir+0x45c/0x740
 do_mkdirat+0x234/0x2f0
 __x64_sys_mkdir+0xd6/0x120
 do_syscall_64+0x5f/0xfa0
 entry_SYSCALL_64_after_hwframe+0x76/0x7e

The above issue occurs with us in errors=continue mode when accompanied by
storage failures. There have been many inconsistencies in the file system
data.
In the case of file system data inconsistency, for example, if the block
bitmap of a referenced block is not set, it can lead to the situation where
a block being committed is allocated and used again. As a result, the
following condition will not be satisfied then trigger BUG_ON. Of course,
it is entirely possible to construct a problematic image that can trigger
this BUG_ON through specific operations. In fact, I have constructed such
an image and easily reproduced this issue.
Therefore, J_ASSERT() holds true only under ideal conditions, but it may
not necessarily be satisfied in exceptional scenarios. Using J_ASSERT()
directly in abnormal situations would cause the system to crash, which is
clearly not what we want. So here we directly trigger a JBD abort instead
of immediately invoking BUG_ON.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68337/">CVE-2025-68337 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68337">CVE-2025-68337 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255482">SUSE bug 1255482</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568339" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68339</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68339" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68339" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68339" ref_url="https://www.suse.com/security/cve/CVE-2025-68339" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

atm/fore200e: Fix possible data race in fore200e_open()

Protect access to fore200e-&gt;available_cell_rate with rate_mtx lock in the
error handling path of fore200e_open() to prevent a data race.

The field fore200e-&gt;available_cell_rate is a shared resource used to track
available bandwidth. It is concurrently accessed by fore200e_open(),
fore200e_close(), and fore200e_change_qos().

In fore200e_open(), the lock rate_mtx is correctly held when subtracting
vcc-&gt;qos.txtp.max_pcr from available_cell_rate to reserve bandwidth.
However, if the subsequent call to fore200e_activate_vcin() fails, the
function restores the reserved bandwidth by adding back to
available_cell_rate without holding the lock.

This introduces a race condition because available_cell_rate is a global
device resource shared across all VCCs. If the error path in
fore200e_open() executes concurrently with operations like
fore200e_close() or fore200e_change_qos() on other VCCs, a
read-modify-write race occurs.

Specifically, the error path reads the rate without the lock. If another
CPU acquires the lock and modifies the rate (e.g., releasing bandwidth in
fore200e_close()) between this read and the subsequent write, the error
path will overwrite the concurrent update with a stale value. This results
in incorrect bandwidth accounting.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68339/">CVE-2025-68339 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68339">CVE-2025-68339 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255505">SUSE bug 1255505</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568340" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68340</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68340" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68340" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68340" ref_url="https://www.suse.com/security/cve/CVE-2025-68340" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0316-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023970.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

team: Move team device type change at the end of team_port_add

Attempting to add a port device that is already up will expectedly fail,
but not before modifying the team device header_ops.

In the case of the syzbot reproducer the gre0 device is
already in state UP when it attempts to add it as a
port device of team0, this fails but before that
header_ops-&gt;create of team0 is changed from eth_header to ipgre_header
in the call to team_dev_type_check_change.

Later when we end up in ipgre_header() struct ip_tunnel* points to nonsense
as the private data of the device still holds a struct team.

Example sequence of iproute2 commands to reproduce the hang/BUG():
ip link add dev team0 type team
ip link add dev gre0 type gre
ip link set dev gre0 up
ip link set dev gre0 master team0
ip link set dev team0 up
ping -I team0 1.1.1.1

Move team_dev_type_check_change down where all other checks have passed
as it changes the dev type with no way to restore it in case
one of the checks that follow it fail.

Also make sure to preserve the origial mtu assignment:
  - If port_dev is not the same type as dev, dev takes mtu from port_dev
  - If port_dev is the same type as dev, port_dev takes mtu from dev

This is done by adding a conditional before the call to dev_set_mtu
to prevent it from assigning port_dev-&gt;mtu = dev-&gt;mtu and instead
letting team_dev_type_check_change assign dev-&gt;mtu = port_dev-&gt;mtu.
The conditional is needed because the patch moves the call to
team_dev_type_check_change past dev_set_mtu.

Testing:
  - team device driver in-tree selftests
  - Add/remove various devices as slaves of team device
  - syzbot
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68340/">CVE-2025-68340 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68340">CVE-2025-68340 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255507">SUSE bug 1255507</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568341" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68341</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68341" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68341" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68341" ref_url="https://www.suse.com/security/cve/CVE-2025-68341" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

veth: reduce XDP no_direct return section to fix race

As explain in commit fa349e396e48 ("veth: Fix race with AF_XDP exposing
old or uninitialized descriptors") for veth there is a chance after
napi_complete_done() that another CPU can manage start another NAPI
instance running veth_pool(). For NAPI this is correctly handled as the
napi_schedule_prep() check will prevent multiple instances from getting
scheduled, but for the remaining code in veth_pool() this can run
concurrent with the newly started NAPI instance.

The problem/race is that xdp_clear_return_frame_no_direct() isn't
designed to be nested.

Prior to commit 401cb7dae813 ("net: Reference bpf_redirect_info via
task_struct on PREEMPT_RT.") the temporary BPF net context
bpf_redirect_info was stored per CPU, where this wasn't an issue. Since
this commit the BPF context is stored in 'current' task_struct. When
running veth in threaded-NAPI mode, then the kthread becomes the storage
area. Now a race exists between two concurrent veth_pool() function calls
one exiting NAPI and one running new NAPI, both using the same BPF net
context.

Race is when another CPU gets within the xdp_set_return_frame_no_direct()
section before exiting veth_pool() calls the clear-function
xdp_clear_return_frame_no_direct().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68341/">CVE-2025-68341 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68341">CVE-2025-68341 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255506">SUSE bug 1255506</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568342" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68342</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68342" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68342" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68342" ref_url="https://www.suse.com/security/cve/CVE-2025-68342" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: gs_usb: gs_usb_receive_bulk_callback(): check actual_length before accessing data

The URB received in gs_usb_receive_bulk_callback() contains a struct
gs_host_frame. The length of the data after the header depends on the
gs_host_frame hf::flags and the active device features (e.g. time
stamping).

Introduce a new function gs_usb_get_minimum_length() and check that we have
at least received the required amount of data before accessing it. Only
copy the data to that skb that has actually been received.

[mkl: rename gs_usb_get_minimum_length() -&gt; +gs_usb_get_minimum_rx_length()]
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68342/">CVE-2025-68342 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68342">CVE-2025-68342 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255508">SUSE bug 1255508</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568343" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68343</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68343" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68343" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68343" ref_url="https://www.suse.com/security/cve/CVE-2025-68343" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: gs_usb: gs_usb_receive_bulk_callback(): check actual_length before accessing header

The driver expects to receive a struct gs_host_frame in
gs_usb_receive_bulk_callback().

Use struct_group to describe the header of the struct gs_host_frame and
check that we have at least received the header before accessing any
members of it.

To resubmit the URB, do not dereference the pointer chain
"dev-&gt;parent-&gt;hf_size_rx" but use "parent-&gt;hf_size_rx" instead. Since
"urb-&gt;context" contains "parent", it is always defined, while "dev" is not
defined if the URB it too short.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68343/">CVE-2025-68343 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68343">CVE-2025-68343 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255509">SUSE bug 1255509</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568344" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68344</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68344" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68344" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68344" ref_url="https://www.suse.com/security/cve/CVE-2025-68344" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: wavefront: Fix integer overflow in sample size validation

The wavefront_send_sample() function has an integer overflow issue
when validating sample size. The header-&gt;size field is u32 but gets
cast to int for comparison with dev-&gt;freemem

Fix by using unsigned comparison to avoid integer overflow.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68344/">CVE-2025-68344 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68344">CVE-2025-68344 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255816">SUSE bug 1255816</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68345</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68345" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68345" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68345" ref_url="https://www.suse.com/security/cve/CVE-2025-68345" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: hda: cs35l41: Fix NULL pointer dereference in cs35l41_hda_read_acpi()

The acpi_get_first_physical_node() function can return NULL, in which
case the get_device() function also returns NULL, but this value is
then dereferenced without checking,so add a check to prevent a crash.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68345/">CVE-2025-68345 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68345">CVE-2025-68345 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255601">SUSE bug 1255601</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568346" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68346</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68346" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68346" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68346" ref_url="https://www.suse.com/security/cve/CVE-2025-68346" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: dice: fix buffer overflow in detect_stream_formats()

The function detect_stream_formats() reads the stream_count value directly
from a FireWire device without validating it. This can lead to
out-of-bounds writes when a malicious device provides a stream_count value
greater than MAX_STREAMS.

Fix by applying the same validation to both TX and RX stream counts in
detect_stream_formats().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68346/">CVE-2025-68346 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68346">CVE-2025-68346 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255603">SUSE bug 1255603</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568347" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68347</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68347" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68347" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68347" ref_url="https://www.suse.com/security/cve/CVE-2025-68347" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: firewire-motu: fix buffer overflow in hwdep read for DSP events

The DSP event handling code in hwdep_read() could write more bytes to
the user buffer than requested, when a user provides a buffer smaller
than the event header size (8 bytes).

Fix by using min_t() to clamp the copy size, This ensures we never copy
more than the user requested.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68347/">CVE-2025-68347 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68347">CVE-2025-68347 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255706">SUSE bug 1255706</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568348" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68348</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68348" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68348" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68348" ref_url="https://www.suse.com/security/cve/CVE-2025-68348" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

block: fix memory leak in __blkdev_issue_zero_pages

Move the fatal signal check before bio_alloc() to prevent a memory
leak when BLKDEV_ZERO_KILLABLE is set and a fatal signal is pending.

Previously, the bio was allocated before checking for a fatal signal.
If a signal was pending, the code would break out of the loop without
freeing or chaining the just-allocated bio, causing a memory leak.

This matches the pattern already used in __blkdev_issue_write_zeroes()
where the signal check precedes the allocation.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68348/">CVE-2025-68348 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68348">CVE-2025-68348 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255694">SUSE bug 1255694</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568349" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68349</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68349" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68349" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68349" ref_url="https://www.suse.com/security/cve/CVE-2025-68349" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2264" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002483.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2352" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002541.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2722" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003230.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3685" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFSv4/pNFS: Clear NFS_INO_LAYOUTCOMMIT in pnfs_mark_layout_stateid_invalid

Fixes a crash when layout is null during this call stack:

write_inode
    -&gt; nfs4_write_inode
        -&gt; pnfs_layoutcommit_inode

pnfs_set_layoutcommit relies on the lseg refcount to keep the layout
around. Need to clear NFS_INO_LAYOUTCOMMIT otherwise we might attempt
to reference a null layout.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68349/">CVE-2025-68349 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68349">CVE-2025-68349 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255544">SUSE bug 1255544</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568351" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68351</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68351" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68351" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68351" ref_url="https://www.suse.com/security/cve/CVE-2025-68351" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

exfat: fix refcount leak in exfat_find

Fix refcount leaks in `exfat_find` related to `exfat_get_dentry_set`.

Function `exfat_get_dentry_set` would increase the reference counter of
`es-&gt;bh` on success. Therefore, `exfat_put_dentry_set` must be called
after `exfat_get_dentry_set` to ensure refcount consistency. This patch
relocate two checks to avoid possible leaks.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68351/">CVE-2025-68351 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68351">CVE-2025-68351 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255567">SUSE bug 1255567</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568352" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68352</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68352" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68352" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68352" ref_url="https://www.suse.com/security/cve/CVE-2025-68352" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

spi: ch341: fix out-of-bounds memory access in ch341_transfer_one

Discovered by Atuin - Automated Vulnerability Discovery Engine.

The 'len' variable is calculated as 'min(32, trans-&gt;len + 1)',
which includes the 1-byte command header.

When copying data from 'trans-&gt;tx_buf' to 'ch341-&gt;tx_buf + 1', using 'len'
as the length is incorrect because:

1. It causes an out-of-bounds read from 'trans-&gt;tx_buf' (which has size
   'trans-&gt;len', i.e., 'len - 1' in this context).
2. It can cause an out-of-bounds write to 'ch341-&gt;tx_buf' if 'len' is
   CH341_PACKET_LENGTH (32). Writing 32 bytes to ch341-&gt;tx_buf + 1
   overflows the buffer.

Fix this by copying 'len - 1' bytes.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68352/">CVE-2025-68352 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68352">CVE-2025-68352 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255541">SUSE bug 1255541</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568353" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68353</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68353" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68353" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68353" ref_url="https://www.suse.com/security/cve/CVE-2025-68353" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: vxlan: prevent NULL deref in vxlan_xmit_one

Neither sock4 nor sock6 pointers are guaranteed to be non-NULL in
vxlan_xmit_one, e.g. if the iface is brought down. This can lead to the
following NULL dereference:

  BUG: kernel NULL pointer dereference, address: 0000000000000010
  Oops: Oops: 0000 [#1] SMP NOPTI
  RIP: 0010:vxlan_xmit_one+0xbb3/0x1580
  Call Trace:
   vxlan_xmit+0x429/0x610
   dev_hard_start_xmit+0x55/0xa0
   __dev_queue_xmit+0x6d0/0x7f0
   ip_finish_output2+0x24b/0x590
   ip_output+0x63/0x110

Mentioned commits changed the code path in vxlan_xmit_one and as a side
effect the sock4/6 pointer validity checks in vxlan(6)_get_route were
lost. Fix this by adding back checks.

Since both commits being fixed were released in the same version (v6.7)
and are strongly related, bundle the fixes in a single commit.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68353/">CVE-2025-68353 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68353">CVE-2025-68353 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255533">SUSE bug 1255533</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568354" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68354</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68354" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68354" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68354" ref_url="https://www.suse.com/security/cve/CVE-2025-68354" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

regulator: core: Protect regulator_supply_alias_list with regulator_list_mutex

regulator_supply_alias_list was accessed without any locking in
regulator_supply_alias(), regulator_register_supply_alias(), and
regulator_unregister_supply_alias(). Concurrent registration,
unregistration and lookups can race, leading to:

1 use-after-free if an alias entry is removed while being read,
2 duplicate entries when two threads register the same alias,
3 inconsistent alias mappings observed by consumers.

Protect all traversals, insertions and deletions on
regulator_supply_alias_list with the existing regulator_list_mutex.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68354/">CVE-2025-68354 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68354">CVE-2025-68354 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255553">SUSE bug 1255553</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568356" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68356</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68356" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68356" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68356" ref_url="https://www.suse.com/security/cve/CVE-2025-68356" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gfs2: Prevent recursive memory reclaim

Function new_inode() returns a new inode with inode-&gt;i_mapping-&gt;gfp_mask
set to GFP_HIGHUSER_MOVABLE.  This value includes the __GFP_FS flag, so
allocations in that address space can recurse into filesystem memory
reclaim.  We don't want that to happen because it can consume a
significant amount of stack memory.

Worse than that is that it can also deadlock: for example, in several
places, gfs2_unstuff_dinode() is called inside filesystem transactions.
This calls filemap_grab_folio(), which can allocate a new folio, which
can trigger memory reclaim.  If memory reclaim recurses into the
filesystem and starts another transaction, a deadlock will ensue.

To fix these kinds of problems, prevent memory reclaim from recursing
into filesystem code by making sure that the gfp_mask of inode address
spaces doesn't include __GFP_FS.

The "meta" and resource group address spaces were already using GFP_NOFS
as their gfp_mask (which doesn't include __GFP_FS).  The default value
of GFP_HIGHUSER_MOVABLE is less restrictive than GFP_NOFS, though.  To
avoid being overly limiting, use the default value and only knock off
the __GFP_FS flag.  I'm not sure if this will actually make a
difference, but it also shouldn't hurt.

This patch is loosely based on commit ad22c7a043c2 ("xfs: prevent stack
overflows from page cache allocation").

Fixes xfstest generic/273.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68356/">CVE-2025-68356 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68356">CVE-2025-68356 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255593">SUSE bug 1255593</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568359" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68359</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68359" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68359" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68359" ref_url="https://www.suse.com/security/cve/CVE-2025-68359" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix double free of qgroup record after failure to add delayed ref head

In the previous code it was possible to incur into a double kfree()
scenario when calling add_delayed_ref_head(). This could happen if the
record was reported to already exist in the
btrfs_qgroup_trace_extent_nolock() call, but then there was an error
later on add_delayed_ref_head(). In this case, since
add_delayed_ref_head() returned an error, the caller went to free the
record. Since add_delayed_ref_head() couldn't set this kfree'd pointer
to NULL, then kfree() would have acted on a non-NULL 'record' object
which was pointing to memory already freed by the callee.

The problem comes from the fact that the responsibility to kfree the
object is on both the caller and the callee at the same time. Hence, the
fix for this is to shift the ownership of the 'qrecord' object out of
the add_delayed_ref_head(). That is, we will never attempt to kfree()
the given object inside of this function, and will expect the caller to
act on the 'qrecord' object on its own. The only exception where the
'qrecord' object cannot be kfree'd is if it was inserted into the
tracing logic, for which we already have the 'qrecord_inserted_ret'
boolean to account for this. Hence, the caller has to kfree the object
only if add_delayed_ref_head() reports not to have inserted it on the
tracing logic.

As a side-effect of the above, we must guarantee that
'qrecord_inserted_ret' is properly initialized at the start of the
function, not at the end, and then set when an actual insert
happens. This way we avoid 'qrecord_inserted_ret' having an invalid
value on an early exit.

The documentation from the add_delayed_ref_head() has also been updated
to reflect on the exact ownership of the 'qrecord' object.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68359/">CVE-2025-68359 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68359">CVE-2025-68359 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255542">SUSE bug 1255542</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568360" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68360</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68360" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68360" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68360" ref_url="https://www.suse.com/security/cve/CVE-2025-68360" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mt76: wed: use proper wed reference in mt76 wed driver callabacks

MT7996 driver can use both wed and wed_hif2 devices to offload traffic
from/to the wireless NIC. In the current codebase we assume to always
use the primary wed device in wed callbacks resulting in the following
crash if the hw runs wed_hif2 (e.g. 6GHz link).

[  297.455876] Unable to handle kernel read from unreadable memory at virtual address 000000000000080a
[  297.464928] Mem abort info:
[  297.467722]   ESR = 0x0000000096000005
[  297.471461]   EC = 0x25: DABT (current EL), IL = 32 bits
[  297.476766]   SET = 0, FnV = 0
[  297.479809]   EA = 0, S1PTW = 0
[  297.482940]   FSC = 0x05: level 1 translation fault
[  297.487809] Data abort info:
[  297.490679]   ISV = 0, ISS = 0x00000005, ISS2 = 0x00000000
[  297.496156]   CM = 0, WnR = 0, TnD = 0, TagAccess = 0
[  297.501196]   GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0
[  297.506500] user pgtable: 4k pages, 39-bit VAs, pgdp=0000000107480000
[  297.512927] [000000000000080a] pgd=08000001097fb003, p4d=08000001097fb003, pud=08000001097fb003, pmd=0000000000000000
[  297.523532] Internal error: Oops: 0000000096000005 [#1] SMP
[  297.715393] CPU: 2 UID: 0 PID: 45 Comm: kworker/u16:2 Tainted: G           O       6.12.50 #0
[  297.723908] Tainted: [O]=OOT_MODULE
[  297.727384] Hardware name: Banana Pi BPI-R4 (2x SFP+) (DT)
[  297.732857] Workqueue: nf_ft_offload_del nf_flow_rule_route_ipv6 [nf_flow_table]
[  297.740254] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[  297.747205] pc : mt76_wed_offload_disable+0x64/0xa0 [mt76]
[  297.752688] lr : mtk_wed_flow_remove+0x58/0x80
[  297.757126] sp : ffffffc080fe3ae0
[  297.760430] x29: ffffffc080fe3ae0 x28: ffffffc080fe3be0 x27: 00000000deadbef7
[  297.767557] x26: ffffff80c5ebca00 x25: 0000000000000001 x24: ffffff80c85f4c00
[  297.774683] x23: ffffff80c1875b78 x22: ffffffc080d42cd0 x21: ffffffc080660018
[  297.781809] x20: ffffff80c6a076d0 x19: ffffff80c6a043c8 x18: 0000000000000000
[  297.788935] x17: 0000000000000000 x16: 0000000000000001 x15: 0000000000000000
[  297.796060] x14: 0000000000000019 x13: ffffff80c0ad8ec0 x12: 00000000fa83b2da
[  297.803185] x11: ffffff80c02700c0 x10: ffffff80c0ad8ec0 x9 : ffffff81fef96200
[  297.810311] x8 : ffffff80c02700c0 x7 : ffffff80c02700d0 x6 : 0000000000000002
[  297.817435] x5 : 0000000000000400 x4 : 0000000000000000 x3 : 0000000000000000
[  297.824561] x2 : 0000000000000001 x1 : 0000000000000800 x0 : ffffff80c6a063c8
[  297.831686] Call trace:
[  297.834123]  mt76_wed_offload_disable+0x64/0xa0 [mt76]
[  297.839254]  mtk_wed_flow_remove+0x58/0x80
[  297.843342]  mtk_flow_offload_cmd+0x434/0x574
[  297.847689]  mtk_wed_setup_tc_block_cb+0x30/0x40
[  297.852295]  nf_flow_offload_ipv6_hook+0x7f4/0x964 [nf_flow_table]
[  297.858466]  nf_flow_rule_route_ipv6+0x438/0x4a4 [nf_flow_table]
[  297.864463]  process_one_work+0x174/0x300
[  297.868465]  worker_thread+0x278/0x430
[  297.872204]  kthread+0xd8/0xdc
[  297.875251]  ret_from_fork+0x10/0x20
[  297.878820] Code: 928b5ae0 8b000273 91400a60 f943fa61 (79401421)
[  297.884901] ---[ end trace 0000000000000000 ]---

Fix the issue detecting the proper wed reference to use running wed
callabacks.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68360/">CVE-2025-68360 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68360">CVE-2025-68360 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255536">SUSE bug 1255536</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568361" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68361</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68361" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68361" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68361" ref_url="https://www.suse.com/security/cve/CVE-2025-68361" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

erofs: limit the level of fs stacking for file-backed mounts

Otherwise, it could cause potential kernel stack overflow (e.g., EROFS
mounting itself).
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68361/">CVE-2025-68361 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68361">CVE-2025-68361 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255526">SUSE bug 1255526</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568362" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68362</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68362" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68362" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68362" ref_url="https://www.suse.com/security/cve/CVE-2025-68362" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: rtl818x: rtl8187: Fix potential buffer underflow in rtl8187_rx_cb()

The rtl8187_rx_cb() calculates the rx descriptor header address
by subtracting its size from the skb tail pointer.
However, it does not validate if the received packet
(skb-&gt;len from urb-&gt;actual_length) is large enough to contain this
header.

If a truncated packet is received, this will lead to a buffer
underflow, reading memory before the start of the skb data area,
and causing a kernel panic.

Add length checks for both rtl8187 and rtl8187b descriptor headers
before attempting to access them, dropping the packet cleanly if the
check fails.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68362/">CVE-2025-68362 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68362">CVE-2025-68362 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255611">SUSE bug 1255611</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568363" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68363</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68363" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68363" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68363" ref_url="https://www.suse.com/security/cve/CVE-2025-68363" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Check skb-&gt;transport_header is set in bpf_skb_check_mtu

The bpf_skb_check_mtu helper needs to use skb-&gt;transport_header when
the BPF_MTU_CHK_SEGS flag is used:

	bpf_skb_check_mtu(skb, ifindex, &amp;mtu_len, 0, BPF_MTU_CHK_SEGS)

The transport_header is not always set. There is a WARN_ON_ONCE
report when CONFIG_DEBUG_NET is enabled + skb-&gt;gso_size is set +
bpf_prog_test_run is used:

WARNING: CPU: 1 PID: 2216 at ./include/linux/skbuff.h:3071
 skb_gso_validate_network_len
 bpf_skb_check_mtu
 bpf_prog_3920e25740a41171_tc_chk_segs_flag # A test in the next patch
 bpf_test_run
 bpf_prog_test_run_skb

For a normal ingress skb (not test_run), skb_reset_transport_header
is performed but there is plan to avoid setting it as described in
commit 2170a1f09148 ("net: no longer reset transport_header in __netif_receive_skb_core()").

This patch fixes the bpf helper by checking
skb_transport_header_was_set(). The check is done just before
skb-&gt;transport_header is used, to avoid breaking the existing bpf prog.
The WARN_ON_ONCE is limited to bpf_prog_test_run, so targeting bpf-next.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68363/">CVE-2025-68363 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68363">CVE-2025-68363 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255552">SUSE bug 1255552</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568366" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68366</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68366" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68366" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68366" ref_url="https://www.suse.com/security/cve/CVE-2025-68366" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nbd: defer config unlock in nbd_genl_connect

There is one use-after-free warning when running NBD_CMD_CONNECT and
NBD_CLEAR_SOCK:

nbd_genl_connect
  nbd_alloc_and_init_config // config_refs=1
  nbd_start_device // config_refs=2
  set NBD_RT_HAS_CONFIG_REF			open nbd // config_refs=3
  recv_work done // config_refs=2
						NBD_CLEAR_SOCK // config_refs=1
						close nbd // config_refs=0
  refcount_inc -&gt; uaf

------------[ cut here ]------------
refcount_t: addition on 0; use-after-free.
WARNING: CPU: 24 PID: 1014 at lib/refcount.c:25 refcount_warn_saturate+0x12e/0x290
 nbd_genl_connect+0x16d0/0x1ab0
 genl_family_rcv_msg_doit+0x1f3/0x310
 genl_rcv_msg+0x44a/0x790

The issue can be easily reproduced by adding a small delay before
refcount_inc(&amp;nbd-&gt;config_refs) in nbd_genl_connect():

        mutex_unlock(&amp;nbd-&gt;config_lock);
        if (!ret) {
                set_bit(NBD_RT_HAS_CONFIG_REF, &amp;config-&gt;runtime_flags);
+               printk("before sleep\n");
+               mdelay(5 * 1000);
+               printk("after sleep\n");
                refcount_inc(&amp;nbd-&gt;config_refs);
                nbd_connect_reply(info, nbd-&gt;index);
        }
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68366/">CVE-2025-68366 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68366">CVE-2025-68366 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255622">SUSE bug 1255622</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568367" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68367</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68367" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68367" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68367" ref_url="https://www.suse.com/security/cve/CVE-2025-68367" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

macintosh/mac_hid: fix race condition in mac_hid_toggle_emumouse

The following warning appears when running syzkaller, and this issue also
exists in the mainline code.

 ------------[ cut here ]------------
 list_add double add: new=ffffffffa57eee28, prev=ffffffffa57eee28, next=ffffffffa5e63100.
 WARNING: CPU: 0 PID: 1491 at lib/list_debug.c:35 __list_add_valid_or_report+0xf7/0x130
 Modules linked in:
 CPU: 0 PID: 1491 Comm: syz.1.28 Not tainted 6.6.0+ #3
 Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014
 RIP: 0010:__list_add_valid_or_report+0xf7/0x130
 RSP: 0018:ff1100010dfb7b78 EFLAGS: 00010282
 RAX: 0000000000000000 RBX: ffffffffa57eee18 RCX: ffffffff97fc9817
 RDX: 0000000000040000 RSI: ffa0000002383000 RDI: 0000000000000001
 RBP: ffffffffa57eee28 R08: 0000000000000001 R09: ffe21c0021bf6f2c
 R10: 0000000000000001 R11: 6464615f7473696c R12: ffffffffa5e63100
 R13: ffffffffa57eee28 R14: ffffffffa57eee28 R15: ff1100010dfb7d48
 FS:  00007fb14398b640(0000) GS:ff11000119600000(0000) knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: 0000000000000000 CR3: 000000010d096005 CR4: 0000000000773ef0
 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
 PKRU: 80000000
 Call Trace:
  &lt;TASK&gt;
  input_register_handler+0xb3/0x210
  mac_hid_start_emulation+0x1c5/0x290
  mac_hid_toggle_emumouse+0x20a/0x240
  proc_sys_call_handler+0x4c2/0x6e0
  new_sync_write+0x1b1/0x2d0
  vfs_write+0x709/0x950
  ksys_write+0x12a/0x250
  do_syscall_64+0x5a/0x110
  entry_SYSCALL_64_after_hwframe+0x78/0xe2

The WARNING occurs when two processes concurrently write to the mac-hid
emulation sysctl, causing a race condition in mac_hid_toggle_emumouse().
Both processes read old_val=0, then both try to register the input handler,
leading to a double list_add of the same handler.

  CPU0                             CPU1
  -------------------------        -------------------------
  vfs_write() //write 1            vfs_write()  //write 1
    proc_sys_write()                 proc_sys_write()
      mac_hid_toggle_emumouse()          mac_hid_toggle_emumouse()
        old_val = *valp // old_val=0
                                           old_val = *valp // old_val=0
                                           mutex_lock_killable()
                                           proc_dointvec() // *valp=1
                                           mac_hid_start_emulation()
                                             input_register_handler()
                                           mutex_unlock()
        mutex_lock_killable()
        proc_dointvec()
        mac_hid_start_emulation()
          input_register_handler() //Trigger Warning
        mutex_unlock()

Fix this by moving the old_val read inside the mutex lock region.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68367/">CVE-2025-68367 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68367">CVE-2025-68367 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255547">SUSE bug 1255547</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568368" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68368</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68368" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68368" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68368" ref_url="https://www.suse.com/security/cve/CVE-2025-68368" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

md: init bioset in mddev_init

IO operations may be needed before md_run(), such as updating metadata
after writing sysfs. Without bioset, this triggers a NULL pointer
dereference as below:

 BUG: kernel NULL pointer dereference, address: 0000000000000020
 Call Trace:
  md_update_sb+0x658/0xe00
  new_level_store+0xc5/0x120
  md_attr_store+0xc9/0x1e0
  sysfs_kf_write+0x6f/0xa0
  kernfs_fop_write_iter+0x141/0x2a0
  vfs_write+0x1fc/0x5a0
  ksys_write+0x79/0x180
  __x64_sys_write+0x1d/0x30
  x64_sys_call+0x2818/0x2880
  do_syscall_64+0xa9/0x580
  entry_SYSCALL_64_after_hwframe+0x4b/0x53

Reproducer
```
  mdadm -CR /dev/md0 -l1 -n2 /dev/sd[cd]
  echo inactive &gt; /sys/block/md0/md/array_state
  echo 10 &gt; /sys/block/md0/md/new_level
```

mddev_init() can only be called once per mddev, no need to test if bioset
has been initialized anymore.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68368/">CVE-2025-68368 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68368">CVE-2025-68368 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255527">SUSE bug 1255527</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568371" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68371</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68371" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68371" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68371" ref_url="https://www.suse.com/security/cve/CVE-2025-68371" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: smartpqi: Fix device resources accessed after device removal

Correct possible race conditions during device removal.

Previously, a scheduled work item to reset a LUN could still execute
after the device was removed, leading to use-after-free and other
resource access issues.

This race condition occurs because the abort handler may schedule a LUN
reset concurrently with device removal via sdev_destroy(), leading to
use-after-free and improper access to freed resources.

  - Check in the device reset handler if the device is still present in
    the controller's SCSI device list before running; if not, the reset
    is skipped.

  - Cancel any pending TMF work that has not started in sdev_destroy().

  - Ensure device freeing in sdev_destroy() is done while holding the
    LUN reset mutex to avoid races with ongoing resets.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68371/">CVE-2025-68371 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68371">CVE-2025-68371 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255572">SUSE bug 1255572</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568372" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68372</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68372" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68372" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68372" ref_url="https://www.suse.com/security/cve/CVE-2025-68372" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nbd: defer config put in recv_work

There is one uaf issue in recv_work when running NBD_CLEAR_SOCK and
NBD_CMD_RECONFIGURE:
  nbd_genl_connect     // conf_ref=2 (connect and recv_work A)
  nbd_open	       // conf_ref=3
  recv_work A done     // conf_ref=2
  NBD_CLEAR_SOCK       // conf_ref=1
  nbd_genl_reconfigure // conf_ref=2 (trigger recv_work B)
  close nbd	       // conf_ref=1
  recv_work B
    config_put         // conf_ref=0
    atomic_dec(&amp;config-&gt;recv_threads); -&gt; UAF

Or only running NBD_CLEAR_SOCK:
  nbd_genl_connect   // conf_ref=2
  nbd_open 	     // conf_ref=3
  NBD_CLEAR_SOCK     // conf_ref=2
  close nbd
    nbd_release
      config_put     // conf_ref=1
  recv_work
    config_put 	     // conf_ref=0
    atomic_dec(&amp;config-&gt;recv_threads); -&gt; UAF

Commit 87aac3a80af5 ("nbd: call nbd_config_put() before notifying the
waiter") moved nbd_config_put() to run before waking up the waiter in
recv_work, in order to ensure that nbd_start_device_ioctl() would not
be woken up while nbd-&gt;task_recv was still uncleared.

However, in nbd_start_device_ioctl(), after being woken up it explicitly
calls flush_workqueue() to make sure all current works are finished.
Therefore, there is no need to move the config put ahead of the wakeup.

Move nbd_config_put() to the end of recv_work, so that the reference is
held for the whole lifetime of the worker thread. This makes sure the
config cannot be freed while recv_work is still running, even if clear
+ reconfigure interleave.

In addition, we don't need to worry about recv_work dropping the last
nbd_put (which causes deadlock):

path A (netlink with NBD_CFLAG_DESTROY_ON_DISCONNECT):
  connect  // nbd_refs=1 (trigger recv_work)
  open nbd // nbd_refs=2
  NBD_CLEAR_SOCK
  close nbd
    nbd_release
      nbd_disconnect_and_put
        flush_workqueue // recv_work done
      nbd_config_put
        nbd_put // nbd_refs=1
      nbd_put // nbd_refs=0
        queue_work

path B (netlink without NBD_CFLAG_DESTROY_ON_DISCONNECT):
  connect  // nbd_refs=2 (trigger recv_work)
  open nbd // nbd_refs=3
  NBD_CLEAR_SOCK // conf_refs=2
  close nbd
    nbd_release
      nbd_config_put // conf_refs=1
      nbd_put // nbd_refs=2
  recv_work done // conf_refs=0, nbd_refs=1
  rmmod // nbd_refs=0

Depends-on: e2daec488c57 ("nbd: Fix hungtask when nbd_config_put")
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68372/">CVE-2025-68372 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68372">CVE-2025-68372 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255537">SUSE bug 1255537</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568374" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68374</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68374" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68374" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68374" ref_url="https://www.suse.com/security/cve/CVE-2025-68374" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

md: fix rcu protection in md_wakeup_thread

We attempted to use RCU to protect the pointer 'thread', but directly
passed the value when calling md_wakeup_thread(). This means that the
RCU pointer has been acquired before rcu_read_lock(), which renders
rcu_read_lock() ineffective and could lead to a use-after-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68374/">CVE-2025-68374 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68374">CVE-2025-68374 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255530">SUSE bug 1255530</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568376" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68376</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68376" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68376" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68376" ref_url="https://www.suse.com/security/cve/CVE-2025-68376" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

coresight: ETR: Fix ETR buffer use-after-free issue

When ETR is enabled as CS_MODE_SYSFS, if the buffer size is changed
and enabled again, currently sysfs_buf will point to the newly
allocated memory(buf_new) and free the old memory(buf_old). But the
etr_buf that is being used by the ETR remains pointed to buf_old, not
updated to buf_new. In this case, it will result in a memory
use-after-free issue.

Fix this by checking ETR's mode before updating and releasing buf_old,
if the mode is CS_MODE_SYSFS, then skip updating and releasing it.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68376/">CVE-2025-68376 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68376">CVE-2025-68376 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255529">SUSE bug 1255529</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568378" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68378</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68378" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68378" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68378" ref_url="https://www.suse.com/security/cve/CVE-2025-68378" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix stackmap overflow check in __bpf_get_stackid()

Syzkaller reported a KASAN slab-out-of-bounds write in __bpf_get_stackid()
when copying stack trace data. The issue occurs when the perf trace
 contains more stack entries than the stack map bucket can hold,
 leading to an out-of-bounds write in the bucket's data array.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68378/">CVE-2025-68378 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68378">CVE-2025-68378 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255614">SUSE bug 1255614</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568379" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68379</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68379" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68379" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68379" ref_url="https://www.suse.com/security/cve/CVE-2025-68379" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/rxe: Fix null deref on srq-&gt;rq.queue after resize failure

A NULL pointer dereference can occur in rxe_srq_chk_attr() when
ibv_modify_srq() is invoked twice in succession under certain error
conditions. The first call may fail in rxe_queue_resize(), which leads
rxe_srq_from_attr() to set srq-&gt;rq.queue = NULL. The second call then
triggers a crash (null deref) when accessing
srq-&gt;rq.queue-&gt;buf-&gt;index_mask.

Call Trace:
&lt;TASK&gt;
rxe_modify_srq+0x170/0x480 [rdma_rxe]
? __pfx_rxe_modify_srq+0x10/0x10 [rdma_rxe]
? uverbs_try_lock_object+0x4f/0xa0 [ib_uverbs]
? rdma_lookup_get_uobject+0x1f0/0x380 [ib_uverbs]
ib_uverbs_modify_srq+0x204/0x290 [ib_uverbs]
? __pfx_ib_uverbs_modify_srq+0x10/0x10 [ib_uverbs]
? tryinc_node_nr_active+0xe6/0x150
? uverbs_fill_udata+0xed/0x4f0 [ib_uverbs]
ib_uverbs_handler_UVERBS_METHOD_INVOKE_WRITE+0x2c0/0x470 [ib_uverbs]
? __pfx_ib_uverbs_handler_UVERBS_METHOD_INVOKE_WRITE+0x10/0x10 [ib_uverbs]
? uverbs_fill_udata+0xed/0x4f0 [ib_uverbs]
ib_uverbs_run_method+0x55a/0x6e0 [ib_uverbs]
? __pfx_ib_uverbs_handler_UVERBS_METHOD_INVOKE_WRITE+0x10/0x10 [ib_uverbs]
ib_uverbs_cmd_verbs+0x54d/0x800 [ib_uverbs]
? __pfx_ib_uverbs_cmd_verbs+0x10/0x10 [ib_uverbs]
? __pfx___raw_spin_lock_irqsave+0x10/0x10
? __pfx_do_vfs_ioctl+0x10/0x10
? ioctl_has_perm.constprop.0.isra.0+0x2c7/0x4c0
? __pfx_ioctl_has_perm.constprop.0.isra.0+0x10/0x10
ib_uverbs_ioctl+0x13e/0x220 [ib_uverbs]
? __pfx_ib_uverbs_ioctl+0x10/0x10 [ib_uverbs]
__x64_sys_ioctl+0x138/0x1c0
do_syscall_64+0x82/0x250
? fdget_pos+0x58/0x4c0
? ksys_write+0xf3/0x1c0
? __pfx_ksys_write+0x10/0x10
? do_syscall_64+0xc8/0x250
? __pfx_vm_mmap_pgoff+0x10/0x10
? fget+0x173/0x230
? fput+0x2a/0x80
? ksys_mmap_pgoff+0x224/0x4c0
? do_syscall_64+0xc8/0x250
? do_user_addr_fault+0x37b/0xfe0
? clear_bhb_loop+0x50/0xa0
? clear_bhb_loop+0x50/0xa0
? clear_bhb_loop+0x50/0xa0
entry_SYSCALL_64_after_hwframe+0x76/0x7e
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68379/">CVE-2025-68379 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68379">CVE-2025-68379 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255695">SUSE bug 1255695</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568380" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68380</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68380" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68380" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68380" ref_url="https://www.suse.com/security/cve/CVE-2025-68380" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath11k: fix peer HE MCS assignment

In ath11k_wmi_send_peer_assoc_cmd(), peer's transmit MCS is sent to
firmware as receive MCS while peer's receive MCS sent as transmit MCS,
which goes against firmwire's definition.

While connecting to a misbehaved AP that advertises 0xffff (meaning not
supported) for 160 MHz transmit MCS map, firmware crashes due to 0xffff
is assigned to he_mcs-&gt;rx_mcs_set field.

	Ext Tag: HE Capabilities
	    [...]
	    Supported HE-MCS and NSS Set
		[...]
	        Rx and Tx MCS Maps 160 MHz
		    [...]
	            Tx HE-MCS Map 160 MHz: 0xffff

Swap the assignment to fix this issue.

As the HE rate control mask is meant to limit our own transmit MCS, it
needs to go via he_mcs-&gt;rx_mcs_set field. With the aforementioned swapping
done, change is needed as well to apply it to the peer's receive MCS.

Tested-on: WCN6855 hw2.1 PCI WLAN.HSP.1.1-03125-QCAHSPSWPL_V1_V2_SILICONZ_LITE-3.6510.41
Tested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.4.1-00199-QCAHKSWPL_SILICONZ-1
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68380/">CVE-2025-68380 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68380">CVE-2025-68380 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255580">SUSE bug 1255580</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568431" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68431</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68431" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68431" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68431" ref_url="https://www.suse.com/security/cve/CVE-2025-68431" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0087-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023728.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0377-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024044.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20121-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043750.html" source="SUSE-SU"/>
    <description>
    libheif is an HEIF and AVIF file format decoder and encoder. Prior to version 1.21.0, a crafted HEIF that exercises the overlay image item path triggers a heap buffer over-read in `HeifPixelImage::overlay()`. The function computes a negative row length (likely from an unclipped overlay rectangle or invalid offsets), which then underflows when converted to `size_t` and is passed to `memcpy`, causing a very large read past the end of the source plane and a crash. Version 1.21.0 contains a patch. As a workaround, avoid decoding images using `iovl` overlay boxes.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-25"/>
	<updated date="2026-02-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68431/">CVE-2025-68431 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68431">CVE-2025-68431 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255735">SUSE bug 1255735</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039641" comment="gdk-pixbuf-loader-libheif-1.19.7-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009752979" comment="gdk-pixbuf-loader-libheif is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039642" comment="libheif-aom-1.19.7-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039768" comment="libheif-aom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039643" comment="libheif-dav1d-1.19.7-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039769" comment="libheif-dav1d is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039644" comment="libheif-devel-1.19.7-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009752980" comment="libheif-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039645" comment="libheif-ffmpeg-1.19.7-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039770" comment="libheif-ffmpeg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039646" comment="libheif-jpeg-1.19.7-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039771" comment="libheif-jpeg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039647" comment="libheif-openjpeg-1.19.7-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039772" comment="libheif-openjpeg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039648" comment="libheif-rav1e-1.19.7-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039773" comment="libheif-rav1e is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039649" comment="libheif-svtenc-1.19.7-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039774" comment="libheif-svtenc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039650" comment="libheif1-1.19.7-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009752981" comment="libheif1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568460" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68460</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68460" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68460" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68460" ref_url="https://www.suse.com/security/cve/CVE-2025-68460" source="SUSE CVE"/>
    <description>
    Roundcube Webmail before 1.5.12 and 1.6 before 1.6.12 is prone to a information disclosure vulnerability in the HTML style sanitizer.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-06"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-68460/">CVE-2025-68460 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68460">CVE-2025-68460 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255306">SUSE bug 1255306</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047349" comment="roundcubemail-1.6.13-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152670" comment="roundcubemail is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568461" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68461</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68461" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68461" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68461" ref_url="https://www.suse.com/security/cve/CVE-2025-68461" source="SUSE CVE"/>
    <description>
    Roundcube Webmail before 1.5.12 and 1.6 before 1.6.12 is prone to a Cross-Site-Scripting (XSS) vulnerability via the animate tag in an SVG document.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-06"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-68461/">CVE-2025-68461 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68461">CVE-2025-68461 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255308">SUSE bug 1255308</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047349" comment="roundcubemail-1.6.13-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152670" comment="roundcubemail is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568468" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68468</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68468" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68468" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68468" ref_url="https://www.suse.com/security/cve/CVE-2025-68468" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024497.html" source="SUSE-SU"/>
    <description>
    Avahi is a system which facilitates service discovery on a local network via the mDNS/DNS-SD protocol suite. In 0.9-rc2 and earlier, avahi-daemon can be crashed by sending unsolicited announcements containing CNAME resource records pointing it to resource records with short TTLs. As soon as they expire avahi-daemon crashes.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-27"/>
	<updated date="2026-03-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68468/">CVE-2025-68468 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68468">CVE-2025-68468 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256499">SUSE bug 1256499</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040025" comment="avahi-0.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151208" comment="avahi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040026" comment="avahi-autoipd-0.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151209" comment="avahi-autoipd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040027" comment="avahi-compat-howl-devel-0.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243729" comment="avahi-compat-howl-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040028" comment="avahi-compat-mDNSResponder-devel-0.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151210" comment="avahi-compat-mDNSResponder-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040029" comment="avahi-lang-0.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151211" comment="avahi-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040030" comment="avahi-utils-0.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243733" comment="avahi-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040031" comment="avahi-utils-gtk-0.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243734" comment="avahi-utils-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040032" comment="libavahi-client3-0.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151212" comment="libavahi-client3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040033" comment="libavahi-common3-0.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151214" comment="libavahi-common3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040034" comment="libavahi-core7-0.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151216" comment="libavahi-core7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040035" comment="libavahi-devel-0.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151217" comment="libavahi-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040036" comment="libavahi-glib-devel-0.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243735" comment="libavahi-glib-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040037" comment="libavahi-glib1-0.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243736" comment="libavahi-glib1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040038" comment="libavahi-gobject-devel-0.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243738" comment="libavahi-gobject-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040039" comment="libavahi-gobject0-0.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243739" comment="libavahi-gobject0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040040" comment="libavahi-libevent1-0.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009755253" comment="libavahi-libevent1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040041" comment="libavahi-qt6-1-0.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037217" comment="libavahi-qt6-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040042" comment="libavahi-qt6-devel-0.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037218" comment="libavahi-qt6-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040043" comment="libavahi-ui-gtk3-0-0.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243742" comment="libavahi-ui-gtk3-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040044" comment="libdns_sd-0.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151218" comment="libdns_sd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040045" comment="libhowl0-0.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243745" comment="libhowl0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040046" comment="python3-avahi-gtk-0.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009346637" comment="python3-avahi-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040047" comment="python313-avahi-0.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037219" comment="python313-avahi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040048" comment="typelib-1_0-Avahi-0_6-0.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243748" comment="typelib-1_0-Avahi-0_6 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568471" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68471</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68471" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68471" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68471" ref_url="https://www.suse.com/security/cve/CVE-2025-68471" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0143-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023789.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0259-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0422-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024097.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0577-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20167-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024497.html" source="SUSE-SU"/>
    <description>
    Avahi is a system which facilitates service discovery on a local network via the mDNS/DNS-SD protocol suite. In 0.9-rc2 and earlier, avahi-daemon can be crashed by sending 2 unsolicited announcements with CNAME resource records 2 seconds apart.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-27"/>
	<updated date="2026-03-01"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68471/">CVE-2025-68471 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68471">CVE-2025-68471 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256500">SUSE bug 1256500</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040025" comment="avahi-0.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151208" comment="avahi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040026" comment="avahi-autoipd-0.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151209" comment="avahi-autoipd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040027" comment="avahi-compat-howl-devel-0.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243729" comment="avahi-compat-howl-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040028" comment="avahi-compat-mDNSResponder-devel-0.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151210" comment="avahi-compat-mDNSResponder-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040029" comment="avahi-lang-0.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151211" comment="avahi-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040030" comment="avahi-utils-0.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243733" comment="avahi-utils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040031" comment="avahi-utils-gtk-0.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243734" comment="avahi-utils-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040032" comment="libavahi-client3-0.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151212" comment="libavahi-client3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040033" comment="libavahi-common3-0.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151214" comment="libavahi-common3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040034" comment="libavahi-core7-0.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151216" comment="libavahi-core7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040035" comment="libavahi-devel-0.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151217" comment="libavahi-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040036" comment="libavahi-glib-devel-0.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243735" comment="libavahi-glib-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040037" comment="libavahi-glib1-0.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243736" comment="libavahi-glib1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040038" comment="libavahi-gobject-devel-0.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243738" comment="libavahi-gobject-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040039" comment="libavahi-gobject0-0.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243739" comment="libavahi-gobject0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040040" comment="libavahi-libevent1-0.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009755253" comment="libavahi-libevent1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040041" comment="libavahi-qt6-1-0.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037217" comment="libavahi-qt6-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040042" comment="libavahi-qt6-devel-0.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037218" comment="libavahi-qt6-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040043" comment="libavahi-ui-gtk3-0-0.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243742" comment="libavahi-ui-gtk3-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040044" comment="libdns_sd-0.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151218" comment="libdns_sd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040045" comment="libhowl0-0.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243745" comment="libhowl0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040046" comment="python3-avahi-gtk-0.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009346637" comment="python3-avahi-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040047" comment="python313-avahi-0.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037219" comment="python313-avahi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010040048" comment="typelib-1_0-Avahi-0_6-0.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009243748" comment="typelib-1_0-Avahi-0_6 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568480" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68480</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68480" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68480" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68480" ref_url="https://www.suse.com/security/cve/CVE-2025-68480" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0226-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20130-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043741.html" source="SUSE-SU"/>
    <description>
    Marshmallow is a lightweight library for converting complex objects to and from simple Python datatypes. In versions from 3.0.0rc1 to before 3.26.2 and from 4.0.0 to before 4.1.2, Schema.load(data, many=True) is vulnerable to denial of service attacks. A moderately sized request can consume a disproportionate amount of CPU time. This issue has been patched in version 3.26.2 and 4.1.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-25"/>
	<updated date="2026-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68480/">CVE-2025-68480 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68480">CVE-2025-68480 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255473">SUSE bug 1255473</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039705" comment="python-marshmallow-doc-3.20.2-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039775" comment="python-marshmallow-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039706" comment="python313-marshmallow-3.20.2-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039776" comment="python313-marshmallow is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68615</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68615" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68615" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68615" ref_url="https://www.suse.com/security/cve/CVE-2025-68615" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0696" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003171.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0750" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002405.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0812" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0225-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0227-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0227-2" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20267-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024211.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20751-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024833.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20901-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025112.html" source="SUSE-SU"/>
    <description>
    net-snmp is a SNMP application library, tools and daemon. Prior to versions 5.9.5 and 5.10.pre2, a specially crafted packet to an net-snmp snmptrapd daemon can cause a buffer overflow and the daemon to crash. This issue has been patched in versions 5.9.5 and 5.10.pre2.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-25"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68615/">CVE-2025-68615 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68615">CVE-2025-68615 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255491">SUSE bug 1255491</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050013" comment="libsnmp40-5.9.4-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009726675" comment="libsnmp40 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050172" comment="net-snmp-5.9.4-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151708" comment="net-snmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050173" comment="net-snmp-devel-5.9.4-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151709" comment="net-snmp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050174" comment="perl-SNMP-5.9.4-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151710" comment="perl-SNMP is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050175" comment="python313-net-snmp-5.9.4-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010050229" comment="python313-net-snmp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050014" comment="snmp-mibs-5.9.4-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151711" comment="snmp-mibs is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568616" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68616</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68616" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68616" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68616" ref_url="https://www.suse.com/security/cve/CVE-2025-68616" source="SUSE CVE"/>
    <description>
    WeasyPrint helps web developers to create PDF documents. Prior to version 68.0, a server-side request forgery (SSRF) protection bypass exists in WeasyPrint's `default_url_fetcher`. The vulnerability allows attackers to access internal network resources (such as `localhost` services or cloud metadata endpoints) even when a developer has implemented a custom `url_fetcher` to block such access. This occurs because the underlying `urllib` library follows HTTP redirects automatically without re-validating the new destination against the developer's security policy. Version 68.0 contains a patch for the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-22"/>
	<updated date="2026-02-20"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-68616/">CVE-2025-68616 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68616">CVE-2025-68616 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256936">SUSE bug 1256936</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010038476" comment="python313-weasyprint-65.1-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010038477" comment="python313-weasyprint is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568618" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68618</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68618" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68618" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68618" ref_url="https://www.suse.com/security/cve/CVE-2025-68618" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023733.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024032.html" source="SUSE-SU"/>
    <description>
    ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to version 7.1.2-12, using Magick to read a malicious SVG file resulted in a DoS attack. Version 7.1.2-12 fixes the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-02-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="5.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68618/">CVE-2025-68618 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68618">CVE-2025-68618 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255821">SUSE bug 1255821</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041321" comment="ImageMagick-7.1.2.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041322" comment="ImageMagick-config-7-SUSE-7.1.2.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041323" comment="ImageMagick-config-7-upstream-limited-7.1.2.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977490" comment="ImageMagick-config-7-upstream-limited is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041324" comment="ImageMagick-config-7-upstream-open-7.1.2.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977491" comment="ImageMagick-config-7-upstream-open is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041325" comment="ImageMagick-config-7-upstream-secure-7.1.2.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977492" comment="ImageMagick-config-7-upstream-secure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041326" comment="ImageMagick-config-7-upstream-websafe-7.1.2.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977493" comment="ImageMagick-config-7-upstream-websafe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041327" comment="ImageMagick-devel-7.1.2.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041328" comment="ImageMagick-doc-7.1.2.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041329" comment="ImageMagick-extra-7.1.2.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041330" comment="libMagick++-7_Q16HDRI5-7.1.2.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698047" comment="libMagick++-7_Q16HDRI5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041331" comment="libMagick++-devel-7.1.2.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041332" comment="libMagickCore-7_Q16HDRI10-7.1.2.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698048" comment="libMagickCore-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041333" comment="libMagickWand-7_Q16HDRI10-7.1.2.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698049" comment="libMagickWand-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041334" comment="perl-PerlMagick-7.1.2.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568670" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68670</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68670" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68670" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68670" ref_url="https://www.suse.com/security/cve/CVE-2025-68670" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0404-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0433-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024137.html" source="SUSE-SU"/>
    <description>
    xrdp is an open source RDP server. xrdp before v0.10.5 contains an unauthenticated stack-based buffer overflow vulnerability. The issue stems from improper bounds checking when processing user domain information during the connection sequence. If exploited, the vulnerability could allow remote attackers to execute arbitrary code on the target system. The vulnerability allows an attacker to overwrite the stack buffer and the return address, which could theoretically be used to redirect the execution flow. The impact of this vulnerability is lessened if a compiler flag has been used to build the xrdp executable with stack canary protection. If this is the case, a second vulnerability would need to be used to leak the stack canary value. Upgrade to version 0.10.5 to receive a patch. Additionally, do not rely on stack canary protection on production systems.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-04"/>
	<updated date="2026-02-13"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68670/">CVE-2025-68670 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68670">CVE-2025-68670 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257362">SUSE bug 1257362</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041939" comment="libpainter0-0.9.26-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287510" comment="libpainter0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041940" comment="librfxencode0-0.9.26-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287511" comment="librfxencode0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041941" comment="xrdp-0.9.26-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287512" comment="xrdp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041942" comment="xrdp-devel-0.9.26-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287513" comment="xrdp-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568724" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68724</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68724" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68724" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68724" ref_url="https://www.suse.com/security/cve/CVE-2025-68724" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: asymmetric_keys - prevent overflow in asymmetric_key_generate_id

Use check_add_overflow() to guard against potential integer overflows
when adding the binary blob lengths and the size of an asymmetric_key_id
structure and return ERR_PTR(-EOVERFLOW) accordingly. This prevents a
possible buffer overflow when copying data from potentially malicious
X.509 certificate fields that can be arbitrarily large, such as ASN.1
INTEGER serial numbers, issuer names, etc.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68724/">CVE-2025-68724 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68724">CVE-2025-68724 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255550">SUSE bug 1255550</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568725" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68725</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68725" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68725" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68725" ref_url="https://www.suse.com/security/cve/CVE-2025-68725" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Do not let BPF test infra emit invalid GSO types to stack

Yinhao et al. reported that their fuzzer tool was able to trigger a
skb_warn_bad_offload() from netif_skb_features() -&gt; gso_features_check().
When a BPF program - triggered via BPF test infra - pushes the packet
to the loopback device via bpf_clone_redirect() then mentioned offload
warning can be seen. GSO-related features are then rightfully disabled.

We get into this situation due to convert___skb_to_skb() setting
gso_segs and gso_size but not gso_type. Technically, it makes sense
that this warning triggers since the GSO properties are malformed due
to the gso_type. Potentially, the gso_type could be marked non-trustworthy
through setting it at least to SKB_GSO_DODGY without any other specific
assumptions, but that also feels wrong given we should not go further
into the GSO engine in the first place.

The checks were added in 121d57af308d ("gso: validate gso_type in GSO
handlers") because there were malicious (syzbot) senders that combine
a protocol with a non-matching gso_type. If we would want to drop such
packets, gso_features_check() currently only returns feature flags via
netif_skb_features(), so one location for potentially dropping such skbs
could be validate_xmit_unreadable_skb(), but then otoh it would be
an additional check in the fast-path for a very corner case. Given
bpf_clone_redirect() is the only place where BPF test infra could emit
such packets, lets reject them right there.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68725/">CVE-2025-68725 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68725">CVE-2025-68725 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255569">SUSE bug 1255569</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68732</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68732" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68732" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68732" ref_url="https://www.suse.com/security/cve/CVE-2025-68732" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0263-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0317-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gpu: host1x: Fix race in syncpt alloc/free

Fix race condition between host1x_syncpt_alloc()
and host1x_syncpt_put() by using kref_put_mutex()
instead of kref_put() + manual mutex locking.

This ensures no thread can acquire the
syncpt_mutex after the refcount drops to zero
but before syncpt_release acquires it.
This prevents races where syncpoints could
be allocated while still being cleaned up
from a previous release.

Remove explicit mutex locking in syncpt_release
as kref_put_mutex() handles this atomically.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68732/">CVE-2025-68732 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68732">CVE-2025-68732 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255688">SUSE bug 1255688</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1255689">SUSE bug 1255689</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568735" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68735</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68735" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68735" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68735" ref_url="https://www.suse.com/security/cve/CVE-2025-68735" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/panthor: Prevent potential UAF in group creation

This commit prevents the possibility of a use after free issue in the
GROUP_CREATE ioctl function, which arose as pointer to the group is
accessed in that ioctl function after storing it in the Xarray.
A malicious userspace can second guess the handle of a group and try
to call GROUP_DESTROY ioctl from another thread around the same time
as GROUP_CREATE ioctl.

To prevent the use after free exploit, this commit uses a mark on an
entry of group pool Xarray which is added just before returning from
the GROUP_CREATE ioctl function. The mark is checked for all ioctls
that specify the group handle and so userspace won't be abe to delete
a group that isn't marked yet.

v2: Add R-bs and fixes tags
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-27"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68735/">CVE-2025-68735 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68735">CVE-2025-68735 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255811">SUSE bug 1255811</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256251">SUSE bug 1256251</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568736" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68736</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68736" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68736" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68736" ref_url="https://www.suse.com/security/cve/CVE-2025-68736" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

landlock: Fix handling of disconnected directories

Disconnected files or directories can appear when they are visible and
opened from a bind mount, but have been renamed or moved from the source
of the bind mount in a way that makes them inaccessible from the mount
point (i.e. out of scope).

Previously, access rights tied to files or directories opened through a
disconnected directory were collected by walking the related hierarchy
down to the root of the filesystem, without taking into account the
mount point because it couldn't be found. This could lead to
inconsistent access results, potential access right widening, and
hard-to-debug renames, especially since such paths cannot be printed.

For a sandboxed task to create a disconnected directory, it needs to
have write access (i.e. FS_MAKE_REG, FS_REMOVE_FILE, and FS_REFER) to
the underlying source of the bind mount, and read access to the related
mount point.   Because a sandboxed task cannot acquire more access
rights than those defined by its Landlock domain, this could lead to
inconsistent access rights due to missing permissions that should be
inherited from the mount point hierarchy, while inheriting permissions
from the filesystem hierarchy hidden by this mount point instead.

Landlock now handles files and directories opened from disconnected
directories by taking into account the filesystem hierarchy when the
mount point is not found in the hierarchy walk, and also always taking
into account the mount point from which these disconnected directories
were opened.  This ensures that a rename is not allowed if it would
widen access rights [1].

The rationale is that, even if disconnected hierarchies might not be
visible or accessible to a sandboxed task, relying on the collected
access rights from them improves the guarantee that access rights will
not be widened during a rename because of the access right comparison
between the source and the destination (see LANDLOCK_ACCESS_FS_REFER).
It may look like this would grant more access on disconnected files and
directories, but the security policies are always enforced for all the
evaluated hierarchies.  This new behavior should be less surprising to
users and safer from an access control perspective.

Remove a wrong WARN_ON_ONCE() canary in collect_domain_accesses() and
fix the related comment.

Because opened files have their access rights stored in the related file
security properties, there is no impact for disconnected or unlinked
files.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N" cvss4="7/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68736/">CVE-2025-68736 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68736">CVE-2025-68736 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255698">SUSE bug 1255698</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568740" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68740</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68740" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68740" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68740" ref_url="https://www.suse.com/security/cve/CVE-2025-68740" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ima: Handle error code returned by ima_filter_rule_match()

In ima_match_rules(), if ima_filter_rule_match() returns -ENOENT due to
the rule being NULL, the function incorrectly skips the 'if (!rc)' check
and sets 'result = true'. The LSM rule is considered a match, causing
extra files to be measured by IMA.

This issue can be reproduced in the following scenario:
After unloading the SELinux policy module via 'semodule -d', if an IMA
measurement is triggered before ima_lsm_rules is updated,
in ima_match_rules(), the first call to ima_filter_rule_match() returns
-ESTALE. This causes the code to enter the 'if (rc == -ESTALE &amp;&amp;
!rule_reinitialized)' block, perform ima_lsm_copy_rule() and retry. In
ima_lsm_copy_rule(), since the SELinux module has been removed, the rule
becomes NULL, and the second call to ima_filter_rule_match() returns
-ENOENT. This bypasses the 'if (!rc)' check and results in a false match.

Call trace:
  selinux_audit_rule_match+0x310/0x3b8
  security_audit_rule_match+0x60/0xa0
  ima_match_rules+0x2e4/0x4a0
  ima_match_policy+0x9c/0x1e8
  ima_get_action+0x48/0x60
  process_measurement+0xf8/0xa98
  ima_bprm_check+0x98/0xd8
  security_bprm_check+0x5c/0x78
  search_binary_handler+0x6c/0x318
  exec_binprm+0x58/0x1b8
  bprm_execve+0xb8/0x130
  do_execveat_common.isra.0+0x1a8/0x258
  __arm64_sys_execve+0x48/0x68
  invoke_syscall+0x50/0x128
  el0_svc_common.constprop.0+0xc8/0xf0
  do_el0_svc+0x24/0x38
  el0_svc+0x44/0x200
  el0t_64_sync_handler+0x100/0x130
  el0t_64_sync+0x3c8/0x3d0

Fix this by changing 'if (!rc)' to 'if (rc &lt;= 0)' to ensure that error
codes like -ENOENT do not bypass the check and accidentally result in a
successful match.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68740/">CVE-2025-68740 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68740">CVE-2025-68740 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255812">SUSE bug 1255812</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568741" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68741</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68741" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68741" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68741" ref_url="https://www.suse.com/security/cve/CVE-2025-68741" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: qla2xxx: Fix improper freeing of purex item

In qla2xxx_process_purls_iocb(), an item is allocated via
qla27xx_copy_multiple_pkt(), which internally calls
qla24xx_alloc_purex_item().

The qla24xx_alloc_purex_item() function may return a pre-allocated item
from a per-adapter pool for small allocations, instead of dynamically
allocating memory with kzalloc().

An error handling path in qla2xxx_process_purls_iocb() incorrectly uses
kfree() to release the item. If the item was from the pre-allocated
pool, calling kfree() on it is a bug that can lead to memory corruption.

Fix this by using the correct deallocation function,
qla24xx_free_purex_item(), which properly handles both dynamically
allocated and pre-allocated items.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68741/">CVE-2025-68741 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68741">CVE-2025-68741 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255703">SUSE bug 1255703</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568742" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68742</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68742" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68742" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68742" ref_url="https://www.suse.com/security/cve/CVE-2025-68742" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Fix invalid prog-&gt;stats access when update_effective_progs fails

Syzkaller triggers an invalid memory access issue following fault
injection in update_effective_progs. The issue can be described as
follows:

__cgroup_bpf_detach
  update_effective_progs
    compute_effective_progs
      bpf_prog_array_alloc &lt;-- fault inject
  purge_effective_progs
    /* change to dummy_bpf_prog */
    array-&gt;items[index] = &amp;dummy_bpf_prog.prog

---softirq start---
__do_softirq
  ...
    __cgroup_bpf_run_filter_skb
      __bpf_prog_run_save_cb
        bpf_prog_run
          stats = this_cpu_ptr(prog-&gt;stats)
          /* invalid memory access */
          flags = u64_stats_update_begin_irqsave(&amp;stats-&gt;syncp)
---softirq end---

  static_branch_dec(&amp;cgroup_bpf_enabled_key[atype])

The reason is that fault injection caused update_effective_progs to fail
and then changed the original prog into dummy_bpf_prog.prog in
purge_effective_progs. Then a softirq came, and accessing the members of
dummy_bpf_prog.prog in the softirq triggers invalid mem access.

To fix it, skip updating stats when stats is NULL.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68742/">CVE-2025-68742 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68742">CVE-2025-68742 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255707">SUSE bug 1255707</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568743" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68743</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68743" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68743" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68743" ref_url="https://www.suse.com/security/cve/CVE-2025-68743" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mshv: Fix create memory region overlap check

The current check is incorrect; it only checks if the beginning or end
of a region is within an existing region. This doesn't account for
userspace specifying a region that begins before and ends after an
existing region.

Change the logic to a range intersection check against gfns and uaddrs
for each region.

Remove mshv_partition_region_by_uaddr() as it is no longer used.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68743/">CVE-2025-68743 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68743">CVE-2025-68743 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255708">SUSE bug 1255708</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568744" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68744</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68744" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68744" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68744" ref_url="https://www.suse.com/security/cve/CVE-2025-68744" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bpf: Free special fields when update [lru_,]percpu_hash maps

As [lru_,]percpu_hash maps support BPF_KPTR_{REF,PERCPU}, missing
calls to 'bpf_obj_free_fields()' in 'pcpu_copy_value()' could cause the
memory referenced by BPF_KPTR_{REF,PERCPU} fields to be held until the
map gets freed.

Fix this by calling 'bpf_obj_free_fields()' after
'copy_map_value[,_long]()' in 'pcpu_copy_value()'.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68744/">CVE-2025-68744 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68744">CVE-2025-68744 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255709">SUSE bug 1255709</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568745" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68745</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68745" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68745" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68745" ref_url="https://www.suse.com/security/cve/CVE-2025-68745" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: qla2xxx: Clear cmds after chip reset

Commit aefed3e5548f ("scsi: qla2xxx: target: Fix offline port handling
and host reset handling") caused two problems:

1. Commands sent to FW, after chip reset got stuck and never freed as FW
   is not going to respond to them anymore.

2. BUG_ON(cmd-&gt;sg_mapped) in qlt_free_cmd().  Commit 26f9ce53817a
   ("scsi: qla2xxx: Fix missed DMA unmap for aborted commands")
   attempted to fix this, but introduced another bug under different
   circumstances when two different CPUs were racing to call
   qlt_unmap_sg() at the same time: BUG_ON(!valid_dma_direction(dir)) in
   dma_unmap_sg_attrs().

So revert "scsi: qla2xxx: Fix missed DMA unmap for aborted commands" and
partially revert "scsi: qla2xxx: target: Fix offline port handling and
host reset handling" at __qla2x00_abort_all_cmds.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68745/">CVE-2025-68745 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68745">CVE-2025-68745 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255721">SUSE bug 1255721</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68746</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68746" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68746" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68746" ref_url="https://www.suse.com/security/cve/CVE-2025-68746" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

spi: tegra210-quad: Fix timeout handling

When the CPU that the QSPI interrupt handler runs on (typically CPU 0)
is excessively busy, it can lead to rare cases of the IRQ thread not
running before the transfer timeout is reached.

While handling the timeouts, any pending transfers are cleaned up and
the message that they correspond to is marked as failed, which leaves
the curr_xfer field pointing at stale memory.

To avoid this, clear curr_xfer to NULL upon timeout and check for this
condition when the IRQ thread is finally run.

While at it, also make sure to clear interrupts on failure so that new
interrupts can be run.

A better, more involved, fix would move the interrupt clearing into a
hard IRQ handler. Ideally we would also want to signal that the IRQ
thread no longer needs to be run after the timeout is hit to avoid the
extra check for a valid transfer.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68746/">CVE-2025-68746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68746">CVE-2025-68746 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255722">SUSE bug 1255722</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568747" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68747</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68747" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68747" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68747" ref_url="https://www.suse.com/security/cve/CVE-2025-68747" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/panthor: Fix UAF on kernel BO VA nodes

If the MMU is down, panthor_vm_unmap_range() might return an error.
We expect the page table to be updated still, and if the MMU is blocked,
the rest of the GPU should be blocked too, so no risk of accessing
physical memory returned to the system (which the current code doesn't
cover for anyway).

Proceed with the rest of the cleanup instead of bailing out and leaving
the va_node inserted in the drm_mm, which leads to UAF when other
adjacent nodes are removed from the drm_mm tree.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-06"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68747/">CVE-2025-68747 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68747">CVE-2025-68747 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255723">SUSE bug 1255723</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257628">SUSE bug 1257628</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568748" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68748</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68748" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68748" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68748" ref_url="https://www.suse.com/security/cve/CVE-2025-68748" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/panthor: Fix UAF race between device unplug and FW event processing

The function panthor_fw_unplug() will free the FW memory sections.
The problem is that there could still be pending FW events which are yet
not handled at this point. process_fw_events_work() can in this case try
to access said freed memory.

Simply call disable_work_sync() to both drain and prevent future
invocation of process_fw_events_work().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68748/">CVE-2025-68748 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68748">CVE-2025-68748 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255813">SUSE bug 1255813</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568749" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68749</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68749" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68749" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68749" ref_url="https://www.suse.com/security/cve/CVE-2025-68749" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

accel/ivpu: Fix race condition when unbinding BOs

Fix 'Memory manager not clean during takedown' warning that occurs
when ivpu_gem_bo_free() removes the BO from the BOs list before it
gets unmapped. Then file_priv_unbind() triggers a warning in
drm_mm_takedown() during context teardown.

Protect the unmapping sequence with bo_list_lock to ensure the BO is
always fully unmapped when removed from the list. This ensures the BO
is either fully unmapped at context teardown time or present on the
list and unmapped by file_priv_unbind().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68749/">CVE-2025-68749 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68749">CVE-2025-68749 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255724">SUSE bug 1255724</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568750" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68750</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68750" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68750" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68750" ref_url="https://www.suse.com/security/cve/CVE-2025-68750" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: potential integer overflow in usbg_make_tpg()

The variable tpgt in usbg_make_tpg() is defined as unsigned long and is
assigned to tpgt-&gt;tport_tpgt, which is defined as u16. This may cause an
integer overflow when tpgt is greater than USHRT_MAX (65535). I
haven't tried to trigger it myself, but it is possible to trigger it
by calling usbg_make_tpg() with a large value for tpgt.

I modified the type of tpgt to match tpgt-&gt;tport_tpgt and adjusted the
relevant code accordingly.

This patch is similar to commit 59c816c1f24d ("vhost/scsi: potential
memory corruption").
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68750/">CVE-2025-68750 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68750">CVE-2025-68750 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255814">SUSE bug 1255814</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568753" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68753</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68753" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68753" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68753" ref_url="https://www.suse.com/security/cve/CVE-2025-68753" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: firewire-motu: add bounds check in put_user loop for DSP events

In the DSP event handling code, a put_user() loop copies event data.
When the user buffer size is not aligned to 4 bytes, it could overwrite
beyond the buffer boundary.

Fix by adding a bounds check before put_user().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68753/">CVE-2025-68753 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68753">CVE-2025-68753 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256238">SUSE bug 1256238</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568757" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68757</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68757" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68757" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68757" ref_url="https://www.suse.com/security/cve/CVE-2025-68757" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/vgem-fence: Fix potential deadlock on release

A timer that expires a vgem fence automatically in 10 seconds is now
released with timer_delete_sync() from fence-&gt;ops.release() called on last
dma_fence_put().  In some scenarios, it can run in IRQ context, which is
not safe unless TIMER_IRQSAFE is used.  One potentially risky scenario was
demonstrated in Intel DRM CI trybot, BAT run on machine bat-adlp-6, while
working on new IGT subtests syncobj_timeline@stress-* as user space
replacements of some problematic test cases of a dma-fence-chain selftest
[1].

[117.004338] ================================
[117.004340] WARNING: inconsistent lock state
[117.004342] 6.17.0-rc7-CI_DRM_17270-g7644974e648c+ #1 Tainted: G S   U
[117.004346] --------------------------------
[117.004347] inconsistent {HARDIRQ-ON-W} -&gt; {IN-HARDIRQ-W} usage.
[117.004349] swapper/0/0 [HC1[1]:SC1[1]:HE0:SE0] takes:
[117.004352] ffff888138f86aa8 ((&amp;fence-&gt;timer)){?.-.}-{0:0}, at: __timer_delete_sync+0x4b/0x190
[117.004361] {HARDIRQ-ON-W} state was registered at:
[117.004363]   lock_acquire+0xc4/0x2e0
[117.004366]   call_timer_fn+0x80/0x2a0
[117.004368]   __run_timers+0x231/0x310
[117.004370]   run_timer_softirq+0x76/0xe0
[117.004372]   handle_softirqs+0xd4/0x4d0
[117.004375]   __irq_exit_rcu+0x13f/0x160
[117.004377]   irq_exit_rcu+0xe/0x20
[117.004379]   sysvec_apic_timer_interrupt+0xa0/0xc0
[117.004382]   asm_sysvec_apic_timer_interrupt+0x1b/0x20
[117.004385]   cpuidle_enter_state+0x12b/0x8a0
[117.004388]   cpuidle_enter+0x2e/0x50
[117.004393]   call_cpuidle+0x22/0x60
[117.004395]   do_idle+0x1fd/0x260
[117.004398]   cpu_startup_entry+0x29/0x30
[117.004401]   start_secondary+0x12d/0x160
[117.004404]   common_startup_64+0x13e/0x141
[117.004407] irq event stamp: 2282669
[117.004409] hardirqs last  enabled at (2282668): [&lt;ffffffff8289db71&gt;] _raw_spin_unlock_irqrestore+0x51/0x80
[117.004414] hardirqs last disabled at (2282669): [&lt;ffffffff82882021&gt;] sysvec_irq_work+0x11/0xc0
[117.004419] softirqs last  enabled at (2254702): [&lt;ffffffff8289fd00&gt;] __do_softirq+0x10/0x18
[117.004423] softirqs last disabled at (2254725): [&lt;ffffffff813d4ddf&gt;] __irq_exit_rcu+0x13f/0x160
[117.004426]
other info that might help us debug this:
[117.004429]  Possible unsafe locking scenario:
[117.004432]        CPU0
[117.004433]        ----
[117.004434]   lock((&amp;fence-&gt;timer));
[117.004436]   &lt;Interrupt&gt;
[117.004438]     lock((&amp;fence-&gt;timer));
[117.004440]
 *** DEADLOCK ***
[117.004443] 1 lock held by swapper/0/0:
[117.004445]  #0: ffffc90000003d50 ((&amp;fence-&gt;timer)){?.-.}-{0:0}, at: call_timer_fn+0x7a/0x2a0
[117.004450]
stack backtrace:
[117.004453] CPU: 0 UID: 0 PID: 0 Comm: swapper/0 Tainted: G S   U              6.17.0-rc7-CI_DRM_17270-g7644974e648c+ #1 PREEMPT(voluntary)
[117.004455] Tainted: [S]=CPU_OUT_OF_SPEC, [U]=USER
[117.004455] Hardware name: Intel Corporation Alder Lake Client Platform/AlderLake-P DDR4 RVP, BIOS RPLPFWI1.R00.4035.A00.2301200723 01/20/2023
[117.004456] Call Trace:
[117.004456]  &lt;IRQ&gt;
[117.004457]  dump_stack_lvl+0x91/0xf0
[117.004460]  dump_stack+0x10/0x20
[117.004461]  print_usage_bug.part.0+0x260/0x360
[117.004463]  mark_lock+0x76e/0x9c0
[117.004465]  ? register_lock_class+0x48/0x4a0
[117.004467]  __lock_acquire+0xbc3/0x2860
[117.004469]  lock_acquire+0xc4/0x2e0
[117.004470]  ? __timer_delete_sync+0x4b/0x190
[117.004472]  ? __timer_delete_sync+0x4b/0x190
[117.004473]  __timer_delete_sync+0x68/0x190
[117.004474]  ? __timer_delete_sync+0x4b/0x190
[117.004475]  timer_delete_sync+0x10/0x20
[117.004476]  vgem_fence_release+0x19/0x30 [vgem]
[117.004478]  dma_fence_release+0xc1/0x3b0
[117.004480]  ? dma_fence_release+0xa1/0x3b0
[117.004481]  dma_fence_chain_release+0xe7/0x130
[117.004483]  dma_fence_release+0xc1/0x3b0
[117.004484]  ? _raw_spin_unlock_irqrestore+0x27/0x80
[117.004485]  dma_fence_chain_irq_work+0x59/0x80
[117.004487]  irq_work_single+0x75/0xa0
[117.004490]  irq_work_r
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68757/">CVE-2025-68757 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68757">CVE-2025-68757 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255943">SUSE bug 1255943</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568758" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68758</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68758" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68758" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68758" ref_url="https://www.suse.com/security/cve/CVE-2025-68758" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

backlight: led-bl: Add devlink to supplier LEDs

LED Backlight is a consumer of one or multiple LED class devices, but
devlink is currently unable to create correct supplier-producer links when
the supplier is a class device. It creates instead a link where the
supplier is the parent of the expected device.

One consequence is that removal order is not correctly enforced.

Issues happen for example with the following sections in a device tree
overlay:

    // An LED driver chip
    pca9632@62 {
        compatible = "nxp,pca9632";
        reg = &lt;0x62&gt;;

	// ...

        addon_led_pwm: led-pwm@3 {
            reg = &lt;3&gt;;
            label = "addon:led:pwm";
        };
    };

    backlight-addon {
        compatible = "led-backlight";
        leds = &lt;&amp;addon_led_pwm&gt;;
        brightness-levels = &lt;255&gt;;
        default-brightness-level = &lt;255&gt;;
    };

In this example, the devlink should be created between the backlight-addon
(consumer) and the pca9632@62 (supplier). Instead it is created between the
backlight-addon (consumer) and the parent of the pca9632@62, which is
typically the I2C bus adapter.

On removal of the above overlay, the LED driver can be removed before the
backlight device, resulting in:

    Unable to handle kernel NULL pointer dereference at virtual address 0000000000000010
    ...
    Call trace:
     led_put+0xe0/0x140
     devm_led_release+0x6c/0x98

Another way to reproduce the bug without any device tree overlays is
unbinding the LED class device (pca9632@62) before unbinding the consumer
(backlight-addon):

  echo 11-0062 &gt;/sys/bus/i2c/drivers/leds-pca963x/unbind
  echo ...backlight-dock &gt;/sys/bus/platform/drivers/led-backlight/unbind

Fix by adding a devlink between the consuming led-backlight device and the
supplying LED device, as other drivers and subsystems do as well.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68758/">CVE-2025-68758 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68758">CVE-2025-68758 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255944">SUSE bug 1255944</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568759" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68759</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68759" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68759" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68759" ref_url="https://www.suse.com/security/cve/CVE-2025-68759" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: rtl818x: Fix potential memory leaks in rtl8180_init_rx_ring()

In rtl8180_init_rx_ring(), memory is allocated for skb packets and DMA
allocations in a loop. When an allocation fails, the previously
successful allocations are not freed on exit.

Fix that by jumping to err_free_rings label on error, which calls
rtl8180_free_rx_ring() to free the allocations. Remove the free of
rx_ring in rtl8180_init_rx_ring() error path, and set the freed
priv-&gt;rx_buf entry to null, to avoid double free.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68759/">CVE-2025-68759 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68759">CVE-2025-68759 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255934">SUSE bug 1255934</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568764" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68764</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68764" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68764" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68764" ref_url="https://www.suse.com/security/cve/CVE-2025-68764" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFS: Automounted filesystems should inherit ro,noexec,nodev,sync flags

When a filesystem is being automounted, it needs to preserve the
user-set superblock mount options, such as the "ro" flag.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68764/">CVE-2025-68764 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68764">CVE-2025-68764 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255930">SUSE bug 1255930</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568765" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68765</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68765" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68765" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68765" ref_url="https://www.suse.com/security/cve/CVE-2025-68765" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mt76: mt7615: Fix memory leak in mt7615_mcu_wtbl_sta_add()

In mt7615_mcu_wtbl_sta_add(), an skb sskb is allocated. If the
subsequent call to mt76_connac_mcu_alloc_wtbl_req() fails, the function
returns an error without freeing sskb, leading to a memory leak.

Fix this by calling dev_kfree_skb() on sskb in the error handling path
to ensure it is properly released.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68765/">CVE-2025-68765 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68765">CVE-2025-68765 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255931">SUSE bug 1255931</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568766" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68766</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68766" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68766" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68766" ref_url="https://www.suse.com/security/cve/CVE-2025-68766" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023915.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0315-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043756.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

irqchip/mchp-eic: Fix error code in mchp_eic_domain_alloc()

If irq_domain_translate_twocell() sets "hwirq" to &gt;= MCHP_EIC_NIRQ (2) then
it results in an out of bounds access.

The code checks for invalid values, but doesn't set the error code.  Return
-EINVAL in that case, instead of returning success.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68766/">CVE-2025-68766 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68766">CVE-2025-68766 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255932">SUSE bug 1255932</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568768" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68768</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68768" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68768" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68768" ref_url="https://www.suse.com/security/cve/CVE-2025-68768" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

inet: frags: flush pending skbs in fqdir_pre_exit()

We have been seeing occasional deadlocks on pernet_ops_rwsem since
September in NIPA. The stuck task was usually modprobe (often loading
a driver like ipvlan), trying to take the lock as a Writer.
lockdep does not track readers for rwsems so the read wasn't obvious
from the reports.

On closer inspection the Reader holding the lock was conntrack looping
forever in nf_conntrack_cleanup_net_list(). Based on past experience
with occasional NIPA crashes I looked thru the tests which run before
the crash and noticed that the crash follows ip_defrag.sh. An immediate
red flag. Scouring thru (de)fragmentation queues reveals skbs sitting
around, holding conntrack references.

The problem is that since conntrack depends on nf_defrag_ipv6,
nf_defrag_ipv6 will load first. Since nf_defrag_ipv6 loads first its
netns exit hooks run _after_ conntrack's netns exit hook.

Flush all fragment queue SKBs during fqdir_pre_exit() to release
conntrack references before conntrack cleanup runs. Also flush
the queues in timer expiry handlers when they discover fqdir-&gt;dead
is set, in case packet sneaks in while we're running the pre_exit
flush.

The commit under Fixes is not exactly the culprit, but I think
previously the timer firing would eventually unblock the spinning
conntrack.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68768/">CVE-2025-68768 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68768">CVE-2025-68768 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256579">SUSE bug 1256579</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568770" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68770</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68770" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68770" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68770" ref_url="https://www.suse.com/security/cve/CVE-2025-68770" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bnxt_en: Fix XDP_TX path

For XDP_TX action in bnxt_rx_xdp(), clearing of the event flags is not
correct.  __bnxt_poll_work() -&gt; bnxt_rx_pkt() -&gt; bnxt_rx_xdp() may be
looping within NAPI and some event flags may be set in earlier
iterations.  In particular, if BNXT_TX_EVENT is set earlier indicating
some XDP_TX packets are ready and pending, it will be cleared if it is
XDP_TX action again.  Normally, we will set BNXT_TX_EVENT again when we
successfully call __bnxt_xmit_xdp().  But if the TX ring has no more
room, the flag will not be set.  This will cause the TX producer to be
ahead but the driver will not hit the TX doorbell.

For multi-buf XDP_TX, there is no need to clear the event flags and set
BNXT_AGG_EVENT.  The BNXT_AGG_EVENT flag should have been set earlier in
bnxt_rx_pkt().

The visible symptom of this is that the RX ring associated with the
TX XDP ring will eventually become empty and all packets will be dropped.
Because this condition will cause the driver to not refill the RX ring
seeing that the TX ring has forever pending XDP_TX packets.

The fix is to only clear BNXT_RX_EVENT when we have successfully
called __bnxt_xmit_xdp().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68770/">CVE-2025-68770 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68770">CVE-2025-68770 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256584">SUSE bug 1256584</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568771" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68771</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68771" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68771" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68771" ref_url="https://www.suse.com/security/cve/CVE-2025-68771" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ocfs2: fix kernel BUG in ocfs2_find_victim_chain

syzbot reported a kernel BUG in ocfs2_find_victim_chain() because the
`cl_next_free_rec` field of the allocation chain list (next free slot in
the chain list) is 0, triggring the BUG_ON(!cl-&gt;cl_next_free_rec)
condition in ocfs2_find_victim_chain() and panicking the kernel.

To fix this, an if condition is introduced in ocfs2_claim_suballoc_bits(),
just before calling ocfs2_find_victim_chain(), the code block in it being
executed when either of the following conditions is true:

1. `cl_next_free_rec` is equal to 0, indicating that there are no free
chains in the allocation chain list
2. `cl_next_free_rec` is greater than `cl_count` (the total number of
chains in the allocation chain list)

Either of them being true is indicative of the fact that there are no
chains left for usage.

This is addressed using ocfs2_error(), which prints
the error log for debugging purposes, rather than panicking the kernel.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68771/">CVE-2025-68771 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68771">CVE-2025-68771 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256582">SUSE bug 1256582</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568773" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68773</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68773" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68773" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68773" ref_url="https://www.suse.com/security/cve/CVE-2025-68773" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

spi: fsl-cpm: Check length parity before switching to 16 bit mode

Commit fc96ec826bce ("spi: fsl-cpm: Use 16 bit mode for large transfers
with even size") failed to make sure that the size is really even
before switching to 16 bit mode. Until recently the problem went
unnoticed because kernfs uses a pre-allocated bounce buffer of size
PAGE_SIZE for reading EEPROM.

But commit 8ad6249c51d0 ("eeprom: at25: convert to spi-mem API")
introduced an additional dynamically allocated bounce buffer whose size
is exactly the size of the transfer, leading to a buffer overrun in
the fsl-cpm driver when that size is odd.

Add the missing length parity verification and remain in 8 bit mode
when the length is not even.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68773/">CVE-2025-68773 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68773">CVE-2025-68773 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256586">SUSE bug 1256586</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68775</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68775" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68775" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68775" ref_url="https://www.suse.com/security/cve/CVE-2025-68775" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/handshake: duplicate handshake cancellations leak socket

When a handshake request is cancelled it is removed from the
handshake_net-&gt;hn_requests list, but it is still present in the
handshake_rhashtbl until it is destroyed.

If a second cancellation request arrives for the same handshake request,
then remove_pending() will return false... and assuming
HANDSHAKE_F_REQ_COMPLETED isn't set in req-&gt;hr_flags, we'll continue
processing through the out_true label, where we put another reference on
the sock and a refcount underflow occurs.

This can happen for example if a handshake times out - particularly if
the SUNRPC client sends the AUTH_TLS probe to the server but doesn't
follow it up with the ClientHello due to a problem with tlshd.  When the
timeout is hit on the server, the server will send a FIN, which triggers
a cancellation request via xs_reset_transport().  When the timeout is
hit on the client, another cancellation request happens via
xs_tls_handshake_sync().

Add a test_and_set_bit(HANDSHAKE_F_REQ_COMPLETED) in the pending cancel
path so duplicate cancels can be detected.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68775/">CVE-2025-68775 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68775">CVE-2025-68775 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256665">SUSE bug 1256665</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256666">SUSE bug 1256666</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68776</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68776" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68776" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68776" ref_url="https://www.suse.com/security/cve/CVE-2025-68776" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/hsr: fix NULL pointer dereference in prp_get_untagged_frame()

prp_get_untagged_frame() calls __pskb_copy() to create frame-&gt;skb_std
but doesn't check if the allocation failed. If __pskb_copy() returns
NULL, skb_clone() is called with a NULL pointer, causing a crash:

Oops: general protection fault, probably for non-canonical address 0xdffffc000000000f: 0000 [#1] SMP KASAN NOPTI
KASAN: null-ptr-deref in range [0x0000000000000078-0x000000000000007f]
CPU: 0 UID: 0 PID: 5625 Comm: syz.1.18 Not tainted syzkaller #0 PREEMPT(full)
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
RIP: 0010:skb_clone+0xd7/0x3a0 net/core/skbuff.c:2041
Code: 03 42 80 3c 20 00 74 08 4c 89 f7 e8 23 29 05 f9 49 83 3e 00 0f 85 a0 01 00 00 e8 94 dd 9d f8 48 8d 6b 7e 49 89 ee 49 c1 ee 03 &lt;43&gt; 0f b6 04 26 84 c0 0f 85 d1 01 00 00 44 0f b6 7d 00 41 83 e7 0c
RSP: 0018:ffffc9000d00f200 EFLAGS: 00010207
RAX: ffffffff892235a1 RBX: 0000000000000000 RCX: ffff88803372a480
RDX: 0000000000000000 RSI: 0000000000000820 RDI: 0000000000000000
RBP: 000000000000007e R08: ffffffff8f7d0f77 R09: 1ffffffff1efa1ee
R10: dffffc0000000000 R11: fffffbfff1efa1ef R12: dffffc0000000000
R13: 0000000000000820 R14: 000000000000000f R15: ffff88805144cc00
FS:  0000555557f6d500(0000) GS:ffff88808d72f000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000555581d35808 CR3: 000000005040e000 CR4: 0000000000352ef0
Call Trace:
 &lt;TASK&gt;
 hsr_forward_do net/hsr/hsr_forward.c:-1 [inline]
 hsr_forward_skb+0x1013/0x2860 net/hsr/hsr_forward.c:741
 hsr_handle_frame+0x6ce/0xa70 net/hsr/hsr_slave.c:84
 __netif_receive_skb_core+0x10b9/0x4380 net/core/dev.c:5966
 __netif_receive_skb_one_core net/core/dev.c:6077 [inline]
 __netif_receive_skb+0x72/0x380 net/core/dev.c:6192
 netif_receive_skb_internal net/core/dev.c:6278 [inline]
 netif_receive_skb+0x1cb/0x790 net/core/dev.c:6337
 tun_rx_batched+0x1b9/0x730 drivers/net/tun.c:1485
 tun_get_user+0x2b65/0x3e90 drivers/net/tun.c:1953
 tun_chr_write_iter+0x113/0x200 drivers/net/tun.c:1999
 new_sync_write fs/read_write.c:593 [inline]
 vfs_write+0x5c9/0xb30 fs/read_write.c:686
 ksys_write+0x145/0x250 fs/read_write.c:738
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xfa/0xfa0 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f0449f8e1ff
Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 &lt;48&gt; 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48
RSP: 002b:00007ffd7ad94c90 EFLAGS: 00000293 ORIG_RAX: 0000000000000001
RAX: ffffffffffffffda RBX: 00007f044a1e5fa0 RCX: 00007f0449f8e1ff
RDX: 000000000000003e RSI: 0000200000000500 RDI: 00000000000000c8
RBP: 00007ffd7ad94d20 R08: 0000000000000000 R09: 0000000000000000
R10: 000000000000003e R11: 0000000000000293 R12: 0000000000000001
R13: 00007f044a1e5fa0 R14: 00007f044a1e5fa0 R15: 0000000000000003
 &lt;/TASK&gt;

Add a NULL check immediately after __pskb_copy() to handle allocation
failures gracefully.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68776/">CVE-2025-68776 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68776">CVE-2025-68776 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256659">SUSE bug 1256659</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68777</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68777" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68777" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68777" ref_url="https://www.suse.com/security/cve/CVE-2025-68777" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Input: ti_am335x_tsc - fix off-by-one error in wire_order validation

The current validation 'wire_order[i] &gt; ARRAY_SIZE(config_pins)' allows
wire_order[i] to equal ARRAY_SIZE(config_pins), which causes out-of-bounds
access when used as index in 'config_pins[wire_order[i]]'.

Since config_pins has 4 elements (indices 0-3), the valid range for
wire_order should be 0-3. Fix the off-by-one error by using &gt;= instead
of &gt; in the validation check.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68777/">CVE-2025-68777 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68777">CVE-2025-68777 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256655">SUSE bug 1256655</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68778</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68778" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68778" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68778" ref_url="https://www.suse.com/security/cve/CVE-2025-68778" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: don't log conflicting inode if it's a dir moved in the current transaction

We can't log a conflicting inode if it's a directory and it was moved
from one parent directory to another parent directory in the current
transaction, as this can result an attempt to have a directory with
two hard links during log replay, one for the old parent directory and
another for the new parent directory.

The following scenario triggers that issue:

1) We have directories "dir1" and "dir2" created in a past transaction.
   Directory "dir1" has inode A as its parent directory;

2) We move "dir1" to some other directory;

3) We create a file with the name "dir1" in directory inode A;

4) We fsync the new file. This results in logging the inode of the new file
   and the inode for the directory "dir1" that was previously moved in the
   current transaction. So the log tree has the INODE_REF item for the
   new location of "dir1";

5) We move the new file to some other directory. This results in updating
   the log tree to included the new INODE_REF for the new location of the
   file and removes the INODE_REF for the old location. This happens
   during the rename when we call btrfs_log_new_name();

6) We fsync the file, and that persists the log tree changes done in the
   previous step (btrfs_log_new_name() only updates the log tree in
   memory);

7) We have a power failure;

8) Next time the fs is mounted, log replay happens and when processing
   the inode for directory "dir1" we find a new INODE_REF and add that
   link, but we don't remove the old link of the inode since we have
   not logged the old parent directory of the directory inode "dir1".

As a result after log replay finishes when we trigger writeback of the
subvolume tree's extent buffers, the tree check will detect that we have
a directory a hard link count of 2 and we get a mount failure.
The errors and stack traces reported in dmesg/syslog are like this:

   [ 3845.729764] BTRFS info (device dm-0): start tree-log replay
   [ 3845.730304] page: refcount:3 mapcount:0 mapping:000000005c8a3027 index:0x1d00 pfn:0x11510c
   [ 3845.731236] memcg:ffff9264c02f4e00
   [ 3845.731751] aops:btree_aops [btrfs] ino:1
   [ 3845.732300] flags: 0x17fffc00000400a(uptodate|private|writeback|node=0|zone=2|lastcpupid=0x1ffff)
   [ 3845.733346] raw: 017fffc00000400a 0000000000000000 dead000000000122 ffff9264d978aea8
   [ 3845.734265] raw: 0000000000001d00 ffff92650e6d4738 00000003ffffffff ffff9264c02f4e00
   [ 3845.735305] page dumped because: eb page dump
   [ 3845.735981] BTRFS critical (device dm-0): corrupt leaf: root=5 block=30408704 slot=6 ino=257, invalid nlink: has 2 expect no more than 1 for dir
   [ 3845.737786] BTRFS info (device dm-0): leaf 30408704 gen 10 total ptrs 17 free space 14881 owner 5
   [ 3845.737789] BTRFS info (device dm-0): refs 4 lock_owner 0 current 30701
   [ 3845.737792] 	item 0 key (256 INODE_ITEM 0) itemoff 16123 itemsize 160
   [ 3845.737794] 		inode generation 3 transid 9 size 16 nbytes 16384
   [ 3845.737795] 		block group 0 mode 40755 links 1 uid 0 gid 0
   [ 3845.737797] 		rdev 0 sequence 2 flags 0x0
   [ 3845.737798] 		atime 1764259517.0
   [ 3845.737800] 		ctime 1764259517.572889464
   [ 3845.737801] 		mtime 1764259517.572889464
   [ 3845.737802] 		otime 1764259517.0
   [ 3845.737803] 	item 1 key (256 INODE_REF 256) itemoff 16111 itemsize 12
   [ 3845.737805] 		index 0 name_len 2
   [ 3845.737807] 	item 2 key (256 DIR_ITEM 2363071922) itemoff 16077 itemsize 34
   [ 3845.737808] 		location key (257 1 0) type 2
   [ 3845.737810] 		transid 9 data_len 0 name_len 4
   [ 3845.737811] 	item 3 key (256 DIR_ITEM 2676584006) itemoff 16043 itemsize 34
   [ 3845.737813] 		location key (258 1 0) type 2
   [ 3845.737814] 		transid 9 data_len 0 name_len 4
   [ 3845.737815] 	item 4 key (256 DIR_INDEX 2) itemoff 16009 itemsize 34
   [ 3845.737816] 		location key (257 1 0) type 2
   [
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68778/">CVE-2025-68778 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68778">CVE-2025-68778 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256683">SUSE bug 1256683</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568783" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68783</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68783" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68783" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68783" ref_url="https://www.suse.com/security/cve/CVE-2025-68783" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: usb-mixer: us16x08: validate meter packet indices

get_meter_levels_from_urb() parses the 64-byte meter packets sent by
the device and fills the per-channel arrays meter_level[],
comp_level[] and master_level[] in struct snd_us16x08_meter_store.

Currently the function derives the channel index directly from the
meter packet (MUB2(meter_urb, s) - 1) and uses it to index those
arrays without validating the range. If the packet contains a
negative or out-of-range channel number, the driver may write past
the end of these arrays.

Introduce a local channel variable and validate it before updating the
arrays. We reject negative indices, limit meter_level[] and
comp_level[] to SND_US16X08_MAX_CHANNELS, and guard master_level[]
updates with ARRAY_SIZE(master_level).
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68783/">CVE-2025-68783 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68783">CVE-2025-68783 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256650">SUSE bug 1256650</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568784" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68784</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68784" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68784" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68784" ref_url="https://www.suse.com/security/cve/CVE-2025-68784" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xfs: fix a UAF problem in xattr repair

The xchk_setup_xattr_buf function can allocate a new value buffer, which
means that any reference to ab-&gt;value before the call could become a
dangling pointer.  Fix this by moving an assignment to after the buffer
setup.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-68784/">CVE-2025-68784 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68784">CVE-2025-68784 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256793">SUSE bug 1256793</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568785" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68785</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68785" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68785" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68785" ref_url="https://www.suse.com/security/cve/CVE-2025-68785" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: openvswitch: fix middle attribute validation in push_nsh() action

The push_nsh() action structure looks like this:

 OVS_ACTION_ATTR_PUSH_NSH(OVS_KEY_ATTR_NSH(OVS_NSH_KEY_ATTR_BASE,...))

The outermost OVS_ACTION_ATTR_PUSH_NSH attribute is OK'ed by the
nla_for_each_nested() inside __ovs_nla_copy_actions().  The innermost
OVS_NSH_KEY_ATTR_BASE/MD1/MD2 are OK'ed by the nla_for_each_nested()
inside nsh_key_put_from_nlattr().  But nothing checks if the attribute
in the middle is OK.  We don't even check that this attribute is the
OVS_KEY_ATTR_NSH.  We just do a double unwrap with a pair of nla_data()
calls - first time directly while calling validate_push_nsh() and the
second time as part of the nla_for_each_nested() macro, which isn't
safe, potentially causing invalid memory access if the size of this
attribute is incorrect.  The failure may not be noticed during
validation due to larger netlink buffer, but cause trouble later during
action execution where the buffer is allocated exactly to the size:

 BUG: KASAN: slab-out-of-bounds in nsh_hdr_from_nlattr+0x1dd/0x6a0 [openvswitch]
 Read of size 184 at addr ffff88816459a634 by task a.out/22624

 CPU: 8 UID: 0 PID: 22624 6.18.0-rc7+ #115 PREEMPT(voluntary)
 Call Trace:
  &lt;TASK&gt;
  dump_stack_lvl+0x51/0x70
  print_address_description.constprop.0+0x2c/0x390
  kasan_report+0xdd/0x110
  kasan_check_range+0x35/0x1b0
  __asan_memcpy+0x20/0x60
  nsh_hdr_from_nlattr+0x1dd/0x6a0 [openvswitch]
  push_nsh+0x82/0x120 [openvswitch]
  do_execute_actions+0x1405/0x2840 [openvswitch]
  ovs_execute_actions+0xd5/0x3b0 [openvswitch]
  ovs_packet_cmd_execute+0x949/0xdb0 [openvswitch]
  genl_family_rcv_msg_doit+0x1d6/0x2b0
  genl_family_rcv_msg+0x336/0x580
  genl_rcv_msg+0x9f/0x130
  netlink_rcv_skb+0x11f/0x370
  genl_rcv+0x24/0x40
  netlink_unicast+0x73e/0xaa0
  netlink_sendmsg+0x744/0xbf0
  __sys_sendto+0x3d6/0x450
  do_syscall_64+0x79/0x2c0
  entry_SYSCALL_64_after_hwframe+0x76/0x7e
  &lt;/TASK&gt;

Let's add some checks that the attribute is properly sized and it's
the only one attribute inside the action.  Technically, there is no
real reason for OVS_KEY_ATTR_NSH to be there, as we know that we're
pushing an NSH header already, it just creates extra nesting, but
that's how uAPI works today.  So, keeping as it is.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68785/">CVE-2025-68785 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68785">CVE-2025-68785 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256640">SUSE bug 1256640</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68788</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68788" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68788" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68788" ref_url="https://www.suse.com/security/cve/CVE-2025-68788" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fsnotify: do not generate ACCESS/MODIFY events on child for special files

inotify/fanotify do not allow users with no read access to a file to
subscribe to events (e.g. IN_ACCESS/IN_MODIFY), but they do allow the
same user to subscribe for watching events on children when the user
has access to the parent directory (e.g. /dev).

Users with no read access to a file but with read access to its parent
directory can still stat the file and see if it was accessed/modified
via atime/mtime change.

The same is not true for special files (e.g. /dev/null). Users will not
generally observe atime/mtime changes when other users read/write to
special files, only when someone sets atime/mtime via utimensat().

Align fsnotify events with this stat behavior and do not generate
ACCESS/MODIFY events to parent watchers on read/write of special files.
The events are still generated to parent watchers on utimensat(). This
closes some side-channels that could be possibly used for information
exfiltration [1].

[1] https://snee.la/pdf/pubs/file-notification-attacks.pdf
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68788/">CVE-2025-68788 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68788">CVE-2025-68788 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256638">SUSE bug 1256638</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68789</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68789" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68789" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68789" ref_url="https://www.suse.com/security/cve/CVE-2025-68789" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-68789/">CVE-2025-68789 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68789">CVE-2025-68789 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256781">SUSE bug 1256781</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568792" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68792</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68792" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68792" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68792" ref_url="https://www.suse.com/security/cve/CVE-2025-68792" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tpm2-sessions: Fix out of range indexing in name_size

'name_size' does not have any range checks, and it just directly indexes
with TPM_ALG_ID, which could lead into memory corruption at worst.

Address the issue by only processing known values and returning -EINVAL for
unrecognized values.

Make also 'tpm_buf_append_name' and 'tpm_buf_fill_hmac_session' fallible so
that errors are detected before causing any spurious TPM traffic.

End also the authorization session on failure in both of the functions, as
the session state would be then by definition corrupted.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68792/">CVE-2025-68792 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68792">CVE-2025-68792 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256656">SUSE bug 1256656</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568795" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68795</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68795" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68795" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68795" ref_url="https://www.suse.com/security/cve/CVE-2025-68795" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ethtool: Avoid overflowing userspace buffer on stats query

The ethtool -S command operates across three ioctl calls:
ETHTOOL_GSSET_INFO for the size, ETHTOOL_GSTRINGS for the names, and
ETHTOOL_GSTATS for the values.

If the number of stats changes between these calls (e.g., due to device
reconfiguration), userspace's buffer allocation will be incorrect,
potentially leading to buffer overflow.

Drivers are generally expected to maintain stable stat counts, but some
drivers (e.g., mlx5, bnx2x, bna, ksz884x) use dynamic counters, making
this scenario possible.

Some drivers try to handle this internally:
- bnad_get_ethtool_stats() returns early in case stats.n_stats is not
  equal to the driver's stats count.
- micrel/ksz884x also makes sure not to write anything beyond
  stats.n_stats and overflow the buffer.

However, both use stats.n_stats which is already assigned with the value
returned from get_sset_count(), hence won't solve the issue described
here.

Change ethtool_get_strings(), ethtool_get_stats(),
ethtool_get_phy_stats() to not return anything in case of a mismatch
between userspace's size and get_sset_size(), to prevent buffer
overflow.
The returned n_stats value will be equal to zero, to reflect that
nothing has been returned.

This could result in one of two cases when using upstream ethtool,
depending on when the size change is detected:
1. When detected in ethtool_get_strings():
    # ethtool -S eth2
    no stats available

2. When detected in get stats, all stats will be reported as zero.

Both cases are presumably transient, and a subsequent ethtool call
should succeed.

Other than the overflow avoidance, these two cases are very evident (no
output/cleared stats), which is arguably better than presenting
incorrect/shifted stats.
I also considered returning an error instead of a "silent" response, but
that seems more destructive towards userspace apps.

Notes:
- This patch does not claim to fix the inherent race, it only makes sure
  that we do not overflow the userspace buffer, and makes for a more
  predictable behavior.

- RTNL lock is held during each ioctl, the race window exists between
  the separate ioctl calls when the lock is released.

- Userspace ethtool always fills stats.n_stats, but it is likely that
  these stats ioctls are implemented in other userspace applications
  which might not fill it. The added code checks that it's not zero,
  to prevent any regressions.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68795/">CVE-2025-68795 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68795">CVE-2025-68795 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256688">SUSE bug 1256688</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68797</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68797" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68797" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68797" ref_url="https://www.suse.com/security/cve/CVE-2025-68797" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

char: applicom: fix NULL pointer dereference in ac_ioctl

Discovered by Atuin - Automated Vulnerability Discovery Engine.

In ac_ioctl, the validation of IndexCard and the check for a valid
RamIO pointer are skipped when cmd is 6. However, the function
unconditionally executes readb(apbs[IndexCard].RamIO + VERS) at the
end.

If cmd is 6, IndexCard may reference a board that does not exist
(where RamIO is NULL), leading to a NULL pointer dereference.

Fix this by skipping the readb access when cmd is 6, as this
command is a global information query and does not target a specific
board context.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68797/">CVE-2025-68797 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68797">CVE-2025-68797 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256660">SUSE bug 1256660</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68798</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68798" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68798" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68798" ref_url="https://www.suse.com/security/cve/CVE-2025-68798" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

perf/x86/amd: Check event before enable to avoid GPF

On AMD machines cpuc-&gt;events[idx] can become NULL in a subtle race
condition with NMI-&gt;throttle-&gt;x86_pmu_stop().

Check event for NULL in amd_pmu_enable_all() before enable to avoid a GPF.
This appears to be an AMD only issue.

Syzkaller reported a GPF in amd_pmu_enable_all.

INFO: NMI handler (perf_event_nmi_handler) took too long to run: 13.143
    msecs
Oops: general protection fault, probably for non-canonical address
    0xdffffc0000000034: 0000  PREEMPT SMP KASAN NOPTI
KASAN: null-ptr-deref in range [0x00000000000001a0-0x00000000000001a7]
CPU: 0 UID: 0 PID: 328415 Comm: repro_36674776 Not tainted 6.12.0-rc1-syzk
RIP: 0010:x86_pmu_enable_event (arch/x86/events/perf_event.h:1195
    arch/x86/events/core.c:1430)
RSP: 0018:ffff888118009d60 EFLAGS: 00010012
RAX: dffffc0000000000 RBX: 0000000000000000 RCX: 0000000000000000
RDX: 0000000000000034 RSI: 0000000000000000 RDI: 00000000000001a0
RBP: 0000000000000001 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000002
R13: ffff88811802a440 R14: ffff88811802a240 R15: ffff8881132d8601
FS:  00007f097dfaa700(0000) GS:ffff888118000000(0000) GS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000200001c0 CR3: 0000000103d56000 CR4: 00000000000006f0
Call Trace:
 &lt;IRQ&gt;
amd_pmu_enable_all (arch/x86/events/amd/core.c:760 (discriminator 2))
x86_pmu_enable (arch/x86/events/core.c:1360)
event_sched_out (kernel/events/core.c:1191 kernel/events/core.c:1186
    kernel/events/core.c:2346)
__perf_remove_from_context (kernel/events/core.c:2435)
event_function (kernel/events/core.c:259)
remote_function (kernel/events/core.c:92 (discriminator 1)
    kernel/events/core.c:72 (discriminator 1))
__flush_smp_call_function_queue (./arch/x86/include/asm/jump_label.h:27
    ./include/linux/jump_label.h:207 ./include/trace/events/csd.h:64
    kernel/smp.c:135 kernel/smp.c:540)
__sysvec_call_function_single (./arch/x86/include/asm/jump_label.h:27
    ./include/linux/jump_label.h:207
    ./arch/x86/include/asm/trace/irq_vectors.h:99 arch/x86/kernel/smp.c:272)
sysvec_call_function_single (arch/x86/kernel/smp.c:266 (discriminator 47)
    arch/x86/kernel/smp.c:266 (discriminator 47))
 &lt;/IRQ&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68798/">CVE-2025-68798 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68798">CVE-2025-68798 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256689">SUSE bug 1256689</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68799</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68799" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68799" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68799" ref_url="https://www.suse.com/security/cve/CVE-2025-68799" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

caif: fix integer underflow in cffrml_receive()

The cffrml_receive() function extracts a length field from the packet
header and, when FCS is disabled, subtracts 2 from this length without
validating that len &gt;= 2.

If an attacker sends a malicious packet with a length field of 0 or 1
to an interface with FCS disabled, the subtraction causes an integer
underflow.

This can lead to memory exhaustion and kernel instability, potential
information disclosure if padding contains uninitialized kernel memory.

Fix this by validating that len &gt;= 2 before performing the subtraction.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68799/">CVE-2025-68799 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68799">CVE-2025-68799 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256643">SUSE bug 1256643</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568800" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68800</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68800" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68800" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68800" ref_url="https://www.suse.com/security/cve/CVE-2025-68800" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3083" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002524.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003268.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4759" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003256.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mlxsw: spectrum_mr: Fix use-after-free when updating multicast route stats

Cited commit added a dedicated mutex (instead of RTNL) to protect the
multicast route list, so that it will not change while the driver
periodically traverses it in order to update the kernel about multicast
route stats that were queried from the device.

One instance of list entry deletion (during route replace) was missed
and it can result in a use-after-free [1].

Fix by acquiring the mutex before deleting the entry from the list and
releasing it afterwards.

[1]
BUG: KASAN: slab-use-after-free in mlxsw_sp_mr_stats_update+0x4a5/0x540 drivers/net/ethernet/mellanox/mlxsw/spectrum_mr.c:1006 [mlxsw_spectrum]
Read of size 8 at addr ffff8881523c2fa8 by task kworker/2:5/22043

CPU: 2 UID: 0 PID: 22043 Comm: kworker/2:5 Not tainted 6.18.0-rc1-custom-g1a3d6d7cd014 #1 PREEMPT(full)
Hardware name: Mellanox Technologies Ltd. MSN2010/SA002610, BIOS 5.6.5 08/24/2017
Workqueue: mlxsw_core mlxsw_sp_mr_stats_update [mlxsw_spectrum]
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0xba/0x110
 print_report+0x174/0x4f5
 kasan_report+0xdf/0x110
 mlxsw_sp_mr_stats_update+0x4a5/0x540 drivers/net/ethernet/mellanox/mlxsw/spectrum_mr.c:1006 [mlxsw_spectrum]
 process_one_work+0x9cc/0x18e0
 worker_thread+0x5df/0xe40
 kthread+0x3b8/0x730
 ret_from_fork+0x3e9/0x560
 ret_from_fork_asm+0x1a/0x30
 &lt;/TASK&gt;

Allocated by task 29933:
 kasan_save_stack+0x30/0x50
 kasan_save_track+0x14/0x30
 __kasan_kmalloc+0x8f/0xa0
 mlxsw_sp_mr_route_add+0xd8/0x4770 [mlxsw_spectrum]
 mlxsw_sp_router_fibmr_event_work+0x371/0xad0 drivers/net/ethernet/mellanox/mlxsw/spectrum_router.c:7965 [mlxsw_spectrum]
 process_one_work+0x9cc/0x18e0
 worker_thread+0x5df/0xe40
 kthread+0x3b8/0x730
 ret_from_fork+0x3e9/0x560
 ret_from_fork_asm+0x1a/0x30

Freed by task 29933:
 kasan_save_stack+0x30/0x50
 kasan_save_track+0x14/0x30
 __kasan_save_free_info+0x3b/0x70
 __kasan_slab_free+0x43/0x70
 kfree+0x14e/0x700
 mlxsw_sp_mr_route_add+0x2dea/0x4770 drivers/net/ethernet/mellanox/mlxsw/spectrum_mr.c:444 [mlxsw_spectrum]
 mlxsw_sp_router_fibmr_event_work+0x371/0xad0 drivers/net/ethernet/mellanox/mlxsw/spectrum_router.c:7965 [mlxsw_spectrum]
 process_one_work+0x9cc/0x18e0
 worker_thread+0x5df/0xe40
 kthread+0x3b8/0x730
 ret_from_fork+0x3e9/0x560
 ret_from_fork_asm+0x1a/0x30
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68800/">CVE-2025-68800 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68800">CVE-2025-68800 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256646">SUSE bug 1256646</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68801</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68801" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68801" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68801" ref_url="https://www.suse.com/security/cve/CVE-2025-68801" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mlxsw: spectrum_router: Fix neighbour use-after-free

We sometimes observe use-after-free when dereferencing a neighbour [1].
The problem seems to be that the driver stores a pointer to the
neighbour, but without holding a reference on it. A reference is only
taken when the neighbour is used by a nexthop.

Fix by simplifying the reference counting scheme. Always take a
reference when storing a neighbour pointer in a neighbour entry. Avoid
taking a referencing when the neighbour is used by a nexthop as the
neighbour entry associated with the nexthop already holds a reference.

Tested by running the test that uncovered the problem over 300 times.
Without this patch the problem was reproduced after a handful of
iterations.

[1]
BUG: KASAN: slab-use-after-free in mlxsw_sp_neigh_entry_update+0x2d4/0x310
Read of size 8 at addr ffff88817f8e3420 by task ip/3929

CPU: 3 UID: 0 PID: 3929 Comm: ip Not tainted 6.18.0-rc4-virtme-g36b21a067510 #3 PREEMPT(full)
Hardware name: Nvidia SN5600/VMOD0013, BIOS 5.13 05/31/2023
Call Trace:
 &lt;TASK&gt;
 dump_stack_lvl+0x6f/0xa0
 print_address_description.constprop.0+0x6e/0x300
 print_report+0xfc/0x1fb
 kasan_report+0xe4/0x110
 mlxsw_sp_neigh_entry_update+0x2d4/0x310
 mlxsw_sp_router_rif_gone_sync+0x35f/0x510
 mlxsw_sp_rif_destroy+0x1ea/0x730
 mlxsw_sp_inetaddr_port_vlan_event+0xa1/0x1b0
 __mlxsw_sp_inetaddr_lag_event+0xcc/0x130
 __mlxsw_sp_inetaddr_event+0xf5/0x3c0
 mlxsw_sp_router_netdevice_event+0x1015/0x1580
 notifier_call_chain+0xcc/0x150
 call_netdevice_notifiers_info+0x7e/0x100
 __netdev_upper_dev_unlink+0x10b/0x210
 netdev_upper_dev_unlink+0x79/0xa0
 vrf_del_slave+0x18/0x50
 do_set_master+0x146/0x7d0
 do_setlink.isra.0+0x9a0/0x2880
 rtnl_newlink+0x637/0xb20
 rtnetlink_rcv_msg+0x6fe/0xb90
 netlink_rcv_skb+0x123/0x380
 netlink_unicast+0x4a3/0x770
 netlink_sendmsg+0x75b/0xc90
 __sock_sendmsg+0xbe/0x160
 ____sys_sendmsg+0x5b2/0x7d0
 ___sys_sendmsg+0xfd/0x180
 __sys_sendmsg+0x124/0x1c0
 do_syscall_64+0xbb/0xfd0
 entry_SYSCALL_64_after_hwframe+0x4b/0x53
[...]

Allocated by task 109:
 kasan_save_stack+0x30/0x50
 kasan_save_track+0x14/0x30
 __kasan_kmalloc+0x7b/0x90
 __kmalloc_noprof+0x2c1/0x790
 neigh_alloc+0x6af/0x8f0
 ___neigh_create+0x63/0xe90
 mlxsw_sp_nexthop_neigh_init+0x430/0x7e0
 mlxsw_sp_nexthop_type_init+0x212/0x960
 mlxsw_sp_nexthop6_group_info_init.constprop.0+0x81f/0x1280
 mlxsw_sp_nexthop6_group_get+0x392/0x6a0
 mlxsw_sp_fib6_entry_create+0x46a/0xfd0
 mlxsw_sp_router_fib6_replace+0x1ed/0x5f0
 mlxsw_sp_router_fib6_event_work+0x10a/0x2a0
 process_one_work+0xd57/0x1390
 worker_thread+0x4d6/0xd40
 kthread+0x355/0x5b0
 ret_from_fork+0x1d4/0x270
 ret_from_fork_asm+0x11/0x20

Freed by task 154:
 kasan_save_stack+0x30/0x50
 kasan_save_track+0x14/0x30
 __kasan_save_free_info+0x3b/0x60
 __kasan_slab_free+0x43/0x70
 kmem_cache_free_bulk.part.0+0x1eb/0x5e0
 kvfree_rcu_bulk+0x1f2/0x260
 kfree_rcu_work+0x130/0x1b0
 process_one_work+0xd57/0x1390
 worker_thread+0x4d6/0xd40
 kthread+0x355/0x5b0
 ret_from_fork+0x1d4/0x270
 ret_from_fork_asm+0x11/0x20

Last potentially related work creation:
 kasan_save_stack+0x30/0x50
 kasan_record_aux_stack+0x8c/0xa0
 kvfree_call_rcu+0x93/0x5b0
 mlxsw_sp_router_neigh_event_work+0x67d/0x860
 process_one_work+0xd57/0x1390
 worker_thread+0x4d6/0xd40
 kthread+0x355/0x5b0
 ret_from_fork+0x1d4/0x270
 ret_from_fork_asm+0x11/0x20
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68801/">CVE-2025-68801 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68801">CVE-2025-68801 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256653">SUSE bug 1256653</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568802" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68802</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68802" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68802" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68802" ref_url="https://www.suse.com/security/cve/CVE-2025-68802" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/xe: Limit num_syncs to prevent oversized allocations

The exec and vm_bind ioctl allow userspace to specify an arbitrary
num_syncs value. Without bounds checking, a very large num_syncs
can force an excessively large allocation, leading to kernel warnings
from the page allocator as below.

Introduce DRM_XE_MAX_SYNCS (set to 1024) and reject any request
exceeding this limit.

"
------------[ cut here ]------------
WARNING: CPU: 0 PID: 1217 at mm/page_alloc.c:5124 __alloc_frozen_pages_noprof+0x2f8/0x2180 mm/page_alloc.c:5124
...
Call Trace:
 &lt;TASK&gt;
 alloc_pages_mpol+0xe4/0x330 mm/mempolicy.c:2416
 ___kmalloc_large_node+0xd8/0x110 mm/slub.c:4317
 __kmalloc_large_node_noprof+0x18/0xe0 mm/slub.c:4348
 __do_kmalloc_node mm/slub.c:4364 [inline]
 __kmalloc_noprof+0x3d4/0x4b0 mm/slub.c:4388
 kmalloc_noprof include/linux/slab.h:909 [inline]
 kmalloc_array_noprof include/linux/slab.h:948 [inline]
 xe_exec_ioctl+0xa47/0x1e70 drivers/gpu/drm/xe/xe_exec.c:158
 drm_ioctl_kernel+0x1f1/0x3e0 drivers/gpu/drm/drm_ioctl.c:797
 drm_ioctl+0x5e7/0xc50 drivers/gpu/drm/drm_ioctl.c:894
 xe_drm_ioctl+0x10b/0x170 drivers/gpu/drm/xe/xe_device.c:224
 vfs_ioctl fs/ioctl.c:51 [inline]
 __do_sys_ioctl fs/ioctl.c:598 [inline]
 __se_sys_ioctl fs/ioctl.c:584 [inline]
 __x64_sys_ioctl+0x18b/0x210 fs/ioctl.c:584
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xbb/0x380 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
...
"

v2: Add "Reported-by" and Cc stable kernels.
v3: Change XE_MAX_SYNCS from 64 to 1024. (Matt &amp; Ashutosh)
v4: s/XE_MAX_SYNCS/DRM_XE_MAX_SYNCS/ (Matt)
v5: Do the check at the top of the exec func. (Matt)

(cherry picked from commit b07bac9bd708ec468cd1b8a5fe70ae2ac9b0a11c)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-06"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68802/">CVE-2025-68802 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68802">CVE-2025-68802 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256661">SUSE bug 1256661</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568803" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68803</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68803" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68803" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68803" ref_url="https://www.suse.com/security/cve/CVE-2025-68803" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFSD: NFSv4 file creation neglects setting ACL

An NFSv4 client that sets an ACL with a named principal during file
creation retrieves the ACL afterwards, and finds that it is only a
default ACL (based on the mode bits) and not the ACL that was
requested during file creation. This violates RFC 8881 section
6.4.1.3: "the ACL attribute is set as given".

The issue occurs in nfsd_create_setattr(), which calls
nfsd_attrs_valid() to determine whether to call nfsd_setattr().
However, nfsd_attrs_valid() checks only for iattr changes and
security labels, but not POSIX ACLs. When only an ACL is present,
the function returns false, nfsd_setattr() is skipped, and the
POSIX ACL is never applied to the inode.

Subsequently, when the client retrieves the ACL, the server finds
no POSIX ACL on the inode and returns one generated from the file's
mode bits rather than returning the originally-specified ACL.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68803/">CVE-2025-68803 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68803">CVE-2025-68803 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256770">SUSE bug 1256770</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68804</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68804" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68804" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68804" ref_url="https://www.suse.com/security/cve/CVE-2025-68804" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

platform/chrome: cros_ec_ishtp: Fix UAF after unbinding driver

After unbinding the driver, another kthread `cros_ec_console_log_work`
is still accessing the device, resulting an UAF and crash.

The driver doesn't unregister the EC device in .remove() which should
shutdown sub-devices synchronously.  Fix it.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68804/">CVE-2025-68804 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68804">CVE-2025-68804 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256617">SUSE bug 1256617</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256618">SUSE bug 1256618</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568808" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68808</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68808" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68808" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68808" ref_url="https://www.suse.com/security/cve/CVE-2025-68808" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: vidtv: initialize local pointers upon transfer of memory ownership

vidtv_channel_si_init() creates a temporary list (program, service, event)
and ownership of the memory itself is transferred to the PAT/SDT/EIT
tables through vidtv_psi_pat_program_assign(),
vidtv_psi_sdt_service_assign(), vidtv_psi_eit_event_assign().

The problem here is that the local pointer where the memory ownership
transfer was completed is not initialized to NULL. This causes the
vidtv_psi_pmt_create_sec_for_each_pat_entry() function to fail, and
in the flow that jumps to free_eit, the memory that was freed by
vidtv_psi_*_table_destroy() can be accessed again by
vidtv_psi_*_event_destroy() due to the uninitialized local pointer, so it
is freed once again.

Therefore, to prevent use-after-free and double-free vulnerability,
local pointers must be initialized to NULL when transferring memory
ownership.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68808/">CVE-2025-68808 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68808">CVE-2025-68808 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256682">SUSE bug 1256682</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568810" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68810</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68810" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68810" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68810" ref_url="https://www.suse.com/security/cve/CVE-2025-68810" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: Disallow toggling KVM_MEM_GUEST_MEMFD on an existing memslot

Reject attempts to disable KVM_MEM_GUEST_MEMFD on a memslot that was
initially created with a guest_memfd binding, as KVM doesn't support
toggling KVM_MEM_GUEST_MEMFD on existing memslots.  KVM prevents enabling
KVM_MEM_GUEST_MEMFD, but doesn't prevent clearing the flag.

Failure to reject the new memslot results in a use-after-free due to KVM
not unbinding from the guest_memfd instance.  Unbinding on a FLAGS_ONLY
change is easy enough, and can/will be done as a hardening measure (in
anticipation of KVM supporting dirty logging on guest_memfd at some point),
but fixing the use-after-free would only address the immediate symptom.

  ==================================================================
  BUG: KASAN: slab-use-after-free in kvm_gmem_release+0x362/0x400 [kvm]
  Write of size 8 at addr ffff8881111ae908 by task repro/745

  CPU: 7 UID: 1000 PID: 745 Comm: repro Not tainted 6.18.0-rc6-115d5de2eef3-next-kasan #3 NONE
  Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015
  Call Trace:
   &lt;TASK&gt;
   dump_stack_lvl+0x51/0x60
   print_report+0xcb/0x5c0
   kasan_report+0xb4/0xe0
   kvm_gmem_release+0x362/0x400 [kvm]
   __fput+0x2fa/0x9d0
   task_work_run+0x12c/0x200
   do_exit+0x6ae/0x2100
   do_group_exit+0xa8/0x230
   __x64_sys_exit_group+0x3a/0x50
   x64_sys_call+0x737/0x740
   do_syscall_64+0x5b/0x900
   entry_SYSCALL_64_after_hwframe+0x4b/0x53
  RIP: 0033:0x7f581f2eac31
   &lt;/TASK&gt;

  Allocated by task 745 on cpu 6 at 9.746971s:
   kasan_save_stack+0x20/0x40
   kasan_save_track+0x13/0x50
   __kasan_kmalloc+0x77/0x90
   kvm_set_memory_region.part.0+0x652/0x1110 [kvm]
   kvm_vm_ioctl+0x14b0/0x3290 [kvm]
   __x64_sys_ioctl+0x129/0x1a0
   do_syscall_64+0x5b/0x900
   entry_SYSCALL_64_after_hwframe+0x4b/0x53

  Freed by task 745 on cpu 6 at 9.747467s:
   kasan_save_stack+0x20/0x40
   kasan_save_track+0x13/0x50
   __kasan_save_free_info+0x37/0x50
   __kasan_slab_free+0x3b/0x60
   kfree+0xf5/0x440
   kvm_set_memslot+0x3c2/0x1160 [kvm]
   kvm_set_memory_region.part.0+0x86a/0x1110 [kvm]
   kvm_vm_ioctl+0x14b0/0x3290 [kvm]
   __x64_sys_ioctl+0x129/0x1a0
   do_syscall_64+0x5b/0x900
   entry_SYSCALL_64_after_hwframe+0x4b/0x53
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68810/">CVE-2025-68810 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68810">CVE-2025-68810 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256679">SUSE bug 1256679</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568811" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68811</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68811" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68811" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68811" ref_url="https://www.suse.com/security/cve/CVE-2025-68811" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2722" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

svcrdma: use rc_pageoff for memcpy byte offset

svc_rdma_copy_inline_range added rc_curpage (page index) to the page
base instead of the byte offset rc_pageoff. Use rc_pageoff so copies
land within the current page.

Found by ZeroPath (https://zeropath.com)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68811/">CVE-2025-68811 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68811">CVE-2025-68811 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256677">SUSE bug 1256677</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568813" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68813</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68813" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68813" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68813" ref_url="https://www.suse.com/security/cve/CVE-2025-68813" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0944-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0970-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024807.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0992-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1132-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1136-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024847.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20817-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20887-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20888-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20889-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20891-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20892-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20893-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20895-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20896-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20897-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20898-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20899-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20900-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20943-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20944-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20945-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20946-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045205.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipvs: fix ipv4 null-ptr-deref in route error path

The IPv4 code path in __ip_vs_get_out_rt() calls dst_link_failure()
without ensuring skb-&gt;dev is set, leading to a NULL pointer dereference
in fib_compute_spec_dst() when ipv4_link_failure() attempts to send
ICMP destination unreachable messages.

The issue emerged after commit ed0de45a1008 ("ipv4: recompile ip options
in ipv4_link_failure") started calling __ip_options_compile() from
ipv4_link_failure(). This code path eventually calls fib_compute_spec_dst()
which dereferences skb-&gt;dev. An attempt was made to fix the NULL skb-&gt;dev
dereference in commit 0113d9c9d1cc ("ipv4: fix null-deref in
ipv4_link_failure"), but it only addressed the immediate dev_net(skb-&gt;dev)
dereference by using a fallback device. The fix was incomplete because
fib_compute_spec_dst() later in the call chain still accesses skb-&gt;dev
directly, which remains NULL when IPVS calls dst_link_failure().

The crash occurs when:
1. IPVS processes a packet in NAT mode with a misconfigured destination
2. Route lookup fails in __ip_vs_get_out_rt() before establishing a route
3. The error path calls dst_link_failure(skb) with skb-&gt;dev == NULL
4. ipv4_link_failure() -&gt; ipv4_send_dest_unreach() -&gt;
   __ip_options_compile() -&gt; fib_compute_spec_dst()
5. fib_compute_spec_dst() dereferences NULL skb-&gt;dev

Apply the same fix used for IPv6 in commit 326bf17ea5d4 ("ipvs: fix
ipv6 route unreach panic"): set skb-&gt;dev from skb_dst(skb)-&gt;dev before
calling dst_link_failure().

KASAN: null-ptr-deref in range [0x0000000000000328-0x000000000000032f]
CPU: 1 PID: 12732 Comm: syz.1.3469 Not tainted 6.6.114 #2
RIP: 0010:__in_dev_get_rcu include/linux/inetdevice.h:233
RIP: 0010:fib_compute_spec_dst+0x17a/0x9f0 net/ipv4/fib_frontend.c:285
Call Trace:
  &lt;TASK&gt;
  spec_dst_fill net/ipv4/ip_options.c:232
  spec_dst_fill net/ipv4/ip_options.c:229
  __ip_options_compile+0x13a1/0x17d0 net/ipv4/ip_options.c:330
  ipv4_send_dest_unreach net/ipv4/route.c:1252
  ipv4_link_failure+0x702/0xb80 net/ipv4/route.c:1265
  dst_link_failure include/net/dst.h:437
  __ip_vs_get_out_rt+0x15fd/0x19e0 net/netfilter/ipvs/ip_vs_xmit.c:412
  ip_vs_nat_xmit+0x1d8/0xc80 net/netfilter/ipvs/ip_vs_xmit.c:764
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-04-02"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68813/">CVE-2025-68813 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68813">CVE-2025-68813 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256641">SUSE bug 1256641</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256644">SUSE bug 1256644</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568814" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68814</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68814" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68814" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68814" ref_url="https://www.suse.com/security/cve/CVE-2025-68814" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

io_uring: fix filename leak in __io_openat_prep()

 __io_openat_prep() allocates a struct filename using getname(). However,
for the condition of the file being installed in the fixed file table as
well as having O_CLOEXEC flag set, the function returns early. At that
point, the request doesn't have REQ_F_NEED_CLEANUP flag set. Due to this,
the memory for the newly allocated struct filename is not cleaned up,
causing a memory leak.

Fix this by setting the REQ_F_NEED_CLEANUP for the request just after the
successful getname() call, so that when the request is torn down, the
filename will be cleaned up, along with other resources needing cleanup.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68814/">CVE-2025-68814 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68814">CVE-2025-68814 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256651">SUSE bug 1256651</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568815" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68815</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68815" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68815" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68815" ref_url="https://www.suse.com/security/cve/CVE-2025-68815" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: ets: Remove drr class from the active list if it changes to strict

Whenever a user issues an ets qdisc change command, transforming a
drr class into a strict one, the ets code isn't checking whether that
class was in the active list and removing it. This means that, if a
user changes a strict class (which was in the active list) back to a drr
one, that class will be added twice to the active list [1].

Doing so with the following commands:

tc qdisc add dev lo root handle 1: ets bands 2 strict 1
tc qdisc add dev lo parent 1:2 handle 20: \
    tbf rate 8bit burst 100b latency 1s
tc filter add dev lo parent 1: basic classid 1:2
ping -c1 -W0.01 -s 56 127.0.0.1
tc qdisc change dev lo root handle 1: ets bands 2 strict 2
tc qdisc change dev lo root handle 1: ets bands 2 strict 1
ping -c1 -W0.01 -s 56 127.0.0.1

Will trigger the following splat with list debug turned on:

[   59.279014][  T365] ------------[ cut here ]------------
[   59.279452][  T365] list_add double add: new=ffff88801d60e350, prev=ffff88801d60e350, next=ffff88801d60e2c0.
[   59.280153][  T365] WARNING: CPU: 3 PID: 365 at lib/list_debug.c:35 __list_add_valid_or_report+0x17f/0x220
[   59.280860][  T365] Modules linked in:
[   59.281165][  T365] CPU: 3 UID: 0 PID: 365 Comm: tc Not tainted 6.18.0-rc7-00105-g7e9f13163c13-dirty #239 PREEMPT(voluntary)
[   59.281977][  T365] Hardware name: Bochs Bochs, BIOS Bochs 01/01/2011
[   59.282391][  T365] RIP: 0010:__list_add_valid_or_report+0x17f/0x220
[   59.282842][  T365] Code: 89 c6 e8 d4 b7 0d ff 90 0f 0b 90 90 31 c0 e9 31 ff ff ff 90 48 c7 c7 e0 a0 22 9f 48 89 f2 48 89 c1 4c 89 c6 e8 b2 b7 0d ff 90 &lt;0f&gt; 0b 90 90 31 c0 e9 0f ff ff ff 48 89 f7 48 89 44 24 10 4c 89 44
...
[   59.288812][  T365] Call Trace:
[   59.289056][  T365]  &lt;TASK&gt;
[   59.289224][  T365]  ? srso_alias_return_thunk+0x5/0xfbef5
[   59.289546][  T365]  ets_qdisc_change+0xd2b/0x1e80
[   59.289891][  T365]  ? __lock_acquire+0x7e7/0x1be0
[   59.290223][  T365]  ? __pfx_ets_qdisc_change+0x10/0x10
[   59.290546][  T365]  ? srso_alias_return_thunk+0x5/0xfbef5
[   59.290898][  T365]  ? __mutex_trylock_common+0xda/0x240
[   59.291228][  T365]  ? __pfx___mutex_trylock_common+0x10/0x10
[   59.291655][  T365]  ? srso_alias_return_thunk+0x5/0xfbef5
[   59.291993][  T365]  ? srso_alias_return_thunk+0x5/0xfbef5
[   59.292313][  T365]  ? trace_contention_end+0xc8/0x110
[   59.292656][  T365]  ? srso_alias_return_thunk+0x5/0xfbef5
[   59.293022][  T365]  ? srso_alias_return_thunk+0x5/0xfbef5
[   59.293351][  T365]  tc_modify_qdisc+0x63a/0x1cf0

Fix this by always checking and removing an ets class from the active list
when changing it to strict.

[1] https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/tree/net/sched/sch_ets.c?id=ce052b9402e461a9aded599f5b47e76bc727f7de#n663
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68815/">CVE-2025-68815 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68815">CVE-2025-68815 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256680">SUSE bug 1256680</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568816" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68816</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68816" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68816" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68816" ref_url="https://www.suse.com/security/cve/CVE-2025-68816" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5: fw_tracer, Validate format string parameters

Add validation for format string parameters in the firmware tracer to
prevent potential security vulnerabilities and crashes from malformed
format strings received from firmware.

The firmware tracer receives format strings from the device firmware and
uses them to format trace messages. Without proper validation, bad
firmware could provide format strings with invalid format specifiers
(e.g., %s, %p, %n) that could lead to crashes, or other undefined
behavior.

Add mlx5_tracer_validate_params() to validate that all format specifiers
in trace strings are limited to safe integer/hex formats (%x, %d, %i,
%u, %llx, %lx, etc.). Reject strings containing other format types that
could be used to access arbitrary memory or cause crashes.
Invalid format strings are added to the trace output for visibility with
"BAD_FORMAT: " prefix.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68816/">CVE-2025-68816 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68816">CVE-2025-68816 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256674">SUSE bug 1256674</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568818" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68818</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68818" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68818" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68818" ref_url="https://www.suse.com/security/cve/CVE-2025-68818" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: Revert "scsi: qla2xxx: Perform lockless command completion in abort path"

This reverts commit 0367076b0817d5c75dfb83001ce7ce5c64d803a9.

The commit being reverted added code to __qla2x00_abort_all_cmds() to
call sp-&gt;done() without holding a spinlock.  But unlike the older code
below it, this new code failed to check sp-&gt;cmd_type and just assumed
TYPE_SRB, which results in a jump to an invalid pointer in target-mode
with TYPE_TGT_CMD:

qla2xxx [0000:65:00.0]-d034:8: qla24xx_do_nack_work create sess success
  0000000009f7a79b
qla2xxx [0000:65:00.0]-5003:8: ISP System Error - mbx1=1ff5h mbx2=10h
  mbx3=0h mbx4=0h mbx5=191h mbx6=0h mbx7=0h.
qla2xxx [0000:65:00.0]-d01e:8: -&gt; fwdump no buffer
qla2xxx [0000:65:00.0]-f03a:8: qla_target(0): System error async event
  0x8002 occurred
qla2xxx [0000:65:00.0]-00af:8: Performing ISP error recovery -
  ha=0000000058183fda.
BUG: kernel NULL pointer dereference, address: 0000000000000000
PF: supervisor instruction fetch in kernel mode
PF: error_code(0x0010) - not-present page
PGD 0 P4D 0
Oops: 0010 [#1] SMP
CPU: 2 PID: 9446 Comm: qla2xxx_8_dpc Tainted: G           O       6.1.133 #1
Hardware name: Supermicro Super Server/X11SPL-F, BIOS 4.2 12/15/2023
RIP: 0010:0x0
Code: Unable to access opcode bytes at 0xffffffffffffffd6.
RSP: 0018:ffffc90001f93dc8 EFLAGS: 00010206
RAX: 0000000000000282 RBX: 0000000000000355 RCX: ffff88810d16a000
RDX: ffff88810dbadaa8 RSI: 0000000000080000 RDI: ffff888169dc38c0
RBP: ffff888169dc38c0 R08: 0000000000000001 R09: 0000000000000045
R10: ffffffffa034bdf0 R11: 0000000000000000 R12: ffff88810800bb40
R13: 0000000000001aa8 R14: ffff888100136610 R15: ffff8881070f7400
FS:  0000000000000000(0000) GS:ffff88bf80080000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: ffffffffffffffd6 CR3: 000000010c8ff006 CR4: 00000000003706e0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 &lt;TASK&gt;
 ? __die+0x4d/0x8b
 ? page_fault_oops+0x91/0x180
 ? trace_buffer_unlock_commit_regs+0x38/0x1a0
 ? exc_page_fault+0x391/0x5e0
 ? asm_exc_page_fault+0x22/0x30
 __qla2x00_abort_all_cmds+0xcb/0x3e0 [qla2xxx_scst]
 qla2x00_abort_all_cmds+0x50/0x70 [qla2xxx_scst]
 qla2x00_abort_isp_cleanup+0x3b7/0x4b0 [qla2xxx_scst]
 qla2x00_abort_isp+0xfd/0x860 [qla2xxx_scst]
 qla2x00_do_dpc+0x581/0xa40 [qla2xxx_scst]
 kthread+0xa8/0xd0
 &lt;/TASK&gt;

Then commit 4475afa2646d ("scsi: qla2xxx: Complete command early within
lock") added the spinlock back, because not having the lock caused a
race and a crash.  But qla2x00_abort_srb() in the switch below already
checks for qla2x00_chip_is_down() and handles it the same way, so the
code above the switch is now redundant and still buggy in target-mode.
Remove it.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68818/">CVE-2025-68818 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68818">CVE-2025-68818 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256675">SUSE bug 1256675</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568819" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68819</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68819" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68819" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68819" ref_url="https://www.suse.com/security/cve/CVE-2025-68819" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: dvb-usb: dtv5100: fix out-of-bounds in dtv5100_i2c_msg()

rlen value is a user-controlled value, but dtv5100_i2c_msg() does not
check the size of the rlen value. Therefore, if it is set to a value
larger than sizeof(st-&gt;data), an out-of-bounds vuln occurs for st-&gt;data.

Therefore, we need to add proper range checking to prevent this vuln.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68819/">CVE-2025-68819 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68819">CVE-2025-68819 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256664">SUSE bug 1256664</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568820" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68820</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68820" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68820" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68820" ref_url="https://www.suse.com/security/cve/CVE-2025-68820" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: xattr: fix null pointer deref in ext4_raw_inode()

If ext4_get_inode_loc() fails (e.g. if it returns -EFSCORRUPTED),
iloc.bh will remain set to NULL. Since ext4_xattr_inode_dec_ref_all()
lacks error checking, this will lead to a null pointer dereference
in ext4_raw_inode(), called right after ext4_get_inode_loc().

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-68820/">CVE-2025-68820 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68820">CVE-2025-68820 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256754">SUSE bug 1256754</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568821" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68821</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68821" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68821" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68821" ref_url="https://www.suse.com/security/cve/CVE-2025-68821" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fuse: fix readahead reclaim deadlock

Commit e26ee4efbc79 ("fuse: allocate ff-&gt;release_args only if release is
needed") skips allocating ff-&gt;release_args if the server does not
implement open. However in doing so, fuse_prepare_release() now skips
grabbing the reference on the inode, which makes it possible for an
inode to be evicted from the dcache while there are inflight readahead
requests. This causes a deadlock if the server triggers reclaim while
servicing the readahead request and reclaim attempts to evict the inode
of the file being read ahead. Since the folio is locked during
readahead, when reclaim evicts the fuse inode and fuse_evict_inode()
attempts to remove all folios associated with the inode from the page
cache (truncate_inode_pages_range()), reclaim will block forever waiting
for the lock since readahead cannot relinquish the lock because it is
itself blocked in reclaim:

&gt;&gt;&gt; stack_trace(1504735)
 folio_wait_bit_common (mm/filemap.c:1308:4)
 folio_lock (./include/linux/pagemap.h:1052:3)
 truncate_inode_pages_range (mm/truncate.c:336:10)
 fuse_evict_inode (fs/fuse/inode.c:161:2)
 evict (fs/inode.c:704:3)
 dentry_unlink_inode (fs/dcache.c:412:3)
 __dentry_kill (fs/dcache.c:615:3)
 shrink_kill (fs/dcache.c:1060:12)
 shrink_dentry_list (fs/dcache.c:1087:3)
 prune_dcache_sb (fs/dcache.c:1168:2)
 super_cache_scan (fs/super.c:221:10)
 do_shrink_slab (mm/shrinker.c:435:9)
 shrink_slab (mm/shrinker.c:626:10)
 shrink_node (mm/vmscan.c:5951:2)
 shrink_zones (mm/vmscan.c:6195:3)
 do_try_to_free_pages (mm/vmscan.c:6257:3)
 do_swap_page (mm/memory.c:4136:11)
 handle_pte_fault (mm/memory.c:5562:10)
 handle_mm_fault (mm/memory.c:5870:9)
 do_user_addr_fault (arch/x86/mm/fault.c:1338:10)
 handle_page_fault (arch/x86/mm/fault.c:1481:3)
 exc_page_fault (arch/x86/mm/fault.c:1539:2)
 asm_exc_page_fault+0x22/0x27

Fix this deadlock by allocating ff-&gt;release_args and grabbing the
reference on the inode when preparing the file for release even if the
server does not implement open. The inode reference will be dropped when
the last reference on the fuse file is dropped (see fuse_file_put() -&gt;
fuse_release_end()).
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68821/">CVE-2025-68821 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68821">CVE-2025-68821 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256667">SUSE bug 1256667</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568822" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68822</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68822" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68822" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68822" ref_url="https://www.suse.com/security/cve/CVE-2025-68822" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Input: alps - fix use-after-free bugs caused by dev3_register_work

The dev3_register_work delayed work item is initialized within
alps_reconnect() and scheduled upon receipt of the first bare
PS/2 packet from an external PS/2 device connected to the ALPS
touchpad. During device detachment, the original implementation
calls flush_workqueue() in psmouse_disconnect() to ensure
completion of dev3_register_work. However, the flush_workqueue()
in psmouse_disconnect() only blocks and waits for work items that
were already queued to the workqueue prior to its invocation. Any
work items submitted after flush_workqueue() is called are not
included in the set of tasks that the flush operation awaits.
This means that after flush_workqueue() has finished executing,
the dev3_register_work could still be scheduled. Although the
psmouse state is set to PSMOUSE_CMD_MODE in psmouse_disconnect(),
the scheduling of dev3_register_work remains unaffected.

The race condition can occur as follows:

CPU 0 (cleanup path)     | CPU 1 (delayed work)
psmouse_disconnect()     |
  psmouse_set_state()    |
  flush_workqueue()      | alps_report_bare_ps2_packet()
  alps_disconnect()      |   psmouse_queue_work()
    kfree(priv); // FREE | alps_register_bare_ps2_mouse()
                         |   priv = container_of(work...); // USE
                         |   priv-&gt;dev3 // USE

Add disable_delayed_work_sync() in alps_disconnect() to ensure
that dev3_register_work is properly canceled and prevented from
executing after the alps_data structure has been deallocated.

This bug is identified by static analysis.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-68822/">CVE-2025-68822 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-68822">CVE-2025-68822 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256668">SUSE bug 1256668</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568950" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68950</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68950" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68950" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68950" ref_url="https://www.suse.com/security/cve/CVE-2025-68950" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0072-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024032.html" source="SUSE-SU"/>
    <description>
    ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to version 7.1.2-12, Magick fails to check for circular references between two MVGs, leading to a stack overflow. This is a DoS vulnerability, and any situation that allows reading the mvg file will be affected. Version 7.1.2-12 fixes the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-02-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="5.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-68950/">CVE-2025-68950 at SUSE</cve>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68950">CVE-2025-68950 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255822">SUSE bug 1255822</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041321" comment="ImageMagick-7.1.2.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041322" comment="ImageMagick-config-7-SUSE-7.1.2.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041323" comment="ImageMagick-config-7-upstream-limited-7.1.2.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977490" comment="ImageMagick-config-7-upstream-limited is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041324" comment="ImageMagick-config-7-upstream-open-7.1.2.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977491" comment="ImageMagick-config-7-upstream-open is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041325" comment="ImageMagick-config-7-upstream-secure-7.1.2.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977492" comment="ImageMagick-config-7-upstream-secure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041326" comment="ImageMagick-config-7-upstream-websafe-7.1.2.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977493" comment="ImageMagick-config-7-upstream-websafe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041327" comment="ImageMagick-devel-7.1.2.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041328" comment="ImageMagick-doc-7.1.2.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041329" comment="ImageMagick-extra-7.1.2.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041330" comment="libMagick++-7_Q16HDRI5-7.1.2.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698047" comment="libMagick++-7_Q16HDRI5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041331" comment="libMagick++-devel-7.1.2.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041332" comment="libMagickCore-7_Q16HDRI10-7.1.2.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698048" comment="libMagickCore-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041333" comment="libMagickWand-7_Q16HDRI10-7.1.2.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698049" comment="libMagickWand-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041334" comment="perl-PerlMagick-7.1.2.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202568973" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-68973</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-68973" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-68973" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-68973" ref_url="https://www.suse.com/security/cve/CVE-2025-68973" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0719" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003161.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0728" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002386.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1229" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002460.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0214-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0378-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024043.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20080-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023818.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20108-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20243-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024239.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20356-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024327.html" source="SUSE-SU"/>
    <description>
    In GnuPG before 2.4.9, armor_filter in g10/armor.c has two increments of an index variable where one is intended, leading to an out-of-bounds write for crafted input. (For ExtendedLTS, 2.2.51 and later are fixed versions.)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-16"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-68973/">CVE-2025-68973 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-68973">CVE-2025-68973 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255715">SUSE bug 1255715</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037709" comment="dirmngr-2.5.5-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009695558" comment="dirmngr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037710" comment="gpg2-2.5.5-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151446" comment="gpg2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037711" comment="gpg2-lang-2.5.5-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151447" comment="gpg2-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037712" comment="gpg2-tpm-2.5.5-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009999481" comment="gpg2-tpm is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202569194" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-69194</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-69194" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69194" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-69194" ref_url="https://www.suse.com/security/cve/CVE-2025-69194" source="SUSE CVE"/>
    <description>
    A security issue was discovered in GNU Wget2 when handling Metalink documents. The application fails to properly validate file paths provided in Metalink &lt;file name&gt; elements. An attacker can abuse this behavior to write files to unintended locations on the system. This can lead to data loss or potentially allow further compromise of the user's environment.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-16"/>
	<updated date="2026-03-06"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-69194/">CVE-2025-69194 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-69194">CVE-2025-69194 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255728">SUSE bug 1255728</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037738" comment="libwget4-2.2.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037147" comment="libwget4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037739" comment="wget2-2.2.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037148" comment="wget2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037740" comment="wget2-devel-2.2.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037149" comment="wget2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202569195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-69195</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-69195" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69195" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-69195" ref_url="https://www.suse.com/security/cve/CVE-2025-69195" source="SUSE CVE"/>
    <description>
    A flaw was found in GNU Wget2. This vulnerability, a stack-based buffer overflow, occurs in the filename sanitization logic when processing attacker-controlled URL paths, particularly when filename restriction options are active. A remote attacker can exploit this by providing a specially crafted URL, which, upon user interaction with wget2, can lead to memory corruption. This can cause the application to crash and potentially allow for further malicious activities.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-16"/>
	<updated date="2026-03-08"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-69195/">CVE-2025-69195 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-69195">CVE-2025-69195 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255729">SUSE bug 1255729</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037738" comment="libwget4-2.2.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037147" comment="libwget4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037739" comment="wget2-2.2.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037148" comment="wget2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037740" comment="wget2-devel-2.2.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037149" comment="wget2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202569204" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-69204</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-69204" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69204" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-69204" ref_url="https://www.suse.com/security/cve/CVE-2025-69204" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023699.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20183-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024032.html" source="SUSE-SU"/>
    <description>
    ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to version 7.1.2-12, in the WriteSVGImage function, using an int variable to store number_attributes caused an integer overflow. This, in turn, triggered a buffer overflow and caused a DoS attack. Version 7.1.2-12 fixes the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-02-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="5.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-69204/">CVE-2025-69204 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-69204">CVE-2025-69204 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1255823">SUSE bug 1255823</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041321" comment="ImageMagick-7.1.2.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041322" comment="ImageMagick-config-7-SUSE-7.1.2.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041323" comment="ImageMagick-config-7-upstream-limited-7.1.2.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977490" comment="ImageMagick-config-7-upstream-limited is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041324" comment="ImageMagick-config-7-upstream-open-7.1.2.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977491" comment="ImageMagick-config-7-upstream-open is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041325" comment="ImageMagick-config-7-upstream-secure-7.1.2.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977492" comment="ImageMagick-config-7-upstream-secure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041326" comment="ImageMagick-config-7-upstream-websafe-7.1.2.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977493" comment="ImageMagick-config-7-upstream-websafe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041327" comment="ImageMagick-devel-7.1.2.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041328" comment="ImageMagick-doc-7.1.2.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041329" comment="ImageMagick-extra-7.1.2.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041330" comment="libMagick++-7_Q16HDRI5-7.1.2.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698047" comment="libMagick++-7_Q16HDRI5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041331" comment="libMagick++-devel-7.1.2.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041332" comment="libMagickCore-7_Q16HDRI10-7.1.2.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698048" comment="libMagickCore-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041333" comment="libMagickWand-7_Q16HDRI10-7.1.2.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698049" comment="libMagickWand-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041334" comment="perl-PerlMagick-7.1.2.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202569223" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-69223</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-69223" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69223" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-69223" ref_url="https://www.suse.com/security/cve/CVE-2025-69223" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024669.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024346.html" source="SUSE-SU"/>
    <description>
    AIOHTTP is an asynchronous HTTP client/server framework for asyncio and Python. Versions 3.13.2 and below allow a zip bomb to be used to execute a DoS against the AIOHTTP server. An attacker may be able to send a compressed request that when decompressed by AIOHTTP could exhaust the host's memory. This issue is fixed in version 3.13.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-15"/>
	<updated date="2026-03-13"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-69223/">CVE-2025-69223 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-69223">CVE-2025-69223 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256017">SUSE bug 1256017</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010043894" comment="python313-Brotli-1.1.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010043908" comment="python313-Brotli is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010043895" comment="python313-aiohttp-3.11.16-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010043909" comment="python313-aiohttp is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202569224" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-69224</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-69224" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69224" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-69224" ref_url="https://www.suse.com/security/cve/CVE-2025-69224" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024669.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024346.html" source="SUSE-SU"/>
    <description>
    AIOHTTP is an asynchronous HTTP client/server framework for asyncio and Python. Versions 3.13.2 and below of the Python HTTP parser may allow a request smuggling attack with the presence of non-ASCII characters. If a pure Python version of AIOHTTP is installed (i.e. without the usual C extensions) or AIOHTTP_NO_EXTENSIONS is enabled, then an attacker may be able to execute a request smuggling attack to bypass certain firewalls or proxy protections. This issue is fixed in version 3.13.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-15"/>
	<updated date="2026-03-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-69224/">CVE-2025-69224 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-69224">CVE-2025-69224 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256018">SUSE bug 1256018</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010043894" comment="python313-Brotli-1.1.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010043908" comment="python313-Brotli is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010043895" comment="python313-aiohttp-3.11.16-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010043909" comment="python313-aiohttp is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202569225" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-69225</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-69225" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69225" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-69225" ref_url="https://www.suse.com/security/cve/CVE-2025-69225" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024669.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024346.html" source="SUSE-SU"/>
    <description>
    AIOHTTP is an asynchronous HTTP client/server framework for asyncio and Python. Versions 3.13.2 and below contain parser logic which allows non-ASCII decimals to be present in the Range header. There is no known impact, but there is the possibility that there's a method to exploit a request smuggling vulnerability. This issue is fixed in version 3.13.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-15"/>
	<updated date="2026-03-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-69225/">CVE-2025-69225 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-69225">CVE-2025-69225 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256019">SUSE bug 1256019</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010043894" comment="python313-Brotli-1.1.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010043908" comment="python313-Brotli is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010043895" comment="python313-aiohttp-3.11.16-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010043909" comment="python313-aiohttp is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202569226" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-69226</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-69226" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69226" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-69226" ref_url="https://www.suse.com/security/cve/CVE-2025-69226" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024669.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024346.html" source="SUSE-SU"/>
    <description>
    AIOHTTP is an asynchronous HTTP client/server framework for asyncio and Python. Versions 3.13.2 and below enable an attacker to ascertain the existence of absolute path components through the path normalization logic for static files meant to prevent path traversal. If an application uses web.static() (not recommended for production deployments), it may be possible for an attacker to ascertain the existence of path components. This issue is fixed in version 3.13.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-15"/>
	<updated date="2026-03-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-69226/">CVE-2025-69226 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-69226">CVE-2025-69226 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256020">SUSE bug 1256020</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010043894" comment="python313-Brotli-1.1.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010043908" comment="python313-Brotli is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010043895" comment="python313-aiohttp-3.11.16-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010043909" comment="python313-aiohttp is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202569227" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-69227</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-69227" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69227" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-69227" ref_url="https://www.suse.com/security/cve/CVE-2025-69227" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024669.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024346.html" source="SUSE-SU"/>
    <description>
    AIOHTTP is an asynchronous HTTP client/server framework for asyncio and Python. Versions 3.13.2 and below allow for an infinite loop to occur when assert statements are bypassed, resulting in a DoS attack when processing a POST body. If optimizations are enabled (-O or PYTHONOPTIMIZE=1), and the application includes a handler that uses the Request.post() method, then an attacker may be able to execute a DoS attack with a specially crafted message. This issue is fixed in version 3.13.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-15"/>
	<updated date="2026-03-13"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-69227/">CVE-2025-69227 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-69227">CVE-2025-69227 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256021">SUSE bug 1256021</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010043894" comment="python313-Brotli-1.1.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010043908" comment="python313-Brotli is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010043895" comment="python313-aiohttp-3.11.16-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010043909" comment="python313-aiohttp is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202569228" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-69228</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-69228" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69228" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-69228" ref_url="https://www.suse.com/security/cve/CVE-2025-69228" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024669.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024346.html" source="SUSE-SU"/>
    <description>
    AIOHTTP is an asynchronous HTTP client/server framework for asyncio and Python. Versions 3.13.2 and below allow a request to be crafted in such a way that an AIOHTTP server's memory fills up uncontrollably during processing. If an application includes a handler that uses the Request.post() method, an attacker may be able to freeze the server by exhausting the memory. This issue is fixed in version 3.13.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-15"/>
	<updated date="2026-03-13"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-69228/">CVE-2025-69228 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-69228">CVE-2025-69228 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256022">SUSE bug 1256022</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010043894" comment="python313-Brotli-1.1.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010043908" comment="python313-Brotli is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010043895" comment="python313-aiohttp-3.11.16-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010043909" comment="python313-aiohttp is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202569229" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-69229</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-69229" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69229" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-69229" ref_url="https://www.suse.com/security/cve/CVE-2025-69229" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024669.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024671.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024346.html" source="SUSE-SU"/>
    <description>
    AIOHTTP is an asynchronous HTTP client/server framework for asyncio and Python. In versions 3.13.2 and below, handling of chunked messages can result in excessive blocking CPU usage when receiving a large number of chunks. If an application makes use of the request.read() method in an endpoint, it may be possible for an attacker to cause the server to spend a moderate amount of blocking CPU time (e.g. 1 second) while processing the request. This could potentially lead to DoS as the server would be unable to handle other requests during that time. This issue is fixed in version 3.13.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-15"/>
	<updated date="2026-03-13"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-69229/">CVE-2025-69229 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-69229">CVE-2025-69229 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256023">SUSE bug 1256023</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010043894" comment="python313-Brotli-1.1.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010043908" comment="python313-Brotli is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010043895" comment="python313-aiohttp-3.11.16-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010043909" comment="python313-aiohttp is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202569418" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-69418</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-69418" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69418" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-69418" ref_url="https://www.suse.com/security/cve/CVE-2025-69418" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1473" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024331.html" source="SUSE-SU"/>
    <description>
    Issue summary: When using the low-level OCB API directly with AES-NI or&lt;br&gt;other hardware-accelerated code paths, inputs whose length is not a multiple&lt;br&gt;of 16 bytes can leave the final partial block unencrypted and unauthenticated.&lt;br&gt;&lt;br&gt;Impact summary: The trailing 1-15 bytes of a message may be exposed in&lt;br&gt;cleartext on encryption and are not covered by the authentication tag,&lt;br&gt;allowing an attacker to read or tamper with those bytes without detection.&lt;br&gt;&lt;br&gt;The low-level OCB encrypt and decrypt routines in the hardware-accelerated&lt;br&gt;stream path process full 16-byte blocks but do not advance the input/output&lt;br&gt;pointers. The subsequent tail-handling code then operates on the original&lt;br&gt;base pointers, effectively reprocessing the beginning of the buffer while&lt;br&gt;leaving the actual trailing bytes unprocessed. The authentication checksum&lt;br&gt;also excludes the true tail bytes.&lt;br&gt;&lt;br&gt;However, typical OpenSSL consumers using EVP are not affected because the&lt;br&gt;higher-level EVP and provider OCB implementations split inputs so that full&lt;br&gt;blocks and trailing partial blocks are processed in separate calls, avoiding&lt;br&gt;the problematic code path. Additionally, TLS does not use OCB ciphersuites.&lt;br&gt;The vulnerability only affects applications that call the low-level&lt;br&gt;CRYPTO_ocb128_encrypt() or CRYPTO_ocb128_decrypt() functions directly with&lt;br&gt;non-block-aligned lengths in a single call on hardware-accelerated builds.&lt;br&gt;For these reasons the issue was assessed as Low severity.&lt;br&gt;&lt;br&gt;The FIPS modules in 3.6, 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected&lt;br&gt;by this issue, as OCB mode is not a FIPS-approved algorithm.&lt;br&gt;&lt;br&gt;OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue.&lt;br&gt;&lt;br&gt;OpenSSL 1.0.2 is not affected by this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-69418/">CVE-2025-69418 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-69418">CVE-2025-69418 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256835">SUSE bug 1256835</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041595" comment="libopenssl-3-devel-3.5.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700693" comment="libopenssl-3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041596" comment="libopenssl-3-fips-provider-3.5.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009868077" comment="libopenssl-3-fips-provider is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041597" comment="libopenssl-3-fips-provider-x86-64-v3-3.5.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010034160" comment="libopenssl-3-fips-provider-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041598" comment="libopenssl3-3.5.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700695" comment="libopenssl3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041599" comment="libopenssl3-x86-64-v3-3.5.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010034161" comment="libopenssl3-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041600" comment="openssl-3-3.5.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700697" comment="openssl-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041601" comment="openssl-3-doc-3.5.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700698" comment="openssl-3-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202569419" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-69419</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-69419" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69419" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-69419" ref_url="https://www.suse.com/security/cve/CVE-2025-69419" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1473" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003157.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1503" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002449.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3042" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002521.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4472" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003283.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4824" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002590.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024331.html" source="SUSE-SU"/>
    <description>
    Issue summary: Calling PKCS12_get_friendlyname() function on a maliciously
crafted PKCS#12 file with a BMPString (UTF-16BE) friendly name containing
non-ASCII BMP code point can trigger a one byte write before the allocated
buffer.

Impact summary: The out-of-bounds write can cause a memory corruption
which can have various consequences including a Denial of Service.

The OPENSSL_uni2utf8() function performs a two-pass conversion of a PKCS#12
BMPString (UTF-16BE) to UTF-8. In the second pass, when emitting UTF-8 bytes,
the helper function bmp_to_utf8() incorrectly forwards the remaining UTF-16
source byte count as the destination buffer capacity to UTF8_putc(). For BMP
code points above U+07FF, UTF-8 requires three bytes, but the forwarded
capacity can be just two bytes. UTF8_putc() then returns -1, and this negative
value is added to the output length without validation, causing the
length to become negative. The subsequent trailing NUL byte is then written
at a negative offset, causing write outside of heap allocated buffer.

The vulnerability is reachable via the public PKCS12_get_friendlyname() API
when parsing attacker-controlled PKCS#12 files. While PKCS12_parse() uses a
different code path that avoids this issue, PKCS12_get_friendlyname() directly
invokes the vulnerable function. Exploitation requires an attacker to provide
a malicious PKCS#12 file to be parsed by the application and the attacker
can just trigger a one zero byte write before the allocated buffer.
For that reason the issue was assessed as Low severity according to our
Security Policy.

The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,
as the PKCS#12 implementation is outside the OpenSSL FIPS module boundary.

OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue.

OpenSSL 1.0.2 is not affected by this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-69419/">CVE-2025-69419 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-69419">CVE-2025-69419 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256836">SUSE bug 1256836</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041595" comment="libopenssl-3-devel-3.5.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700693" comment="libopenssl-3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041596" comment="libopenssl-3-fips-provider-3.5.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009868077" comment="libopenssl-3-fips-provider is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041597" comment="libopenssl-3-fips-provider-x86-64-v3-3.5.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010034160" comment="libopenssl-3-fips-provider-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041598" comment="libopenssl3-3.5.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700695" comment="libopenssl3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041599" comment="libopenssl3-x86-64-v3-3.5.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010034161" comment="libopenssl3-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041600" comment="openssl-3-3.5.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700697" comment="openssl-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041601" comment="openssl-3-doc-3.5.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700698" comment="openssl-3-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202569420" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-69420</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-69420" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69420" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-69420" ref_url="https://www.suse.com/security/cve/CVE-2025-69420" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1473" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024331.html" source="SUSE-SU"/>
    <description>
    Issue summary: A type confusion vulnerability exists in the TimeStamp Response
verification code where an ASN1_TYPE union member is accessed without first
validating the type, causing an invalid or NULL pointer dereference when
processing a malformed TimeStamp Response file.

Impact summary: An application calling TS_RESP_verify_response() with a
malformed TimeStamp Response can be caused to dereference an invalid or
NULL pointer when reading, resulting in a Denial of Service.

The functions ossl_ess_get_signing_cert() and ossl_ess_get_signing_cert_v2()
access the signing cert attribute value without validating its type.
When the type is not V_ASN1_SEQUENCE, this results in accessing invalid memory
through the ASN1_TYPE union, causing a crash.

Exploiting this vulnerability requires an attacker to provide a malformed
TimeStamp Response to an application that verifies timestamp responses. The
TimeStamp protocol (RFC 3161) is not widely used and the impact of the
exploit is just a Denial of Service. For these reasons the issue was
assessed as Low severity.

The FIPS modules in 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,
as the TimeStamp Response implementation is outside the OpenSSL FIPS module
boundary.

OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue.

OpenSSL 1.0.2 is not affected by this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-69420/">CVE-2025-69420 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-69420">CVE-2025-69420 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256837">SUSE bug 1256837</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041595" comment="libopenssl-3-devel-3.5.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700693" comment="libopenssl-3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041596" comment="libopenssl-3-fips-provider-3.5.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009868077" comment="libopenssl-3-fips-provider is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041597" comment="libopenssl-3-fips-provider-x86-64-v3-3.5.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010034160" comment="libopenssl-3-fips-provider-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041598" comment="libopenssl3-3.5.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700695" comment="libopenssl3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041599" comment="libopenssl3-x86-64-v3-3.5.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010034161" comment="libopenssl3-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041600" comment="openssl-3-3.5.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700697" comment="openssl-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041601" comment="openssl-3-doc-3.5.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700698" comment="openssl-3-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202569421" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-69421</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-69421" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-69421" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-69421" ref_url="https://www.suse.com/security/cve/CVE-2025-69421" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1473" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024331.html" source="SUSE-SU"/>
    <description>
    Issue summary: Processing a malformed PKCS#12 file can trigger a NULL pointer
dereference in the PKCS12_item_decrypt_d2i_ex() function.

Impact summary: A NULL pointer dereference can trigger a crash which leads to
Denial of Service for an application processing PKCS#12 files.

The PKCS12_item_decrypt_d2i_ex() function does not check whether the oct
parameter is NULL before dereferencing it. When called from
PKCS12_unpack_p7encdata() with a malformed PKCS#12 file, this parameter can
be NULL, causing a crash. The vulnerability is limited to Denial of Service
and cannot be escalated to achieve code execution or memory disclosure.

Exploiting this issue requires an attacker to provide a malformed PKCS#12 file
to an application that processes it. For that reason the issue was assessed as
Low severity according to our Security Policy.

The FIPS modules in 3.6, 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,
as the PKCS#12 implementation is outside the OpenSSL FIPS module boundary.

OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are vulnerable to this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-69421/">CVE-2025-69421 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-69421">CVE-2025-69421 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256838">SUSE bug 1256838</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041595" comment="libopenssl-3-devel-3.5.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700693" comment="libopenssl-3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041596" comment="libopenssl-3-fips-provider-3.5.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009868077" comment="libopenssl-3-fips-provider is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041597" comment="libopenssl-3-fips-provider-x86-64-v3-3.5.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010034160" comment="libopenssl-3-fips-provider-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041598" comment="libopenssl3-3.5.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700695" comment="libopenssl3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041599" comment="libopenssl3-x86-64-v3-3.5.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010034161" comment="libopenssl3-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041600" comment="openssl-3-3.5.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700697" comment="openssl-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041601" comment="openssl-3-doc-3.5.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700698" comment="openssl-3-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20257039" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-7039</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-7039" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-7039" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-7039" ref_url="https://www.suse.com/security/cve/CVE-2025-7039" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21063-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21201-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023556.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4186-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023316.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4278-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4308-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023497.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023743.html" source="SUSE-SU"/>
    <description>
    A flaw was found in glib. An integer overflow during temporary file creation leads to an out-of-bounds memory access, allowing an attacker to potentially perform path traversal or access private temporary file content by creating symbolic links. This vulnerability allows a local attacker to manipulate file paths and access unauthorized data. The core issue stems from insufficient validation of file path lengths during temporary file operations.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-13"/>
	<updated date="2026-01-16"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.9/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="2.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-7039/">CVE-2025-7039 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-7039">CVE-2025-7039 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249055">SUSE bug 1249055</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037192" comment="gio-branding-upstream-2.84.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009241263" comment="gio-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037193" comment="glib2-devel-2.84.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151142" comment="glib2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037194" comment="glib2-devel-static-2.84.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009241266" comment="glib2-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037195" comment="glib2-doc-2.84.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009862594" comment="glib2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037196" comment="glib2-lang-2.84.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151143" comment="glib2-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037197" comment="glib2-tests-devel-2.84.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009755645" comment="glib2-tests-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037198" comment="glib2-tools-2.84.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151144" comment="glib2-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037199" comment="libgio-2_0-0-2.84.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151145" comment="libgio-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037200" comment="libgirepository-2_0-0-2.84.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037220" comment="libgirepository-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037201" comment="libglib-2_0-0-2.84.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151147" comment="libglib-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037202" comment="libgmodule-2_0-0-2.84.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151149" comment="libgmodule-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037203" comment="libgobject-2_0-0-2.84.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151151" comment="libgobject-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037204" comment="libgthread-2_0-0-2.84.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151153" comment="libgthread-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037205" comment="typelib-1_0-GIRepository-3_0-2.84.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037221" comment="typelib-1_0-GIRepository-3_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037206" comment="typelib-1_0-GLib-2_0-2.84.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037222" comment="typelib-1_0-GLib-2_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037207" comment="typelib-1_0-GLibUnix-2_0-2.84.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037223" comment="typelib-1_0-GLibUnix-2_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037208" comment="typelib-1_0-GModule-2_0-2.84.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037224" comment="typelib-1_0-GModule-2_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037209" comment="typelib-1_0-GObject-2_0-2.84.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037225" comment="typelib-1_0-GObject-2_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037210" comment="typelib-1_0-Gio-2_0-2.84.4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037226" comment="typelib-1_0-Gio-2_0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202570888" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-70888</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-70888" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-70888" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-70888" ref_url="https://www.suse.com/security/cve/CVE-2025-70888" source="SUSE CVE"/>
    <description>
    An issue in mtrojnar Osslsigncode affected at v2.10 and before allows a remote attacker to escalate privileges via the osslsigncode.c component
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-10"/>
	<updated date="2026-04-10"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-70888/">CVE-2025-70888 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-70888">CVE-2025-70888 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260680">SUSE bug 1260680</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010053394" comment="osslsigncode-2.13-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010052792" comment="osslsigncode is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71064</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71064" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71064" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71064" ref_url="https://www.suse.com/security/cve/CVE-2025-71064" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: hns3: using the num_tqps in the vf driver to apply for resources

Currently, hdev-&gt;htqp is allocated using hdev-&gt;num_tqps, and kinfo-&gt;tqp
is allocated using kinfo-&gt;num_tqps. However, kinfo-&gt;num_tqps is set to
min(new_tqps, hdev-&gt;num_tqps);  Therefore, kinfo-&gt;num_tqps may be smaller
than hdev-&gt;num_tqps, which causes some hdev-&gt;htqp[i] to remain
uninitialized in hclgevf_knic_setup().

Thus, this patch allocates hdev-&gt;htqp and kinfo-&gt;tqp using hdev-&gt;num_tqps,
ensuring that the lengths of hdev-&gt;htqp and kinfo-&gt;tqp are consistent
and that all elements are properly initialized.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-71064/">CVE-2025-71064 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-71064">CVE-2025-71064 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256654">SUSE bug 1256654</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71066</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71066" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71066" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71066" ref_url="https://www.suse.com/security/cve/CVE-2025-71066" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1131-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: ets: Always remove class from active list before deleting in ets_qdisc_change

zdi-disclosures@trendmicro.com says:

The vulnerability is a race condition between `ets_qdisc_dequeue` and
`ets_qdisc_change`.  It leads to UAF on `struct Qdisc` object.
Attacker requires the capability to create new user and network namespace
in order to trigger the bug.
See my additional commentary at the end of the analysis.

Analysis:

static int ets_qdisc_change(struct Qdisc *sch, struct nlattr *opt,
                          struct netlink_ext_ack *extack)
{
...

      // (1) this lock is preventing .change handler (`ets_qdisc_change`)
      //to race with .dequeue handler (`ets_qdisc_dequeue`)
      sch_tree_lock(sch);

      for (i = nbands; i &lt; oldbands; i++) {
              if (i &gt;= q-&gt;nstrict &amp;&amp; q-&gt;classes[i].qdisc-&gt;q.qlen)
                      list_del_init(&amp;q-&gt;classes[i].alist);
              qdisc_purge_queue(q-&gt;classes[i].qdisc);
      }

      WRITE_ONCE(q-&gt;nbands, nbands);
      for (i = nstrict; i &lt; q-&gt;nstrict; i++) {
              if (q-&gt;classes[i].qdisc-&gt;q.qlen) {
		      // (2) the class is added to the q-&gt;active
                      list_add_tail(&amp;q-&gt;classes[i].alist, &amp;q-&gt;active);
                      q-&gt;classes[i].deficit = quanta[i];
              }
      }
      WRITE_ONCE(q-&gt;nstrict, nstrict);
      memcpy(q-&gt;prio2band, priomap, sizeof(priomap));

      for (i = 0; i &lt; q-&gt;nbands; i++)
              WRITE_ONCE(q-&gt;classes[i].quantum, quanta[i]);

      for (i = oldbands; i &lt; q-&gt;nbands; i++) {
              q-&gt;classes[i].qdisc = queues[i];
              if (q-&gt;classes[i].qdisc != &amp;noop_qdisc)
                      qdisc_hash_add(q-&gt;classes[i].qdisc, true);
      }

      // (3) the qdisc is unlocked, now dequeue can be called in parallel
      // to the rest of .change handler
      sch_tree_unlock(sch);

      ets_offload_change(sch);
      for (i = q-&gt;nbands; i &lt; oldbands; i++) {
	      // (4) we're reducing the refcount for our class's qdisc and
	      //  freeing it
              qdisc_put(q-&gt;classes[i].qdisc);
	      // (5) If we call .dequeue between (4) and (5), we will have
	      // a strong UAF and we can control RIP
              q-&gt;classes[i].qdisc = NULL;
              WRITE_ONCE(q-&gt;classes[i].quantum, 0);
              q-&gt;classes[i].deficit = 0;
              gnet_stats_basic_sync_init(&amp;q-&gt;classes[i].bstats);
              memset(&amp;q-&gt;classes[i].qstats, 0, sizeof(q-&gt;classes[i].qstats));
      }
      return 0;
}

Comment:
This happens because some of the classes have their qdiscs assigned to
NULL, but remain in the active list. This commit fixes this issue by always
removing the class from the active list before deleting and freeing its
associated qdisc

Reproducer Steps
(trimmed version of what was sent by zdi-disclosures@trendmicro.com)

```
DEV="${DEV:-lo}"
ROOT_HANDLE="${ROOT_HANDLE:-1:}"
BAND2_HANDLE="${BAND2_HANDLE:-20:}"   # child under 1:2
PING_BYTES="${PING_BYTES:-48}"
PING_COUNT="${PING_COUNT:-200000}"
PING_DST="${PING_DST:-127.0.0.1}"

SLOW_TBF_RATE="${SLOW_TBF_RATE:-8bit}"
SLOW_TBF_BURST="${SLOW_TBF_BURST:-100b}"
SLOW_TBF_LAT="${SLOW_TBF_LAT:-1s}"

cleanup() {
  tc qdisc del dev "$DEV" root 2&gt;/dev/null
}
trap cleanup EXIT

ip link set "$DEV" up

tc qdisc del dev "$DEV" root 2&gt;/dev/null || true

tc qdisc add dev "$DEV" root handle "$ROOT_HANDLE" ets bands 2 strict 2

tc qdisc add dev "$DEV" parent 1:2 handle "$BAND2_HANDLE" \
  tbf rate "$SLOW_TBF_RATE" burst "$SLOW_TBF_BURST" latency "$SLOW_TBF_LAT"

tc filter add dev "$DEV" parent 1: protocol all prio 1 u32 match u32 0 0 flowid 1:2
tc -s qdisc ls dev $DEV

ping -I "$DEV" -f -c "$PING_COUNT" -s "$PING_BYTES" -W 0.001 "$PING_DST" \
  &gt;/dev/null 2&gt;&amp;1 &amp;
tc qdisc change dev "$DEV" root handle "$ROOT_HANDLE" ets bands 2 strict 0
tc qdisc change dev "$DEV" root handle "$ROOT_HANDLE" ets bands 2 strict 2
tc -s qdisc ls dev $DEV
tc qdisc del dev "$DEV" parent 
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-71066/">CVE-2025-71066 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-71066">CVE-2025-71066 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256645">SUSE bug 1256645</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258005">SUSE bug 1258005</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571071" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71071</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71071" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71071" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71071" ref_url="https://www.suse.com/security/cve/CVE-2025-71071" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommu/mediatek: fix use-after-free on probe deferral

The driver is dropping the references taken to the larb devices during
probe after successful lookup as well as on errors. This can
potentially lead to a use-after-free in case a larb device has not yet
been bound to its driver so that the iommu driver probe defers.

Fix this by keeping the references as expected while the iommu driver is
bound.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-71071/">CVE-2025-71071 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71071">CVE-2025-71071 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256802">SUSE bug 1256802</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571073" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71073</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71073" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71073" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71073" ref_url="https://www.suse.com/security/cve/CVE-2025-71073" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Input: lkkbd - disable pending work before freeing device

lkkbd_interrupt() schedules lk-&gt;tq via schedule_work(), and the work
handler lkkbd_reinit() dereferences the lkkbd structure and its
serio/input_dev fields.

lkkbd_disconnect() and error paths in lkkbd_connect() free the lkkbd
structure without preventing the reinit work from being queued again
until serio_close() returns. This can allow the work handler to run
after the structure has been freed, leading to a potential use-after-free.

Use disable_work_sync() instead of cancel_work_sync() to ensure the
reinit work cannot be re-queued, and call it both in lkkbd_disconnect()
and in lkkbd_connect() error paths after serio_open().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71073/">CVE-2025-71073 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71073">CVE-2025-71073 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256632">SUSE bug 1256632</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71076</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71076" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71076" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71076" ref_url="https://www.suse.com/security/cve/CVE-2025-71076" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/xe/oa: Limit num_syncs to prevent oversized allocations

The OA open parameters did not validate num_syncs, allowing
userspace to pass arbitrarily large values, potentially
leading to excessive allocations.

Add check to ensure that num_syncs does not exceed DRM_XE_MAX_SYNCS,
returning -EINVAL when the limit is violated.

v2: use XE_IOCTL_DBG() and drop duplicated check. (Ashutosh)

(cherry picked from commit e057b2d2b8d815df3858a87dffafa2af37e5945b)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-71076/">CVE-2025-71076 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71076">CVE-2025-71076 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256627">SUSE bug 1256627</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571077" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71077</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71077" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71077" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71077" ref_url="https://www.suse.com/security/cve/CVE-2025-71077" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tpm: Cap the number of PCR banks

tpm2_get_pcr_allocation() does not cap any upper limit for the number of
banks. Cap the limit to eight banks so that out of bounds values coming
from external I/O cause on only limited harm.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-71077/">CVE-2025-71077 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71077">CVE-2025-71077 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256613">SUSE bug 1256613</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71078</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71078" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71078" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71078" ref_url="https://www.suse.com/security/cve/CVE-2025-71078" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/64s/slb: Fix SLB multihit issue during SLB preload

On systems using the hash MMU, there is a software SLB preload cache that
mirrors the entries loaded into the hardware SLB buffer. This preload
cache is subject to periodic eviction - typically after every 256 context
switches - to remove old entry.

To optimize performance, the kernel skips switch_mmu_context() in
switch_mm_irqs_off() when the prev and next mm_struct are the same.
However, on hash MMU systems, this can lead to inconsistencies between
the hardware SLB and the software preload cache.

If an SLB entry for a process is evicted from the software cache on one
CPU, and the same process later runs on another CPU without executing
switch_mmu_context(), the hardware SLB may retain stale entries. If the
kernel then attempts to reload that entry, it can trigger an SLB
multi-hit error.

The following timeline shows how stale SLB entries are created and can
cause a multi-hit error when a process moves between CPUs without a
MMU context switch.

CPU 0                                   CPU 1
-----                                    -----
Process P
exec                                    swapper/1
 load_elf_binary
  begin_new_exc
    activate_mm
     switch_mm_irqs_off
      switch_mmu_context
       switch_slb
       /*
        * This invalidates all
        * the entries in the HW
        * and setup the new HW
        * SLB entries as per the
        * preload cache.
        */
context_switch
sched_migrate_task migrates process P to cpu-1

Process swapper/0                       context switch (to process P)
(uses mm_struct of Process P)           switch_mm_irqs_off()
                                         switch_slb
                                           load_slb++
                                            /*
                                            * load_slb becomes 0 here
                                            * and we evict an entry from
                                            * the preload cache with
                                            * preload_age(). We still
                                            * keep HW SLB and preload
                                            * cache in sync, that is
                                            * because all HW SLB entries
                                            * anyways gets evicted in
                                            * switch_slb during SLBIA.
                                            * We then only add those
                                            * entries back in HW SLB,
                                            * which are currently
                                            * present in preload_cache
                                            * (after eviction).
                                            */
                                        load_elf_binary continues...
                                         setup_new_exec()
                                          slb_setup_new_exec()

                                        sched_switch event
                                        sched_migrate_task migrates
                                        process P to cpu-0

context_switch from swapper/0 to Process P
 switch_mm_irqs_off()
  /*
   * Since both prev and next mm struct are same we don't call
   * switch_mmu_context(). This will cause the HW SLB and SW preload
   * cache to go out of sync in preload_new_slb_context. Because there
   * was an SLB entry which was evicted from both HW and preload cache
   * on cpu-1. Now later in preload_new_slb_context(), when we will try
   * to add the same preload entry again, we will add this to the SW
   * preload cache and then will add it to the HW SLB. Since on cpu-0
   * this entry was never invalidated, hence adding this entry to the HW
   * SLB will cause a SLB multi-hit error.
   */
load_elf_binary cont
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-71078/">CVE-2025-71078 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71078">CVE-2025-71078 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256616">SUSE bug 1256616</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71079</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71079" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71079" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71079" ref_url="https://www.suse.com/security/cve/CVE-2025-71079" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: nfc: fix deadlock between nfc_unregister_device and rfkill_fop_write

A deadlock can occur between nfc_unregister_device() and rfkill_fop_write()
due to lock ordering inversion between device_lock and rfkill_global_mutex.

The problematic lock order is:

Thread A (rfkill_fop_write):
  rfkill_fop_write()
    mutex_lock(&amp;rfkill_global_mutex)
      rfkill_set_block()
        nfc_rfkill_set_block()
          nfc_dev_down()
            device_lock(&amp;dev-&gt;dev)    &lt;- waits for device_lock

Thread B (nfc_unregister_device):
  nfc_unregister_device()
    device_lock(&amp;dev-&gt;dev)
      rfkill_unregister()
        mutex_lock(&amp;rfkill_global_mutex)  &lt;- waits for rfkill_global_mutex

This creates a classic ABBA deadlock scenario.

Fix this by moving rfkill_unregister() and rfkill_destroy() outside the
device_lock critical section. Store the rfkill pointer in a local variable
before releasing the lock, then call rfkill_unregister() after releasing
device_lock.

This change is safe because rfkill_fop_write() holds rfkill_global_mutex
while calling the rfkill callbacks, and rfkill_unregister() also acquires
rfkill_global_mutex before cleanup. Therefore, rfkill_unregister() will
wait for any ongoing callback to complete before proceeding, and
device_del() is only called after rfkill_unregister() returns, preventing
any use-after-free.

The similar lock ordering in nfc_register_device() (device_lock -&gt;
rfkill_global_mutex via rfkill_register) is safe because during
registration the device is not yet in rfkill_list, so no concurrent
rfkill operations can occur on this device.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.1/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-71079/">CVE-2025-71079 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71079">CVE-2025-71079 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256619">SUSE bug 1256619</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571080" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71080</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71080" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71080" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71080" ref_url="https://www.suse.com/security/cve/CVE-2025-71080" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv6: fix a BUG in rt6_get_pcpu_route() under PREEMPT_RT

On PREEMPT_RT kernels, after rt6_get_pcpu_route() returns NULL, the
current task can be preempted. Another task running on the same CPU
may then execute rt6_make_pcpu_route() and successfully install a
pcpu_rt entry. When the first task resumes execution, its cmpxchg()
in rt6_make_pcpu_route() will fail because rt6i_pcpu is no longer
NULL, triggering the BUG_ON(prev). It's easy to reproduce it by adding
mdelay() after rt6_get_pcpu_route().

Using preempt_disable/enable is not appropriate here because
ip6_rt_pcpu_alloc() may sleep.

Fix this by handling the cmpxchg() failure gracefully on PREEMPT_RT:
free our allocation and return the existing pcpu_rt installed by
another task. The BUG_ON is replaced by WARN_ON_ONCE for non-PREEMPT_RT
kernels where such races should not occur.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-27"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71080/">CVE-2025-71080 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71080">CVE-2025-71080 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256608">SUSE bug 1256608</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71081</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71081" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71081" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71081" ref_url="https://www.suse.com/security/cve/CVE-2025-71081" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: stm32: sai: fix OF node leak on probe

The reference taken to the sync provider OF node when probing the
platform device is currently only dropped if the set_sync() callback
fails during DAI probe.

Make sure to drop the reference on platform probe failures (e.g. probe
deferral) and on driver unbind.

This also avoids a potential use-after-free in case the DAI is ever
reprobed without first rebinding the platform driver.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71081/">CVE-2025-71081 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71081">CVE-2025-71081 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256609">SUSE bug 1256609</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571082" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71082</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71082" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71082" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71082" ref_url="https://www.suse.com/security/cve/CVE-2025-71082" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: btusb: revert use of devm_kzalloc in btusb

This reverts commit 98921dbd00c4e ("Bluetooth: Use devm_kzalloc in
btusb.c file").

In btusb_probe(), we use devm_kzalloc() to allocate the btusb data. This
ties the lifetime of all the btusb data to the binding of a driver to
one interface, INTF. In a driver that binds to other interfaces, ISOC
and DIAG, this is an accident waiting to happen.

The issue is revealed in btusb_disconnect(), where calling
usb_driver_release_interface(&amp;btusb_driver, data-&gt;intf) will have devm
free the data that is also being used by the other interfaces of the
driver that may not be released yet.

To fix this, revert the use of devm and go back to freeing memory
explicitly.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71082/">CVE-2025-71082 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71082">CVE-2025-71082 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256611">SUSE bug 1256611</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71083</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71083" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71083" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71083" ref_url="https://www.suse.com/security/cve/CVE-2025-71083" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/ttm: Avoid NULL pointer deref for evicted BOs

It is possible for a BO to exist that is not currently associated with a
resource, e.g. because it has been evicted.

When devcoredump tries to read the contents of all BOs for dumping, we need
to expect this as well -- in this case, ENODATA is recorded instead of the
buffer contents.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71083/">CVE-2025-71083 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71083">CVE-2025-71083 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256610">SUSE bug 1256610</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571084" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71084</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71084" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71084" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71084" ref_url="https://www.suse.com/security/cve/CVE-2025-71084" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/cm: Fix leaking the multicast GID table reference

If the CM ID is destroyed while the CM event for multicast creating is
still queued the cancel_work_sync() will prevent the work from running
which also prevents destroying the ah_attr. This leaks a refcount and
triggers a WARN:

   GID entry ref leak for dev syz1 index 2 ref=573
   WARNING: CPU: 1 PID: 655 at drivers/infiniband/core/cache.c:809 release_gid_table drivers/infiniband/core/cache.c:806 [inline]
   WARNING: CPU: 1 PID: 655 at drivers/infiniband/core/cache.c:809 gid_table_release_one+0x284/0x3cc drivers/infiniband/core/cache.c:886

Destroy the ah_attr after canceling the work, it is safe to call this
twice.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71084/">CVE-2025-71084 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71084">CVE-2025-71084 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256622">SUSE bug 1256622</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571085" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71085</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71085" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71085" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71085" ref_url="https://www.suse.com/security/cve/CVE-2025-71085" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3488" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003199.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3963" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0939-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024788.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0940-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024781.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0943-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024780.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0944-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024779.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0945-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024778.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0946-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024787.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0951-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024786.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0953-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024785.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0954-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0958-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024804.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0964-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024809.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0967-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024808.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0970-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024807.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0983-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024814.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0985-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0992-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024869.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0997-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1000-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024902.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1002-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024904.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1039-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024931.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024929.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1059-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024940.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1073-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1083-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024952.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1088-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1089-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024960.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1099-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1100-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1101-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025011.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1102-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025010.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1125-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025019.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1131-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1132-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045151.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1136-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20773-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024861.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20774-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024860.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20775-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024859.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20776-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024858.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024857.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20778-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024856.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20779-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024855.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20780-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20781-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024853.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20783-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024850.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024849.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024847.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024846.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20789-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024845.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20790-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024844.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20791-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024843.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024842.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20798-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20799-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024889.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20801-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20802-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024887.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20803-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024886.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20804-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024885.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024883.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20807-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024882.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20808-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20809-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024880.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20810-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024879.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024878.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024877.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024876.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20815-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024873.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20817-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044961.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20828-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025009.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20829-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025008.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025007.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20831-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20832-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20836-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20837-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20840-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20841-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20842-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024995.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20848-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20849-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20850-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20855-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024985.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20856-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20857-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20858-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024982.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20859-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024980.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20861-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20862-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024978.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20863-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024977.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20864-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20865-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20866-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025051.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025045.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20887-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045168.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20888-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045167.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20889-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045166.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20891-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045164.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20892-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045163.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20893-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045162.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20894-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20895-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20896-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20897-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20898-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20899-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20900-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20943-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20944-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045208.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20945-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045207.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20946-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045206.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20947-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045205.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv6: BUG() in pskb_expand_head() as part of calipso_skbuff_setattr()

There exists a kernel oops caused by a BUG_ON(nhead &lt; 0) at
net/core/skbuff.c:2232 in pskb_expand_head().
This bug is triggered as part of the calipso_skbuff_setattr()
routine when skb_cow() is passed headroom &gt; INT_MAX
(i.e. (int)(skb_headroom(skb) + len_delta) &lt; 0).

The root cause of the bug is due to an implicit integer cast in
__skb_cow(). The check (headroom &gt; skb_headroom(skb)) is meant to ensure
that delta = headroom - skb_headroom(skb) is never negative, otherwise
we will trigger a BUG_ON in pskb_expand_head(). However, if
headroom &gt; INT_MAX and delta &lt;= -NET_SKB_PAD, the check passes, delta
becomes negative, and pskb_expand_head() is passed a negative value for
nhead.

Fix the trigger condition in calipso_skbuff_setattr(). Avoid passing
"negative" headroom sizes to skb_cow() within calipso_skbuff_setattr()
by only using skb_cow() to grow headroom.

PoC:
	Using `netlabelctl` tool:

        netlabelctl map del default
        netlabelctl calipso add pass doi:7
        netlabelctl map add default address:0::1/128 protocol:calipso,7

        Then run the following PoC:

        int fd = socket(AF_INET6, SOCK_DGRAM, IPPROTO_UDP);

        // setup msghdr
        int cmsg_size = 2;
        int cmsg_len = 0x60;
        struct msghdr msg;
        struct sockaddr_in6 dest_addr;
        struct cmsghdr * cmsg = (struct cmsghdr *) calloc(1,
                        sizeof(struct cmsghdr) + cmsg_len);
        msg.msg_name = &amp;dest_addr;
        msg.msg_namelen = sizeof(dest_addr);
        msg.msg_iov = NULL;
        msg.msg_iovlen = 0;
        msg.msg_control = cmsg;
        msg.msg_controllen = cmsg_len;
        msg.msg_flags = 0;

        // setup sockaddr
        dest_addr.sin6_family = AF_INET6;
        dest_addr.sin6_port = htons(31337);
        dest_addr.sin6_flowinfo = htonl(31337);
        dest_addr.sin6_addr = in6addr_loopback;
        dest_addr.sin6_scope_id = 31337;

        // setup cmsghdr
        cmsg-&gt;cmsg_len = cmsg_len;
        cmsg-&gt;cmsg_level = IPPROTO_IPV6;
        cmsg-&gt;cmsg_type = IPV6_HOPOPTS;
        char * hop_hdr = (char *)cmsg + sizeof(struct cmsghdr);
        hop_hdr[1] = 0x9; //set hop size - (0x9 + 1) * 8 = 80

        sendmsg(fd, &amp;msg, 0);
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71085/">CVE-2025-71085 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71085">CVE-2025-71085 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256623">SUSE bug 1256623</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256624">SUSE bug 1256624</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571086" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71086</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71086" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71086" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71086" ref_url="https://www.suse.com/security/cve/CVE-2025-71086" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: rose: fix invalid array index in rose_kill_by_device()

rose_kill_by_device() collects sockets into a local array[] and then
iterates over them to disconnect sockets bound to a device being brought
down.

The loop mistakenly indexes array[cnt] instead of array[i]. For cnt &lt;
ARRAY_SIZE(array), this reads an uninitialized entry; for cnt ==
ARRAY_SIZE(array), it is an out-of-bounds read. Either case can lead to
an invalid socket pointer dereference and also leaks references taken
via sock_hold().

Fix the index to use i.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71086/">CVE-2025-71086 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71086">CVE-2025-71086 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256625">SUSE bug 1256625</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571087" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71087</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71087" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71087" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71087" ref_url="https://www.suse.com/security/cve/CVE-2025-71087" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iavf: fix off-by-one issues in iavf_config_rss_reg()

There are off-by-one bugs when configuring RSS hash key and lookup
table, causing out-of-bounds reads to memory [1] and out-of-bounds
writes to device registers.

Before commit 43a3d9ba34c9 ("i40evf: Allow PF driver to configure RSS"),
the loop upper bounds were:
    i &lt;= I40E_VFQF_{HKEY,HLUT}_MAX_INDEX
which is safe since the value is the last valid index.

That commit changed the bounds to:
    i &lt;= adapter-&gt;rss_{key,lut}_size / 4
where `rss_{key,lut}_size / 4` is the number of dwords, so the last
valid index is `(rss_{key,lut}_size / 4) - 1`. Therefore, using `&lt;=`
accesses one element past the end.

Fix the issues by using `&lt;` instead of `&lt;=`, ensuring we do not exceed
the bounds.

[1] KASAN splat about rss_key_size off-by-one
  BUG: KASAN: slab-out-of-bounds in iavf_config_rss+0x619/0x800
  Read of size 4 at addr ffff888102c50134 by task kworker/u8:6/63

  CPU: 0 UID: 0 PID: 63 Comm: kworker/u8:6 Not tainted 6.18.0-rc2-enjuk-tnguy-00378-g3005f5b77652-dirty #156 PREEMPT(voluntary)
  Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
  Workqueue: iavf iavf_watchdog_task
  Call Trace:
   &lt;TASK&gt;
   dump_stack_lvl+0x6f/0xb0
   print_report+0x170/0x4f3
   kasan_report+0xe1/0x1a0
   iavf_config_rss+0x619/0x800
   iavf_watchdog_task+0x2be7/0x3230
   process_one_work+0x7fd/0x1420
   worker_thread+0x4d1/0xd40
   kthread+0x344/0x660
   ret_from_fork+0x249/0x320
   ret_from_fork_asm+0x1a/0x30
   &lt;/TASK&gt;

  Allocated by task 63:
   kasan_save_stack+0x30/0x50
   kasan_save_track+0x14/0x30
   __kasan_kmalloc+0x7f/0x90
   __kmalloc_noprof+0x246/0x6f0
   iavf_watchdog_task+0x28fc/0x3230
   process_one_work+0x7fd/0x1420
   worker_thread+0x4d1/0xd40
   kthread+0x344/0x660
   ret_from_fork+0x249/0x320
   ret_from_fork_asm+0x1a/0x30

  The buggy address belongs to the object at ffff888102c50100
   which belongs to the cache kmalloc-64 of size 64
  The buggy address is located 0 bytes to the right of
   allocated 52-byte region [ffff888102c50100, ffff888102c50134)

  The buggy address belongs to the physical page:
  page: refcount:0 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x102c50
  flags: 0x200000000000000(node=0|zone=2)
  page_type: f5(slab)
  raw: 0200000000000000 ffff8881000418c0 dead000000000122 0000000000000000
  raw: 0000000000000000 0000000080200020 00000000f5000000 0000000000000000
  page dumped because: kasan: bad access detected

  Memory state around the buggy address:
   ffff888102c50000: 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc
   ffff888102c50080: 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc fc
  &gt;ffff888102c50100: 00 00 00 00 00 00 04 fc fc fc fc fc fc fc fc fc
                                       ^
   ffff888102c50180: 00 00 00 00 00 00 00 00 fc fc fc fc fc fc fc fc
   ffff888102c50200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71087/">CVE-2025-71087 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71087">CVE-2025-71087 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256628">SUSE bug 1256628</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571088" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71088</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71088" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71088" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71088" ref_url="https://www.suse.com/security/cve/CVE-2025-71088" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mptcp: fallback earlier on simult connection

Syzkaller reports a simult-connect race leading to inconsistent fallback
status:

  WARNING: CPU: 3 PID: 33 at net/mptcp/subflow.c:1515 subflow_data_ready+0x40b/0x7c0 net/mptcp/subflow.c:1515
  Modules linked in:
  CPU: 3 UID: 0 PID: 33 Comm: ksoftirqd/3 Not tainted syzkaller #0 PREEMPT(full)
  Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
  RIP: 0010:subflow_data_ready+0x40b/0x7c0 net/mptcp/subflow.c:1515
  Code: 89 ee e8 78 61 3c f6 40 84 ed 75 21 e8 8e 66 3c f6 44 89 fe bf 07 00 00 00 e8 c1 61 3c f6 41 83 ff 07 74 09 e8 76 66 3c f6 90 &lt;0f&gt; 0b 90 e8 6d 66 3c f6 48 89 df e8 e5 ad ff ff 31 ff 89 c5 89 c6
  RSP: 0018:ffffc900006cf338 EFLAGS: 00010246
  RAX: 0000000000000000 RBX: ffff888031acd100 RCX: ffffffff8b7f2abf
  RDX: ffff88801e6ea440 RSI: ffffffff8b7f2aca RDI: 0000000000000005
  RBP: 0000000000000000 R08: 0000000000000005 R09: 0000000000000007
  R10: 0000000000000004 R11: 0000000000002c10 R12: ffff88802ba69900
  R13: 1ffff920000d9e67 R14: ffff888046f81800 R15: 0000000000000004
  FS:  0000000000000000(0000) GS:ffff8880d69bc000(0000) knlGS:0000000000000000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: 0000560fc0ca1670 CR3: 0000000032c3a000 CR4: 0000000000352ef0
  Call Trace:
   &lt;TASK&gt;
   tcp_data_queue+0x13b0/0x4f90 net/ipv4/tcp_input.c:5197
   tcp_rcv_state_process+0xfdf/0x4ec0 net/ipv4/tcp_input.c:6922
   tcp_v6_do_rcv+0x492/0x1740 net/ipv6/tcp_ipv6.c:1672
   tcp_v6_rcv+0x2976/0x41e0 net/ipv6/tcp_ipv6.c:1918
   ip6_protocol_deliver_rcu+0x188/0x1520 net/ipv6/ip6_input.c:438
   ip6_input_finish+0x1e4/0x4b0 net/ipv6/ip6_input.c:489
   NF_HOOK include/linux/netfilter.h:318 [inline]
   NF_HOOK include/linux/netfilter.h:312 [inline]
   ip6_input+0x105/0x2f0 net/ipv6/ip6_input.c:500
   dst_input include/net/dst.h:471 [inline]
   ip6_rcv_finish net/ipv6/ip6_input.c:79 [inline]
   NF_HOOK include/linux/netfilter.h:318 [inline]
   NF_HOOK include/linux/netfilter.h:312 [inline]
   ipv6_rcv+0x264/0x650 net/ipv6/ip6_input.c:311
   __netif_receive_skb_one_core+0x12d/0x1e0 net/core/dev.c:5979
   __netif_receive_skb+0x1d/0x160 net/core/dev.c:6092
   process_backlog+0x442/0x15e0 net/core/dev.c:6444
   __napi_poll.constprop.0+0xba/0x550 net/core/dev.c:7494
   napi_poll net/core/dev.c:7557 [inline]
   net_rx_action+0xa9f/0xfe0 net/core/dev.c:7684
   handle_softirqs+0x216/0x8e0 kernel/softirq.c:579
   run_ksoftirqd kernel/softirq.c:968 [inline]
   run_ksoftirqd+0x3a/0x60 kernel/softirq.c:960
   smpboot_thread_fn+0x3f7/0xae0 kernel/smpboot.c:160
   kthread+0x3c2/0x780 kernel/kthread.c:463
   ret_from_fork+0x5d7/0x6f0 arch/x86/kernel/process.c:148
   ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
   &lt;/TASK&gt;

The TCP subflow can process the simult-connect syn-ack packet after
transitioning to TCP_FIN1 state, bypassing the MPTCP fallback check,
as the sk_state_change() callback is not invoked for * -&gt; FIN_WAIT1
transitions.

That will move the msk socket to an inconsistent status and the next
incoming data will hit the reported splat.

Close the race moving the simult-fallback check at the earliest possible
stage - that is at syn-ack generation time.

About the fixes tags: [2] was supposed to also fix this issue introduced
by [3]. [1] is required as a dependence: it was not explicitly marked as
a fix, but it is one and it has already been backported before [3]. In
other words, this commit should be backported up to [3], including [2]
and [1] if that's not already there.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71088/">CVE-2025-71088 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71088">CVE-2025-71088 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256630">SUSE bug 1256630</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571089" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71089</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71089" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71089" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71089" ref_url="https://www.suse.com/security/cve/CVE-2025-71089" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iommu: disable SVA when CONFIG_X86 is set

Patch series "Fix stale IOTLB entries for kernel address space", v7.

This proposes a fix for a security vulnerability related to IOMMU Shared
Virtual Addressing (SVA).  In an SVA context, an IOMMU can cache kernel
page table entries.  When a kernel page table page is freed and
reallocated for another purpose, the IOMMU might still hold stale,
incorrect entries.  This can be exploited to cause a use-after-free or
write-after-free condition, potentially leading to privilege escalation or
data corruption.

This solution introduces a deferred freeing mechanism for kernel page
table pages, which provides a safe window to notify the IOMMU to
invalidate its caches before the page is reused.


This patch (of 8):

In the IOMMU Shared Virtual Addressing (SVA) context, the IOMMU hardware
shares and walks the CPU's page tables.  The x86 architecture maps the
kernel's virtual address space into the upper portion of every process's
page table.  Consequently, in an SVA context, the IOMMU hardware can walk
and cache kernel page table entries.

The Linux kernel currently lacks a notification mechanism for kernel page
table changes, specifically when page table pages are freed and reused. 
The IOMMU driver is only notified of changes to user virtual address
mappings.  This can cause the IOMMU's internal caches to retain stale
entries for kernel VA.

Use-After-Free (UAF) and Write-After-Free (WAF) conditions arise when
kernel page table pages are freed and later reallocated.  The IOMMU could
misinterpret the new data as valid page table entries.  The IOMMU might
then walk into attacker-controlled memory, leading to arbitrary physical
memory DMA access or privilege escalation.  This is also a
Write-After-Free issue, as the IOMMU will potentially continue to write
Accessed and Dirty bits to the freed memory while attempting to walk the
stale page tables.

Currently, SVA contexts are unprivileged and cannot access kernel
mappings.  However, the IOMMU will still walk kernel-only page tables all
the way down to the leaf entries, where it realizes the mapping is for the
kernel and errors out.  This means the IOMMU still caches these
intermediate page table entries, making the described vulnerability a real
concern.

Disable SVA on x86 architecture until the IOMMU can receive notification
to flush the paging cache before freeing the CPU kernel page table pages.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71089/">CVE-2025-71089 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71089">CVE-2025-71089 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256612">SUSE bug 1256612</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256615">SUSE bug 1256615</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571091" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71091</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71091" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71091" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71091" ref_url="https://www.suse.com/security/cve/CVE-2025-71091" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

team: fix check for port enabled in team_queue_override_port_prio_changed()

There has been a syzkaller bug reported recently with the following
trace:

list_del corruption, ffff888058bea080-&gt;prev is LIST_POISON2 (dead000000000122)
------------[ cut here ]------------
kernel BUG at lib/list_debug.c:59!
Oops: invalid opcode: 0000 [#1] SMP KASAN NOPTI
CPU: 3 UID: 0 PID: 21246 Comm: syz.0.2928 Not tainted syzkaller #0 PREEMPT(full)
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014
RIP: 0010:__list_del_entry_valid_or_report+0x13e/0x200 lib/list_debug.c:59
Code: 48 c7 c7 e0 71 f0 8b e8 30 08 ef fc 90 0f 0b 48 89 ef e8 a5 02 55 fd 48 89 ea 48 89 de 48 c7 c7 40 72 f0 8b e8 13 08 ef fc 90 &lt;0f&gt; 0b 48 89 ef e8 88 02 55 fd 48 89 ea 48 b8 00 00 00 00 00 fc ff
RSP: 0018:ffffc9000d49f370 EFLAGS: 00010286
RAX: 000000000000004e RBX: ffff888058bea080 RCX: ffffc9002817d000
RDX: 0000000000000000 RSI: ffffffff819becc6 RDI: 0000000000000005
RBP: dead000000000122 R08: 0000000000000005 R09: 0000000000000000
R10: 0000000080000000 R11: 0000000000000001 R12: ffff888039e9c230
R13: ffff888058bea088 R14: ffff888058bea080 R15: ffff888055461480
FS:  00007fbbcfe6f6c0(0000) GS:ffff8880d6d0a000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000000110c3afcb0 CR3: 00000000382c7000 CR4: 0000000000352ef0
Call Trace:
 &lt;TASK&gt;
 __list_del_entry_valid include/linux/list.h:132 [inline]
 __list_del_entry include/linux/list.h:223 [inline]
 list_del_rcu include/linux/rculist.h:178 [inline]
 __team_queue_override_port_del drivers/net/team/team_core.c:826 [inline]
 __team_queue_override_port_del drivers/net/team/team_core.c:821 [inline]
 team_queue_override_port_prio_changed drivers/net/team/team_core.c:883 [inline]
 team_priority_option_set+0x171/0x2f0 drivers/net/team/team_core.c:1534
 team_option_set drivers/net/team/team_core.c:376 [inline]
 team_nl_options_set_doit+0x8ae/0xe60 drivers/net/team/team_core.c:2653
 genl_family_rcv_msg_doit+0x209/0x2f0 net/netlink/genetlink.c:1115
 genl_family_rcv_msg net/netlink/genetlink.c:1195 [inline]
 genl_rcv_msg+0x55c/0x800 net/netlink/genetlink.c:1210
 netlink_rcv_skb+0x158/0x420 net/netlink/af_netlink.c:2552
 genl_rcv+0x28/0x40 net/netlink/genetlink.c:1219
 netlink_unicast_kernel net/netlink/af_netlink.c:1320 [inline]
 netlink_unicast+0x5aa/0x870 net/netlink/af_netlink.c:1346
 netlink_sendmsg+0x8c8/0xdd0 net/netlink/af_netlink.c:1896
 sock_sendmsg_nosec net/socket.c:727 [inline]
 __sock_sendmsg net/socket.c:742 [inline]
 ____sys_sendmsg+0xa98/0xc70 net/socket.c:2630
 ___sys_sendmsg+0x134/0x1d0 net/socket.c:2684
 __sys_sendmsg+0x16d/0x220 net/socket.c:2716
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xcd/0xfa0 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

The problem is in this flow:
1) Port is enabled, queue_id != 0, in qom_list
2) Port gets disabled
        -&gt; team_port_disable()
        -&gt; team_queue_override_port_del()
        -&gt; del (removed from list)
3) Port is disabled, queue_id != 0, not in any list
4) Priority changes
        -&gt; team_queue_override_port_prio_changed()
        -&gt; checks: port disabled &amp;&amp; queue_id != 0
        -&gt; calls del - hits the BUG as it is removed already

To fix this, change the check in team_queue_override_port_prio_changed()
so it returns early if port is not enabled.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71091/">CVE-2025-71091 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71091">CVE-2025-71091 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256773">SUSE bug 1256773</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571093" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71093</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71093" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71093" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71093" ref_url="https://www.suse.com/security/cve/CVE-2025-71093" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

e1000: fix OOB in e1000_tbi_should_accept()

In e1000_tbi_should_accept() we read the last byte of the frame via
'data[length - 1]' to evaluate the TBI workaround. If the descriptor-
reported length is zero or larger than the actual RX buffer size, this
read goes out of bounds and can hit unrelated slab objects. The issue
is observed from the NAPI receive path (e1000_clean_rx_irq):

==================================================================
BUG: KASAN: slab-out-of-bounds in e1000_tbi_should_accept+0x610/0x790
Read of size 1 at addr ffff888014114e54 by task sshd/363

CPU: 0 PID: 363 Comm: sshd Not tainted 5.18.0-rc1 #1
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.12.0-59-gc9ba5276e321-prebuilt.qemu.org 04/01/2014
Call Trace:
 &lt;IRQ&gt;
 dump_stack_lvl+0x5a/0x74
 print_address_description+0x7b/0x440
 print_report+0x101/0x200
 kasan_report+0xc1/0xf0
 e1000_tbi_should_accept+0x610/0x790
 e1000_clean_rx_irq+0xa8c/0x1110
 e1000_clean+0xde2/0x3c10
 __napi_poll+0x98/0x380
 net_rx_action+0x491/0xa20
 __do_softirq+0x2c9/0x61d
 do_softirq+0xd1/0x120
 &lt;/IRQ&gt;
 &lt;TASK&gt;
 __local_bh_enable_ip+0xfe/0x130
 ip_finish_output2+0x7d5/0xb00
 __ip_queue_xmit+0xe24/0x1ab0
 __tcp_transmit_skb+0x1bcb/0x3340
 tcp_write_xmit+0x175d/0x6bd0
 __tcp_push_pending_frames+0x7b/0x280
 tcp_sendmsg_locked+0x2e4f/0x32d0
 tcp_sendmsg+0x24/0x40
 sock_write_iter+0x322/0x430
 vfs_write+0x56c/0xa60
 ksys_write+0xd1/0x190
 do_syscall_64+0x43/0x90
 entry_SYSCALL_64_after_hwframe+0x44/0xae
RIP: 0033:0x7f511b476b10
Code: 73 01 c3 48 8b 0d 88 d3 2b 00 f7 d8 64 89 01 48 83 c8 ff c3 66 0f 1f 44 00 00 83 3d f9 2b 2c 00 00 75 10 b8 01 00 00 00 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 31 c3 48 83 ec 08 e8 8e 9b 01 00 48 89 04 24
RSP: 002b:00007ffc9211d4e8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
RAX: ffffffffffffffda RBX: 0000000000004024 RCX: 00007f511b476b10
RDX: 0000000000004024 RSI: 0000559a9385962c RDI: 0000000000000003
RBP: 0000559a9383a400 R08: fffffffffffffff0 R09: 0000000000004f00
R10: 0000000000000070 R11: 0000000000000246 R12: 0000000000000000
R13: 00007ffc9211d57f R14: 0000559a9347bde7 R15: 0000000000000003
 &lt;/TASK&gt;
Allocated by task 1:
 __kasan_krealloc+0x131/0x1c0
 krealloc+0x90/0xc0
 add_sysfs_param+0xcb/0x8a0
 kernel_add_sysfs_param+0x81/0xd4
 param_sysfs_builtin+0x138/0x1a6
 param_sysfs_init+0x57/0x5b
 do_one_initcall+0x104/0x250
 do_initcall_level+0x102/0x132
 do_initcalls+0x46/0x74
 kernel_init_freeable+0x28f/0x393
 kernel_init+0x14/0x1a0
 ret_from_fork+0x22/0x30
The buggy address belongs to the object at ffff888014114000
 which belongs to the cache kmalloc-2k of size 2048
The buggy address is located 1620 bytes to the right of
 2048-byte region [ffff888014114000, ffff888014114800]
The buggy address belongs to the physical page:
page:ffffea0000504400 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x14110
head:ffffea0000504400 order:3 compound_mapcount:0 compound_pincount:0
flags: 0x100000000010200(slab|head|node=0|zone=1)
raw: 0100000000010200 0000000000000000 dead000000000001 ffff888013442000
raw: 0000000000000000 0000000000080008 00000001ffffffff 0000000000000000
page dumped because: kasan: bad access detected
==================================================================

This happens because the TBI check unconditionally dereferences the last
byte without validating the reported length first:

	u8 last_byte = *(data + length - 1);

Fix by rejecting the frame early if the length is zero, or if it exceeds
adapter-&gt;rx_buffer_len. This preserves the TBI workaround semantics for
valid frames and prevents touching memory beyond the RX buffer.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71093/">CVE-2025-71093 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71093">CVE-2025-71093 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256777">SUSE bug 1256777</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571094" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71094</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71094" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71094" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71094" ref_url="https://www.suse.com/security/cve/CVE-2025-71094" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: usb: asix: validate PHY address before use

The ASIX driver reads the PHY address from the USB device via
asix_read_phy_addr(). A malicious or faulty device can return an
invalid address (&gt;= PHY_MAX_ADDR), which causes a warning in
mdiobus_get_phy():

  addr 207 out of range
  WARNING: drivers/net/phy/mdio_bus.c:76

Validate the PHY address in asix_read_phy_addr() and remove the
now-redundant check in ax88172a.c.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71094/">CVE-2025-71094 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71094">CVE-2025-71094 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256597">SUSE bug 1256597</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71095</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71095" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71095" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71095" ref_url="https://www.suse.com/security/cve/CVE-2025-71095" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: stmmac: fix the crash issue for zero copy XDP_TX action

There is a crash issue when running zero copy XDP_TX action, the crash
log is shown below.

[  216.122464] Unable to handle kernel paging request at virtual address fffeffff80000000
[  216.187524] Internal error: Oops: 0000000096000144 [#1]  SMP
[  216.301694] Call trace:
[  216.304130]  dcache_clean_poc+0x20/0x38 (P)
[  216.308308]  __dma_sync_single_for_device+0x1bc/0x1e0
[  216.313351]  stmmac_xdp_xmit_xdpf+0x354/0x400
[  216.317701]  __stmmac_xdp_run_prog+0x164/0x368
[  216.322139]  stmmac_napi_poll_rxtx+0xba8/0xf00
[  216.326576]  __napi_poll+0x40/0x218
[  216.408054] Kernel panic - not syncing: Oops: Fatal exception in interrupt

For XDP_TX action, the xdp_buff is converted to xdp_frame by
xdp_convert_buff_to_frame(). The memory type of the resulting xdp_frame
depends on the memory type of the xdp_buff. For page pool based xdp_buff
it produces xdp_frame with memory type MEM_TYPE_PAGE_POOL. For zero copy
XSK pool based xdp_buff it produces xdp_frame with memory type
MEM_TYPE_PAGE_ORDER0. However, stmmac_xdp_xmit_back() does not check the
memory type and always uses the page pool type, this leads to invalid
mappings and causes the crash. Therefore, check the xdp_buff memory type
in stmmac_xdp_xmit_back() to fix this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71095/">CVE-2025-71095 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71095">CVE-2025-71095 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256605">SUSE bug 1256605</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571096" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71096</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71096" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71096" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71096" ref_url="https://www.suse.com/security/cve/CVE-2025-71096" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024067.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20228-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20564-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024575.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/core: Check for the presence of LS_NLA_TYPE_DGID correctly

The netlink response for RDMA_NL_LS_OP_IP_RESOLVE should always have a
LS_NLA_TYPE_DGID attribute, it is invalid if it does not.

Use the nl parsing logic properly and call nla_parse_deprecated() to fill
the nlattrs array and then directly index that array to get the data for
the DGID. Just fail if it is NULL.

Remove the for loop searching for the nla, and squash the validation and
parsing into one function.

Fixes an uninitialized read from the stack triggered by userspace if it
does not provide the DGID to a kernel initiated RDMA_NL_LS_OP_IP_RESOLVE
query.

    BUG: KMSAN: uninit-value in hex_byte_pack include/linux/hex.h:13 [inline]
    BUG: KMSAN: uninit-value in ip6_string+0xef4/0x13a0 lib/vsprintf.c:1490
     hex_byte_pack include/linux/hex.h:13 [inline]
     ip6_string+0xef4/0x13a0 lib/vsprintf.c:1490
     ip6_addr_string+0x18a/0x3e0 lib/vsprintf.c:1509
     ip_addr_string+0x245/0xee0 lib/vsprintf.c:1633
     pointer+0xc09/0x1bd0 lib/vsprintf.c:2542
     vsnprintf+0xf8a/0x1bd0 lib/vsprintf.c:2930
     vprintk_store+0x3ae/0x1530 kernel/printk/printk.c:2279
     vprintk_emit+0x307/0xcd0 kernel/printk/printk.c:2426
     vprintk_default+0x3f/0x50 kernel/printk/printk.c:2465
     vprintk+0x36/0x50 kernel/printk/printk_safe.c:82
     _printk+0x17e/0x1b0 kernel/printk/printk.c:2475
     ib_nl_process_good_ip_rsep drivers/infiniband/core/addr.c:128 [inline]
     ib_nl_handle_ip_res_resp+0x963/0x9d0 drivers/infiniband/core/addr.c:141
     rdma_nl_rcv_msg drivers/infiniband/core/netlink.c:-1 [inline]
     rdma_nl_rcv_skb drivers/infiniband/core/netlink.c:239 [inline]
     rdma_nl_rcv+0xefa/0x11c0 drivers/infiniband/core/netlink.c:259
     netlink_unicast_kernel net/netlink/af_netlink.c:1320 [inline]
     netlink_unicast+0xf04/0x12b0 net/netlink/af_netlink.c:1346
     netlink_sendmsg+0x10b3/0x1250 net/netlink/af_netlink.c:1896
     sock_sendmsg_nosec net/socket.c:714 [inline]
     __sock_sendmsg+0x333/0x3d0 net/socket.c:729
     ____sys_sendmsg+0x7e0/0xd80 net/socket.c:2617
     ___sys_sendmsg+0x271/0x3b0 net/socket.c:2671
     __sys_sendmsg+0x1aa/0x300 net/socket.c:2703
     __compat_sys_sendmsg net/compat.c:346 [inline]
     __do_compat_sys_sendmsg net/compat.c:353 [inline]
     __se_compat_sys_sendmsg net/compat.c:350 [inline]
     __ia32_compat_sys_sendmsg+0xa4/0x100 net/compat.c:350
     ia32_sys_call+0x3f6c/0x4310 arch/x86/include/generated/asm/syscalls_32.h:371
     do_syscall_32_irqs_on arch/x86/entry/syscall_32.c:83 [inline]
     __do_fast_syscall_32+0xb0/0x150 arch/x86/entry/syscall_32.c:306
     do_fast_syscall_32+0x38/0x80 arch/x86/entry/syscall_32.c:331
     do_SYSENTER_32+0x1f/0x30 arch/x86/entry/syscall_32.c:3
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71096/">CVE-2025-71096 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71096">CVE-2025-71096 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256606">SUSE bug 1256606</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041486" comment="cluster-md-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041487" comment="cluster-md-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041488" comment="cluster-md-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041489" comment="cluster-md-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041490" comment="dlm-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041491" comment="dlm-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041492" comment="dlm-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041493" comment="dlm-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041494" comment="dtb-allwinner-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041495" comment="dtb-altera-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041496" comment="dtb-amazon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041497" comment="dtb-amd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041498" comment="dtb-amlogic-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041499" comment="dtb-apm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041500" comment="dtb-apple-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041501" comment="dtb-arm-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041502" comment="dtb-broadcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041503" comment="dtb-cavium-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041504" comment="dtb-exynos-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041505" comment="dtb-freescale-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041506" comment="dtb-hisilicon-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041507" comment="dtb-lg-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041508" comment="dtb-marvell-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041509" comment="dtb-mediatek-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041510" comment="dtb-nvidia-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041511" comment="dtb-qcom-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041512" comment="dtb-renesas-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041513" comment="dtb-rockchip-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041514" comment="dtb-socionext-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041515" comment="dtb-sprd-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041516" comment="dtb-xilinx-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041517" comment="gfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041518" comment="gfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041519" comment="gfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041520" comment="gfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041521" comment="kernel-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041523" comment="kernel-64kb-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041524" comment="kernel-64kb-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041525" comment="kernel-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041527" comment="kernel-azure-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041528" comment="kernel-azure-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041529" comment="kernel-azure-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041530" comment="kernel-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041531" comment="kernel-default-base-6.12.0-160000.9.1.160000.2.6 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041533" comment="kernel-default-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041534" comment="kernel-default-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041535" comment="kernel-default-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041537" comment="kernel-docs-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041538" comment="kernel-docs-html-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041539" comment="kernel-kvmsmall-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041541" comment="kernel-kvmsmall-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041542" comment="kernel-macros-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041543" comment="kernel-obs-build-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041544" comment="kernel-obs-qa-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041545" comment="kernel-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041547" comment="kernel-rt-extra-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041548" comment="kernel-rt-optional-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041549" comment="kernel-rt-vdso-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041550" comment="kernel-source-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041551" comment="kernel-source-vanilla-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041552" comment="kernel-syms-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041553" comment="kernel-zfcpdump-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041554" comment="kselftests-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041555" comment="kselftests-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041556" comment="kselftests-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041557" comment="kselftests-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041558" comment="ocfs2-kmp-64kb-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041559" comment="ocfs2-kmp-azure-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041560" comment="ocfs2-kmp-default-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041561" comment="ocfs2-kmp-rt-6.12.0-160000.9.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71097</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71097" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71097" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71097" ref_url="https://www.suse.com/security/cve/CVE-2025-71097" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv4: Fix reference count leak when using error routes with nexthop objects

When a nexthop object is deleted, it is marked as dead and then
fib_table_flush() is called to flush all the routes that are using the
dead nexthop.

The current logic in fib_table_flush() is to only flush error routes
(e.g., blackhole) when it is called as part of network namespace
dismantle (i.e., with flush_all=true). Therefore, error routes are not
flushed when their nexthop object is deleted:

 # ip link add name dummy1 up type dummy
 # ip nexthop add id 1 dev dummy1
 # ip route add 198.51.100.1/32 nhid 1
 # ip route add blackhole 198.51.100.2/32 nhid 1
 # ip nexthop del id 1
 # ip route show
 blackhole 198.51.100.2 nhid 1 dev dummy1

As such, they keep holding a reference on the nexthop object which in
turn holds a reference on the nexthop device, resulting in a reference
count leak:

 # ip link del dev dummy1
 [   70.516258] unregister_netdevice: waiting for dummy1 to become free. Usage count = 2

Fix by flushing error routes when their nexthop is marked as dead.

IPv6 does not suffer from this problem.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71097/">CVE-2025-71097 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71097">CVE-2025-71097 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256607">SUSE bug 1256607</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571098" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71098</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71098" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71098" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71098" ref_url="https://www.suse.com/security/cve/CVE-2025-71098" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ip6_gre: make ip6gre_header() robust

Over the years, syzbot found many ways to crash the kernel
in ip6gre_header() [1].

This involves team or bonding drivers ability to dynamically
change their dev-&gt;needed_headroom and/or dev-&gt;hard_header_len

In this particular crash mld_newpack() allocated an skb
with a too small reserve/headroom, and by the time mld_sendpack()
was called, syzbot managed to attach an ip6gre device.

[1]
skbuff: skb_under_panic: text:ffffffff8a1d69a8 len:136 put:40 head:ffff888059bc7000 data:ffff888059bc6fe8 tail:0x70 end:0x6c0 dev:team0
------------[ cut here ]------------
 kernel BUG at net/core/skbuff.c:213 !
 &lt;TASK&gt;
  skb_under_panic net/core/skbuff.c:223 [inline]
  skb_push+0xc3/0xe0 net/core/skbuff.c:2641
  ip6gre_header+0xc8/0x790 net/ipv6/ip6_gre.c:1371
  dev_hard_header include/linux/netdevice.h:3436 [inline]
  neigh_connected_output+0x286/0x460 net/core/neighbour.c:1618
  neigh_output include/net/neighbour.h:556 [inline]
  ip6_finish_output2+0xfb3/0x1480 net/ipv6/ip6_output.c:136
 __ip6_finish_output net/ipv6/ip6_output.c:-1 [inline]
  ip6_finish_output+0x234/0x7d0 net/ipv6/ip6_output.c:220
  NF_HOOK_COND include/linux/netfilter.h:307 [inline]
  ip6_output+0x340/0x550 net/ipv6/ip6_output.c:247
  NF_HOOK+0x9e/0x380 include/linux/netfilter.h:318
  mld_sendpack+0x8d4/0xe60 net/ipv6/mcast.c:1855
  mld_send_cr net/ipv6/mcast.c:2154 [inline]
  mld_ifc_work+0x83e/0xd60 net/ipv6/mcast.c:2693
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71098/">CVE-2025-71098 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71098">CVE-2025-71098 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256591">SUSE bug 1256591</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571099" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71099</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71099" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71099" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71099" ref_url="https://www.suse.com/security/cve/CVE-2025-71099" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/xe/oa: Fix potential UAF in xe_oa_add_config_ioctl()

In xe_oa_add_config_ioctl(), we accessed oa_config-&gt;id after dropping
metrics_lock. Since this lock protects the lifetime of oa_config, an
attacker could guess the id and call xe_oa_remove_config_ioctl() with
perfect timing, freeing oa_config before we dereference it, leading to
a potential use-after-free.

Fix this by caching the id in a local variable while holding the lock.

v2: (Matt A)
- Dropped mutex_unlock(&amp;oa-&gt;metrics_lock) ordering change from
  xe_oa_remove_config_ioctl()

(cherry picked from commit 28aeaed130e8e587fd1b73b6d66ca41ccc5a1a31)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71099/">CVE-2025-71099 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71099">CVE-2025-71099 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256592">SUSE bug 1256592</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571100" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71100</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71100" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71100" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71100" ref_url="https://www.suse.com/security/cve/CVE-2025-71100" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: rtlwifi: 8192cu: fix tid out of range in rtl92cu_tx_fill_desc()

TID getting from ieee80211_get_tid() might be out of range of array size
of sta_entry-&gt;tids[], so check TID is less than MAX_TID_COUNT. Othwerwise,
UBSAN warn:

 UBSAN: array-index-out-of-bounds in drivers/net/wireless/realtek/rtlwifi/rtl8192cu/trx.c:514:30
 index 10 is out of range for type 'rtl_tid_data [9]'
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71100/">CVE-2025-71100 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71100">CVE-2025-71100 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256593">SUSE bug 1256593</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571101" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71101</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71101" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71101" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71101" ref_url="https://www.suse.com/security/cve/CVE-2025-71101" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

platform/x86: hp-bioscfg: Fix out-of-bounds array access in ACPI package parsing

The hp_populate_*_elements_from_package() functions in the hp-bioscfg
driver contain out-of-bounds array access vulnerabilities.

These functions parse ACPI packages into internal data structures using
a for loop with index variable 'elem' that iterates through
enum_obj/integer_obj/order_obj/password_obj/string_obj arrays.

When processing multi-element fields like PREREQUISITES and
ENUM_POSSIBLE_VALUES, these functions read multiple consecutive array
elements using expressions like 'enum_obj[elem + reqs]' and
'enum_obj[elem + pos_values]' within nested loops.

The bug is that the bounds check only validated elem, but did not consider
the additional offset when accessing elem + reqs or elem + pos_values.

The fix changes the bounds check to validate the actual accessed index.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:L/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71101/">CVE-2025-71101 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71101">CVE-2025-71101 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256594">SUSE bug 1256594</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71104</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71104" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71104" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71104" ref_url="https://www.suse.com/security/cve/CVE-2025-71104" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: x86: Fix VM hard lockup after prolonged inactivity with periodic HV timer

When advancing the target expiration for the guest's APIC timer in periodic
mode, set the expiration to "now" if the target expiration is in the past
(similar to what is done in update_target_expiration()).  Blindly adding
the period to the previous target expiration can result in KVM generating
a practically unbounded number of hrtimer IRQs due to programming an
expired timer over and over.  In extreme scenarios, e.g. if userspace
pauses/suspends a VM for an extended duration, this can even cause hard
lockups in the host.

Currently, the bug only affects Intel CPUs when using the hypervisor timer
(HV timer), a.k.a. the VMX preemption timer.  Unlike the software timer,
a.k.a. hrtimer, which KVM keeps running even on exits to userspace, the
HV timer only runs while the guest is active.  As a result, if the vCPU
does not run for an extended duration, there will be a huge gap between
the target expiration and the current time the vCPU resumes running.
Because the target expiration is incremented by only one period on each
timer expiration, this leads to a series of timer expirations occurring
rapidly after the vCPU/VM resumes.

More critically, when the vCPU first triggers a periodic HV timer
expiration after resuming, advancing the expiration by only one period
will result in a target expiration in the past.  As a result, the delta
may be calculated as a negative value.  When the delta is converted into
an absolute value (tscdeadline is an unsigned u64), the resulting value
can overflow what the HV timer is capable of programming.  I.e. the large
value will exceed the VMX Preemption Timer's maximum bit width of
cpu_preemption_timer_multi + 32, and thus cause KVM to switch from the
HV timer to the software timer (hrtimers).

After switching to the software timer, periodic timer expiration callbacks
may be executed consecutively within a single clock interrupt handler,
because hrtimers honors KVM's request for an expiration in the past and
immediately re-invokes KVM's callback after reprogramming.  And because
the interrupt handler runs with IRQs disabled, restarting KVM's hrtimer
over and over until the target expiration is advanced to "now" can result
in a hard lockup.

E.g. the following hard lockup was triggered in the host when running a
Windows VM (only relevant because it used the APIC timer in periodic mode)
after resuming the VM from a long suspend (in the host).

  NMI watchdog: Watchdog detected hard LOCKUP on cpu 45
  ...
  RIP: 0010:advance_periodic_target_expiration+0x4d/0x80 [kvm]
  ...
  RSP: 0018:ff4f88f5d98d8ef0 EFLAGS: 00000046
  RAX: fff0103f91be678e RBX: fff0103f91be678e RCX: 00843a7d9e127bcc
  RDX: 0000000000000002 RSI: 0052ca4003697505 RDI: ff440d5bfbdbd500
  RBP: ff440d5956f99200 R08: ff2ff2a42deb6a84 R09: 000000000002a6c0
  R10: 0122d794016332b3 R11: 0000000000000000 R12: ff440db1af39cfc0
  R13: ff440db1af39cfc0 R14: ffffffffc0d4a560 R15: ff440db1af39d0f8
  FS:  00007f04a6ffd700(0000) GS:ff440db1af380000(0000) knlGS:000000e38a3b8000
  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
  CR2: 000000d5651feff8 CR3: 000000684e038002 CR4: 0000000000773ee0
  PKRU: 55555554
  Call Trace:
   &lt;IRQ&gt;
   apic_timer_fn+0x31/0x50 [kvm]
   __hrtimer_run_queues+0x100/0x280
   hrtimer_interrupt+0x100/0x210
   ? ttwu_do_wakeup+0x19/0x160
   smp_apic_timer_interrupt+0x6a/0x130
   apic_timer_interrupt+0xf/0x20
   &lt;/IRQ&gt;

Moreover, if the suspend duration of the virtual machine is not long enough
to trigger a hard lockup in this scenario, since commit 98c25ead5eda
("KVM: VMX: Move preemption timer &lt;=&gt; hrtimer dance to common x86"), KVM
will continue using the software timer until the guest reprograms the APIC
timer in some way.  Since the periodic timer does not require frequent APIC
timer register programming, the guest may continue to use the software
timer in 
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2025-71104/">CVE-2025-71104 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71104">CVE-2025-71104 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256708">SUSE bug 1256708</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571108" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71108</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71108" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71108" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71108" ref_url="https://www.suse.com/security/cve/CVE-2025-71108" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: typec: ucsi: Handle incorrect num_connectors capability

The UCSI spec states that the num_connectors field is 7 bits, and the
8th bit is reserved and should be set to zero.
Some buggy FW has been known to set this bit, and it can lead to a
system not booting.
Flag that the FW is not behaving correctly, and auto-fix the value
so that the system boots correctly.

Found on Lenovo P1 G8 during Linux enablement program. The FW will
be fixed, but seemed worth addressing in case it hit platforms that
aren't officially Linux supported.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71108/">CVE-2025-71108 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71108">CVE-2025-71108 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256774">SUSE bug 1256774</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71111</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71111" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71111" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71111" ref_url="https://www.suse.com/security/cve/CVE-2025-71111" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

hwmon: (w83791d) Convert macros to functions to avoid TOCTOU

The macro FAN_FROM_REG evaluates its arguments multiple times. When used
in lockless contexts involving shared driver data, this leads to
Time-of-Check to Time-of-Use (TOCTOU) race conditions, potentially
causing divide-by-zero errors.

Convert the macro to a static function. This guarantees that arguments
are evaluated only once (pass-by-value), preventing the race
conditions.

Additionally, in store_fan_div, move the calculation of the minimum
limit inside the update lock. This ensures that the read-modify-write
sequence operates on consistent data.

Adhere to the principle of minimal changes by only converting macros
that evaluate arguments multiple times and are used in lockless
contexts.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71111/">CVE-2025-71111 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71111">CVE-2025-71111 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256728">SUSE bug 1256728</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71112</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71112" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71112" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71112" ref_url="https://www.suse.com/security/cve/CVE-2025-71112" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1131-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: hns3: add VLAN id validation before using

Currently, the VLAN id may be used without validation when
receive a VLAN configuration mailbox from VF. The length of
vlan_del_fail_bmap is BITS_TO_LONGS(VLAN_N_VID). It may cause
out-of-bounds memory access once the VLAN id is bigger than
or equal to VLAN_N_VID.

Therefore, VLAN id needs to be checked to ensure it is within
the range of VLAN_N_VID.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71112/">CVE-2025-71112 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71112">CVE-2025-71112 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256726">SUSE bug 1256726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256727">SUSE bug 1256727</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571113" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71113</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71113" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71113" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71113" ref_url="https://www.suse.com/security/cve/CVE-2025-71113" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: af_alg - zero initialize memory allocated via sock_kmalloc

Several crypto user API contexts and requests allocated with
sock_kmalloc() were left uninitialized, relying on callers to
set fields explicitly. This resulted in the use of uninitialized
data in certain error paths or when new fields are added in the
future.

The ACVP patches also contain two user-space interface files:
algif_kpp.c and algif_akcipher.c. These too rely on proper
initialization of their context structures.

A particular issue has been observed with the newly added
'inflight' variable introduced in af_alg_ctx by commit:

  67b164a871af ("crypto: af_alg - Disallow multiple in-flight AIO requests")

Because the context is not memset to zero after allocation,
the inflight variable has contained garbage values. As a result,
af_alg_alloc_areq() has incorrectly returned -EBUSY randomly when
the garbage value was interpreted as true:

  https://github.com/gregkh/linux/blame/master/crypto/af_alg.c#L1209

The check directly tests ctx-&gt;inflight without explicitly
comparing against true/false. Since inflight is only ever set to
true or false later, an uninitialized value has triggered
-EBUSY failures. Zero-initializing memory allocated with
sock_kmalloc() ensures inflight and other fields start in a known
state, removing random issues caused by uninitialized data.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71113/">CVE-2025-71113 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71113">CVE-2025-71113 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256716">SUSE bug 1256716</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571114" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71114</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71114" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71114" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71114" ref_url="https://www.suse.com/security/cve/CVE-2025-71114" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

via_wdt: fix critical boot hang due to unnamed resource allocation

The VIA watchdog driver uses allocate_resource() to reserve a MMIO
region for the watchdog control register. However, the allocated
resource was not given a name, which causes the kernel resource tree
to contain an entry marked as "&lt;BAD&gt;" under /proc/iomem on x86
platforms.

During boot, this unnamed resource can lead to a critical hang because
subsequent resource lookups and conflict checks fail to handle the
invalid entry properly.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71114/">CVE-2025-71114 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71114">CVE-2025-71114 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256752">SUSE bug 1256752</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71116</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71116" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71116" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71116" ref_url="https://www.suse.com/security/cve/CVE-2025-71116" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

libceph: make decode_pool() more resilient against corrupted osdmaps

If the osdmap is (maliciously) corrupted such that the encoded length
of ceph_pg_pool envelope is less than what is expected for a particular
encoding version, out-of-bounds reads may ensue because the only bounds
check that is there is based on that length value.

This patch adds explicit bounds checks for each field that is decoded
or skipped.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71116/">CVE-2025-71116 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71116">CVE-2025-71116 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256744">SUSE bug 1256744</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571118" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71118</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71118" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71118" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71118" ref_url="https://www.suse.com/security/cve/CVE-2025-71118" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ACPICA: Avoid walking the Namespace if start_node is NULL

Although commit 0c9992315e73 ("ACPICA: Avoid walking the ACPI Namespace
if it is not there") fixed the situation when both start_node and
acpi_gbl_root_node are NULL, the Linux kernel mainline now still crashed
on Honor Magicbook 14 Pro [1].

That happens due to the access to the member of parent_node in
acpi_ns_get_next_node().  The NULL pointer dereference will always
happen, no matter whether or not the start_node is equal to
ACPI_ROOT_OBJECT, so move the check of start_node being NULL
out of the if block.

Unfortunately, all the attempts to contact Honor have failed, they
refused to provide any technical support for Linux.

The bad DSDT table's dump could be found on GitHub [2].

DMI: HONOR FMB-P/FMB-P-PCB, BIOS 1.13 05/08/2025

[ rjw: Subject adjustment, changelog edits ]
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71118/">CVE-2025-71118 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71118">CVE-2025-71118 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256763">SUSE bug 1256763</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571119" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71119</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71119" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71119" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71119" ref_url="https://www.suse.com/security/cve/CVE-2025-71119" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

powerpc/kexec: Enable SMT before waking offline CPUs

If SMT is disabled or a partial SMT state is enabled, when a new kernel
image is loaded for kexec, on reboot the following warning is observed:

kexec: Waking offline cpu 228.
WARNING: CPU: 0 PID: 9062 at arch/powerpc/kexec/core_64.c:223 kexec_prepare_cpus+0x1b0/0x1bc
[snip]
 NIP kexec_prepare_cpus+0x1b0/0x1bc
 LR  kexec_prepare_cpus+0x1a0/0x1bc
 Call Trace:
  kexec_prepare_cpus+0x1a0/0x1bc (unreliable)
  default_machine_kexec+0x160/0x19c
  machine_kexec+0x80/0x88
  kernel_kexec+0xd0/0x118
  __do_sys_reboot+0x210/0x2c4
  system_call_exception+0x124/0x320
  system_call_vectored_common+0x15c/0x2ec

This occurs as add_cpu() fails due to cpu_bootable() returning false for
CPUs that fail the cpu_smt_thread_allowed() check or non primary
threads if SMT is disabled.

Fix the issue by enabling SMT and resetting the number of SMT threads to
the number of threads per core, before attempting to wake up all present
CPUs.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71119/">CVE-2025-71119 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71119">CVE-2025-71119 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256730">SUSE bug 1256730</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571120" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71120</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71120" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71120" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71120" ref_url="https://www.suse.com/security/cve/CVE-2025-71120" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/024000.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0369-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024037.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0411-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1180-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1188-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1212-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1221-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1222-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1236-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1237-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1239-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1242-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1244-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1248-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1254-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1259-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1261-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1263-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1265-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1268-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045421.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1269-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1270-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1271-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1274-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1278-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1279-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1280-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045412.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1283-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045410.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1284-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1285-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1287-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1288-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1297-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1298-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21005-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21006-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21007-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21009-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045397.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21020-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21051-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21053-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21054-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21055-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21056-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21057-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21058-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21059-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21060-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21061-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21071-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21072-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21073-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21074-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21075-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21076-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21077-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21078-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21079-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21080-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21081-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21082-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21083-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21084-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21085-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21086-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21087-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21088-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21089-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21090-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21091-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045433.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

SUNRPC: svcauth_gss: avoid NULL deref on zero length gss_token in gss_read_proxy_verf

A zero length gss_token results in pages == 0 and in_token-&gt;pages[0]
is NULL. The code unconditionally evaluates
page_address(in_token-&gt;pages[0]) for the initial memcpy, which can
dereference NULL even when the copy length is 0. Guard the first
memcpy so it only runs when length &gt; 0.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71120/">CVE-2025-71120 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71120">CVE-2025-71120 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256779">SUSE bug 1256779</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256780">SUSE bug 1256780</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571123" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71123</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71123" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71123" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71123" ref_url="https://www.suse.com/security/cve/CVE-2025-71123" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: fix string copying in parse_apply_sb_mount_options()

strscpy_pad() can't be used to copy a non-NUL-term string into a NUL-term
string of possibly bigger size.  Commit 0efc5990bca5 ("string.h: Introduce
memtostr() and memtostr_pad()") provides additional information in that
regard.  So if this happens, the following warning is observed:

strnlen: detected buffer overflow: 65 byte read of buffer size 64
WARNING: CPU: 0 PID: 28655 at lib/string_helpers.c:1032 __fortify_report+0x96/0xc0 lib/string_helpers.c:1032
Modules linked in:
CPU: 0 UID: 0 PID: 28655 Comm: syz-executor.3 Not tainted 6.12.54-syzkaller-00144-g5f0270f1ba00 #0
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
RIP: 0010:__fortify_report+0x96/0xc0 lib/string_helpers.c:1032
Call Trace:
 &lt;TASK&gt;
 __fortify_panic+0x1f/0x30 lib/string_helpers.c:1039
 strnlen include/linux/fortify-string.h:235 [inline]
 sized_strscpy include/linux/fortify-string.h:309 [inline]
 parse_apply_sb_mount_options fs/ext4/super.c:2504 [inline]
 __ext4_fill_super fs/ext4/super.c:5261 [inline]
 ext4_fill_super+0x3c35/0xad00 fs/ext4/super.c:5706
 get_tree_bdev_flags+0x387/0x620 fs/super.c:1636
 vfs_get_tree+0x93/0x380 fs/super.c:1814
 do_new_mount fs/namespace.c:3553 [inline]
 path_mount+0x6ae/0x1f70 fs/namespace.c:3880
 do_mount fs/namespace.c:3893 [inline]
 __do_sys_mount fs/namespace.c:4103 [inline]
 __se_sys_mount fs/namespace.c:4080 [inline]
 __x64_sys_mount+0x280/0x300 fs/namespace.c:4080
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0x64/0x140 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x76/0x7e

Since userspace is expected to provide s_mount_opts field to be at most 63
characters long with the ending byte being NUL-term, use a 64-byte buffer
which matches the size of s_mount_opts, so that strscpy_pad() does its job
properly.  Return with error if the user still managed to provide a
non-NUL-term string here.

Found by Linux Verification Center (linuxtesting.org) with Syzkaller.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71123/">CVE-2025-71123 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71123">CVE-2025-71123 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256757">SUSE bug 1256757</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571125" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71125</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71125" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71125" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71125" ref_url="https://www.suse.com/security/cve/CVE-2025-71125" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tracing: Do not register unsupported perf events

Synthetic events currently do not have a function to register perf events.
This leads to calling the tracepoint register functions with a NULL
function pointer which triggers:

 ------------[ cut here ]------------
 WARNING: kernel/tracepoint.c:175 at tracepoint_add_func+0x357/0x370, CPU#2: perf/2272
 Modules linked in: kvm_intel kvm irqbypass
 CPU: 2 UID: 0 PID: 2272 Comm: perf Not tainted 6.18.0-ftest-11964-ge022764176fc-dirty #323 PREEMPTLAZY
 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.17.0-debian-1.17.0-1 04/01/2014
 RIP: 0010:tracepoint_add_func+0x357/0x370
 Code: 28 9c e8 4c 0b f5 ff eb 0f 4c 89 f7 48 c7 c6 80 4d 28 9c e8 ab 89 f4 ff 31 c0 5b 41 5c 41 5d 41 5e 41 5f 5d c3 cc cc cc cc cc &lt;0f&gt; 0b 49 c7 c6 ea ff ff ff e9 ee fe ff ff 0f 0b e9 f9 fe ff ff 0f
 RSP: 0018:ffffabc0c44d3c40 EFLAGS: 00010246
 RAX: 0000000000000001 RBX: ffff9380aa9e4060 RCX: 0000000000000000
 RDX: 000000000000000a RSI: ffffffff9e1d4a98 RDI: ffff937fcf5fd6c8
 RBP: 0000000000000001 R08: 0000000000000007 R09: ffff937fcf5fc780
 R10: 0000000000000003 R11: ffffffff9c193910 R12: 000000000000000a
 R13: ffffffff9e1e5888 R14: 0000000000000000 R15: ffffabc0c44d3c78
 FS:  00007f6202f5f340(0000) GS:ffff93819f00f000(0000) knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: 000055d3162281a8 CR3: 0000000106a56003 CR4: 0000000000172ef0
 Call Trace:
  &lt;TASK&gt;
  tracepoint_probe_register+0x5d/0x90
  synth_event_reg+0x3c/0x60
  perf_trace_event_init+0x204/0x340
  perf_trace_init+0x85/0xd0
  perf_tp_event_init+0x2e/0x50
  perf_try_init_event+0x6f/0x230
  ? perf_event_alloc+0x4bb/0xdc0
  perf_event_alloc+0x65a/0xdc0
  __se_sys_perf_event_open+0x290/0x9f0
  do_syscall_64+0x93/0x7b0
  ? entry_SYSCALL_64_after_hwframe+0x76/0x7e
  ? trace_hardirqs_off+0x53/0xc0
  entry_SYSCALL_64_after_hwframe+0x76/0x7e

Instead, have the code return -ENODEV, which doesn't warn and has perf
error out with:

 # perf record -e synthetic:futex_wait
Error:
The sys_perf_event_open() syscall returned with 19 (No such device) for event (synthetic:futex_wait).
"dmesg | grep -i perf" may provide additional information.

Ideally perf should support synthetic events, but for now just fix the
warning. The support can come later.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71125/">CVE-2025-71125 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71125">CVE-2025-71125 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256784">SUSE bug 1256784</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571126" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71126</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71126" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71126" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71126" ref_url="https://www.suse.com/security/cve/CVE-2025-71126" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mptcp: avoid deadlock on fallback while reinjecting

Jakub reported an MPTCP deadlock at fallback time:

 WARNING: possible recursive locking detected
 6.18.0-rc7-virtme #1 Not tainted
 --------------------------------------------
 mptcp_connect/20858 is trying to acquire lock:
 ff1100001da18b60 (&amp;msk-&gt;fallback_lock){+.-.}-{3:3}, at: __mptcp_try_fallback+0xd8/0x280

 but task is already holding lock:
 ff1100001da18b60 (&amp;msk-&gt;fallback_lock){+.-.}-{3:3}, at: __mptcp_retrans+0x352/0xaa0

 other info that might help us debug this:
  Possible unsafe locking scenario:

        CPU0
        ----
   lock(&amp;msk-&gt;fallback_lock);
   lock(&amp;msk-&gt;fallback_lock);

  *** DEADLOCK ***

  May be due to missing lock nesting notation

 3 locks held by mptcp_connect/20858:
  #0: ff1100001da18290 (sk_lock-AF_INET){+.+.}-{0:0}, at: mptcp_sendmsg+0x114/0x1bc0
  #1: ff1100001db40fd0 (k-sk_lock-AF_INET#2){+.+.}-{0:0}, at: __mptcp_retrans+0x2cb/0xaa0
  #2: ff1100001da18b60 (&amp;msk-&gt;fallback_lock){+.-.}-{3:3}, at: __mptcp_retrans+0x352/0xaa0

 stack backtrace:
 CPU: 0 UID: 0 PID: 20858 Comm: mptcp_connect Not tainted 6.18.0-rc7-virtme #1 PREEMPT(full)
 Hardware name: Bochs, BIOS Bochs 01/01/2011
 Call Trace:
  &lt;TASK&gt;
  dump_stack_lvl+0x6f/0xa0
  print_deadlock_bug.cold+0xc0/0xcd
  validate_chain+0x2ff/0x5f0
  __lock_acquire+0x34c/0x740
  lock_acquire.part.0+0xbc/0x260
  _raw_spin_lock_bh+0x38/0x50
  __mptcp_try_fallback+0xd8/0x280
  mptcp_sendmsg_frag+0x16c2/0x3050
  __mptcp_retrans+0x421/0xaa0
  mptcp_release_cb+0x5aa/0xa70
  release_sock+0xab/0x1d0
  mptcp_sendmsg+0xd5b/0x1bc0
  sock_write_iter+0x281/0x4d0
  new_sync_write+0x3c5/0x6f0
  vfs_write+0x65e/0xbb0
  ksys_write+0x17e/0x200
  do_syscall_64+0xbb/0xfd0
  entry_SYSCALL_64_after_hwframe+0x4b/0x53
 RIP: 0033:0x7fa5627cbc5e
 Code: 4d 89 d8 e8 14 bd 00 00 4c 8b 5d f8 41 8b 93 08 03 00 00 59 5e 48 83 f8 fc 74 11 c9 c3 0f 1f 80 00 00 00 00 48 8b 45 10 0f 05 &lt;c9&gt; c3 83 e2 39 83 fa 08 75 e7 e8 13 ff ff ff 0f 1f 00 f3 0f 1e fa
 RSP: 002b:00007fff1fe14700 EFLAGS: 00000202 ORIG_RAX: 0000000000000001
 RAX: ffffffffffffffda RBX: 0000000000000005 RCX: 00007fa5627cbc5e
 RDX: 0000000000001f9c RSI: 00007fff1fe16984 RDI: 0000000000000005
 RBP: 00007fff1fe14710 R08: 0000000000000000 R09: 0000000000000000
 R10: 0000000000000000 R11: 0000000000000202 R12: 00007fff1fe16920
 R13: 0000000000002000 R14: 0000000000001f9c R15: 0000000000001f9c

The packet scheduler could attempt a reinjection after receiving an
MP_FAIL and before the infinite map has been transmitted, causing a
deadlock since MPTCP needs to do the reinjection atomically from WRT
fallback.

Address the issue explicitly avoiding the reinjection in the critical
scenario. Note that this is the only fallback critical section that
could potentially send packets and hit the double-lock.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71126/">CVE-2025-71126 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71126">CVE-2025-71126 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256755">SUSE bug 1256755</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571130" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71130</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71130" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71130" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71130" ref_url="https://www.suse.com/security/cve/CVE-2025-71130" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/i915/gem: Zero-initialize the eb.vma array in i915_gem_do_execbuffer

Initialize the eb.vma array with values of 0 when the eb structure is
first set up. In particular, this sets the eb-&gt;vma[i].vma pointers to
NULL, simplifying cleanup and getting rid of the bug described below.

During the execution of eb_lookup_vmas(), the eb-&gt;vma array is
successively filled up with struct eb_vma objects. This process includes
calling eb_add_vma(), which might fail; however, even in the event of
failure, eb-&gt;vma[i].vma is set for the currently processed buffer.

If eb_add_vma() fails, eb_lookup_vmas() returns with an error, which
prompts a call to eb_release_vmas() to clean up the mess. Since
eb_lookup_vmas() might fail during processing any (possibly not first)
buffer, eb_release_vmas() checks whether a buffer's vma is NULL to know
at what point did the lookup function fail.

In eb_lookup_vmas(), eb-&gt;vma[i].vma is set to NULL if either the helper
function eb_lookup_vma() or eb_validate_vma() fails. eb-&gt;vma[i+1].vma is
set to NULL in case i915_gem_object_userptr_submit_init() fails; the
current one needs to be cleaned up by eb_release_vmas() at this point,
so the next one is set. If eb_add_vma() fails, neither the current nor
the next vma is set to NULL, which is a source of a NULL deref bug
described in the issue linked in the Closes tag.

When entering eb_lookup_vmas(), the vma pointers are set to the slab
poison value, instead of NULL. This doesn't matter for the actual
lookup, since it gets overwritten anyway, however the eb_release_vmas()
function only recognizes NULL as the stopping value, hence the pointers
are being set to NULL as they go in case of intermediate failure. This
patch changes the approach to filling them all with NULL at the start
instead, rather than handling that manually during failure.

(cherry picked from commit 08889b706d4f0b8d2352b7ca29c2d8df4d0787cd)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-71130/">CVE-2025-71130 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71130">CVE-2025-71130 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256741">SUSE bug 1256741</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71131</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71131" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71131" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71131" ref_url="https://www.suse.com/security/cve/CVE-2025-71131" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: seqiv - Do not use req-&gt;iv after crypto_aead_encrypt

As soon as crypto_aead_encrypt is called, the underlying request
may be freed by an asynchronous completion.  Thus dereferencing
req-&gt;iv after it returns is invalid.

Instead of checking req-&gt;iv against info, create a new variable
unaligned_info and use it for that purpose instead.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-71131/">CVE-2025-71131 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71131">CVE-2025-71131 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256742">SUSE bug 1256742</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571132" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71132</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71132" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71132" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71132" ref_url="https://www.suse.com/security/cve/CVE-2025-71132" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smc91x: fix broken irq-context in PREEMPT_RT

When smc91x.c is built with PREEMPT_RT, the following splat occurs
in FVP_RevC:

[   13.055000] smc91x LNRO0003:00 eth0: link up, 10Mbps, half-duplex, lpa 0x0000
[   13.062137] BUG: workqueue leaked atomic, lock or RCU: kworker/2:1[106]
[   13.062137]      preempt=0x00000000 lock=0-&gt;0 RCU=0-&gt;1 workfn=mld_ifc_work
[   13.062266] C
** replaying previous printk message **
[   13.062266] CPU: 2 UID: 0 PID: 106 Comm: kworker/2:1 Not tainted 6.18.0-dirty #179 PREEMPT_{RT,(full)}
[   13.062353] Hardware name:  , BIOS
[   13.062382] Workqueue: mld mld_ifc_work
[   13.062469] Call trace:
[   13.062494]  show_stack+0x24/0x40 (C)
[   13.062602]  __dump_stack+0x28/0x48
[   13.062710]  dump_stack_lvl+0x7c/0xb0
[   13.062818]  dump_stack+0x18/0x34
[   13.062926]  process_scheduled_works+0x294/0x450
[   13.063043]  worker_thread+0x260/0x3d8
[   13.063124]  kthread+0x1c4/0x228
[   13.063235]  ret_from_fork+0x10/0x20

This happens because smc_special_trylock() disables IRQs even on PREEMPT_RT,
but smc_special_unlock() does not restore IRQs on PREEMPT_RT.
The reason is that smc_special_unlock() calls spin_unlock_irqrestore(),
and rcu_read_unlock_bh() in __dev_queue_xmit() cannot invoke
rcu_read_unlock() through __local_bh_enable_ip() when current-&gt;softirq_disable_cnt becomes zero.

To address this issue, replace smc_special_trylock() with spin_trylock_irqsave().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-71132/">CVE-2025-71132 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71132">CVE-2025-71132 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256737">SUSE bug 1256737</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571133" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71133</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71133" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71133" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71133" ref_url="https://www.suse.com/security/cve/CVE-2025-71133" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/irdma: avoid invalid read in irdma_net_event

irdma_net_event() should not dereference anything from "neigh" (alias
"ptr") until it has checked that the event is NETEVENT_NEIGH_UPDATE.
Other events come with different structures pointed to by "ptr" and they
may be smaller than struct neighbour.

Move the read of neigh-&gt;dev under the NETEVENT_NEIGH_UPDATE case.

The bug is mostly harmless, but it triggers KASAN on debug kernels:

 BUG: KASAN: stack-out-of-bounds in irdma_net_event+0x32e/0x3b0 [irdma]
 Read of size 8 at addr ffffc900075e07f0 by task kworker/27:2/542554

 CPU: 27 PID: 542554 Comm: kworker/27:2 Kdump: loaded Not tainted 5.14.0-630.el9.x86_64+debug #1
 Hardware name: [...]
 Workqueue: events rt6_probe_deferred
 Call Trace:
  &lt;IRQ&gt;
  dump_stack_lvl+0x60/0xb0
  print_address_description.constprop.0+0x2c/0x3f0
  print_report+0xb4/0x270
  kasan_report+0x92/0xc0
  irdma_net_event+0x32e/0x3b0 [irdma]
  notifier_call_chain+0x9e/0x180
  atomic_notifier_call_chain+0x5c/0x110
  rt6_do_redirect+0xb91/0x1080
  tcp_v6_err+0xe9b/0x13e0
  icmpv6_notify+0x2b2/0x630
  ndisc_redirect_rcv+0x328/0x530
  icmpv6_rcv+0xc16/0x1360
  ip6_protocol_deliver_rcu+0xb84/0x12e0
  ip6_input_finish+0x117/0x240
  ip6_input+0xc4/0x370
  ipv6_rcv+0x420/0x7d0
  __netif_receive_skb_one_core+0x118/0x1b0
  process_backlog+0xd1/0x5d0
  __napi_poll.constprop.0+0xa3/0x440
  net_rx_action+0x78a/0xba0
  handle_softirqs+0x2d4/0x9c0
  do_softirq+0xad/0xe0
  &lt;/IRQ&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-71133/">CVE-2025-71133 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71133">CVE-2025-71133 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256733">SUSE bug 1256733</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571134" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71134</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71134" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71134" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71134" ref_url="https://www.suse.com/security/cve/CVE-2025-71134" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/page_alloc: change all pageblocks migrate type on coalescing

When a page is freed it coalesces with a buddy into a higher order page
while possible.  When the buddy page migrate type differs, it is expected
to be updated to match the one of the page being freed.

However, only the first pageblock of the buddy page is updated, while the
rest of the pageblocks are left unchanged.

That causes warnings in later expand() and other code paths (like below),
since an inconsistency between migration type of the list containing the
page and the page-owned pageblocks migration types is introduced.

[  308.986589] ------------[ cut here ]------------
[  308.987227] page type is 0, passed migratetype is 1 (nr=256)
[  308.987275] WARNING: CPU: 1 PID: 5224 at mm/page_alloc.c:812 expand+0x23c/0x270
[  308.987293] Modules linked in: algif_hash(E) af_alg(E) nft_fib_inet(E) nft_fib_ipv4(E) nft_fib_ipv6(E) nft_fib(E) nft_reject_inet(E) nf_reject_ipv4(E) nf_reject_ipv6(E) nft_reject(E) nft_ct(E) nft_chain_nat(E) nf_nat(E) nf_conntrack(E) nf_defrag_ipv6(E) nf_defrag_ipv4(E) nf_tables(E) s390_trng(E) vfio_ccw(E) mdev(E) vfio_iommu_type1(E) vfio(E) sch_fq_codel(E) drm(E) i2c_core(E) drm_panel_orientation_quirks(E) loop(E) nfnetlink(E) vsock_loopback(E) vmw_vsock_virtio_transport_common(E) vsock(E) ctcm(E) fsm(E) diag288_wdt(E) watchdog(E) zfcp(E) scsi_transport_fc(E) ghash_s390(E) prng(E) aes_s390(E) des_generic(E) des_s390(E) libdes(E) sha3_512_s390(E) sha3_256_s390(E) sha_common(E) paes_s390(E) crypto_engine(E) pkey_cca(E) pkey_ep11(E) zcrypt(E) rng_core(E) pkey_pckmo(E) pkey(E) autofs4(E)
[  308.987439] Unloaded tainted modules: hmac_s390(E):2
[  308.987650] CPU: 1 UID: 0 PID: 5224 Comm: mempig_verify Kdump: loaded Tainted: G            E       6.18.0-gcc-bpf-debug #431 PREEMPT
[  308.987657] Tainted: [E]=UNSIGNED_MODULE
[  308.987661] Hardware name: IBM 3906 M04 704 (z/VM 7.3.0)
[  308.987666] Krnl PSW : 0404f00180000000 00000349976fa600 (expand+0x240/0x270)
[  308.987676]            R:0 T:1 IO:0 EX:0 Key:0 M:1 W:0 P:0 AS:3 CC:3 PM:0 RI:0 EA:3
[  308.987682] Krnl GPRS: 0000034980000004 0000000000000005 0000000000000030 000003499a0e6d88
[  308.987688]            0000000000000005 0000034980000005 000002be803ac000 0000023efe6c8300
[  308.987692]            0000000000000008 0000034998d57290 000002be00000100 0000023e00000008
[  308.987696]            0000000000000000 0000000000000000 00000349976fa5fc 000002c99b1eb6f0
[  308.987708] Krnl Code: 00000349976fa5f0: c020008a02f2	larl	%r2,000003499883abd4
                          00000349976fa5f6: c0e5ffe3f4b5	brasl	%r14,0000034997378f60
                         #00000349976fa5fc: af000000		mc	0,0
                         &gt;00000349976fa600: a7f4ff4c		brc	15,00000349976fa498
                          00000349976fa604: b9040026		lgr	%r2,%r6
                          00000349976fa608: c0300088317f	larl	%r3,0000034998800906
                          00000349976fa60e: c0e5fffdb6e1	brasl	%r14,00000349976b13d0
                          00000349976fa614: af000000		mc	0,0
[  308.987734] Call Trace:
[  308.987738]  [&lt;00000349976fa600&gt;] expand+0x240/0x270
[  308.987744] ([&lt;00000349976fa5fc&gt;] expand+0x23c/0x270)
[  308.987749]  [&lt;00000349976ff95e&gt;] rmqueue_bulk+0x71e/0x940
[  308.987754]  [&lt;00000349976ffd7e&gt;] __rmqueue_pcplist+0x1fe/0x2a0
[  308.987759]  [&lt;0000034997700966&gt;] rmqueue.isra.0+0xb46/0xf40
[  308.987763]  [&lt;0000034997703ec8&gt;] get_page_from_freelist+0x198/0x8d0
[  308.987768]  [&lt;0000034997706fa8&gt;] __alloc_frozen_pages_noprof+0x198/0x400
[  308.987774]  [&lt;00000349977536f8&gt;] alloc_pages_mpol+0xb8/0x220
[  308.987781]  [&lt;0000034997753bf6&gt;] folio_alloc_mpol_noprof+0x26/0xc0
[  308.987786]  [&lt;0000034997753e4c&gt;] vma_alloc_folio_noprof+0x6c/0xa0
[  308.987791]  [&lt;0000034997775b22&gt;] vma_alloc_anon_folio_pmd+0x42/0x240
[  308.987799]  [&lt;000003499777bfea&gt;] __do_huge_pmd_anonymous_page+0x3a/0x210
[  308.987804]  [&lt;00000349976cb0
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-71134/">CVE-2025-71134 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71134">CVE-2025-71134 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256732">SUSE bug 1256732</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71135</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71135" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71135" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71135" ref_url="https://www.suse.com/security/cve/CVE-2025-71135" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

md/raid5: fix possible null-pointer dereferences in raid5_store_group_thread_cnt()

The variable mddev-&gt;private is first assigned to conf and then checked:

  conf = mddev-&gt;private;
  if (!conf) ...

If conf is NULL, then mddev-&gt;private is also NULL. In this case,
null-pointer dereferences can occur when calling raid5_quiesce():

  raid5_quiesce(mddev, true);
  raid5_quiesce(mddev, false);

since mddev-&gt;private is assigned to conf again in raid5_quiesce(), and conf
is dereferenced in several places, for example:

  conf-&gt;quiesce = 0;
  wake_up(&amp;conf-&gt;wait_for_quiescent);

To fix this issue, the function should unlock mddev and return before
invoking raid5_quiesce() when conf is NULL, following the existing pattern
in raid5_change_consistency_policy().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-71135/">CVE-2025-71135 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71135">CVE-2025-71135 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256761">SUSE bug 1256761</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71136</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71136" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71136" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71136" ref_url="https://www.suse.com/security/cve/CVE-2025-71136" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

media: adv7842: Avoid possible out-of-bounds array accesses in adv7842_cp_log_status()

It's possible for cp_read() and hdmi_read() to return -EIO. Those
values are further used as indexes for accessing arrays.

Fix that by checking return values where it's needed.

Found by Linux Verification Center (linuxtesting.org) with SVACE.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-71136/">CVE-2025-71136 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71136">CVE-2025-71136 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256759">SUSE bug 1256759</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71137</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71137" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71137" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71137" ref_url="https://www.suse.com/security/cve/CVE-2025-71137" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

octeontx2-pf: fix "UBSAN: shift-out-of-bounds error"

This patch ensures that the RX ring size (rx_pending) is not
set below the permitted length. This avoids UBSAN
shift-out-of-bounds errors when users passes small or zero
ring sizes via ethtool -G.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-71137/">CVE-2025-71137 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71137">CVE-2025-71137 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256760">SUSE bug 1256760</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71138</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71138" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71138" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71138" ref_url="https://www.suse.com/security/cve/CVE-2025-71138" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/msm/dpu: Add missing NULL pointer check for pingpong interface

It is checked almost always in dpu_encoder_phys_wb_setup_ctl(), but in a
single place the check is missing.
Also use convenient locals instead of phys_enc-&gt;* where available.

Patchwork: https://patchwork.freedesktop.org/patch/693860/
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71138/">CVE-2025-71138 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71138">CVE-2025-71138 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256785">SUSE bug 1256785</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71141</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71141" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71141" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71141" ref_url="https://www.suse.com/security/cve/CVE-2025-71141" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/tilcdc: Fix removal actions in case of failed probe

The drm_kms_helper_poll_fini() and drm_atomic_helper_shutdown() helpers
should only be called when the device has been successfully registered.
Currently, these functions are called unconditionally in tilcdc_fini(),
which causes warnings during probe deferral scenarios.

[    7.972317] WARNING: CPU: 0 PID: 23 at drivers/gpu/drm/drm_atomic_state_helper.c:175 drm_atomic_helper_crtc_duplicate_state+0x60/0x68
...
[    8.005820]  drm_atomic_helper_crtc_duplicate_state from drm_atomic_get_crtc_state+0x68/0x108
[    8.005858]  drm_atomic_get_crtc_state from drm_atomic_helper_disable_all+0x90/0x1c8
[    8.005885]  drm_atomic_helper_disable_all from drm_atomic_helper_shutdown+0x90/0x144
[    8.005911]  drm_atomic_helper_shutdown from tilcdc_fini+0x68/0xf8 [tilcdc]
[    8.005957]  tilcdc_fini [tilcdc] from tilcdc_pdev_probe+0xb0/0x6d4 [tilcdc]

Fix this by rewriting the failed probe cleanup path using the standard
goto error handling pattern, which ensures that cleanup functions are
only called on successfully initialized resources. Additionally, remove
the now-unnecessary is_registered flag.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-71141/">CVE-2025-71141 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71141">CVE-2025-71141 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256756">SUSE bug 1256756</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71142</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71142" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71142" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71142" ref_url="https://www.suse.com/security/cve/CVE-2025-71142" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

cpuset: fix warning when disabling remote partition

A warning was triggered as follows:

WARNING: kernel/cgroup/cpuset.c:1651 at remote_partition_disable+0xf7/0x110
RIP: 0010:remote_partition_disable+0xf7/0x110
RSP: 0018:ffffc90001947d88 EFLAGS: 00000206
RAX: 0000000000007fff RBX: ffff888103b6e000 RCX: 0000000000006f40
RDX: 0000000000006f00 RSI: ffffc90001947da8 RDI: ffff888103b6e000
RBP: ffff888103b6e000 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000001 R11: ffff88810b2e2728 R12: ffffc90001947da8
R13: 0000000000000000 R14: ffffc90001947da8 R15: ffff8881081f1c00
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f55c8bbe0b2 CR3: 000000010b14c000 CR4: 00000000000006f0
Call Trace:
 &lt;TASK&gt;
 update_prstate+0x2d3/0x580
 cpuset_partition_write+0x94/0xf0
 kernfs_fop_write_iter+0x147/0x200
 vfs_write+0x35d/0x500
 ksys_write+0x66/0xe0
 do_syscall_64+0x6b/0x390
 entry_SYSCALL_64_after_hwframe+0x4b/0x53
RIP: 0033:0x7f55c8cd4887

Reproduction steps (on a 16-CPU machine):

        # cd /sys/fs/cgroup/
        # mkdir A1
        # echo +cpuset &gt; A1/cgroup.subtree_control
        # echo "0-14" &gt; A1/cpuset.cpus.exclusive
        # mkdir A1/A2
        # echo "0-14" &gt; A1/A2/cpuset.cpus.exclusive
        # echo "root" &gt; A1/A2/cpuset.cpus.partition
        # echo 0 &gt; /sys/devices/system/cpu/cpu15/online
        # echo member &gt; A1/A2/cpuset.cpus.partition

When CPU 15 is offlined, subpartitions_cpus gets cleared because no CPUs
remain available for the top_cpuset, forcing partitions to share CPUs with
the top_cpuset. In this scenario, disabling the remote partition triggers
a warning stating that effective_xcpus is not a subset of
subpartitions_cpus. Partitions should be invalidated in this case to
inform users that the partition is now invalid(cpus are shared with
top_cpuset).

To fix this issue:
1. Only emit the warning only if subpartitions_cpus is not empty and the
   effective_xcpus is not a subset of subpartitions_cpus.
2. During the CPU hotplug process, invalidate partitions if
   subpartitions_cpus is empty.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-71142/">CVE-2025-71142 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71142">CVE-2025-71142 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256748">SUSE bug 1256748</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571143" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71143</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71143" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71143" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71143" ref_url="https://www.suse.com/security/cve/CVE-2025-71143" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

clk: samsung: exynos-clkout: Assign .num before accessing .hws

Commit f316cdff8d67 ("clk: Annotate struct clk_hw_onecell_data with
__counted_by") annotated the hws member of 'struct clk_hw_onecell_data'
with __counted_by, which informs the bounds sanitizer (UBSAN_BOUNDS)
about the number of elements in .hws[], so that it can warn when .hws[]
is accessed out of bounds. As noted in that change, the __counted_by
member must be initialized with the number of elements before the first
array access happens, otherwise there will be a warning from each access
prior to the initialization because the number of elements is zero. This
occurs in exynos_clkout_probe() due to .num being assigned after .hws[]
has been accessed:

  UBSAN: array-index-out-of-bounds in drivers/clk/samsung/clk-exynos-clkout.c:178:18
  index 0 is out of range for type 'clk_hw *[*]'

Move the .num initialization to before the first access of .hws[],
clearing up the warning.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-71143/">CVE-2025-71143 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71143">CVE-2025-71143 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256749">SUSE bug 1256749</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71145</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71145" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71145" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71145" ref_url="https://www.suse.com/security/cve/CVE-2025-71145" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

usb: phy: isp1301: fix non-OF device reference imbalance

A recent change fixing a device reference leak in a UDC driver
introduced a potential use-after-free in the non-OF case as the
isp1301_get_client() helper only increases the reference count for the
returned I2C device in the OF case.

Increment the reference count also for non-OF so that the caller can
decrement it unconditionally.

Note that this is inherently racy just as using the returned I2C device
is since nothing is preventing the PHY driver from being unbound while
in use.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71145/">CVE-2025-71145 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71145">CVE-2025-71145 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257155">SUSE bug 1257155</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257156">SUSE bug 1257156</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571147" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71147</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71147" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71147" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71147" ref_url="https://www.suse.com/security/cve/CVE-2025-71147" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KEYS: trusted: Fix a memory leak in tpm2_load_cmd

'tpm2_load_cmd' allocates a tempoary blob indirectly via 'tpm2_key_decode'
but it is not freed in the failure paths. Address this by wrapping the blob
into with a cleanup helper.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71147/">CVE-2025-71147 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71147">CVE-2025-71147 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257158">SUSE bug 1257158</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71148</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71148" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71148" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71148" ref_url="https://www.suse.com/security/cve/CVE-2025-71148" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/handshake: restore destructor on submit failure

handshake_req_submit() replaces sk-&gt;sk_destruct but never restores it when
submission fails before the request is hashed. handshake_sk_destruct() then
returns early and the original destructor never runs, leaking the socket.
Restore sk_destruct on the error path.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71148/">CVE-2025-71148 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71148">CVE-2025-71148 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257159">SUSE bug 1257159</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571149" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71149</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71149" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71149" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71149" ref_url="https://www.suse.com/security/cve/CVE-2025-71149" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

io_uring/poll: correctly handle io_poll_add() return value on update

When the core of io_uring was updated to handle completions
consistently and with fixed return codes, the POLL_REMOVE opcode
with updates got slightly broken. If a POLL_ADD is pending and
then POLL_REMOVE is used to update the events of that request, if that
update causes the POLL_ADD to now trigger, then that completion is lost
and a CQE is never posted.

Additionally, ensure that if an update does cause an existing POLL_ADD
to complete, that the completion value isn't always overwritten with
-ECANCELED. For that case, whatever io_poll_add() set the value to
should just be retained.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71149/">CVE-2025-71149 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71149">CVE-2025-71149 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257164">SUSE bug 1257164</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71154</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71154" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71154" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71154" ref_url="https://www.suse.com/security/cve/CVE-2025-71154" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: usb: rtl8150: fix memory leak on usb_submit_urb() failure

In async_set_registers(), when usb_submit_urb() fails, the allocated
  async_req structure and URB are not freed, causing a memory leak.

  The completion callback async_set_reg_cb() is responsible for freeing
  these allocations, but it is only called after the URB is successfully
  submitted and completes (successfully or with error). If submission
  fails, the callback never runs and the memory is leaked.

  Fix this by freeing both the URB and the request structure in the error
  path when usb_submit_urb() fails.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71154/">CVE-2025-71154 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71154">CVE-2025-71154 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257163">SUSE bug 1257163</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71156</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71156" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71156" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71156" ref_url="https://www.suse.com/security/cve/CVE-2025-71156" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gve: defer interrupt enabling until NAPI registration

Currently, interrupts are automatically enabled immediately upon
request. This allows interrupt to fire before the associated NAPI
context is fully initialized and cause failures like below:

[    0.946369] Call Trace:
[    0.946369]  &lt;IRQ&gt;
[    0.946369]  __napi_poll+0x2a/0x1e0
[    0.946369]  net_rx_action+0x2f9/0x3f0
[    0.946369]  handle_softirqs+0xd6/0x2c0
[    0.946369]  ? handle_edge_irq+0xc1/0x1b0
[    0.946369]  __irq_exit_rcu+0xc3/0xe0
[    0.946369]  common_interrupt+0x81/0xa0
[    0.946369]  &lt;/IRQ&gt;
[    0.946369]  &lt;TASK&gt;
[    0.946369]  asm_common_interrupt+0x22/0x40
[    0.946369] RIP: 0010:pv_native_safe_halt+0xb/0x10

Use the `IRQF_NO_AUTOEN` flag when requesting interrupts to prevent auto
enablement and explicitly enable the interrupt in NAPI initialization
path (and disable it during NAPI teardown).

This ensures that interrupt lifecycle is strictly coupled with
readiness of NAPI context.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71156/">CVE-2025-71156 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71156">CVE-2025-71156 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257167">SUSE bug 1257167</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571157" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71157</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71157" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71157" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71157" ref_url="https://www.suse.com/security/cve/CVE-2025-71157" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

RDMA/core: always drop device refcount in ib_del_sub_device_and_put()

Since nldev_deldev() (introduced by commit 060c642b2ab8 ("RDMA/nldev: Add
support to add/delete a sub IB device through netlink") grabs a reference
using ib_device_get_by_index() before calling ib_del_sub_device_and_put(),
we need to drop that reference before returning -EOPNOTSUPP error.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71157/">CVE-2025-71157 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71157">CVE-2025-71157 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257168">SUSE bug 1257168</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571161" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71161</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71161" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71161" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71161" ref_url="https://www.suse.com/security/cve/CVE-2025-71161" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dm-verity: disable recursive forward error correction

There are two problems with the recursive correction:

1. It may cause denial-of-service. In fec_read_bufs, there is a loop that
has 253 iterations. For each iteration, we may call verity_hash_for_block
recursively. There is a limit of 4 nested recursions - that means that
there may be at most 253^4 (4 billion) iterations. Red Hat QE team
actually created an image that pushes dm-verity to this limit - and this
image just makes the udev-worker process get stuck in the 'D' state.

2. It doesn't work. In fec_read_bufs we store data into the variable
"fio-&gt;bufs", but fio bufs is shared between recursive invocations, if
"verity_hash_for_block" invoked correction recursively, it would
overwrite partially filled fio-&gt;bufs.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71161/">CVE-2025-71161 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71161">CVE-2025-71161 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257174">SUSE bug 1257174</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571162" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71162</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71162" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71162" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71162" ref_url="https://www.suse.com/security/cve/CVE-2025-71162" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dmaengine: tegra-adma: Fix use-after-free

A use-after-free bug exists in the Tegra ADMA driver when audio streams
are terminated, particularly during XRUN conditions. The issue occurs
when the DMA buffer is freed by tegra_adma_terminate_all() before the
vchan completion tasklet finishes accessing it.

The race condition follows this sequence:

  1. DMA transfer completes, triggering an interrupt that schedules the
     completion tasklet (tasklet has not executed yet)
  2. Audio playback stops, calling tegra_adma_terminate_all() which
     frees the DMA buffer memory via kfree()
  3. The scheduled tasklet finally executes, calling vchan_complete()
     which attempts to access the already-freed memory

Since tasklets can execute at any time after being scheduled, there is
no guarantee that the buffer will remain valid when vchan_complete()
runs.

Fix this by properly synchronizing the virtual channel completion:
 - Calling vchan_terminate_vdesc() in tegra_adma_stop() to mark the
   descriptors as terminated instead of freeing the descriptor.
 - Add the callback tegra_adma_synchronize() that calls
   vchan_synchronize() which kills any pending tasklets and frees any
   terminated descriptors.

Crash logs:
[  337.427523] BUG: KASAN: use-after-free in vchan_complete+0x124/0x3b0
[  337.427544] Read of size 8 at addr ffff000132055428 by task swapper/0/0

[  337.427562] Call trace:
[  337.427564]  dump_backtrace+0x0/0x320
[  337.427571]  show_stack+0x20/0x30
[  337.427575]  dump_stack_lvl+0x68/0x84
[  337.427584]  print_address_description.constprop.0+0x74/0x2b8
[  337.427590]  kasan_report+0x1f4/0x210
[  337.427598]  __asan_load8+0xa0/0xd0
[  337.427603]  vchan_complete+0x124/0x3b0
[  337.427609]  tasklet_action_common.constprop.0+0x190/0x1d0
[  337.427617]  tasklet_action+0x30/0x40
[  337.427623]  __do_softirq+0x1a0/0x5c4
[  337.427628]  irq_exit+0x110/0x140
[  337.427633]  handle_domain_irq+0xa4/0xe0
[  337.427640]  gic_handle_irq+0x64/0x160
[  337.427644]  call_on_irq_stack+0x20/0x4c
[  337.427649]  do_interrupt_handler+0x7c/0x90
[  337.427654]  el1_interrupt+0x30/0x80
[  337.427659]  el1h_64_irq_handler+0x18/0x30
[  337.427663]  el1h_64_irq+0x7c/0x80
[  337.427667]  cpuidle_enter_state+0xe4/0x540
[  337.427674]  cpuidle_enter+0x54/0x80
[  337.427679]  do_idle+0x2e0/0x380
[  337.427685]  cpu_startup_entry+0x2c/0x70
[  337.427690]  rest_init+0x114/0x130
[  337.427695]  arch_call_rest_init+0x18/0x24
[  337.427702]  start_kernel+0x380/0x3b4
[  337.427706]  __primary_switched+0xc0/0xc8
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-71162/">CVE-2025-71162 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71162">CVE-2025-71162 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257204">SUSE bug 1257204</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571163" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71163</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71163" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71163" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71163" ref_url="https://www.suse.com/security/cve/CVE-2025-71163" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dmaengine: idxd: fix device leaks on compat bind and unbind

Make sure to drop the reference taken when looking up the idxd device as
part of the compat bind and unbind sysfs interface.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-71163/">CVE-2025-71163 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71163">CVE-2025-71163 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257215">SUSE bug 1257215</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71182</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71182" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71182" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71182" ref_url="https://www.suse.com/security/cve/CVE-2025-71182" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: j1939: make j1939_session_activate() fail if device is no longer registered

syzbot is still reporting

  unregister_netdevice: waiting for vcan0 to become free. Usage count = 2

even after commit 93a27b5891b8 ("can: j1939: add missing calls in
NETDEV_UNREGISTER notification handler") was added. A debug printk() patch
found that j1939_session_activate() can succeed even after
j1939_cancel_active_session() from j1939_netdev_notify(NETDEV_UNREGISTER)
has completed.

Since j1939_cancel_active_session() is processed with the session list lock
held, checking ndev-&gt;reg_state in j1939_session_activate() with the session
list lock held can reliably close the race window.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-71182/">CVE-2025-71182 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71182">CVE-2025-71182 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257586">SUSE bug 1257586</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571183" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71183</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71183" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71183" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71183" ref_url="https://www.suse.com/security/cve/CVE-2025-71183" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: always detect conflicting inodes when logging inode refs

After rename exchanging (either with the rename exchange operation or
regular renames in multiple non-atomic steps) two inodes and at least
one of them is a directory, we can end up with a log tree that contains
only of the inodes and after a power failure that can result in an attempt
to delete the other inode when it should not because it was not deleted
before the power failure. In some case that delete attempt fails when
the target inode is a directory that contains a subvolume inside it, since
the log replay code is not prepared to deal with directory entries that
point to root items (only inode items).

1) We have directories "dir1" (inode A) and "dir2" (inode B) under the
   same parent directory;

2) We have a file (inode C) under directory "dir1" (inode A);

3) We have a subvolume inside directory "dir2" (inode B);

4) All these inodes were persisted in a past transaction and we are
   currently at transaction N;

5) We rename the file (inode C), so at btrfs_log_new_name() we update
   inode C's last_unlink_trans to N;

6) We get a rename exchange for "dir1" (inode A) and "dir2" (inode B),
   so after the exchange "dir1" is inode B and "dir2" is inode A.
   During the rename exchange we call btrfs_log_new_name() for inodes
   A and B, but because they are directories, we don't update their
   last_unlink_trans to N;

7) An fsync against the file (inode C) is done, and because its inode
   has a last_unlink_trans with a value of N we log its parent directory
   (inode A) (through btrfs_log_all_parents(), called from
   btrfs_log_inode_parent()).

8) So we end up with inode B not logged, which now has the old name
   of inode A. At copy_inode_items_to_log(), when logging inode A, we
   did not check if we had any conflicting inode to log because inode
   A has a generation lower than the current transaction (created in
   a past transaction);

9) After a power failure, when replaying the log tree, since we find that
   inode A has a new name that conflicts with the name of inode B in the
   fs tree, we attempt to delete inode B... this is wrong since that
   directory was never deleted before the power failure, and because there
   is a subvolume inside that directory, attempting to delete it will fail
   since replay_dir_deletes() and btrfs_unlink_inode() are not prepared
   to deal with dir items that point to roots instead of inodes.

   When that happens the mount fails and we get a stack trace like the
   following:

   [87.2314] BTRFS info (device dm-0): start tree-log replay
   [87.2318] BTRFS critical (device dm-0): failed to delete reference to subvol, root 5 inode 256 parent 259
   [87.2332] ------------[ cut here ]------------
   [87.2338] BTRFS: Transaction aborted (error -2)
   [87.2346] WARNING: CPU: 1 PID: 638968 at fs/btrfs/inode.c:4345 __btrfs_unlink_inode+0x416/0x440 [btrfs]
   [87.2368] Modules linked in: btrfs loop dm_thin_pool (...)
   [87.2470] CPU: 1 UID: 0 PID: 638968 Comm: mount Tainted: G        W           6.18.0-rc7-btrfs-next-218+ #2 PREEMPT(full)
   [87.2489] Tainted: [W]=WARN
   [87.2494] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.2-0-gea1b7a073390-prebuilt.qemu.org 04/01/2014
   [87.2514] RIP: 0010:__btrfs_unlink_inode+0x416/0x440 [btrfs]
   [87.2538] Code: c0 89 04 24 (...)
   [87.2568] RSP: 0018:ffffc0e741f4b9b8 EFLAGS: 00010286
   [87.2574] RAX: 0000000000000000 RBX: ffff9d3ec8a6cf60 RCX: 0000000000000000
   [87.2582] RDX: 0000000000000002 RSI: ffffffff84ab45a1 RDI: 00000000ffffffff
   [87.2591] RBP: ffff9d3ec8a6ef20 R08: 0000000000000000 R09: ffffc0e741f4b840
   [87.2599] R10: ffff9d45dc1fffa8 R11: 0000000000000003 R12: ffff9d3ee26d77e0
   [87.2608] R13: ffffc0e741f4ba98 R14: ffff9d4458040800 R15: ffff9d44b6b7ca10
   [87.2618] FS:  00007f7b9603a840(0000) GS:ffff9d4658982000(0000) knlGS:0000000000000000
   [87.
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-71183/">CVE-2025-71183 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71183">CVE-2025-71183 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257631">SUSE bug 1257631</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571184" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71184</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71184" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71184" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71184" ref_url="https://www.suse.com/security/cve/CVE-2025-71184" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix NULL dereference on root when tracing inode eviction

When evicting an inode the first thing we do is to setup tracing for it,
which implies fetching the root's id. But in btrfs_evict_inode() the
root might be NULL, as implied in the next check that we do in
btrfs_evict_inode().

Hence, we either should set the -&gt;root_objectid to 0 in case the root is
NULL, or we move tracing setup after checking that the root is not
NULL. Setting the rootid to 0 at least gives us the possibility to trace
this call even in the case when the root is NULL, so that's the solution
taken here.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2025-71184/">CVE-2025-71184 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71184">CVE-2025-71184 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257635">SUSE bug 1257635</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71185</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71185" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71185" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71185" ref_url="https://www.suse.com/security/cve/CVE-2025-71185" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dmaengine: ti: dma-crossbar: fix device leak on am335x route allocation

Make sure to drop the reference taken when looking up the crossbar
platform device during am335x route allocation.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71185/">CVE-2025-71185 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71185">CVE-2025-71185 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257560">SUSE bug 1257560</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571186" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71186</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71186" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71186" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71186" ref_url="https://www.suse.com/security/cve/CVE-2025-71186" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dmaengine: stm32: dmamux: fix device leak on route allocation

Make sure to drop the reference taken when looking up the DMA mux
platform device during route allocation.

Note that holding a reference to a device does not prevent its driver
data from going away so there is no point in keeping the reference.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71186/">CVE-2025-71186 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71186">CVE-2025-71186 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257565">SUSE bug 1257565</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71188</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71188" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71188" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71188" ref_url="https://www.suse.com/security/cve/CVE-2025-71188" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dmaengine: lpc18xx-dmamux: fix device leak on route allocation

Make sure to drop the reference taken when looking up the DMA mux
platform device during route allocation.

Note that holding a reference to a device does not prevent its driver
data from going away so there is no point in keeping the reference.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71188/">CVE-2025-71188 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71188">CVE-2025-71188 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257576">SUSE bug 1257576</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571189" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71189</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71189" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71189" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71189" ref_url="https://www.suse.com/security/cve/CVE-2025-71189" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dmaengine: dw: dmamux: fix OF node leak on route allocation failure

Make sure to drop the reference taken to the DMA master OF node also on
late route allocation failures.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71189/">CVE-2025-71189 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71189">CVE-2025-71189 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257573">SUSE bug 1257573</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571190" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71190</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71190" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71190" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71190" ref_url="https://www.suse.com/security/cve/CVE-2025-71190" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dmaengine: bcm-sba-raid: fix device leak on probe

Make sure to drop the reference taken when looking up the mailbox device
during probe on probe failures and on driver unbind.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71190/">CVE-2025-71190 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71190">CVE-2025-71190 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257580">SUSE bug 1257580</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71191</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71191" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71191" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71191" ref_url="https://www.suse.com/security/cve/CVE-2025-71191" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dmaengine: at_hdmac: fix device leak on of_dma_xlate()

Make sure to drop the reference taken when looking up the DMA platform
device during of_dma_xlate() when releasing channel resources.

Note that commit 3832b78b3ec2 ("dmaengine: at_hdmac: add missing
put_device() call in at_dma_xlate()") fixed the leak in a couple of
error paths but the reference is still leaking on successful allocation.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71191/">CVE-2025-71191 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71191">CVE-2025-71191 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257579">SUSE bug 1257579</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571192" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71192</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71192" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71192" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71192" ref_url="https://www.suse.com/security/cve/CVE-2025-71192" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: ac97: fix a double free in snd_ac97_controller_register()

If ac97_add_adapter() fails, put_device() is the correct way to drop
the device reference. kfree() is not required.
Add kfree() if idr_alloc() fails and in ac97_adapter_release() to do
the cleanup.

Found by code review.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71192/">CVE-2025-71192 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-71192">CVE-2025-71192 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257679">SUSE bug 1257679</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571193" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71193</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71193" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71193" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71193" ref_url="https://www.suse.com/security/cve/CVE-2025-71193" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

phy: qcom-qusb2: Fix NULL pointer dereference on early suspend

Enabling runtime PM before attaching the QPHY instance as driver data
can lead to a NULL pointer dereference in runtime PM callbacks that
expect valid driver data. There is a small window where the suspend
callback may run after PM runtime enabling and before runtime forbid.
This causes a sporadic crash during boot:

```
Unable to handle kernel NULL pointer dereference at virtual address 00000000000000a1
[...]
CPU: 0 UID: 0 PID: 11 Comm: kworker/0:1 Not tainted 6.16.7+ #116 PREEMPT
Workqueue: pm pm_runtime_work
pstate: 20000005 (nzCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : qusb2_phy_runtime_suspend+0x14/0x1e0 [phy_qcom_qusb2]
lr : pm_generic_runtime_suspend+0x2c/0x44
[...]
```

Attach the QPHY instance as driver data before enabling runtime PM to
prevent NULL pointer dereference in runtime PM callbacks.

Reorder pm_runtime_enable() and pm_runtime_forbid() to prevent a
short window where an unnecessary runtime suspend can occur.

Use the devres-managed version to ensure PM runtime is symmetrically
disabled during driver removal for proper cleanup.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71193/">CVE-2025-71193 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-71193">CVE-2025-71193 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257686">SUSE bug 1257686</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571194" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71194</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71194" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71194" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71194" ref_url="https://www.suse.com/security/cve/CVE-2025-71194" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: fix deadlock in wait_current_trans() due to ignored transaction type

When wait_current_trans() is called during start_transaction(), it
currently waits for a blocked transaction without considering whether
the given transaction type actually needs to wait for that particular
transaction state. The btrfs_blocked_trans_types[] array already defines
which transaction types should wait for which transaction states, but
this check was missing in wait_current_trans().

This can lead to a deadlock scenario involving two transactions and
pending ordered extents:

  1. Transaction A is in TRANS_STATE_COMMIT_DOING state

  2. A worker processing an ordered extent calls start_transaction()
     with TRANS_JOIN

  3. join_transaction() returns -EBUSY because Transaction A is in
     TRANS_STATE_COMMIT_DOING

  4. Transaction A moves to TRANS_STATE_UNBLOCKED and completes

  5. A new Transaction B is created (TRANS_STATE_RUNNING)

  6. The ordered extent from step 2 is added to Transaction B's
     pending ordered extents

  7. Transaction B immediately starts commit by another task and
     enters TRANS_STATE_COMMIT_START

  8. The worker finally reaches wait_current_trans(), sees Transaction B
     in TRANS_STATE_COMMIT_START (a blocked state), and waits
     unconditionally

  9. However, TRANS_JOIN should NOT wait for TRANS_STATE_COMMIT_START
     according to btrfs_blocked_trans_types[]

  10. Transaction B is waiting for pending ordered extents to complete

  11. Deadlock: Transaction B waits for ordered extent, ordered extent
      waits for Transaction B

This can be illustrated by the following call stacks:
  CPU0                              CPU1
                                    btrfs_finish_ordered_io()
                                      start_transaction(TRANS_JOIN)
                                        join_transaction()
                                          # -EBUSY (Transaction A is
                                          # TRANS_STATE_COMMIT_DOING)
  # Transaction A completes
  # Transaction B created
  # ordered extent added to
  # Transaction B's pending list
  btrfs_commit_transaction()
    # Transaction B enters
    # TRANS_STATE_COMMIT_START
    # waiting for pending ordered
    # extents
                                        wait_current_trans()
                                          # waits for Transaction B
                                          # (should not wait!)

Task bstore_kv_sync in btrfs_commit_transaction waiting for ordered
extents:

  __schedule+0x2e7/0x8a0
  schedule+0x64/0xe0
  btrfs_commit_transaction+0xbf7/0xda0 [btrfs]
  btrfs_sync_file+0x342/0x4d0 [btrfs]
  __x64_sys_fdatasync+0x4b/0x80
  do_syscall_64+0x33/0x40
  entry_SYSCALL_64_after_hwframe+0x44/0xa9

Task kworker in wait_current_trans waiting for transaction commit:

  Workqueue: btrfs-syno_nocow btrfs_work_helper [btrfs]
  __schedule+0x2e7/0x8a0
  schedule+0x64/0xe0
  wait_current_trans+0xb0/0x110 [btrfs]
  start_transaction+0x346/0x5b0 [btrfs]
  btrfs_finish_ordered_io.isra.0+0x49b/0x9c0 [btrfs]
  btrfs_work_helper+0xe8/0x350 [btrfs]
  process_one_work+0x1d3/0x3c0
  worker_thread+0x4d/0x3e0
  kthread+0x12d/0x150
  ret_from_fork+0x1f/0x30

Fix this by passing the transaction type to wait_current_trans() and
checking btrfs_blocked_trans_types[cur_trans-&gt;state] against the given
type before deciding to wait. This ensures that transaction types which
are allowed to join during certain blocked states will not unnecessarily
wait and cause deadlocks.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71194/">CVE-2025-71194 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-71194">CVE-2025-71194 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257687">SUSE bug 1257687</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571195" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71195</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71195" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71195" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71195" ref_url="https://www.suse.com/security/cve/CVE-2025-71195" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dmaengine: xilinx: xdma: Fix regmap max_register

The max_register field is assigned the size of the register memory
region instead of the offset of the last register.
The result is that reading from the regmap via debugfs can cause
a segmentation fault:

tail /sys/kernel/debug/regmap/xdma.1.auto/registers
Unable to handle kernel paging request at virtual address ffff800082f70000
Mem abort info:
  ESR = 0x0000000096000007
  EC = 0x25: DABT (current EL), IL = 32 bits
  SET = 0, FnV = 0
  EA = 0, S1PTW = 0
  FSC = 0x07: level 3 translation fault
[...]
Call trace:
 regmap_mmio_read32le+0x10/0x30
 _regmap_bus_reg_read+0x74/0xc0
 _regmap_read+0x68/0x198
 regmap_read+0x54/0x88
 regmap_read_debugfs+0x140/0x380
 regmap_map_read_file+0x30/0x48
 full_proxy_read+0x68/0xc8
 vfs_read+0xcc/0x310
 ksys_read+0x7c/0x120
 __arm64_sys_read+0x24/0x40
 invoke_syscall.constprop.0+0x64/0x108
 do_el0_svc+0xb0/0xd8
 el0_svc+0x38/0x130
 el0t_64_sync_handler+0x120/0x138
 el0t_64_sync+0x194/0x198
Code: aa1e03e9 d503201f f9400000 8b214000 (b9400000)
---[ end trace 0000000000000000 ]---
note: tail[1217] exited with irqs disabled
note: tail[1217] exited with preempt_count 1
Segmentation fault
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71195/">CVE-2025-71195 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-71195">CVE-2025-71195 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257704">SUSE bug 1257704</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571196" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71196</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71196" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71196" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71196" ref_url="https://www.suse.com/security/cve/CVE-2025-71196" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

phy: stm32-usphyc: Fix off by one in probe()

The "index" variable is used as an index into the usbphyc-&gt;phys[] array
which has usbphyc-&gt;nphys elements.  So if it is equal to usbphyc-&gt;nphys
then it is one element out of bounds.  The "index" comes from the
device tree so it's data that we trust and it's unlikely to be wrong,
however it's obviously still worth fixing the bug.  Change the &gt; to &gt;=.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71196/">CVE-2025-71196 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-71196">CVE-2025-71196 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257716">SUSE bug 1257716</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571197" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71197</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71197" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71197" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71197" ref_url="https://www.suse.com/security/cve/CVE-2025-71197" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

w1: therm: Fix off-by-one buffer overflow in alarms_store

The sysfs buffer passed to alarms_store() is allocated with 'size + 1'
bytes and a NUL terminator is appended. However, the 'size' argument
does not account for this extra byte. The original code then allocated
'size' bytes and used strcpy() to copy 'buf', which always writes one
byte past the allocated buffer since strcpy() copies until the NUL
terminator at index 'size'.

Fix this by parsing the 'buf' parameter directly using simple_strtoll()
without allocating any intermediate memory or string copying. This
removes the overflow while simplifying the code.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-71197/">CVE-2025-71197 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-71197">CVE-2025-71197 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257743">SUSE bug 1257743</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71198</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71198" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71198" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71198" ref_url="https://www.suse.com/security/cve/CVE-2025-71198" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iio: imu: st_lsm6dsx: fix iio_chan_spec for sensors without event detection

The st_lsm6dsx_acc_channels array of struct iio_chan_spec has a non-NULL
event_spec field, indicating support for IIO events. However, event
detection is not supported for all sensors, and if userspace tries to
configure accelerometer wakeup events on a sensor device that does not
support them (e.g. LSM6DS0), st_lsm6dsx_write_event() dereferences a NULL
pointer when trying to write to the wakeup register.
Define an additional struct iio_chan_spec array whose members have a NULL
event_spec field, and use this array instead of st_lsm6dsx_acc_channels for
sensors without event detection capability.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71198/">CVE-2025-71198 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-71198">CVE-2025-71198 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257741">SUSE bug 1257741</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571199" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71199</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71199" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71199" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71199" ref_url="https://www.suse.com/security/cve/CVE-2025-71199" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

iio: adc: at91-sama5d2_adc: Fix potential use-after-free in sama5d2_adc driver

at91_adc_interrupt can call at91_adc_touch_data_handler function
to start the work by schedule_work(&amp;st-&gt;touch_st.workq).

If we remove the module which will call at91_adc_remove to
make cleanup, it will free indio_dev through iio_device_unregister but
quite a bit later. While the work mentioned above will be used. The
sequence of operations that may lead to a UAF bug is as follows:

CPU0                                      CPU1

                                     | at91_adc_workq_handler
at91_adc_remove                      |
iio_device_unregister(indio_dev)     |
//free indio_dev a bit later         |
                                     | iio_push_to_buffers(indio_dev)
                                     | //use indio_dev

Fix it by ensuring that the work is canceled before proceeding with
the cleanup in at91_adc_remove.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71199/">CVE-2025-71199 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-71199">CVE-2025-71199 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257750">SUSE bug 1257750</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571200" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71200</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71200" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71200" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71200" ref_url="https://www.suse.com/security/cve/CVE-2025-71200" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mmc: sdhci-of-dwcmshc: Prevent illegal clock reduction in HS200/HS400 mode

When operating in HS200 or HS400 timing modes, reducing the clock frequency
below 52MHz will lead to link broken as the Rockchip DWC MSHC controller
requires maintaining a minimum clock of 52MHz in these modes.

Add a check to prevent illegal clock reduction through debugfs:

root@debian:/# echo 50000000 &gt; /sys/kernel/debug/mmc0/clock
root@debian:/# [   30.090146] mmc0: running CQE recovery
mmc0: cqhci: Failed to halt
mmc0: cqhci: spurious TCN for tag 0
WARNING: drivers/mmc/host/cqhci-core.c:797 at cqhci_irq+0x254/0x818, CPU#1: kworker/1:0H/24
Modules linked in:
CPU: 1 UID: 0 PID: 24 Comm: kworker/1:0H Not tainted 6.19.0-rc1-00001-g09db0998649d-dirty #204 PREEMPT
Hardware name: Rockchip RK3588 EVB1 V10 Board (DT)
Workqueue: kblockd blk_mq_run_work_fn
pstate: 604000c9 (nZCv daIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : cqhci_irq+0x254/0x818
lr : cqhci_irq+0x254/0x818
...
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71200/">CVE-2025-71200 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71200">CVE-2025-71200 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258222">SUSE bug 1258222</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571222" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71222</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71222" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71222" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71222" ref_url="https://www.suse.com/security/cve/CVE-2025-71222" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: wlcore: ensure skb headroom before skb_push

This avoids occasional skb_under_panic Oops from wl1271_tx_work. In this case, headroom is
less than needed (typically 110 - 94 = 16 bytes).
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71222/">CVE-2025-71222 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71222">CVE-2025-71222 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258279">SUSE bug 1258279</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571224" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71224</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71224" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71224" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71224" ref_url="https://www.suse.com/security/cve/CVE-2025-71224" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mac80211: ocb: skip rx_no_sta when interface is not joined

ieee80211_ocb_rx_no_sta() assumes a valid channel context, which is only
present after JOIN_OCB.

RX may run before JOIN_OCB is executed, in which case the OCB interface
is not operational. Skip RX peer handling when the interface is not
joined to avoid warnings in the RX path.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71224/">CVE-2025-71224 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-71224">CVE-2025-71224 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258824">SUSE bug 1258824</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571225" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71225</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71225" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71225" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71225" ref_url="https://www.suse.com/security/cve/CVE-2025-71225" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

md: suspend array while updating raid_disks via sysfs

In raid1_reshape(), freeze_array() is called before modifying the r1bio
memory pool (conf-&gt;r1bio_pool) and conf-&gt;raid_disks, and
unfreeze_array() is called after the update is completed.

However, freeze_array() only waits until nr_sync_pending and
(nr_pending - nr_queued) of all buckets reaches zero. When an I/O error
occurs, nr_queued is increased and the corresponding r1bio is queued to
either retry_list or bio_end_io_list. As a result, freeze_array() may
unblock before these r1bios are released.

This can lead to a situation where conf-&gt;raid_disks and the mempool have
already been updated while queued r1bios, allocated with the old
raid_disks value, are later released. Consequently, free_r1bio() may
access memory out of bounds in put_all_bios() and release r1bios of the
wrong size to the new mempool, potentially causing issues with the
mempool as well.

Since only normal I/O might increase nr_queued while an I/O error occurs,
suspending the array avoids this issue.

Note: Updating raid_disks via ioctl SET_ARRAY_INFO already suspends
the array. Therefore, we suspend the array when updating raid_disks
via sysfs to avoid this issue too.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71225/">CVE-2025-71225 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71225">CVE-2025-71225 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258411">SUSE bug 1258411</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571229" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71229</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71229" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71229" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71229" ref_url="https://www.suse.com/security/cve/CVE-2025-71229" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: rtw88: Fix alignment fault in rtw_core_enable_beacon()

rtw_core_enable_beacon() reads 4 bytes from an address that is not a
multiple of 4. This results in a crash on some systems.

Do 1 byte reads/writes instead.

Unable to handle kernel paging request at virtual address ffff8000827e0522
Mem abort info:
  ESR = 0x0000000096000021
  EC = 0x25: DABT (current EL), IL = 32 bits
  SET = 0, FnV = 0
  EA = 0, S1PTW = 0
  FSC = 0x21: alignment fault
Data abort info:
  ISV = 0, ISS = 0x00000021, ISS2 = 0x00000000
  CM = 0, WnR = 0, TnD = 0, TagAccess = 0
  GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0
swapper pgtable: 4k pages, 48-bit VAs, pgdp=0000000005492000
[ffff8000827e0522] pgd=0000000000000000, p4d=10000001021d9403, pud=10000001021da403, pmd=100000011061c403, pte=00780000f3200f13
Internal error: Oops: 0000000096000021 [#1]  SMP
Modules linked in: [...] rtw88_8822ce rtw88_8822c rtw88_pci rtw88_core [...]
CPU: 0 UID: 0 PID: 73 Comm: kworker/u32:2 Tainted: G        W           6.17.9 #1-NixOS VOLUNTARY
Tainted: [W]=WARN
Hardware name: FriendlyElec NanoPC-T6 LTS (DT)
Workqueue: phy0 rtw_c2h_work [rtw88_core]
pstate: 60400009 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
pc : rtw_pci_read32+0x18/0x40 [rtw88_pci]
lr : rtw_core_enable_beacon+0xe0/0x148 [rtw88_core]
sp : ffff800080cc3ca0
x29: ffff800080cc3ca0 x28: ffff0001031fc240 x27: ffff000102100828
x26: ffffd2cb7c9b4088 x25: ffff0001031fc2c0 x24: ffff000112fdef00
x23: ffff000112fdef18 x22: ffff000111c29970 x21: 0000000000000001
x20: 0000000000000001 x19: ffff000111c22040 x18: 0000000000000000
x17: 0000000000000000 x16: 0000000000000000 x15: 0000000000000000
x14: 0000000000000000 x13: 0000000000000000 x12: 0000000000000000
x11: 0000000000000000 x10: 0000000000000000 x9 : ffffd2cb6507c090
x8 : 0000000000000000 x7 : 0000000000000000 x6 : 0000000000000000
x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000000
x2 : 0000000000007f10 x1 : 0000000000000522 x0 : ffff8000827e0522
Call trace:
 rtw_pci_read32+0x18/0x40 [rtw88_pci] (P)
 rtw_hw_scan_chan_switch+0x124/0x1a8 [rtw88_core]
 rtw_fw_c2h_cmd_handle+0x254/0x290 [rtw88_core]
 rtw_c2h_work+0x50/0x98 [rtw88_core]
 process_one_work+0x178/0x3f8
 worker_thread+0x208/0x418
 kthread+0x120/0x220
 ret_from_fork+0x10/0x20
Code: d28fe202 8b020000 f9524400 8b214000 (b9400000)
---[ end trace 0000000000000000 ]---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71229/">CVE-2025-71229 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71229">CVE-2025-71229 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258415">SUSE bug 1258415</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71231</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71231" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71231" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71231" ref_url="https://www.suse.com/security/cve/CVE-2025-71231" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: iaa - Fix out-of-bounds index in find_empty_iaa_compression_mode

The local variable 'i' is initialized with -EINVAL, but the for loop
immediately overwrites it and -EINVAL is never returned.

If no empty compression mode can be found, the function would return the
out-of-bounds index IAA_COMP_MODES_MAX, which would cause an invalid
array access in add_iaa_compression_mode().

Fix both issues by returning either a valid index or -EINVAL.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-08"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71231/">CVE-2025-71231 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71231">CVE-2025-71231 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258424">SUSE bug 1258424</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258425">SUSE bug 1258425</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71232</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71232" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71232" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71232" ref_url="https://www.suse.com/security/cve/CVE-2025-71232" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: qla2xxx: Free sp in error path to fix system crash

System crash seen during load/unload test in a loop,

[61110.449331] qla2xxx [0000:27:00.0]-0042:0: Disabled MSI-X.
[61110.467494] =============================================================================
[61110.467498] BUG qla2xxx_srbs (Tainted: G           OE    --------  --- ): Objects remaining in qla2xxx_srbs on __kmem_cache_shutdown()
[61110.467501] -----------------------------------------------------------------------------

[61110.467502] Slab 0x000000000ffc8162 objects=51 used=1 fp=0x00000000e25d3d85 flags=0x57ffffc0010200(slab|head|node=1|zone=2|lastcpupid=0x1fffff)
[61110.467509] CPU: 53 PID: 455206 Comm: rmmod Kdump: loaded Tainted: G           OE    --------  ---  5.14.0-284.11.1.el9_2.x86_64 #1
[61110.467513] Hardware name: HPE ProLiant DL385 Gen10 Plus v2/ProLiant DL385 Gen10 Plus v2, BIOS A42 08/17/2023
[61110.467515] Call Trace:
[61110.467516]  &lt;TASK&gt;
[61110.467519]  dump_stack_lvl+0x34/0x48
[61110.467526]  slab_err.cold+0x53/0x67
[61110.467534]  __kmem_cache_shutdown+0x16e/0x320
[61110.467540]  kmem_cache_destroy+0x51/0x160
[61110.467544]  qla2x00_module_exit+0x93/0x99 [qla2xxx]
[61110.467607]  ? __do_sys_delete_module.constprop.0+0x178/0x280
[61110.467613]  ? syscall_trace_enter.constprop.0+0x145/0x1d0
[61110.467616]  ? do_syscall_64+0x5c/0x90
[61110.467619]  ? exc_page_fault+0x62/0x150
[61110.467622]  ? entry_SYSCALL_64_after_hwframe+0x63/0xcd
[61110.467626]  &lt;/TASK&gt;
[61110.467627] Disabling lock debugging due to kernel taint
[61110.467635] Object 0x0000000026f7e6e6 @offset=16000
[61110.467639] ------------[ cut here ]------------
[61110.467639] kmem_cache_destroy qla2xxx_srbs: Slab cache still has objects when called from qla2x00_module_exit+0x93/0x99 [qla2xxx]
[61110.467659] WARNING: CPU: 53 PID: 455206 at mm/slab_common.c:520 kmem_cache_destroy+0x14d/0x160
[61110.467718] CPU: 53 PID: 455206 Comm: rmmod Kdump: loaded Tainted: G    B      OE    --------  ---  5.14.0-284.11.1.el9_2.x86_64 #1
[61110.467720] Hardware name: HPE ProLiant DL385 Gen10 Plus v2/ProLiant DL385 Gen10 Plus v2, BIOS A42 08/17/2023
[61110.467721] RIP: 0010:kmem_cache_destroy+0x14d/0x160
[61110.467724] Code: 99 7d 07 00 48 89 ef e8 e1 6a 07 00 eb b3 48 8b 55 60 48 8b 4c 24 20 48 c7 c6 70 fc 66 90 48 c7 c7 f8 ef a1 90 e8 e1 ed 7c 00 &lt;0f&gt; 0b eb 93 c3 cc cc cc cc 66 2e 0f 1f 84 00 00 00 00 00 55 48 89
[61110.467725] RSP: 0018:ffffa304e489fe80 EFLAGS: 00010282
[61110.467727] RAX: 0000000000000000 RBX: ffffffffc0d9a860 RCX: 0000000000000027
[61110.467729] RDX: ffff8fd5ff9598a8 RSI: 0000000000000001 RDI: ffff8fd5ff9598a0
[61110.467730] RBP: ffff8fb6aaf78700 R08: 0000000000000000 R09: 0000000100d863b7
[61110.467731] R10: ffffa304e489fd20 R11: ffffffff913bef48 R12: 0000000040002000
[61110.467731] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000
[61110.467733] FS:  00007f64c89fb740(0000) GS:ffff8fd5ff940000(0000) knlGS:0000000000000000
[61110.467734] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[61110.467735] CR2: 00007f0f02bfe000 CR3: 00000020ad6dc005 CR4: 0000000000770ee0
[61110.467736] PKRU: 55555554
[61110.467737] Call Trace:
[61110.467738]  &lt;TASK&gt;
[61110.467739]  qla2x00_module_exit+0x93/0x99 [qla2xxx]
[61110.467755]  ? __do_sys_delete_module.constprop.0+0x178/0x280

Free sp in the error path to fix the crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71232/">CVE-2025-71232 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71232">CVE-2025-71232 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258422">SUSE bug 1258422</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571233" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71233</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71233" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71233" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71233" ref_url="https://www.suse.com/security/cve/CVE-2025-71233" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

PCI: endpoint: Avoid creating sub-groups asynchronously

The asynchronous creation of sub-groups by a delayed work could lead to a
NULL pointer dereference when the driver directory is removed before the
work completes.

The crash can be easily reproduced with the following commands:

  # cd /sys/kernel/config/pci_ep/functions/pci_epf_test
  # for i in {1..20}; do mkdir test &amp;&amp; rmdir test; done

  BUG: kernel NULL pointer dereference, address: 0000000000000088
  ...
  Call Trace:
   configfs_register_group+0x3d/0x190
   pci_epf_cfs_work+0x41/0x110
   process_one_work+0x18f/0x350
   worker_thread+0x25a/0x3a0

Fix this issue by using configfs_add_default_group() API which does not
have the deadlock problem as configfs_register_group() and does not require
the delayed work handler.

[mani: slightly reworded the description and added stable list]
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71233/">CVE-2025-71233 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71233">CVE-2025-71233 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258421">SUSE bug 1258421</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571234" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71234</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71234" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71234" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71234" ref_url="https://www.suse.com/security/cve/CVE-2025-71234" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: rtl8xxxu: fix slab-out-of-bounds in rtl8xxxu_sta_add

The driver does not set hw-&gt;sta_data_size, which causes mac80211 to
allocate insufficient space for driver private station data in
__sta_info_alloc(). When rtl8xxxu_sta_add() accesses members of
struct rtl8xxxu_sta_info through sta-&gt;drv_priv, this results in a
slab-out-of-bounds write.

KASAN report on RISC-V (VisionFive 2) with RTL8192EU adapter:

  BUG: KASAN: slab-out-of-bounds in rtl8xxxu_sta_add+0x31c/0x346
  Write of size 8 at addr ffffffd6d3e9ae88 by task kworker/u16:0/12

Set hw-&gt;sta_data_size to sizeof(struct rtl8xxxu_sta_info) during
probe, similar to how hw-&gt;vif_data_size is configured. This ensures
mac80211 allocates sufficient space for the driver's per-station
private data.

Tested on StarFive VisionFive 2 v1.2A board.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:A/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71234/">CVE-2025-71234 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71234">CVE-2025-71234 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258419">SUSE bug 1258419</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258420">SUSE bug 1258420</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571235" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71235</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71235" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71235" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71235" ref_url="https://www.suse.com/security/cve/CVE-2025-71235" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: qla2xxx: Delay module unload while fabric scan in progress

System crash seen during load/unload test in a loop.

[105954.384919] RBP: ffff914589838dc0 R08: 0000000000000000 R09: 0000000000000086
[105954.384920] R10: 000000000000000f R11: ffffa31240904be5 R12: ffff914605f868e0
[105954.384921] R13: ffff914605f86910 R14: 0000000000008010 R15: 00000000ddb7c000
[105954.384923] FS:  0000000000000000(0000) GS:ffff9163fec40000(0000) knlGS:0000000000000000
[105954.384925] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[105954.384926] CR2: 000055d31ce1d6a0 CR3: 0000000119f5e001 CR4: 0000000000770ee0
[105954.384928] PKRU: 55555554
[105954.384929] Call Trace:
[105954.384931]  &lt;IRQ&gt;
[105954.384934]  qla24xx_sp_unmap+0x1f3/0x2a0 [qla2xxx]
[105954.384962]  ? qla_async_scan_sp_done+0x114/0x1f0 [qla2xxx]
[105954.384980]  ? qla24xx_els_ct_entry+0x4de/0x760 [qla2xxx]
[105954.384999]  ? __wake_up_common+0x80/0x190
[105954.385004]  ? qla24xx_process_response_queue+0xc2/0xaa0 [qla2xxx]
[105954.385023]  ? qla24xx_msix_rsp_q+0x44/0xb0 [qla2xxx]
[105954.385040]  ? __handle_irq_event_percpu+0x3d/0x190
[105954.385044]  ? handle_irq_event+0x58/0xb0
[105954.385046]  ? handle_edge_irq+0x93/0x240
[105954.385050]  ? __common_interrupt+0x41/0xa0
[105954.385055]  ? common_interrupt+0x3e/0xa0
[105954.385060]  ? asm_common_interrupt+0x22/0x40

The root cause of this was that there was a free (dma_free_attrs) in the
interrupt context.  There was a device discovery/fabric scan in
progress.  A module unload was issued which set the UNLOADING flag.  As
part of the discovery, after receiving an interrupt a work queue was
scheduled (which involved a work to be queued).  Since the UNLOADING
flag is set, the work item was not allocated and the mapped memory had
to be freed.  The free occurred in interrupt context leading to system
crash.  Delay the driver unload until the fabric scan is complete to
avoid the crash.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71235/">CVE-2025-71235 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71235">CVE-2025-71235 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258469">SUSE bug 1258469</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571236" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71236</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71236" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71236" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71236" ref_url="https://www.suse.com/security/cve/CVE-2025-71236" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: qla2xxx: Validate sp before freeing associated memory

System crash with the following signature
[154563.214890] nvme nvme2: NVME-FC{1}: controller connect complete
[154564.169363] qla2xxx [0000:b0:00.1]-3002:2: nvme: Sched: Set ZIO exchange threshold to 3.
[154564.169405] qla2xxx [0000:b0:00.1]-ffffff:2: SET ZIO Activity exchange threshold to 5.
[154565.539974] qla2xxx [0000:b0:00.1]-5013:2: RSCN database changed - 0078 0080 0000.
[154565.545744] qla2xxx [0000:b0:00.1]-5013:2: RSCN database changed - 0078 00a0 0000.
[154565.545857] qla2xxx [0000:b0:00.1]-11a2:2: FEC=enabled (data rate).
[154565.552760] qla2xxx [0000:b0:00.1]-11a2:2: FEC=enabled (data rate).
[154565.553079] BUG: kernel NULL pointer dereference, address: 00000000000000f8
[154565.553080] #PF: supervisor read access in kernel mode
[154565.553082] #PF: error_code(0x0000) - not-present page
[154565.553084] PGD 80000010488ab067 P4D 80000010488ab067 PUD 104978a067 PMD 0
[154565.553089] Oops: 0000 1 PREEMPT SMP PTI
[154565.553092] CPU: 10 PID: 858 Comm: qla2xxx_2_dpc Kdump: loaded Tainted: G           OE     -------  ---  5.14.0-503.11.1.el9_5.x86_64 #1
[154565.553096] Hardware name: HPE Synergy 660 Gen10/Synergy 660 Gen10 Compute Module, BIOS I43 09/30/2024
[154565.553097] RIP: 0010:qla_fab_async_scan.part.0+0x40b/0x870 [qla2xxx]
[154565.553141] Code: 00 00 e8 58 a3 ec d4 49 89 e9 ba 12 20 00 00 4c 89 e6 49 c7 c0 00 ee a8 c0 48 c7 c1 66 c0 a9 c0 bf 00 80 00 10 e8 15 69 00 00 &lt;4c&gt; 8b 8d f8 00 00 00 4d 85 c9 74 35 49 8b 84 24 00 19 00 00 48 8b
[154565.553143] RSP: 0018:ffffb4dbc8aebdd0 EFLAGS: 00010286
[154565.553145] RAX: 0000000000000000 RBX: ffff8ec2cf0908d0 RCX: 0000000000000002
[154565.553147] RDX: 0000000000000000 RSI: ffffffffc0a9c896 RDI: ffffb4dbc8aebd47
[154565.553148] RBP: 0000000000000000 R08: ffffb4dbc8aebd45 R09: 0000000000ffff0a
[154565.553150] R10: 0000000000000000 R11: 000000000000000f R12: ffff8ec2cf0908d0
[154565.553151] R13: ffff8ec2cf090900 R14: 0000000000000102 R15: ffff8ec2cf084000
[154565.553152] FS:  0000000000000000(0000) GS:ffff8ed27f800000(0000) knlGS:0000000000000000
[154565.553154] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[154565.553155] CR2: 00000000000000f8 CR3: 000000113ae0a005 CR4: 00000000007706f0
[154565.553157] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[154565.553158] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[154565.553159] PKRU: 55555554
[154565.553160] Call Trace:
[154565.553162]  &lt;TASK&gt;
[154565.553165]  ? show_trace_log_lvl+0x1c4/0x2df
[154565.553172]  ? show_trace_log_lvl+0x1c4/0x2df
[154565.553177]  ? qla_fab_async_scan.part.0+0x40b/0x870 [qla2xxx]
[154565.553215]  ? __die_body.cold+0x8/0xd
[154565.553218]  ? page_fault_oops+0x134/0x170
[154565.553223]  ? snprintf+0x49/0x70
[154565.553229]  ? exc_page_fault+0x62/0x150
[154565.553238]  ? asm_exc_page_fault+0x22/0x30

Check for sp being non NULL before freeing any associated memory
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.1/CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-71236/">CVE-2025-71236 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71236">CVE-2025-71236 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258442">SUSE bug 1258442</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202571264" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-71264</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-71264" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-71264" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-71264" ref_url="https://www.suse.com/security/cve/CVE-2025-71264" source="SUSE CVE"/>
    <description>
    Mumble before 1.6.870 is prone to an out-of-bounds array access, which may result in denial of service (client crash).
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-25"/>
	<updated date="2026-04-05"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-71264/">CVE-2025-71264 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2025-71264">CVE-2025-71264 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259721">SUSE bug 1259721</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050216" comment="mumble-1.5.857-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260552" comment="mumble is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050217" comment="mumble-server-1.5.857-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009260556" comment="mumble-server is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20257345" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-7345</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-7345" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-7345" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-7345" ref_url="https://www.suse.com/security/cve/CVE-2025-7345" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:12841" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001903.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:13315" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001884.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02954-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041329.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02963-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03010-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03373-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041867.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20694-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041760.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20748-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20128-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043744.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20156-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023946.html" source="SUSE-SU"/>
    <description>
    A flaw exists in gdk-pixbuf within the gdk_pixbuf__jpeg_image_load_increment function (io-jpeg.c) and in glib's g_base64_encode_step (glib/gbase64.c). When processing maliciously crafted JPEG images, a heap buffer overflow can occur during Base64 encoding, allowing out-of-bounds reads from heap memory, potentially causing application crashes or arbitrary code execution.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-25"/>
	<updated date="2026-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-7345/">CVE-2025-7345 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-7345">CVE-2025-7345 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246114">SUSE bug 1246114</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039693" comment="gdk-pixbuf-devel-2.42.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151614" comment="gdk-pixbuf-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039694" comment="gdk-pixbuf-lang-2.42.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151615" comment="gdk-pixbuf-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039695" comment="gdk-pixbuf-query-loaders-2.42.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151616" comment="gdk-pixbuf-query-loaders is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039696" comment="gdk-pixbuf-thumbnailer-2.42.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177170" comment="gdk-pixbuf-thumbnailer is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039697" comment="libgdk_pixbuf-2_0-0-2.42.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151618" comment="libgdk_pixbuf-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039698" comment="typelib-1_0-GdkPixbuf-2_0-2.42.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151620" comment="typelib-1_0-GdkPixbuf-2_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039699" comment="typelib-1_0-GdkPixdata-2_0-2.42.12-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342391" comment="typelib-1_0-GdkPixdata-2_0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20257545" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-7545</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-7545" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-7545" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-7545" ref_url="https://www.suse.com/security/cve/CVE-2025-7545" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023286.html" source="SUSE-SU"/>
    <description>
    A vulnerability classified as problematic was found in GNU Binutils 2.45. Affected by this vulnerability is the function copy_section of the file binutils/objcopy.c. The manipulation leads to heap-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The patch is named 08c3cbe5926e4d355b5cb70bbec2b1eeb40c2944. It is recommended to apply a patch to fix this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-13"/>
	<updated date="2025-12-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-7545/">CVE-2025-7545 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-7545">CVE-2025-7545 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246481">SUSE bug 1246481</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033339" comment="binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033340" comment="binutils-devel-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033444" comment="bpftool-7.5.0-160000.2.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009955992" comment="bpftool is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033445" comment="bpftool-bash-completion-7.5.0-160000.2.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033375" comment="bpftool-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033343" comment="cross-aarch64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167594" comment="cross-aarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033344" comment="cross-arm-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167596" comment="cross-arm-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033345" comment="cross-avr-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167598" comment="cross-avr-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033346" comment="cross-bpf-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010029579" comment="cross-bpf-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033347" comment="cross-epiphany-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238034" comment="cross-epiphany-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033348" comment="cross-hppa-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167600" comment="cross-hppa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033349" comment="cross-hppa64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167602" comment="cross-hppa64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033350" comment="cross-i386-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167604" comment="cross-i386-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033351" comment="cross-ia64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167606" comment="cross-ia64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033352" comment="cross-loongarch64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033376" comment="cross-loongarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033353" comment="cross-m68k-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167608" comment="cross-m68k-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033354" comment="cross-mips-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167610" comment="cross-mips-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033355" comment="cross-ppc-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167612" comment="cross-ppc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033356" comment="cross-ppc64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167614" comment="cross-ppc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033357" comment="cross-ppc64le-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167616" comment="cross-ppc64le-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033358" comment="cross-pru-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010029580" comment="cross-pru-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033359" comment="cross-riscv64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238035" comment="cross-riscv64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033360" comment="cross-rx-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238036" comment="cross-rx-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033361" comment="cross-s390-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167618" comment="cross-s390-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033362" comment="cross-s390x-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167620" comment="cross-s390x-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033363" comment="cross-sparc-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167622" comment="cross-sparc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033364" comment="cross-sparc64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167624" comment="cross-sparc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033365" comment="cross-spu-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167626" comment="cross-spu-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033366" comment="cross-x86_64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167628" comment="cross-x86_64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033367" comment="cross-xtensa-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297932" comment="cross-xtensa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033368" comment="gprofng-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033377" comment="gprofng is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033369" comment="libctf-nobfd0-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297779" comment="libctf-nobfd0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033370" comment="libctf0-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297780" comment="libctf0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20257546" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-7546</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-7546" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-7546" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-7546" ref_url="https://www.suse.com/security/cve/CVE-2025-7546" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023286.html" source="SUSE-SU"/>
    <description>
    A vulnerability, which was classified as problematic, has been found in GNU Binutils 2.45. Affected by this issue is the function bfd_elf_set_group_contents of the file bfd/elf.c. The manipulation leads to out-of-bounds write. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The name of the patch is 41461010eb7c79fee7a9d5f6209accdaac66cc6b. It is recommended to apply a patch to fix this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-13"/>
	<updated date="2025-12-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-7546/">CVE-2025-7546 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-7546">CVE-2025-7546 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246485">SUSE bug 1246485</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033339" comment="binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033340" comment="binutils-devel-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033444" comment="bpftool-7.5.0-160000.2.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009955992" comment="bpftool is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033445" comment="bpftool-bash-completion-7.5.0-160000.2.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033375" comment="bpftool-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033343" comment="cross-aarch64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167594" comment="cross-aarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033344" comment="cross-arm-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167596" comment="cross-arm-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033345" comment="cross-avr-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167598" comment="cross-avr-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033346" comment="cross-bpf-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010029579" comment="cross-bpf-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033347" comment="cross-epiphany-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238034" comment="cross-epiphany-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033348" comment="cross-hppa-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167600" comment="cross-hppa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033349" comment="cross-hppa64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167602" comment="cross-hppa64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033350" comment="cross-i386-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167604" comment="cross-i386-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033351" comment="cross-ia64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167606" comment="cross-ia64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033352" comment="cross-loongarch64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033376" comment="cross-loongarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033353" comment="cross-m68k-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167608" comment="cross-m68k-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033354" comment="cross-mips-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167610" comment="cross-mips-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033355" comment="cross-ppc-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167612" comment="cross-ppc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033356" comment="cross-ppc64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167614" comment="cross-ppc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033357" comment="cross-ppc64le-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167616" comment="cross-ppc64le-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033358" comment="cross-pru-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010029580" comment="cross-pru-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033359" comment="cross-riscv64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238035" comment="cross-riscv64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033360" comment="cross-rx-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238036" comment="cross-rx-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033361" comment="cross-s390-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167618" comment="cross-s390-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033362" comment="cross-s390x-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167620" comment="cross-s390x-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033363" comment="cross-sparc-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167622" comment="cross-sparc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033364" comment="cross-sparc64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167624" comment="cross-sparc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033365" comment="cross-spu-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167626" comment="cross-spu-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033366" comment="cross-x86_64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167628" comment="cross-x86_64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033367" comment="cross-xtensa-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297932" comment="cross-xtensa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033368" comment="gprofng-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033377" comment="gprofng is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033369" comment="libctf-nobfd0-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297779" comment="libctf-nobfd0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033370" comment="libctf0-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297780" comment="libctf0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20257700" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-7700</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-7700" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-7700" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-7700" ref_url="https://www.suse.com/security/cve/CVE-2025-7700" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02972-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041348.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02990-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03162-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:2990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3715-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022963.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20932-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045220.html" source="SUSE-SU"/>
    <description>
    A flaw was found in FFmpeg's ALS audio decoder, where it does not properly check for memory allocation failures. This can cause the application to crash when processing certain malformed audio files. While it does not lead to data theft or system control, it can be used to disrupt services and cause a denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-7700/">CVE-2025-7700 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-7700">CVE-2025-7700 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246790">SUSE bug 1246790</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051876" comment="ffmpeg-7-7.1.2-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010051920" comment="ffmpeg-7 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051877" comment="ffmpeg-7-libavcodec-devel-7.1.2-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010051921" comment="ffmpeg-7-libavcodec-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051878" comment="ffmpeg-7-libavdevice-devel-7.1.2-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010051922" comment="ffmpeg-7-libavdevice-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051879" comment="ffmpeg-7-libavfilter-devel-7.1.2-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010051923" comment="ffmpeg-7-libavfilter-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051880" comment="ffmpeg-7-libavformat-devel-7.1.2-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010051924" comment="ffmpeg-7-libavformat-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051881" comment="ffmpeg-7-libavutil-devel-7.1.2-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010051925" comment="ffmpeg-7-libavutil-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051882" comment="ffmpeg-7-libpostproc-devel-7.1.2-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010051926" comment="ffmpeg-7-libpostproc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051883" comment="ffmpeg-7-libswresample-devel-7.1.2-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010051927" comment="ffmpeg-7-libswresample-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051884" comment="ffmpeg-7-libswscale-devel-7.1.2-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010051928" comment="ffmpeg-7-libswscale-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051885" comment="libavcodec61-7.1.2-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010051929" comment="libavcodec61 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051886" comment="libavdevice61-7.1.2-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010051930" comment="libavdevice61 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051887" comment="libavfilter10-7.1.2-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010051931" comment="libavfilter10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051888" comment="libavformat61-7.1.2-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010051932" comment="libavformat61 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051889" comment="libavutil59-7.1.2-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010051933" comment="libavutil59 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051890" comment="libpostproc58-7.1.2-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010051934" comment="libpostproc58 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051891" comment="libswresample5-7.1.2-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010051935" comment="libswresample5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051892" comment="libswscale8-7.1.2-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010051936" comment="libswscale8 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20258027" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-8027</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-8027" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8027" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-8027" ref_url="https://www.suse.com/security/cve/CVE-2025-8027" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:11747" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001836.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:11748" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001834.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:12187" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001857.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:13676" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02529-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02531-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02546-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023500.html" source="SUSE-SU"/>
    <description>
    On 64-bit platforms IonMonkey-JIT only wrote 32 bits of the 64-bit return value space on the stack. Baseline-JIT, however, read the entire 64 bits. This vulnerability was fixed in Firefox 141, Firefox ESR 115.26, Firefox ESR 128.13, Firefox ESR 140.1, Thunderbird 141, Thunderbird 128.13, and Thunderbird 140.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-05"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L" cvss4="7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8027/">CVE-2025-8027 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8027">CVE-2025-8027 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246664">SUSE bug 1246664</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032507" comment="libmozjs-128-0-128.14.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032510" comment="libmozjs-128-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032508" comment="mozjs128-128.14.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032511" comment="mozjs128 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032509" comment="mozjs128-devel-128.14.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032512" comment="mozjs128-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20258028" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-8028</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-8028" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8028" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-8028" ref_url="https://www.suse.com/security/cve/CVE-2025-8028" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:11747" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001836.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:11748" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001834.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:12187" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001857.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:13676" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02529-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02531-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02546-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023500.html" source="SUSE-SU"/>
    <description>
    On arm64, a WASM `br_table` instruction with a lot of entries could lead to the label being too far from the instruction causing truncation and incorrect computation of the branch address. This vulnerability was fixed in Firefox 141, Firefox ESR 115.26, Firefox ESR 128.13, Firefox ESR 140.1, Thunderbird 141, Thunderbird 128.13, and Thunderbird 140.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-05"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L" cvss4="7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8028/">CVE-2025-8028 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8028">CVE-2025-8028 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246664">SUSE bug 1246664</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032507" comment="libmozjs-128-0-128.14.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032510" comment="libmozjs-128-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032508" comment="mozjs128-128.14.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032511" comment="mozjs128 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032509" comment="mozjs128-devel-128.14.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032512" comment="mozjs128-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20258029" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-8029</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-8029" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8029" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-8029" ref_url="https://www.suse.com/security/cve/CVE-2025-8029" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:11747" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001836.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:11748" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001834.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:12187" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001857.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:13676" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02529-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02531-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02546-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023500.html" source="SUSE-SU"/>
    <description>
    Thunderbird executed `javascript:` URLs when used in `object` and `embed` tags. This vulnerability was fixed in Firefox 141, Firefox ESR 128.13, Firefox ESR 140.1, Thunderbird 141, Thunderbird 128.13, and Thunderbird 140.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-05"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="2.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8029/">CVE-2025-8029 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8029">CVE-2025-8029 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246664">SUSE bug 1246664</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032507" comment="libmozjs-128-0-128.14.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032510" comment="libmozjs-128-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032508" comment="mozjs128-128.14.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032511" comment="mozjs128 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032509" comment="mozjs128-devel-128.14.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032512" comment="mozjs128-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20258030" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-8030</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-8030" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8030" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-8030" ref_url="https://www.suse.com/security/cve/CVE-2025-8030" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:11747" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001836.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:11748" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001834.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:12187" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001857.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:13676" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02529-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02531-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02546-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023500.html" source="SUSE-SU"/>
    <description>
    Insufficient escaping in the “Copy as cURL” feature could potentially be used to trick a user into executing unexpected code. This vulnerability was fixed in Firefox 141, Firefox ESR 128.13, Firefox ESR 140.1, Thunderbird 141, Thunderbird 128.13, and Thunderbird 140.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-05"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8030/">CVE-2025-8030 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8030">CVE-2025-8030 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246664">SUSE bug 1246664</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032507" comment="libmozjs-128-0-128.14.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032510" comment="libmozjs-128-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032508" comment="mozjs128-128.14.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032511" comment="mozjs128 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032509" comment="mozjs128-devel-128.14.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032512" comment="mozjs128-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20258031" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-8031</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-8031" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8031" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-8031" ref_url="https://www.suse.com/security/cve/CVE-2025-8031" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:11747" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001836.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:11748" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001834.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:12187" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001857.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:13676" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02529-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02531-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02546-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023500.html" source="SUSE-SU"/>
    <description>
    The `username:password` part was not correctly stripped from URLs in CSP reports potentially leaking HTTP Basic Authentication credentials. This vulnerability was fixed in Firefox 141, Firefox ESR 128.13, Firefox ESR 140.1, Thunderbird 141, Thunderbird 128.13, and Thunderbird 140.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-05"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8031/">CVE-2025-8031 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8031">CVE-2025-8031 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246664">SUSE bug 1246664</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032507" comment="libmozjs-128-0-128.14.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032510" comment="libmozjs-128-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032508" comment="mozjs128-128.14.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032511" comment="mozjs128 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032509" comment="mozjs128-devel-128.14.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032512" comment="mozjs128-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20258032" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-8032</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-8032" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8032" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-8032" ref_url="https://www.suse.com/security/cve/CVE-2025-8032" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:11747" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001836.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:11748" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001834.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:12187" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001857.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:13676" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02529-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02531-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02546-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023500.html" source="SUSE-SU"/>
    <description>
    XSLT document loading did not correctly propagate the source document which bypassed its CSP. This vulnerability was fixed in Firefox 141, Firefox ESR 128.13, Firefox ESR 140.1, Thunderbird 141, Thunderbird 128.13, and Thunderbird 140.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-05"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8032/">CVE-2025-8032 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8032">CVE-2025-8032 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246664">SUSE bug 1246664</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032507" comment="libmozjs-128-0-128.14.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032510" comment="libmozjs-128-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032508" comment="mozjs128-128.14.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032511" comment="mozjs128 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032509" comment="mozjs128-devel-128.14.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032512" comment="mozjs128-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20258033" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-8033</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-8033" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8033" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-8033" ref_url="https://www.suse.com/security/cve/CVE-2025-8033" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:11747" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001836.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:11748" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001834.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:12187" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001857.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:13676" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02529-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02531-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02546-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023500.html" source="SUSE-SU"/>
    <description>
    The JavaScript engine did not handle closed generators correctly and it was possible to resume them leading to a nullptr deref. This vulnerability was fixed in Firefox 141, Firefox ESR 115.26, Firefox ESR 128.13, Firefox ESR 140.1, Thunderbird 141, Thunderbird 128.13, and Thunderbird 140.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-05"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8033/">CVE-2025-8033 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8033">CVE-2025-8033 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246664">SUSE bug 1246664</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032507" comment="libmozjs-128-0-128.14.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032510" comment="libmozjs-128-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032508" comment="mozjs128-128.14.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032511" comment="mozjs128 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032509" comment="mozjs128-devel-128.14.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032512" comment="mozjs128-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20258034" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-8034</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-8034" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8034" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-8034" ref_url="https://www.suse.com/security/cve/CVE-2025-8034" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:11747" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001836.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:11748" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001834.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:12187" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001857.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:13676" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02529-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02531-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02546-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023500.html" source="SUSE-SU"/>
    <description>
    Memory safety bugs present in Firefox ESR 115.25, Firefox ESR 128.12, Thunderbird ESR 128.12, Firefox ESR 140.0, Thunderbird ESR 140.0, Firefox 140 and Thunderbird 140. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability was fixed in Firefox 141, Firefox ESR 115.26, Firefox ESR 128.13, Firefox ESR 140.1, Thunderbird 141, Thunderbird 128.13, and Thunderbird 140.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-05"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8034/">CVE-2025-8034 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8034">CVE-2025-8034 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246664">SUSE bug 1246664</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032507" comment="libmozjs-128-0-128.14.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032510" comment="libmozjs-128-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032508" comment="mozjs128-128.14.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032511" comment="mozjs128 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032509" comment="mozjs128-devel-128.14.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032512" comment="mozjs128-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20258035" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-8035</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-8035" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8035" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-8035" ref_url="https://www.suse.com/security/cve/CVE-2025-8035" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:11747" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001836.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:11748" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001834.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:12187" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001857.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:13676" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001914.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02529-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040938.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02531-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040939.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02546-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-July/040955.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023500.html" source="SUSE-SU"/>
    <description>
    Memory safety bugs present in Firefox ESR 128.12, Thunderbird ESR 128.12, Firefox ESR 140.0, Thunderbird ESR 140.0, Firefox 140 and Thunderbird 140. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability was fixed in Firefox 141, Firefox ESR 128.13, Firefox ESR 140.1, Thunderbird 141, Thunderbird 128.13, and Thunderbird 140.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-05"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8035/">CVE-2025-8035 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8035">CVE-2025-8035 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1246664">SUSE bug 1246664</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032507" comment="libmozjs-128-0-128.14.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032510" comment="libmozjs-128-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032508" comment="mozjs128-128.14.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032511" comment="mozjs128 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032509" comment="mozjs128-devel-128.14.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032512" comment="mozjs128-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20258067" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-8067</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-8067" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8067" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-8067" ref_url="https://www.suse.com/security/cve/CVE-2025-8067" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:15017" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001975.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:15018" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03015-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03016-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03017-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20718-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041932.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20801-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20206-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024073.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the Udisks daemon, where it allows unprivileged users to create loop devices using the D-BUS system. This is achieved via the loop device handler, which handles requests sent through the D-BUS interface. As two of the parameters of this handle, it receives the file descriptor list and index specifying the file where the loop device should be backed. The function itself validates the index value to ensure it isn't bigger than the maximum value allowed. However, it fails to validate the lower bound, allowing the index parameter to be a negative value. Under these circumstances, an attacker can cause the UDisks daemon to crash or perform a local privilege escalation by gaining access to files owned by privileged users.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-02-06"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2025-8067/">CVE-2025-8067 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8067">CVE-2025-8067 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248502">SUSE bug 1248502</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041463" comment="libudisks2-0-2.10.1-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152050" comment="libudisks2-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041464" comment="libudisks2-0-devel-2.10.1-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698124" comment="libudisks2-0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041465" comment="libudisks2-0_btrfs-2.10.1-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009695655" comment="libudisks2-0_btrfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041466" comment="libudisks2-0_lsm-2.10.1-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698126" comment="libudisks2-0_lsm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041467" comment="libudisks2-0_lvm2-2.10.1-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698127" comment="libudisks2-0_lvm2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041468" comment="typelib-1_0-UDisks-2_0-2.10.1-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238131" comment="typelib-1_0-UDisks-2_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041469" comment="udisks2-2.10.1-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152051" comment="udisks2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041470" comment="udisks2-bash-completion-2.10.1-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041636" comment="udisks2-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041471" comment="udisks2-docs-2.10.1-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041637" comment="udisks2-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041472" comment="udisks2-lang-2.10.1-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152052" comment="udisks2-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041473" comment="udisks2-zsh-completion-2.10.1-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041638" comment="udisks2-zsh-completion is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20258176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-8176</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-8176" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8176" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-8176" ref_url="https://www.suse.com/security/cve/CVE-2025-8176" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:19113" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002132.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20034" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002202.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20956" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02770-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02771-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02815-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21009-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023396.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in LibTIFF up to 4.7.0. It has been declared as critical. This vulnerability affects the function get_histogram of the file tools/tiffmedian.c. The manipulation leads to use after free. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The patch is identified as fe10872e53efba9cc36c66ac4ab3b41a839d5172. It is recommended to apply a patch to fix this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-22"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8176/">CVE-2025-8176 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-8176">CVE-2025-8176 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247108">SUSE bug 1247108</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030533" comment="libtiff-devel-4.7.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151316" comment="libtiff-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030534" comment="libtiff-devel-docs-4.7.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010030587" comment="libtiff-devel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030535" comment="libtiff6-4.7.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009940809" comment="libtiff6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030536" comment="tiff-4.7.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151319" comment="tiff is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030537" comment="tiff-docs-4.7.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010030588" comment="tiff-docs is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20258177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-8177</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-8177" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8177" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-8177" ref_url="https://www.suse.com/security/cve/CVE-2025-8177" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:02770-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02771-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041171.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02815-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041224.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21009-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023396.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in LibTIFF up to 4.7.0. It has been rated as critical. This issue affects the function setrow of the file tools/thumbnail.c. The manipulation leads to buffer overflow. An attack has to be approached locally. The patch is named e8c9d6c616b19438695fd829e58ae4fde5bfbc22. It is recommended to apply a patch to fix this issue. This vulnerability only affects products that are no longer supported by the maintainer.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-22"/>
	<updated date="2025-12-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8177/">CVE-2025-8177 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-8177">CVE-2025-8177 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247106">SUSE bug 1247106</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030533" comment="libtiff-devel-4.7.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151316" comment="libtiff-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030534" comment="libtiff-devel-docs-4.7.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010030587" comment="libtiff-devel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030535" comment="libtiff6-4.7.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009940809" comment="libtiff6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030536" comment="tiff-4.7.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151319" comment="tiff is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030537" comment="tiff-docs-4.7.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010030588" comment="tiff-docs is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20258194" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-8194</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-8194" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8194" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-8194" ref_url="https://www.suse.com/security/cve/CVE-2025-8194" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:14546" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002047.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:14560" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001955.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:14841" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001949.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:14900" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001954.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:15007" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001968.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:15010" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001970.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:15019" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/001972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02700-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041101.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02701-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041100.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02717-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02767-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041176.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02778-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041187.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02787-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02802-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041209.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02948-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041324.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02982-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041353.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:02984-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041352.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03032-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-September/022448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20749-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3706-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042247.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20125-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023948.html" source="SUSE-SU"/>
    <description>
    There is a defect in the CPython “tarfile” module affecting the “TarFile” extraction and entry enumeration APIs. The tar implementation would process tar archives with negative offsets without error, resulting in an infinite loop and deadlock during the parsing of maliciously crafted tar archives. 

This vulnerability can be mitigated by including the following patch after importing the “tarfile” module:   https://gist.github.com/sethmlarson/1716ac5b82b73dbcbf23ad2eff8b33e1
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-25"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8194/">CVE-2025-8194 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8194">CVE-2025-8194 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247249">SUSE bug 1247249</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039656" comment="libpython3_13-1_0-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039739" comment="libpython3_13-1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039657" comment="libpython3_13-1_0-x86-64-v3-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039740" comment="libpython3_13-1_0-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039658" comment="libpython3_13t1_0-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039741" comment="libpython3_13t1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039659" comment="python313-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039742" comment="python313 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039660" comment="python313-base-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039743" comment="python313-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039661" comment="python313-base-x86-64-v3-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039744" comment="python313-base-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039662" comment="python313-curses-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039745" comment="python313-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039663" comment="python313-dbm-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039746" comment="python313-dbm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039664" comment="python313-devel-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039747" comment="python313-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039665" comment="python313-doc-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039748" comment="python313-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039666" comment="python313-doc-devhelp-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039749" comment="python313-doc-devhelp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039667" comment="python313-idle-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039750" comment="python313-idle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039668" comment="python313-nogil-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039751" comment="python313-nogil is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039669" comment="python313-nogil-base-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039752" comment="python313-nogil-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039670" comment="python313-nogil-curses-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039753" comment="python313-nogil-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039671" comment="python313-nogil-dbm-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039754" comment="python313-nogil-dbm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039672" comment="python313-nogil-devel-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039755" comment="python313-nogil-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039673" comment="python313-nogil-idle-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039756" comment="python313-nogil-idle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039674" comment="python313-nogil-testsuite-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039757" comment="python313-nogil-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039675" comment="python313-nogil-tk-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039758" comment="python313-nogil-tk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039676" comment="python313-nogil-tools-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039759" comment="python313-nogil-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039677" comment="python313-testsuite-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039760" comment="python313-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039678" comment="python313-tk-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039761" comment="python313-tk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039679" comment="python313-tools-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039762" comment="python313-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039680" comment="python313-x86-64-v3-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039763" comment="python313-x86-64-v3 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20258224" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-8224</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-8224" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8224" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-8224" ref_url="https://www.suse.com/security/cve/CVE-2025-8224" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023286.html" source="SUSE-SU"/>
    <description>
    A vulnerability has been found in GNU Binutils 2.44 and classified as problematic. This vulnerability affects the function bfd_elf_get_str_section of the file bfd/elf.c of the component BFD Library. The manipulation leads to null pointer dereference. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The name of the patch is db856d41004301b3a56438efd957ef5cabb91530. It is recommended to apply a patch to fix this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-13"/>
	<updated date="2025-12-19"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8224/">CVE-2025-8224 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-8224">CVE-2025-8224 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247114">SUSE bug 1247114</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033339" comment="binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033340" comment="binutils-devel-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033444" comment="bpftool-7.5.0-160000.2.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009955992" comment="bpftool is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033445" comment="bpftool-bash-completion-7.5.0-160000.2.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033375" comment="bpftool-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033343" comment="cross-aarch64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167594" comment="cross-aarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033344" comment="cross-arm-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167596" comment="cross-arm-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033345" comment="cross-avr-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167598" comment="cross-avr-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033346" comment="cross-bpf-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010029579" comment="cross-bpf-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033347" comment="cross-epiphany-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238034" comment="cross-epiphany-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033348" comment="cross-hppa-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167600" comment="cross-hppa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033349" comment="cross-hppa64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167602" comment="cross-hppa64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033350" comment="cross-i386-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167604" comment="cross-i386-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033351" comment="cross-ia64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167606" comment="cross-ia64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033352" comment="cross-loongarch64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033376" comment="cross-loongarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033353" comment="cross-m68k-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167608" comment="cross-m68k-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033354" comment="cross-mips-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167610" comment="cross-mips-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033355" comment="cross-ppc-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167612" comment="cross-ppc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033356" comment="cross-ppc64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167614" comment="cross-ppc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033357" comment="cross-ppc64le-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167616" comment="cross-ppc64le-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033358" comment="cross-pru-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010029580" comment="cross-pru-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033359" comment="cross-riscv64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238035" comment="cross-riscv64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033360" comment="cross-rx-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238036" comment="cross-rx-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033361" comment="cross-s390-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167618" comment="cross-s390-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033362" comment="cross-s390x-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167620" comment="cross-s390x-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033363" comment="cross-sparc-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167622" comment="cross-sparc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033364" comment="cross-sparc64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167624" comment="cross-sparc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033365" comment="cross-spu-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167626" comment="cross-spu-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033366" comment="cross-x86_64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167628" comment="cross-x86_64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033367" comment="cross-xtensa-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297932" comment="cross-xtensa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033368" comment="gprofng-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033377" comment="gprofng is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033369" comment="libctf-nobfd0-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297779" comment="libctf-nobfd0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033370" comment="libctf0-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297780" comment="libctf0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20258225" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-8225</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-8225" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8225" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-8225" ref_url="https://www.suse.com/security/cve/CVE-2025-8225" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21197-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023545.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4096-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023286.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in GNU Binutils 2.44 and classified as problematic. This issue affects the function process_debug_info of the file binutils/dwarf.c of the component DWARF Section Handler. The manipulation leads to memory leak. Attacking locally is a requirement. The identifier of the patch is e51fdff7d2e538c0e5accdd65649ac68e6e0ddd4. It is recommended to apply a patch to fix this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-13"/>
	<updated date="2025-12-19"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8225/">CVE-2025-8225 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8225">CVE-2025-8225 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247117">SUSE bug 1247117</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033339" comment="binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152512" comment="binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033340" comment="binutils-devel-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152513" comment="binutils-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033444" comment="bpftool-7.5.0-160000.2.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009955992" comment="bpftool is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033445" comment="bpftool-bash-completion-7.5.0-160000.2.3 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033375" comment="bpftool-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033343" comment="cross-aarch64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167594" comment="cross-aarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033344" comment="cross-arm-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167596" comment="cross-arm-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033345" comment="cross-avr-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167598" comment="cross-avr-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033346" comment="cross-bpf-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010029579" comment="cross-bpf-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033347" comment="cross-epiphany-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238034" comment="cross-epiphany-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033348" comment="cross-hppa-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167600" comment="cross-hppa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033349" comment="cross-hppa64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167602" comment="cross-hppa64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033350" comment="cross-i386-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167604" comment="cross-i386-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033351" comment="cross-ia64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167606" comment="cross-ia64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033352" comment="cross-loongarch64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033376" comment="cross-loongarch64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033353" comment="cross-m68k-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167608" comment="cross-m68k-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033354" comment="cross-mips-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167610" comment="cross-mips-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033355" comment="cross-ppc-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167612" comment="cross-ppc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033356" comment="cross-ppc64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167614" comment="cross-ppc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033357" comment="cross-ppc64le-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167616" comment="cross-ppc64le-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033358" comment="cross-pru-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010029580" comment="cross-pru-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033359" comment="cross-riscv64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238035" comment="cross-riscv64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033360" comment="cross-rx-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238036" comment="cross-rx-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033361" comment="cross-s390-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167618" comment="cross-s390-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033362" comment="cross-s390x-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167620" comment="cross-s390x-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033363" comment="cross-sparc-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167622" comment="cross-sparc-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033364" comment="cross-sparc64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167624" comment="cross-sparc64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033365" comment="cross-spu-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167626" comment="cross-spu-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033366" comment="cross-x86_64-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009167628" comment="cross-x86_64-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033367" comment="cross-xtensa-binutils-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297932" comment="cross-xtensa-binutils is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033368" comment="gprofng-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033377" comment="gprofng is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033369" comment="libctf-nobfd0-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297779" comment="libctf-nobfd0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010033370" comment="libctf0-2.45-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009297780" comment="libctf0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20258291" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-8291</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-8291" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8291" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-8291" ref_url="https://www.suse.com/security/cve/CVE-2025-8291" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23323" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003148.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23342" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003140.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23530" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002308.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0123" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002346.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0355" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21207-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4257-2" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023544.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4277-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4297-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4313-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023520.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4368-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4398-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023539.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023609.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0133-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023782.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20125-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043743.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20154-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023948.html" source="SUSE-SU"/>
    <description>
    The 'zipfile' module would not check the validity of the ZIP64 End of
Central Directory (EOCD) Locator record offset value would not be used to
locate the ZIP64 EOCD record, instead the ZIP64 EOCD record would be
assumed to be the previous record in the ZIP archive. This could be abused
to create ZIP archives that are handled differently by the 'zipfile' module
compared to other ZIP implementations.


Remediation maintains this behavior, but checks that the offset specified
in the ZIP64 EOCD Locator record matches the expected value.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-25"/>
	<updated date="2026-04-11"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8291/">CVE-2025-8291 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8291">CVE-2025-8291 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251305">SUSE bug 1251305</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039656" comment="libpython3_13-1_0-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039739" comment="libpython3_13-1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039657" comment="libpython3_13-1_0-x86-64-v3-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039740" comment="libpython3_13-1_0-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039658" comment="libpython3_13t1_0-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039741" comment="libpython3_13t1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039659" comment="python313-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039742" comment="python313 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039660" comment="python313-base-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039743" comment="python313-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039661" comment="python313-base-x86-64-v3-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039744" comment="python313-base-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039662" comment="python313-curses-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039745" comment="python313-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039663" comment="python313-dbm-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039746" comment="python313-dbm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039664" comment="python313-devel-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039747" comment="python313-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039665" comment="python313-doc-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039748" comment="python313-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039666" comment="python313-doc-devhelp-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039749" comment="python313-doc-devhelp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039667" comment="python313-idle-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039750" comment="python313-idle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039668" comment="python313-nogil-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039751" comment="python313-nogil is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039669" comment="python313-nogil-base-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039752" comment="python313-nogil-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039670" comment="python313-nogil-curses-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039753" comment="python313-nogil-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039671" comment="python313-nogil-dbm-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039754" comment="python313-nogil-dbm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039672" comment="python313-nogil-devel-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039755" comment="python313-nogil-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039673" comment="python313-nogil-idle-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039756" comment="python313-nogil-idle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039674" comment="python313-nogil-testsuite-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039757" comment="python313-nogil-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039675" comment="python313-nogil-tk-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039758" comment="python313-nogil-tk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039676" comment="python313-nogil-tools-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039759" comment="python313-nogil-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039677" comment="python313-testsuite-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039760" comment="python313-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039678" comment="python313-tk-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039761" comment="python313-tk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039679" comment="python313-tools-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039762" comment="python313-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039680" comment="python313-x86-64-v3-3.13.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039763" comment="python313-x86-64-v3 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20258534" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-8534</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-8534" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8534" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-8534" ref_url="https://www.suse.com/security/cve/CVE-2025-8534" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03345-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03346-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03348-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21009-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023396.html" source="SUSE-SU"/>
    <description>
    A vulnerability classified as problematic was found in libtiff 4.6.0. This vulnerability affects the function PS_Lvl2page of the file tools/tiff2ps.c of the component tiff2ps. The manipulation leads to null pointer dereference. It is possible to launch the attack on the local host. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The name of the patch is 6ba36f159fd396ad11bf6b7874554197736ecc8b. It is recommended to apply a patch to fix this issue. One of the maintainers explains, that "[t]his error only occurs if DEFER_STRILE_LOAD (defer-strile-load:BOOL=ON) or TIFFOpen( .. "rD") option is used."
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-22"/>
	<updated date="2025-12-19"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8534/">CVE-2025-8534 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8534">CVE-2025-8534 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247582">SUSE bug 1247582</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030533" comment="libtiff-devel-4.7.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151316" comment="libtiff-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030534" comment="libtiff-devel-docs-4.7.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010030587" comment="libtiff-devel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030535" comment="libtiff6-4.7.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009940809" comment="libtiff6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030536" comment="tiff-4.7.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151319" comment="tiff is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030537" comment="tiff-docs-4.7.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010030588" comment="tiff-docs is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20258671" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-8671</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-8671" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8671" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-8671" ref_url="https://www.suse.com/security/cve/CVE-2025-8671" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0888-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024689.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20995-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045336.html" source="SUSE-SU"/>
		<reference ref_id="TID000021980" ref_url="https://www.suse.com/support/kb/doc/?id=000021980" source="SUSE-SU"/>
    <description>
    A mismatch caused by client-triggered server-sent stream resets between HTTP/2 specifications and the internal architectures of some HTTP/2 implementations may result in excessive server resource consumption leading to denial-of-service (DoS).  By opening streams and then rapidly triggering the server to reset them-using malformed frames or flow control errors-an attacker can exploit incorrect stream accounting. Streams reset by the server are considered closed at the protocol level, even though backend processing continues. This allows a client to cause the server to handle an unbounded number of concurrent streams on a single connection. This CVE will be updated as affected product details are released.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-09"/>
	<updated date="2026-04-10"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8671/">CVE-2025-8671 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8671">CVE-2025-8671 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1243888">SUSE bug 1243888</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1243895">SUSE bug 1243895</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010053168" comment="dnsdist-1.9.11-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009815139" comment="dnsdist is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20258677" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-8677</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-8677" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8677" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-8677" ref_url="https://www.suse.com/security/cve/CVE-2025-8677" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:19950" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002208.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21111" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003108.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4110-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023287.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20085-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023814.html" source="SUSE-SU"/>
    <description>
    Querying for records within a specially crafted zone containing certain malformed DNSKEY records can lead to CPU exhaustion.
This issue affects BIND 9 versions 9.18.0 through 9.18.39, 9.20.0 through 9.20.13, 9.21.0 through 9.21.12, 9.18.11-S1 through 9.18.39-S1, and 9.20.9-S1 through 9.20.13-S1.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-18"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8677/">CVE-2025-8677 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8677">CVE-2025-8677 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1252378">SUSE bug 1252378</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037847" comment="bind-9.20.15-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151203" comment="bind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037848" comment="bind-doc-9.20.15-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151205" comment="bind-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037849" comment="bind-modules-bdbhpt-9.20.15-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037911" comment="bind-modules-bdbhpt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037850" comment="bind-modules-generic-9.20.15-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037912" comment="bind-modules-generic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037851" comment="bind-modules-ldap-9.20.15-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037913" comment="bind-modules-ldap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037852" comment="bind-modules-mysql-9.20.15-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037914" comment="bind-modules-mysql is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037853" comment="bind-modules-perl-9.20.15-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037915" comment="bind-modules-perl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037854" comment="bind-modules-sqlite3-9.20.15-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037916" comment="bind-modules-sqlite3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037855" comment="bind-utils-9.20.15-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151207" comment="bind-utils is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20258732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-8732</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-8732" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8732" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-8732" ref_url="https://www.suse.com/security/cve/CVE-2025-8732" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:4104-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4115-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024731.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in libxml2 up to 2.14.5. It has been declared as problematic. This vulnerability affects the function xmlParseSGMLCatalog of the component xmlcatalog. The manipulation leads to uncontrolled recursion. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The code maintainer explains, that "[t]he issue can only be triggered with untrusted SGML catalogs and it makes absolutely no sense to use untrusted catalogs. I also doubt that anyone is still using SGML catalogs at all."
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-19"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8732/">CVE-2025-8732 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8732">CVE-2025-8732 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247850">SUSE bug 1247850</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047326" comment="libexslt0-1.1.43-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010030589" comment="libexslt0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047327" comment="libxml2-2-2.13.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151137" comment="libxml2-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047328" comment="libxml2-devel-2.13.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151139" comment="libxml2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047329" comment="libxml2-doc-2.13.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152664" comment="libxml2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047330" comment="libxml2-tools-2.13.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151140" comment="libxml2-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047331" comment="libxslt-devel-1.1.43-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009155744" comment="libxslt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047332" comment="libxslt-tools-1.1.43-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009155747" comment="libxslt-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047333" comment="libxslt1-1.1.43-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009155748" comment="libxslt1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047334" comment="python313-libxml2-2.13.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010042235" comment="python313-libxml2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20258746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-8746</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-8746" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8746" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-8746" ref_url="https://www.suse.com/security/cve/CVE-2025-8746" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024617.html" source="SUSE-SU"/>
    <description>
    A vulnerability, which was classified as problematic, was found in GNU libopts up to 27.6. Affected is the function __strstr_sse2. The manipulation leads to memory corruption. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. This issue was initially reported to the tcpreplay project, but the code maintainer explains, that this "bug appears to be in libopts which is an external library." This vulnerability only affects products that are no longer supported by the maintainer.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2026-03-06"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8746/">CVE-2025-8746 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-8746">CVE-2025-8746 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247917">SUSE bug 1247917</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045686" comment="autogen-5.18.16-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010045811" comment="autogen is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045687" comment="autoopts-5.18.16-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010045812" comment="autoopts is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045688" comment="libopts25-5.18.16-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010045813" comment="libopts25 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032111" comment="tcpreplay-4.5.2-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154264" comment="tcpreplay is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20258835" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-8835</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-8835" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8835" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-8835" ref_url="https://www.suse.com/security/cve/CVE-2025-8835" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03219-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03367-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024019.html" source="SUSE-SU"/>
    <description>
    A vulnerability was found in JasPer up to 4.2.5. Affected by this vulnerability is the function jas_image_chclrspc of the file src/libjasper/base/jas_image.c of the component Image Color Space Conversion Handler. The manipulation leads to null pointer dereference. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The identifier of the patch is bb7d62bd0a2a8e0e1fdb4d603f3305f955158c52. It is recommended to apply a patch to fix this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-02-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8835/">CVE-2025-8835 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-8835">CVE-2025-8835 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247904">SUSE bug 1247904</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041453" comment="jasper-4.2.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151131" comment="jasper is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041454" comment="libjasper-devel-4.2.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151132" comment="libjasper-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041455" comment="libjasper7-4.2.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025042" comment="libjasper7 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20258836" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-8836</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-8836" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8836" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-8836" ref_url="https://www.suse.com/security/cve/CVE-2025-8836" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03219-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03367-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024019.html" source="SUSE-SU"/>
    <description>
    A vulnerability was determined in JasPer up to 4.2.5. Affected by this issue is the function jpc_floorlog2 of the file src/libjasper/jpc/jpc_enc.c of the component JPEG2000 Encoder. The manipulation leads to reachable assertion. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The patch is identified as 79185d32d7a444abae441935b20ae4676b3513d4. It is recommended to apply a patch to fix this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-02-04"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8836/">CVE-2025-8836 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8836">CVE-2025-8836 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247902">SUSE bug 1247902</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041453" comment="jasper-4.2.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151131" comment="jasper is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041454" comment="libjasper-devel-4.2.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151132" comment="libjasper-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041455" comment="libjasper7-4.2.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025042" comment="libjasper7 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20258837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-8837</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-8837" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8837" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-8837" ref_url="https://www.suse.com/security/cve/CVE-2025-8837" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03219-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03367-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041854.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20200-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024019.html" source="SUSE-SU"/>
    <description>
    A vulnerability was identified in JasPer up to 4.2.5. This affects the function jpc_dec_dump of the file src/libjasper/jpc/jpc_dec.c of the component JPEG2000 File Handler. The manipulation leads to use after free. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The patch is named 8308060d3fbc1da10353ac8a95c8ea60eba9c25a. It is recommended to apply a patch to fix this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-02-04"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8837/">CVE-2025-8837 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-8837">CVE-2025-8837 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1247901">SUSE bug 1247901</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041453" comment="jasper-4.2.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151131" comment="jasper is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041454" comment="libjasper-devel-4.2.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151132" comment="libjasper-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041455" comment="libjasper7-4.2.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025042" comment="libjasper7 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20258961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-8961</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-8961" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-8961" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-8961" ref_url="https://www.suse.com/security/cve/CVE-2025-8961" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03345-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03346-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03348-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21009-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023396.html" source="SUSE-SU"/>
    <description>
    A weakness has been identified in LibTIFF 4.7.0. This affects the function main of the file tiffcrop.c of the component tiffcrop. Executing manipulation can lead to memory corruption. The attack can only be executed locally. The exploit has been made available to the public and could be exploited.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-22"/>
	<updated date="2025-12-19"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-8961/">CVE-2025-8961 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-8961">CVE-2025-8961 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248117">SUSE bug 1248117</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030533" comment="libtiff-devel-4.7.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151316" comment="libtiff-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030534" comment="libtiff-devel-docs-4.7.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010030587" comment="libtiff-devel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030535" comment="libtiff6-4.7.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009940809" comment="libtiff6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030536" comment="tiff-4.7.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151319" comment="tiff is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030537" comment="tiff-docs-4.7.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010030588" comment="tiff-docs is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20259086" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-9086</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-9086" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9086" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-9086" ref_url="https://www.suse.com/security/cve/CVE-2025-9086" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:23043" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002290.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:23383" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-December/002323.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1350" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03173-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041656.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03198-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03267-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041770.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03268-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041769.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20802-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20824-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21145-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023512.html" source="SUSE-SU"/>
    <description>
    1. A cookie is set using the `secure` keyword for `https://target` 
 2. curl is redirected to or otherwise made to speak with `http://target` (same 
   hostname, but using clear text HTTP) using the same cookie set 
 3. The same cookie name is set - but with just a slash as path (`path=\"/\",`).
   Since this site is not secure, the cookie *should* just be ignored.
4. A bug in the path comparison logic makes curl read outside a heap buffer
   boundary

The bug either causes a crash or it potentially makes the comparison come to
the wrong conclusion and lets the clear-text site override the contents of the
secure cookie, contrary to expectations and depending on the memory contents
immediately following the single-byte allocation that holds the path.

The presumed and correct behavior would be to plainly ignore the second set of
the cookie since it was already set as secure on a secure host so overriding
it on an insecure host should not be okay.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-28"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-9086/">CVE-2025-9086 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9086">CVE-2025-9086 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249191">SUSE bug 1249191</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031702" comment="curl-8.14.1-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031703" comment="curl-fish-completion-8.14.1-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010031781" comment="curl-fish-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031704" comment="curl-zsh-completion-8.14.1-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010031782" comment="curl-zsh-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031705" comment="libcurl-devel-8.14.1-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151178" comment="libcurl-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031706" comment="libcurl-devel-doc-8.14.1-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010031783" comment="libcurl-devel-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010031707" comment="libcurl4-8.14.1-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20259157" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-9157</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-9157" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9157" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-9157" ref_url="https://www.suse.com/security/cve/CVE-2025-9157" source="SUSE CVE"/>
    <description>
    A vulnerability was determined in appneta tcpreplay up to 4.5.2-beta2. The impacted element is the function untrunc_packet of the file src/tcpedit/edit_packet.c of the component tcprewrite. Executing manipulation can lead to use after free. It is possible to launch the attack on the local host. The exploit has been publicly disclosed and may be utilized. This patch is called 73008f261f1cdf7a1087dc8759115242696d35da. Applying a patch is advised to resolve this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2025-12-19"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-9157/">CVE-2025-9157 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9157">CVE-2025-9157 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248322">SUSE bug 1248322</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032111" comment="tcpreplay-4.5.2-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154264" comment="tcpreplay is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20259165" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-9165</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-9165" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9165" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-9165" ref_url="https://www.suse.com/security/cve/CVE-2025-9165" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03345-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041837.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03346-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03348-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041835.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21009-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023396.html" source="SUSE-SU"/>
    <description>
    A flaw has been found in LibTIFF 4.7.0. This affects the function _TIFFmallocExt/_TIFFCheckRealloc/TIFFHashSetNew/InitCCITTFax3 of the file tools/tiffcmp.c of the component tiffcmp. Executing manipulation can lead to memory leak. The attack is restricted to local execution. This attack is characterized by high complexity. It is indicated that the exploitability is difficult. The exploit has been published and may be used. There is ongoing doubt regarding the real existence of this vulnerability. This patch is called ed141286a37f6e5ddafb5069347ff5d587e7a4e0. It is best practice to apply a patch to resolve this issue. A researcher disputes the security impact of this issue, because "this is a memory leak on a command line tool that is about to exit anyway". In the reply the project maintainer declares this issue as "a simple 'bug' when leaving the command line tool and (...) not a security issue at all".
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-22"/>
	<updated date="2025-12-19"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-9165/">CVE-2025-9165 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9165">CVE-2025-9165 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248326">SUSE bug 1248326</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030533" comment="libtiff-devel-4.7.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151316" comment="libtiff-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030534" comment="libtiff-devel-docs-4.7.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010030587" comment="libtiff-devel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030535" comment="libtiff6-4.7.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009940809" comment="libtiff6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030536" comment="tiff-4.7.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151319" comment="tiff is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030537" comment="tiff-docs-4.7.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010030588" comment="tiff-docs is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20259179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-9179</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-9179" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9179" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-9179" ref_url="https://www.suse.com/security/cve/CVE-2025-9179" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:14416" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001945.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:14442" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001942.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:14640" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001956.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:14743" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03007-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041410.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03009-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023500.html" source="SUSE-SU"/>
    <description>
    An attacker was able to perform memory corruption in the GMP process which processes encrypted media. This process is also heavily sandboxed, but represents slightly different privileges from the content process. This vulnerability was fixed in Firefox 142, Firefox ESR 115.27, Firefox ESR 128.14, Firefox ESR 140.2, Thunderbird 142, Thunderbird 128.14, and Thunderbird 140.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-05"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-9179/">CVE-2025-9179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9179">CVE-2025-9179 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248162">SUSE bug 1248162</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032507" comment="libmozjs-128-0-128.14.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032510" comment="libmozjs-128-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032508" comment="mozjs128-128.14.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032511" comment="mozjs128 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032509" comment="mozjs128-devel-128.14.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032512" comment="mozjs128-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20259180" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-9180</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-9180" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9180" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-9180" ref_url="https://www.suse.com/security/cve/CVE-2025-9180" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:14416" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001945.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:14442" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001942.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:14640" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001956.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:14743" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03007-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041410.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03009-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023500.html" source="SUSE-SU"/>
    <description>
    Same-origin policy bypass in the Graphics: Canvas2D component. This vulnerability was fixed in Firefox 142, Firefox ESR 115.27, Firefox ESR 128.14, Firefox ESR 140.2, Thunderbird 142, Thunderbird 128.14, and Thunderbird 140.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-05"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2025-9180/">CVE-2025-9180 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9180">CVE-2025-9180 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248162">SUSE bug 1248162</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032507" comment="libmozjs-128-0-128.14.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032510" comment="libmozjs-128-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032508" comment="mozjs128-128.14.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032511" comment="mozjs128 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032509" comment="mozjs128-devel-128.14.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032512" comment="mozjs128-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20259181" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-9181</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-9181" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9181" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-9181" ref_url="https://www.suse.com/security/cve/CVE-2025-9181" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:14416" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001945.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:14442" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001942.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:14640" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001956.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:14743" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03007-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041410.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03009-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023500.html" source="SUSE-SU"/>
    <description>
    Uninitialized memory in the JavaScript Engine component. This vulnerability was fixed in Firefox 142, Firefox ESR 128.14, Firefox ESR 140.2, Thunderbird 142, Thunderbird 128.14, and Thunderbird 140.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-05"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2025-9181/">CVE-2025-9181 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9181">CVE-2025-9181 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248162">SUSE bug 1248162</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032507" comment="libmozjs-128-0-128.14.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032510" comment="libmozjs-128-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032508" comment="mozjs128-128.14.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032511" comment="mozjs128 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032509" comment="mozjs128-devel-128.14.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032512" comment="mozjs128-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20259185" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-9185</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-9185" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9185" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-9185" ref_url="https://www.suse.com/security/cve/CVE-2025-9185" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:14416" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001945.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:14442" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001942.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:14640" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001956.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:14743" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001943.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03007-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041410.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03009-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-August/041409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21170-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023500.html" source="SUSE-SU"/>
    <description>
    Memory safety bugs present in Firefox ESR 115.26, Firefox ESR 128.13, Thunderbird ESR 128.13, Firefox ESR 140.1, Thunderbird ESR 140.1, Firefox 141 and Thunderbird 141. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability was fixed in Firefox 142, Firefox ESR 115.27, Firefox ESR 128.14, Firefox ESR 140.2, Thunderbird 142, Thunderbird 128.14, and Thunderbird 140.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-05"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2025-9185/">CVE-2025-9185 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-9185">CVE-2025-9185 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248162">SUSE bug 1248162</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032507" comment="libmozjs-128-0-128.14.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032510" comment="libmozjs-128-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032508" comment="mozjs128-128.14.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032511" comment="mozjs128 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032509" comment="mozjs128-devel-128.14.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032512" comment="mozjs128-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20259230" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-9230</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-9230" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9230" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-9230" ref_url="https://www.suse.com/security/cve/CVE-2025-9230" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:21174" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-November/002260.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:21255" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003124.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1720" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002463.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2776" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003193.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03437-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041984.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03438-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03439-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041976.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03440-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041979.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03441-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041975.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03442-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041974.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03443-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041973.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03463-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03464-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03522-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042058.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03523-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03546-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03586-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042083.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03630-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042191.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03632-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03635-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20867-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023063.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3758-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024331.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20542-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024594.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20607-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024609.html" source="SUSE-SU"/>
    <description>
    Issue summary: An application trying to decrypt CMS messages encrypted using
password based encryption can trigger an out-of-bounds read and write.

Impact summary: This out-of-bounds read may trigger a crash which leads to
Denial of Service for an application. The out-of-bounds write can cause
a memory corruption which can have various consequences including
a Denial of Service or Execution of attacker-supplied code.

Although the consequences of a successful exploit of this vulnerability
could be severe, the probability that the attacker would be able to
perform it is low. Besides, password based (PWRI) encryption support in CMS
messages is very rarely used. For that reason the issue was assessed as
Moderate severity according to our Security Policy.

The FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this
issue, as the CMS implementation is outside the OpenSSL FIPS module
boundary.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-18"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-9230/">CVE-2025-9230 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9230">CVE-2025-9230 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250232">SUSE bug 1250232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1250410">SUSE bug 1250410</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034150" comment="libopenssl-3-devel-3.5.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700693" comment="libopenssl-3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034151" comment="libopenssl-3-fips-provider-3.5.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009868077" comment="libopenssl-3-fips-provider is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034152" comment="libopenssl-3-fips-provider-x86-64-v3-3.5.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010034160" comment="libopenssl-3-fips-provider-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034153" comment="libopenssl3-3.5.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700695" comment="libopenssl3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034154" comment="libopenssl3-x86-64-v3-3.5.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010034161" comment="libopenssl3-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034155" comment="openssl-3-3.5.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700697" comment="openssl-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034156" comment="openssl-3-doc-3.5.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700698" comment="openssl-3-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20259231" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-9231</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-9231" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9231" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-9231" ref_url="https://www.suse.com/security/cve/CVE-2025-9231" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024331.html" source="SUSE-SU"/>
    <description>
    Issue summary: A timing side-channel which could potentially allow remote
recovery of the private key exists in the SM2 algorithm implementation on 64 bit
ARM platforms.

Impact summary: A timing side-channel in SM2 signature computations on 64 bit
ARM platforms could allow recovering the private key by an attacker..

While remote key recovery over a network was not attempted by the reporter,
timing measurements revealed a timing signal which may allow such an attack.

OpenSSL does not directly support certificates with SM2 keys in TLS, and so
this CVE is not relevant in most TLS contexts.  However, given that it is
possible to add support for such certificates via a custom provider, coupled
with the fact that in such a custom provider context the private key may be
recoverable via remote timing measurements, we consider this to be a Moderate
severity issue.

The FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this
issue, as SM2 is not an approved algorithm.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-18"/>
	<updated date="2026-02-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N" cvss4="6/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-9231/">CVE-2025-9231 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9231">CVE-2025-9231 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250233">SUSE bug 1250233</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034150" comment="libopenssl-3-devel-3.5.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700693" comment="libopenssl-3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034151" comment="libopenssl-3-fips-provider-3.5.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009868077" comment="libopenssl-3-fips-provider is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034152" comment="libopenssl-3-fips-provider-x86-64-v3-3.5.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010034160" comment="libopenssl-3-fips-provider-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034153" comment="libopenssl3-3.5.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700695" comment="libopenssl3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034154" comment="libopenssl3-x86-64-v3-3.5.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010034161" comment="libopenssl3-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034155" comment="openssl-3-3.5.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700697" comment="openssl-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034156" comment="openssl-3-doc-3.5.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700698" comment="openssl-3-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20259232" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-9232</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-9232" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9232" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-9232" ref_url="https://www.suse.com/security/cve/CVE-2025-9232" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:21213-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023595.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21224-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023587.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024331.html" source="SUSE-SU"/>
    <description>
    Issue summary: An application using the OpenSSL HTTP client API functions may
trigger an out-of-bounds read if the 'no_proxy' environment variable is set and
the host portion of the authority component of the HTTP URL is an IPv6 address.

Impact summary: An out-of-bounds read can trigger a crash which leads to
Denial of Service for an application.

The OpenSSL HTTP client API functions can be used directly by applications
but they are also used by the OCSP client functions and CMP (Certificate
Management Protocol) client implementation in OpenSSL. However the URLs used
by these implementations are unlikely to be controlled by an attacker.

In this vulnerable code the out of bounds read can only trigger a crash.
Furthermore the vulnerability requires an attacker-controlled URL to be
passed from an application to the OpenSSL function and the user has to have
a 'no_proxy' environment variable set. For the aforementioned reasons the
issue was assessed as Low severity.

The vulnerable code was introduced in the following patch releases:
3.0.16, 3.1.8, 3.2.4, 3.3.3, 3.4.0 and 3.5.0.

The FIPS modules in 3.5, 3.4, 3.3, 3.2, 3.1 and 3.0 are not affected by this
issue, as the HTTP client implementation is outside the OpenSSL FIPS module
boundary.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-12-18"/>
	<updated date="2026-02-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-9232/">CVE-2025-9232 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9232">CVE-2025-9232 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250234">SUSE bug 1250234</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034150" comment="libopenssl-3-devel-3.5.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700693" comment="libopenssl-3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034151" comment="libopenssl-3-fips-provider-3.5.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009868077" comment="libopenssl-3-fips-provider is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034152" comment="libopenssl-3-fips-provider-x86-64-v3-3.5.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010034160" comment="libopenssl-3-fips-provider-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034153" comment="libopenssl3-3.5.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700695" comment="libopenssl3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034154" comment="libopenssl3-x86-64-v3-3.5.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010034161" comment="libopenssl3-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034155" comment="openssl-3-3.5.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700697" comment="openssl-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010034156" comment="openssl-3-doc-3.5.0-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700698" comment="openssl-3-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20259384" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-9384</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-9384" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9384" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-9384" ref_url="https://www.suse.com/security/cve/CVE-2025-9384" source="SUSE CVE"/>
    <description>
    A vulnerability was detected in appneta tcpreplay up to 4.5.1. Impacted is the function tcpedit_post_args of the file /src/tcpedit/parse_args.c. The manipulation results in null pointer dereference. The attack is only possible with local access. The exploit is now public and may be used. Upgrading to version 4.5.2-beta2 is recommended to address this issue. Upgrading the affected component is advised. The vendor explains, that he was "[a]ble to reproduce in 6fcbf03 but not in 4.5.2-beta2".
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2025-12-19"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-9384/">CVE-2025-9384 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-9384">CVE-2025-9384 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248595">SUSE bug 1248595</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032111" comment="tcpreplay-4.5.2-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154264" comment="tcpreplay is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20259385" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-9385</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-9385" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9385" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-9385" ref_url="https://www.suse.com/security/cve/CVE-2025-9385" source="SUSE CVE"/>
    <description>
    A flaw has been found in appneta tcpreplay up to 4.5.1. The affected element is the function fix_ipv6_checksums of the file edit_packet.c of the component tcprewrite. This manipulation causes use after free. The attack is restricted to local execution. The exploit has been published and may be used. Upgrading to version 4.5.2-beta3 is sufficient to fix this issue. It is advisable to upgrade the affected component.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2025-12-19"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-9385/">CVE-2025-9385 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-9385">CVE-2025-9385 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248596">SUSE bug 1248596</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032111" comment="tcpreplay-4.5.2-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154264" comment="tcpreplay is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20259386" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-9386</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-9386" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9386" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-9386" ref_url="https://www.suse.com/security/cve/CVE-2025-9386" source="SUSE CVE"/>
    <description>
    A vulnerability has been found in appneta tcpreplay up to 4.5.1. The impacted element is the function get_l2len_protocol of the file get.c of the component tcprewrite. Such manipulation leads to use after free. The attack must be carried out locally. The exploit has been disclosed to the public and may be used. Upgrading to version 4.5.2-beta3 is sufficient to resolve this issue. You should upgrade the affected component.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2025-12-19"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-9386/">CVE-2025-9386 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-9386">CVE-2025-9386 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248597">SUSE bug 1248597</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032111" comment="tcpreplay-4.5.2-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154264" comment="tcpreplay is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20259566" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-9566</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-9566" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9566" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-9566" ref_url="https://www.suse.com/security/cve/CVE-2025-9566" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:15900" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002019.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:15904" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-September/002024.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20909" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003106.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03534-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042070.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03584-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042085.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20899-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/023115.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3782-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042305.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20103-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023881.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20116-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023875.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20626-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024648.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20641-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024659.html" source="SUSE-SU"/>
    <description>
    There's a vulnerability in podman where an attacker may use the kube play command to overwrite host files when the kube file container a Secrete or a ConfigMap volume mount and such volume contains a symbolic link to a host file path. In a successful attack, the attacker can only control the target file to be overwritten but not the content to be written into the file.

Binary-Affected: podman
Upstream-version-introduced: v4.0.0
Upstream-version-fixed: v5.6.1
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-25"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="7.2/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-9566/">CVE-2025-9566 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9566">CVE-2025-9566 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249154">SUSE bug 1249154</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047314" comment="podman-5.4.2-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266791" comment="podman is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047315" comment="podman-docker-5.4.2-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009707063" comment="podman-docker is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047316" comment="podman-remote-5.4.2-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009707064" comment="podman-remote is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047317" comment="podmansh-5.4.2-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009853422" comment="podmansh is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20259640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-9640</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-9640" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9640" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-9640" ref_url="https://www.suse.com/security/cve/CVE-2025-9640" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03603-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042173.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03604-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042172.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-October/022916.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:03618-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21005-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21026-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3676-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042219.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3677-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-October/042218.html" source="SUSE-SU"/>
    <description>
    A flaw was found in Samba, in the vfs_streams_xattr module, where uninitialized heap memory could be written into alternate data streams. This allows an authenticated user to read residual memory content that may include sensitive data, resulting in an information disclosure vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-22"/>
	<updated date="2025-11-28"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2025-9640/">CVE-2025-9640 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9640">CVE-2025-9640 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1251279">SUSE bug 1251279</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030508" comment="ctdb-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152996" comment="ctdb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030509" comment="ctdb-pcp-pmda-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009233089" comment="ctdb-pcp-pmda is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030510" comment="ldb-tools-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152723" comment="ldb-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030511" comment="libldb-devel-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152732" comment="libldb-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030512" comment="libldb2-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291435" comment="libldb2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030513" comment="python3-ldb-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009247520" comment="python3-ldb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030514" comment="samba-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151301" comment="samba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030515" comment="samba-ad-dc-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266821" comment="samba-ad-dc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030516" comment="samba-ad-dc-libs-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009666845" comment="samba-ad-dc-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030517" comment="samba-ceph-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009162650" comment="samba-ceph is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030518" comment="samba-client-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151303" comment="samba-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030519" comment="samba-client-libs-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009666847" comment="samba-client-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030520" comment="samba-dcerpc-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010021989" comment="samba-dcerpc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030521" comment="samba-devel-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009666849" comment="samba-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030522" comment="samba-doc-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151305" comment="samba-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030523" comment="samba-dsdb-modules-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177163" comment="samba-dsdb-modules is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030524" comment="samba-gpupdate-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009655385" comment="samba-gpupdate is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030525" comment="samba-ldb-ldap-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009655386" comment="samba-ldb-ldap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030526" comment="samba-libs-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151306" comment="samba-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030527" comment="samba-libs-python3-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266825" comment="samba-libs-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030528" comment="samba-python3-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266827" comment="samba-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030529" comment="samba-test-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152778" comment="samba-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030530" comment="samba-tool-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009666851" comment="samba-tool is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030531" comment="samba-winbind-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151308" comment="samba-winbind is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030532" comment="samba-winbind-libs-4.22.5+git.431.dc5a539f124-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009666852" comment="samba-winbind-libs is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20259649" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-9649</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-9649" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9649" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-9649" ref_url="https://www.suse.com/security/cve/CVE-2025-9649" source="SUSE CVE"/>
    <description>
    A security vulnerability has been detected in appneta tcpreplay 4.5.1. Impacted is the function calc_sleep_time of the file send_packets.c. Such manipulation leads to divide by zero. An attack has to be approached locally. The exploit has been disclosed publicly and may be used. Upgrading to version 4.5.3-beta3 is recommended to address this issue. It is advisable to upgrade the affected component. The vendor confirms in a GitHub issue reply: "Was able to reproduce in 6fcbf03 but NOT 4.5.3-beta3."
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-29"/>
	<updated date="2025-12-19"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2025-9649/">CVE-2025-9649 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-9649">CVE-2025-9649 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1248964">SUSE bug 1248964</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010032111" comment="tcpreplay-4.5.2-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154264" comment="tcpreplay is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20259817" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-9817</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-9817" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9817" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-9817" ref_url="https://www.suse.com/security/cve/CVE-2025-9817" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2025:03294-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2025-September/041794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1169-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024065.html" source="SUSE-SU"/>
    <description>
    SSH dissector crash in Wireshark 4.4.0 to 4.4.8 allows denial of service
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-9817/">CVE-2025-9817 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2025-9817">CVE-2025-9817 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1249090">SUSE bug 1249090</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041589" comment="libwireshark18-4.4.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041611" comment="libwireshark18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041590" comment="libwiretap15-4.4.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041612" comment="libwiretap15 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041591" comment="libwsutil16-4.4.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041613" comment="libwsutil16 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041592" comment="wireshark-4.4.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041593" comment="wireshark-devel-4.4.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041594" comment="wireshark-ui-qt-4.4.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20259820" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-9820</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-9820" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9820" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-9820" ref_url="https://www.suse.com/security/cve/CVE-2025-9820" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:4188" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003274.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5585" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002624.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21202-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023589.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4271-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4272-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4323-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:4525-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-December/023657.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20962-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045320.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20968-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045314.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20984-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045347.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the GnuTLS library, specifically in the gnutls_pkcs11_token_init() function that handles PKCS#11 token initialization. When a token label longer than expected is processed, the function writes past the end of a fixed-size stack buffer. This programming error can cause the application using GnuTLS to crash or, in certain conditions, be exploited for code execution. As a result, systems or applications relying on GnuTLS may be vulnerable to a denial of service or local privilege escalation attacks.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-03"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2025-9820/">CVE-2025-9820 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9820">CVE-2025-9820 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1254132">SUSE bug 1254132</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052615" comment="gnutls-3.8.10-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151156" comment="gnutls is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052616" comment="libgnutls-devel-3.8.10-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151157" comment="libgnutls-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052617" comment="libgnutls-devel-doc-3.8.10-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010052705" comment="libgnutls-devel-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052618" comment="libgnutls30-3.8.10-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177128" comment="libgnutls30 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052619" comment="libgnutlsxx-devel-3.8.10-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153805" comment="libgnutlsxx-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052620" comment="libgnutlsxx30-3.8.10-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009967067" comment="libgnutlsxx30 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20259900" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2025-9900</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2025-9900" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-9900" source="CVE"/>
    <reference ref_id="SUSE CVE-2025-9900" ref_url="https://www.suse.com/security/cve/CVE-2025-9900" source="SUSE CVE"/>
		<reference ref_id="RHSA-2025:17675" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002075.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19113" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002132.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:19276" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-October/002139.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2025:20956" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003099.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:20971-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21009-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21032-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:21037-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023396.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3941-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3957-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023161.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2025:3961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2025-November/023168.html" source="SUSE-SU"/>
    <description>
    A flaw was found in Libtiff. This vulnerability is a "write-what-where" condition, triggered when the library processes a specially crafted TIFF image file.

By providing an abnormally large image height value in the file's metadata, an attacker can trick the library into writing attacker-controlled color data to an arbitrary memory location. This memory corruption can be exploited to cause a denial of service (application crash) or to achieve arbitrary code execution with the permissions of the user.
    </description>
<advisory from="security@suse.de">
	<issued date="2025-11-22"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2025-9900/">CVE-2025-9900 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2025-9900">CVE-2025-9900 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1250404">SUSE bug 1250404</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030533" comment="libtiff-devel-4.7.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151316" comment="libtiff-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030534" comment="libtiff-devel-docs-4.7.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010030587" comment="libtiff-devel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030535" comment="libtiff6-4.7.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009940809" comment="libtiff6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030536" comment="tiff-4.7.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151319" comment="tiff is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010030537" comment="tiff-docs-4.7.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010030588" comment="tiff-docs is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20260628" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-0628</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-0628" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0628" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-0628" ref_url="https://www.suse.com/security/cve/CVE-2026-0628" source="SUSE CVE"/>
    <description>
    Insufficient policy enforcement in WebView tag in Google Chrome prior to 143.0.7499.192 allowed an attacker who convinced a user to install a malicious extension to inject scripts or HTML into a privileged page via a crafted Chrome Extension. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-13"/>
	<updated date="2026-01-13"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-0628/">CVE-2026-0628 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0628">CVE-2026-0628 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256067">SUSE bug 1256067</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037212" comment="chromedriver-143.0.7499.192-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037213" comment="chromium-143.0.7499.192-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20260665" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-0665</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-0665" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0665" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-0665" ref_url="https://www.suse.com/security/cve/CVE-2026-0665" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024103.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0662-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20666-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024747.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024730.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20716-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024769.html" source="SUSE-SU"/>
    <description>
    An off-by-one error was found in QEMU's KVM Xen guest support. A malicious guest could use this flaw to trigger out-of-bounds heap accesses in the QEMU process via the emulated Xen physdev hypercall interface, leading to a denial of service or potential memory corruption.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-14"/>
	<updated date="2026-03-20"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0665/">CVE-2026-0665 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0665">CVE-2026-0665 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256484">SUSE bug 1256484</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048658" comment="qemu-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151104" comment="qemu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048659" comment="qemu-SLOF-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009676699" comment="qemu-SLOF is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048660" comment="qemu-accel-qtest-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700691" comment="qemu-accel-qtest is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048661" comment="qemu-arm-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151105" comment="qemu-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048662" comment="qemu-audio-alsa-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266837" comment="qemu-audio-alsa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048663" comment="qemu-audio-dbus-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009775936" comment="qemu-audio-dbus is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048664" comment="qemu-audio-jack-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700692" comment="qemu-audio-jack is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048665" comment="qemu-audio-oss-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266838" comment="qemu-audio-oss is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048666" comment="qemu-audio-pa-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266839" comment="qemu-audio-pa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048667" comment="qemu-audio-pipewire-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009881182" comment="qemu-audio-pipewire is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048668" comment="qemu-audio-spice-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623393" comment="qemu-audio-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048669" comment="qemu-block-curl-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151106" comment="qemu-block-curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048670" comment="qemu-block-dmg-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154081" comment="qemu-block-dmg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048671" comment="qemu-block-iscsi-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154082" comment="qemu-block-iscsi is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048672" comment="qemu-block-nfs-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266841" comment="qemu-block-nfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048673" comment="qemu-block-rbd-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151107" comment="qemu-block-rbd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048674" comment="qemu-block-ssh-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154083" comment="qemu-block-ssh is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048675" comment="qemu-chardev-baum-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623394" comment="qemu-chardev-baum is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048676" comment="qemu-chardev-spice-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623395" comment="qemu-chardev-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048677" comment="qemu-doc-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009881183" comment="qemu-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048678" comment="qemu-extra-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151108" comment="qemu-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048679" comment="qemu-guest-agent-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153019" comment="qemu-guest-agent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048680" comment="qemu-headless-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009881184" comment="qemu-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048681" comment="qemu-hw-display-qxl-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623396" comment="qemu-hw-display-qxl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048682" comment="qemu-hw-display-virtio-gpu-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623397" comment="qemu-hw-display-virtio-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048683" comment="qemu-hw-display-virtio-gpu-pci-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623398" comment="qemu-hw-display-virtio-gpu-pci is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048684" comment="qemu-hw-display-virtio-vga-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623399" comment="qemu-hw-display-virtio-vga is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048685" comment="qemu-hw-s390x-virtio-gpu-ccw-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623400" comment="qemu-hw-s390x-virtio-gpu-ccw is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048686" comment="qemu-hw-usb-host-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698021" comment="qemu-hw-usb-host is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048687" comment="qemu-hw-usb-redirect-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623401" comment="qemu-hw-usb-redirect is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048688" comment="qemu-hw-usb-smartcard-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623402" comment="qemu-hw-usb-smartcard is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048689" comment="qemu-img-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009881185" comment="qemu-img is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048690" comment="qemu-ipxe-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151109" comment="qemu-ipxe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048691" comment="qemu-ivshmem-tools-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623403" comment="qemu-ivshmem-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048692" comment="qemu-ksm-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009161270" comment="qemu-ksm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048693" comment="qemu-lang-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151111" comment="qemu-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048694" comment="qemu-linux-user-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151112" comment="qemu-linux-user is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048695" comment="qemu-microvm-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291440" comment="qemu-microvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048696" comment="qemu-ppc-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151113" comment="qemu-ppc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048697" comment="qemu-pr-helper-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009881186" comment="qemu-pr-helper is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048698" comment="qemu-s390x-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623404" comment="qemu-s390x is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048699" comment="qemu-seabios-10.0.81.16.3_3_g3d33c746-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151115" comment="qemu-seabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048700" comment="qemu-skiboot-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623405" comment="qemu-skiboot is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048701" comment="qemu-spice-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009881187" comment="qemu-spice is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048702" comment="qemu-tools-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151117" comment="qemu-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048703" comment="qemu-ui-curses-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266842" comment="qemu-ui-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048704" comment="qemu-ui-dbus-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009775937" comment="qemu-ui-dbus is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048705" comment="qemu-ui-gtk-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009266843" comment="qemu-ui-gtk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048706" comment="qemu-ui-opengl-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623406" comment="qemu-ui-opengl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048707" comment="qemu-ui-spice-app-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291441" comment="qemu-ui-spice-app is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048708" comment="qemu-ui-spice-core-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623407" comment="qemu-ui-spice-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048709" comment="qemu-vgabios-10.0.81.16.3_3_g3d33c746-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151118" comment="qemu-vgabios is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048710" comment="qemu-vhost-user-gpu-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009291442" comment="qemu-vhost-user-gpu is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048711" comment="qemu-vmsr-helper-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010035142" comment="qemu-vmsr-helper is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048712" comment="qemu-x86-10.0.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151119" comment="qemu-x86 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20260672" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-0672</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-0672" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0672" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-0672" ref_url="https://www.suse.com/security/cve/CVE-2026-0672" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024357.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024893.html" source="SUSE-SU"/>
    <description>
    When using http.cookies.Morsel, user-controlled cookie values and parameters can allow injecting HTTP headers into messages. Patch rejects all control characters within cookie names, values, and parameters.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-22"/>
	<updated date="2026-03-28"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0672/">CVE-2026-0672 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0672">CVE-2026-0672 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257031">SUSE bug 1257031</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044584" comment="libpython3_13-1_0-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039739" comment="libpython3_13-1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044585" comment="libpython3_13-1_0-x86-64-v3-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039740" comment="libpython3_13-1_0-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044586" comment="libpython3_13t1_0-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039741" comment="libpython3_13t1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044587" comment="python313-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039742" comment="python313 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044588" comment="python313-base-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039743" comment="python313-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044589" comment="python313-base-x86-64-v3-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039744" comment="python313-base-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044590" comment="python313-curses-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039745" comment="python313-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044591" comment="python313-dbm-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039746" comment="python313-dbm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044592" comment="python313-devel-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039747" comment="python313-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044593" comment="python313-doc-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039748" comment="python313-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044594" comment="python313-doc-devhelp-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039749" comment="python313-doc-devhelp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044595" comment="python313-idle-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039750" comment="python313-idle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044596" comment="python313-nogil-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039751" comment="python313-nogil is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044597" comment="python313-nogil-base-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039752" comment="python313-nogil-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044598" comment="python313-nogil-curses-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039753" comment="python313-nogil-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044599" comment="python313-nogil-dbm-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039754" comment="python313-nogil-dbm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044600" comment="python313-nogil-devel-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039755" comment="python313-nogil-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044601" comment="python313-nogil-idle-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039756" comment="python313-nogil-idle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044602" comment="python313-nogil-testsuite-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039757" comment="python313-nogil-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044603" comment="python313-nogil-tk-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039758" comment="python313-nogil-tk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044604" comment="python313-nogil-tools-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039759" comment="python313-nogil-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044605" comment="python313-testsuite-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039760" comment="python313-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044606" comment="python313-tk-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039761" comment="python313-tk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044607" comment="python313-tools-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039762" comment="python313-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044608" comment="python313-x86-64-v3-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039763" comment="python313-x86-64-v3 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20260716" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-0716</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-0716" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0716" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-0716" ref_url="https://www.suse.com/security/cve/CVE-2026-0716" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024351.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0847-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024651.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0886-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024687.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0894-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024697.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1004-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024924.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1178-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045266.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1179-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045265.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024323.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20737-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024798.html" source="SUSE-SU"/>
    <description>
    A flaw was found in libsoup's WebSocket frame processing when handling incoming messages. If a non-default configuration is used where the maximum incoming payload size is unset, the library may read memory outside the intended bounds. This can cause unintended memory exposure or a crash. Applications using libsoup's WebSocket support with this configuration may be impacted.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:L" cvss4="8.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0716/">CVE-2026-0716 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0716">CVE-2026-0716 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256418">SUSE bug 1256418</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048654" comment="libsoup-2_4-1-2.74.3-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151596" comment="libsoup-2_4-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041474" comment="libsoup-3_0-0-3.6.5-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698059" comment="libsoup-3_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041475" comment="libsoup-devel-3.6.5-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151597" comment="libsoup-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041476" comment="libsoup-lang-3.6.5-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151598" comment="libsoup-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048655" comment="libsoup2-devel-2.74.3-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009957647" comment="libsoup2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048656" comment="libsoup2-lang-2.74.3-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698060" comment="libsoup2-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048657" comment="typelib-1_0-Soup-2_4-2.74.3-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151599" comment="typelib-1_0-Soup-2_4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041477" comment="typelib-1_0-Soup-3_0-3.6.5-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698061" comment="typelib-1_0-Soup-3_0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20260719" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-0719</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-0719" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0719" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-0719" ref_url="https://www.suse.com/security/cve/CVE-2026-0719" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2049" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002479.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2214" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002486.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2215" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002487.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2216" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0151-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023792.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023874.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0253-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0257-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023891.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0258-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023890.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0265-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023897.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20205-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20212-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024074.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20245-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024234.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024323.html" source="SUSE-SU"/>
    <description>
    A flaw was identified in the NTLM authentication handling of the libsoup HTTP library, used by GNOME and other applications for network communication. When processing extremely long passwords, an internal size calculation can overflow due to improper use of signed integers. This results in incorrect memory allocation on the stack, followed by unsafe memory copying. As a result, applications using libsoup may crash unexpectedly, creating a denial-of-service risk.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0719/">CVE-2026-0719 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0719">CVE-2026-0719 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256399">SUSE bug 1256399</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048654" comment="libsoup-2_4-1-2.74.3-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151596" comment="libsoup-2_4-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041474" comment="libsoup-3_0-0-3.6.5-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698059" comment="libsoup-3_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041475" comment="libsoup-devel-3.6.5-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151597" comment="libsoup-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041476" comment="libsoup-lang-3.6.5-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151598" comment="libsoup-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048655" comment="libsoup2-devel-2.74.3-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009957647" comment="libsoup2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048656" comment="libsoup2-lang-2.74.3-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698060" comment="libsoup2-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048657" comment="typelib-1_0-Soup-2_4-2.74.3-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151599" comment="typelib-1_0-Soup-2_4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041477" comment="typelib-1_0-Soup-3_0-3.6.5-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698061" comment="typelib-1_0-Soup-3_0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20260818" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-0818</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-0818" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0818" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-0818" ref_url="https://www.suse.com/security/cve/CVE-2026-0818" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0388-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024060.html" source="SUSE-SU"/>
    <description>
    When a user explicitly requested Thunderbird to decrypt an inline OpenPGP message that was embedded in a text section of an email that was formatted and styled with HTML and CSS, then the decrypted contents were rendered in a context in which the CSS styles from the outer messages were active. If the user had additionally allowed loading of the remote content referenced by the outer email message, and the email was crafted by the sender using a combination of CSS rules and fonts and animations, then it was possible to extract the secret contents of the email. This vulnerability was fixed in Thunderbird 147.0.1 and Thunderbird 140.7.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-25"/>
	<updated date="2026-04-14"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N" cvss4="2.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0818/">CVE-2026-0818 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0818">CVE-2026-0818 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257397">SUSE bug 1257397</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050210" comment="MozillaThunderbird-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050211" comment="MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025480" comment="MozillaThunderbird-openpgp-librnp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050212" comment="MozillaThunderbird-translations-common-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050213" comment="MozillaThunderbird-translations-other-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20260861" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-0861</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-0861" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0861" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-0861" ref_url="https://www.suse.com/security/cve/CVE-2026-0861" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2786" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003249.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0347-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023996.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0499-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024155.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024632.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20544-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024593.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024576.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20608-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024608.html" source="SUSE-SU"/>
    <description>
    Passing too large an alignment to the memalign suite of functions (memalign, posix_memalign, aligned_alloc) in the GNU C Library version 2.30 to 2.42 may result in an integer overflow, which could consequently result in a heap corruption.

Note that the attacker must have control over both, the size as well as the alignment arguments of the memalign function to be able to exploit this.  The size parameter must be close enough to PTRDIFF_MAX so as to overflow size_t along with the large alignment argument.  This limits the malicious inputs for the alignment for memalign to the range [1&lt;&lt;62+ 1, 1&lt;&lt;63] and exactly 1&lt;&lt;63 for posix_memalign and aligned_alloc.

Typically the alignment argument passed to such functions is a known constrained quantity (e.g. page size, block size, struct sizes) and is not attacker controlled, because of which this may not be easily exploitable in practice.  An application bug could potentially result in the input alignment being too large, e.g. due to a different buffer overflow or integer overflow in the application or its dependent libraries, but that is again an uncommon usage pattern given typical sources of alignments.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0861/">CVE-2026-0861 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0861">CVE-2026-0861 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256766">SUSE bug 1256766</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1256913">SUSE bug 1256913</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041421" comment="cross-aarch64-glibc-devel-2.40-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041605" comment="cross-aarch64-glibc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041422" comment="cross-ppc64le-glibc-devel-2.40-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041606" comment="cross-ppc64le-glibc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041423" comment="cross-riscv64-glibc-devel-2.40-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041607" comment="cross-riscv64-glibc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041424" comment="cross-s390x-glibc-devel-2.40-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041608" comment="cross-s390x-glibc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041425" comment="glibc-2.40-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151368" comment="glibc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041426" comment="glibc-devel-2.40-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151370" comment="glibc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041427" comment="glibc-devel-static-2.40-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152567" comment="glibc-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041428" comment="glibc-extra-2.40-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151371" comment="glibc-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041429" comment="glibc-gconv-modules-extra-2.40-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041609" comment="glibc-gconv-modules-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041430" comment="glibc-html-2.40-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152569" comment="glibc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041431" comment="glibc-i18ndata-2.40-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152570" comment="glibc-i18ndata is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041432" comment="glibc-info-2.40-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151372" comment="glibc-info is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041433" comment="glibc-lang-2.40-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009651309" comment="glibc-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041434" comment="glibc-locale-2.40-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151373" comment="glibc-locale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041435" comment="glibc-locale-base-2.40-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251612" comment="glibc-locale-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041436" comment="glibc-profile-2.40-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152572" comment="glibc-profile is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041437" comment="glibc-utils-2.40-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152575" comment="glibc-utils is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20260865" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-0865</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-0865" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0865" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-0865" ref_url="https://www.suse.com/security/cve/CVE-2026-0865" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2128" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002475.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4168" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003263.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4463" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002569.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4473" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0590-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024357.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0612-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0613-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024382.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024405.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0643-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024404.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0644-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024403.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0645-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0663-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0664-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0693-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0767-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024550.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20665-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024748.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20710-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024716.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024866.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024893.html" source="SUSE-SU"/>
    <description>
    User-controlled header names and values containing newlines can allow injecting HTTP headers.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-22"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H" cvss4="5.9/CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0865/">CVE-2026-0865 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0865">CVE-2026-0865 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257042">SUSE bug 1257042</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044584" comment="libpython3_13-1_0-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039739" comment="libpython3_13-1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044585" comment="libpython3_13-1_0-x86-64-v3-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039740" comment="libpython3_13-1_0-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044586" comment="libpython3_13t1_0-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039741" comment="libpython3_13t1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044587" comment="python313-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039742" comment="python313 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044588" comment="python313-base-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039743" comment="python313-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044589" comment="python313-base-x86-64-v3-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039744" comment="python313-base-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044590" comment="python313-curses-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039745" comment="python313-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044591" comment="python313-dbm-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039746" comment="python313-dbm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044592" comment="python313-devel-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039747" comment="python313-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044593" comment="python313-doc-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039748" comment="python313-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044594" comment="python313-doc-devhelp-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039749" comment="python313-doc-devhelp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044595" comment="python313-idle-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039750" comment="python313-idle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044596" comment="python313-nogil-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039751" comment="python313-nogil is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044597" comment="python313-nogil-base-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039752" comment="python313-nogil-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044598" comment="python313-nogil-curses-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039753" comment="python313-nogil-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044599" comment="python313-nogil-dbm-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039754" comment="python313-nogil-dbm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044600" comment="python313-nogil-devel-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039755" comment="python313-nogil-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044601" comment="python313-nogil-idle-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039756" comment="python313-nogil-idle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044602" comment="python313-nogil-testsuite-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039757" comment="python313-nogil-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044603" comment="python313-nogil-tk-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039758" comment="python313-nogil-tk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044604" comment="python313-nogil-tools-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039759" comment="python313-nogil-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044605" comment="python313-testsuite-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039760" comment="python313-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044606" comment="python313-tk-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039761" comment="python313-tk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044607" comment="python313-tools-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039762" comment="python313-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044608" comment="python313-x86-64-v3-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039763" comment="python313-x86-64-v3 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20260877" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-0877</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-0877" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0877" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-0877" ref_url="https://www.suse.com/security/cve/CVE-2026-0877" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0667" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002387.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0694" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003177.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0924" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003210.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1320" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002448.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2043" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002477.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2220" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023813.html" source="SUSE-SU"/>
    <description>
    Mitigation bypass in the DOM: Security component. This vulnerability was fixed in Firefox 147, Firefox ESR 115.32, Firefox ESR 140.7, Thunderbird 147, and Thunderbird 140.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-18"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" cvss4="8.6/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0877/">CVE-2026-0877 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0877">CVE-2026-0877 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256340">SUSE bug 1256340</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037856" comment="MozillaFirefox-140.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037857" comment="MozillaFirefox-branding-upstream-140.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037858" comment="MozillaFirefox-devel-140.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037859" comment="MozillaFirefox-translations-common-140.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037860" comment="MozillaFirefox-translations-other-140.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050210" comment="MozillaThunderbird-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050211" comment="MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025480" comment="MozillaThunderbird-openpgp-librnp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050212" comment="MozillaThunderbird-translations-common-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050213" comment="MozillaThunderbird-translations-other-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20260878" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-0878</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-0878" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0878" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-0878" ref_url="https://www.suse.com/security/cve/CVE-2026-0878" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0667" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002387.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0694" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003177.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0924" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003210.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1320" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002448.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2043" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002477.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2220" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023813.html" source="SUSE-SU"/>
    <description>
    Sandbox escape due to incorrect boundary conditions in the Graphics: CanvasWebGL component. This vulnerability was fixed in Firefox 147, Firefox ESR 140.7, Thunderbird 147, and Thunderbird 140.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-18"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" cvss4="9/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2026-0878/">CVE-2026-0878 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0878">CVE-2026-0878 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256340">SUSE bug 1256340</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037856" comment="MozillaFirefox-140.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037857" comment="MozillaFirefox-branding-upstream-140.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037858" comment="MozillaFirefox-devel-140.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037859" comment="MozillaFirefox-translations-common-140.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037860" comment="MozillaFirefox-translations-other-140.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050210" comment="MozillaThunderbird-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050211" comment="MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025480" comment="MozillaThunderbird-openpgp-librnp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050212" comment="MozillaThunderbird-translations-common-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050213" comment="MozillaThunderbird-translations-other-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20260879" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-0879</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-0879" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0879" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-0879" ref_url="https://www.suse.com/security/cve/CVE-2026-0879" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0667" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002387.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0694" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003177.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0924" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003210.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1320" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002448.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2043" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002477.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2220" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023813.html" source="SUSE-SU"/>
    <description>
    Sandbox escape due to incorrect boundary conditions in the Graphics component. This vulnerability was fixed in Firefox 147, Firefox ESR 115.32, Firefox ESR 140.7, Thunderbird 147, and Thunderbird 140.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-18"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0879/">CVE-2026-0879 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0879">CVE-2026-0879 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256340">SUSE bug 1256340</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037856" comment="MozillaFirefox-140.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037857" comment="MozillaFirefox-branding-upstream-140.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037858" comment="MozillaFirefox-devel-140.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037859" comment="MozillaFirefox-translations-common-140.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037860" comment="MozillaFirefox-translations-other-140.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050210" comment="MozillaThunderbird-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050211" comment="MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025480" comment="MozillaThunderbird-openpgp-librnp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050212" comment="MozillaThunderbird-translations-common-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050213" comment="MozillaThunderbird-translations-other-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20260880" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-0880</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-0880" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0880" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-0880" ref_url="https://www.suse.com/security/cve/CVE-2026-0880" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0667" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002387.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0694" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003177.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0924" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003210.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1320" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002448.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2043" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002477.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2220" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023813.html" source="SUSE-SU"/>
    <description>
    Sandbox escape due to integer overflow in the Graphics component. This vulnerability was fixed in Firefox 147, Firefox ESR 115.32, Firefox ESR 140.7, Thunderbird 147, and Thunderbird 140.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-18"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0880/">CVE-2026-0880 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0880">CVE-2026-0880 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256340">SUSE bug 1256340</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037856" comment="MozillaFirefox-140.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037857" comment="MozillaFirefox-branding-upstream-140.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037858" comment="MozillaFirefox-devel-140.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037859" comment="MozillaFirefox-translations-common-140.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037860" comment="MozillaFirefox-translations-other-140.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050210" comment="MozillaThunderbird-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050211" comment="MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025480" comment="MozillaThunderbird-openpgp-librnp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050212" comment="MozillaThunderbird-translations-common-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050213" comment="MozillaThunderbird-translations-other-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20260882" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-0882</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-0882" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0882" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-0882" ref_url="https://www.suse.com/security/cve/CVE-2026-0882" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0667" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002387.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0694" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003177.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0924" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003210.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1320" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002448.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2043" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002477.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2220" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023813.html" source="SUSE-SU"/>
    <description>
    Use-after-free in the IPC component. This vulnerability was fixed in Firefox 147, Firefox ESR 115.32, Firefox ESR 140.7, Thunderbird 147, and Thunderbird 140.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-18"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0882/">CVE-2026-0882 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0882">CVE-2026-0882 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256340">SUSE bug 1256340</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037856" comment="MozillaFirefox-140.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037857" comment="MozillaFirefox-branding-upstream-140.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037858" comment="MozillaFirefox-devel-140.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037859" comment="MozillaFirefox-translations-common-140.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037860" comment="MozillaFirefox-translations-other-140.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050210" comment="MozillaThunderbird-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050211" comment="MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025480" comment="MozillaThunderbird-openpgp-librnp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050212" comment="MozillaThunderbird-translations-common-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050213" comment="MozillaThunderbird-translations-other-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20260883" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-0883</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-0883" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0883" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-0883" ref_url="https://www.suse.com/security/cve/CVE-2026-0883" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0667" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002387.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0694" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003177.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0924" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003210.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1320" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002448.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2043" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002477.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2220" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023813.html" source="SUSE-SU"/>
    <description>
    Information disclosure in the Networking component. This vulnerability was fixed in Firefox 147, Firefox ESR 140.7, Thunderbird 147, and Thunderbird 140.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-18"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0883/">CVE-2026-0883 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0883">CVE-2026-0883 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256340">SUSE bug 1256340</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037856" comment="MozillaFirefox-140.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037857" comment="MozillaFirefox-branding-upstream-140.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037858" comment="MozillaFirefox-devel-140.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037859" comment="MozillaFirefox-translations-common-140.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037860" comment="MozillaFirefox-translations-other-140.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050210" comment="MozillaThunderbird-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050211" comment="MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025480" comment="MozillaThunderbird-openpgp-librnp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050212" comment="MozillaThunderbird-translations-common-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050213" comment="MozillaThunderbird-translations-other-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20260884" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-0884</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-0884" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0884" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-0884" ref_url="https://www.suse.com/security/cve/CVE-2026-0884" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0667" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002387.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0694" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003177.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0924" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003210.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1320" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002448.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2043" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002477.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2220" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023813.html" source="SUSE-SU"/>
    <description>
    Use-after-free in the JavaScript Engine component. This vulnerability was fixed in Firefox 147, Firefox ESR 140.7, Thunderbird 147, and Thunderbird 140.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-18"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0884/">CVE-2026-0884 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0884">CVE-2026-0884 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256340">SUSE bug 1256340</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037856" comment="MozillaFirefox-140.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037857" comment="MozillaFirefox-branding-upstream-140.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037858" comment="MozillaFirefox-devel-140.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037859" comment="MozillaFirefox-translations-common-140.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037860" comment="MozillaFirefox-translations-other-140.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050210" comment="MozillaThunderbird-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050211" comment="MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025480" comment="MozillaThunderbird-openpgp-librnp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050212" comment="MozillaThunderbird-translations-common-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050213" comment="MozillaThunderbird-translations-other-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20260885" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-0885</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-0885" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0885" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-0885" ref_url="https://www.suse.com/security/cve/CVE-2026-0885" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0667" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002387.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0694" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003177.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0924" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003210.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1320" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002448.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2043" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002477.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2220" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023813.html" source="SUSE-SU"/>
    <description>
    Use-after-free in the JavaScript: GC component. This vulnerability was fixed in Firefox 147, Firefox ESR 140.7, Thunderbird 147, and Thunderbird 140.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-18"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0885/">CVE-2026-0885 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0885">CVE-2026-0885 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256340">SUSE bug 1256340</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037856" comment="MozillaFirefox-140.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037857" comment="MozillaFirefox-branding-upstream-140.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037858" comment="MozillaFirefox-devel-140.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037859" comment="MozillaFirefox-translations-common-140.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037860" comment="MozillaFirefox-translations-other-140.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050210" comment="MozillaThunderbird-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050211" comment="MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025480" comment="MozillaThunderbird-openpgp-librnp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050212" comment="MozillaThunderbird-translations-common-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050213" comment="MozillaThunderbird-translations-other-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20260886" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-0886</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-0886" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0886" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-0886" ref_url="https://www.suse.com/security/cve/CVE-2026-0886" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0667" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002387.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0694" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003177.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0924" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003210.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1320" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002448.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2043" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002477.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2220" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023813.html" source="SUSE-SU"/>
    <description>
    Incorrect boundary conditions in the Graphics component. This vulnerability was fixed in Firefox 147, Firefox ESR 115.32, Firefox ESR 140.7, Thunderbird 147, and Thunderbird 140.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-18"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0886/">CVE-2026-0886 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0886">CVE-2026-0886 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256340">SUSE bug 1256340</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037856" comment="MozillaFirefox-140.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037857" comment="MozillaFirefox-branding-upstream-140.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037858" comment="MozillaFirefox-devel-140.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037859" comment="MozillaFirefox-translations-common-140.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037860" comment="MozillaFirefox-translations-other-140.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050210" comment="MozillaThunderbird-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050211" comment="MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025480" comment="MozillaThunderbird-openpgp-librnp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050212" comment="MozillaThunderbird-translations-common-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050213" comment="MozillaThunderbird-translations-other-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20260887" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-0887</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-0887" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0887" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-0887" ref_url="https://www.suse.com/security/cve/CVE-2026-0887" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0667" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002387.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0694" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003177.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0924" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003210.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1320" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002448.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2043" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002477.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2220" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023813.html" source="SUSE-SU"/>
    <description>
    Clickjacking issue, information disclosure in the PDF Viewer component. This vulnerability was fixed in Firefox 147, Firefox ESR 140.7, Thunderbird 147, and Thunderbird 140.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-18"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0887/">CVE-2026-0887 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0887">CVE-2026-0887 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256340">SUSE bug 1256340</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037856" comment="MozillaFirefox-140.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037857" comment="MozillaFirefox-branding-upstream-140.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037858" comment="MozillaFirefox-devel-140.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037859" comment="MozillaFirefox-translations-common-140.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037860" comment="MozillaFirefox-translations-other-140.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050210" comment="MozillaThunderbird-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050211" comment="MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025480" comment="MozillaThunderbird-openpgp-librnp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050212" comment="MozillaThunderbird-translations-common-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050213" comment="MozillaThunderbird-translations-other-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20260890" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-0890</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-0890" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0890" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-0890" ref_url="https://www.suse.com/security/cve/CVE-2026-0890" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0667" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002387.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0694" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003177.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0924" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003210.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1320" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002448.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2043" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002477.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2220" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023813.html" source="SUSE-SU"/>
    <description>
    Spoofing issue in the DOM: Copy &amp; Paste and Drag &amp; Drop component. This vulnerability was fixed in Firefox 147, Firefox ESR 140.7, Thunderbird 147, and Thunderbird 140.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-18"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0890/">CVE-2026-0890 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0890">CVE-2026-0890 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256340">SUSE bug 1256340</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037856" comment="MozillaFirefox-140.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037857" comment="MozillaFirefox-branding-upstream-140.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037858" comment="MozillaFirefox-devel-140.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037859" comment="MozillaFirefox-translations-common-140.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037860" comment="MozillaFirefox-translations-other-140.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050210" comment="MozillaThunderbird-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050211" comment="MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025480" comment="MozillaThunderbird-openpgp-librnp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050212" comment="MozillaThunderbird-translations-common-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050213" comment="MozillaThunderbird-translations-other-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20260891" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-0891</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-0891" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0891" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-0891" ref_url="https://www.suse.com/security/cve/CVE-2026-0891" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0667" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002387.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0694" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003177.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0924" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003210.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1320" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002448.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2043" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002477.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2220" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002491.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0122-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023741.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0153-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023791.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0260-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023888.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20086-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023813.html" source="SUSE-SU"/>
    <description>
    Memory safety bugs present in Firefox ESR 140.6, Thunderbird ESR 140.6, Firefox 146 and Thunderbird 146. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability was fixed in Firefox 147, Firefox ESR 140.7, Thunderbird 147, and Thunderbird 140.7.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-18"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0891/">CVE-2026-0891 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0891">CVE-2026-0891 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256340">SUSE bug 1256340</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037856" comment="MozillaFirefox-140.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037857" comment="MozillaFirefox-branding-upstream-140.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037858" comment="MozillaFirefox-devel-140.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037859" comment="MozillaFirefox-translations-common-140.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037860" comment="MozillaFirefox-translations-other-140.7.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050210" comment="MozillaThunderbird-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050211" comment="MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025480" comment="MozillaThunderbird-openpgp-librnp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050212" comment="MozillaThunderbird-translations-common-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050213" comment="MozillaThunderbird-translations-other-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20260899" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-0899</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-0899" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0899" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-0899" ref_url="https://www.suse.com/security/cve/CVE-2026-0899" source="SUSE CVE"/>
    <description>
    Out of bounds memory access in V8 in Google Chrome prior to 144.0.7559.59 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-18"/>
	<updated date="2026-01-24"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-0899/">CVE-2026-0899 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0899">CVE-2026-0899 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256614">SUSE bug 1256614</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037894" comment="chromedriver-144.0.7559.59-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037895" comment="chromium-144.0.7559.59-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20260900" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-0900</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-0900" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0900" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-0900" ref_url="https://www.suse.com/security/cve/CVE-2026-0900" source="SUSE CVE"/>
    <description>
    Inappropriate implementation in V8 in Google Chrome prior to 144.0.7559.59 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-18"/>
	<updated date="2026-01-22"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-0900/">CVE-2026-0900 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0900">CVE-2026-0900 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256614">SUSE bug 1256614</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037894" comment="chromedriver-144.0.7559.59-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037895" comment="chromium-144.0.7559.59-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20260901" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-0901</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-0901" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0901" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-0901" ref_url="https://www.suse.com/security/cve/CVE-2026-0901" source="SUSE CVE"/>
    <description>
    Inappropriate implementation in Blink in Google Chrome on Android prior to 144.0.7559.59 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-18"/>
	<updated date="2026-01-22"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-0901/">CVE-2026-0901 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0901">CVE-2026-0901 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256614">SUSE bug 1256614</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037894" comment="chromedriver-144.0.7559.59-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037895" comment="chromium-144.0.7559.59-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20260902" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-0902</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-0902" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0902" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-0902" ref_url="https://www.suse.com/security/cve/CVE-2026-0902" source="SUSE CVE"/>
    <description>
    Inappropriate implementation in V8 in Google Chrome prior to 144.0.7559.59 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: Medium)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-18"/>
	<updated date="2026-01-22"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-0902/">CVE-2026-0902 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0902">CVE-2026-0902 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256614">SUSE bug 1256614</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037894" comment="chromedriver-144.0.7559.59-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037895" comment="chromium-144.0.7559.59-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20260903" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-0903</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-0903" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0903" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-0903" ref_url="https://www.suse.com/security/cve/CVE-2026-0903" source="SUSE CVE"/>
    <description>
    Inappropriate implementation in Downloads in Google Chrome on Windows prior to 144.0.7559.59 allowed a remote attacker to bypass dangerous file type protections via a malicious file. (Chromium security severity: Medium)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-18"/>
	<updated date="2026-01-22"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-0903/">CVE-2026-0903 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0903">CVE-2026-0903 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256614">SUSE bug 1256614</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037894" comment="chromedriver-144.0.7559.59-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037895" comment="chromium-144.0.7559.59-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20260904" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-0904</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-0904" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0904" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-0904" ref_url="https://www.suse.com/security/cve/CVE-2026-0904" source="SUSE CVE"/>
    <description>
    Incorrect security UI in Digital Credentials in Google Chrome prior to 144.0.7559.59 allowed a remote attacker to perform domain spoofing via a crafted HTML page. (Chromium security severity: Medium)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-18"/>
	<updated date="2026-01-22"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-0904/">CVE-2026-0904 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0904">CVE-2026-0904 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256614">SUSE bug 1256614</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037894" comment="chromedriver-144.0.7559.59-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037895" comment="chromium-144.0.7559.59-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20260905" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-0905</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-0905" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0905" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-0905" ref_url="https://www.suse.com/security/cve/CVE-2026-0905" source="SUSE CVE"/>
    <description>
    Insufficient policy enforcement in Network in Google Chrome prior to 144.0.7559.59 allowed an attack who obtained a network log file to potentially obtain potentially sensitive information via a network log file. (Chromium security severity: Medium)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-18"/>
	<updated date="2026-01-22"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-0905/">CVE-2026-0905 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0905">CVE-2026-0905 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256614">SUSE bug 1256614</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037894" comment="chromedriver-144.0.7559.59-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037895" comment="chromium-144.0.7559.59-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20260906" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-0906</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-0906" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0906" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-0906" ref_url="https://www.suse.com/security/cve/CVE-2026-0906" source="SUSE CVE"/>
    <description>
    Incorrect security UI  in Google Chrome on Android prior to 144.0.7559.59 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: Low)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-18"/>
	<updated date="2026-01-22"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-0906/">CVE-2026-0906 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0906">CVE-2026-0906 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256614">SUSE bug 1256614</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037894" comment="chromedriver-144.0.7559.59-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037895" comment="chromium-144.0.7559.59-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20260907" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-0907</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-0907" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0907" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-0907" ref_url="https://www.suse.com/security/cve/CVE-2026-0907" source="SUSE CVE"/>
    <description>
    Incorrect security UI in Split View in Google Chrome prior to 144.0.7559.59 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-18"/>
	<updated date="2026-01-22"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-0907/">CVE-2026-0907 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0907">CVE-2026-0907 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256614">SUSE bug 1256614</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037894" comment="chromedriver-144.0.7559.59-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037895" comment="chromium-144.0.7559.59-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20260908" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-0908</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-0908" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0908" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-0908" ref_url="https://www.suse.com/security/cve/CVE-2026-0908" source="SUSE CVE"/>
    <description>
    Use after free in ANGLE in Google Chrome prior to 144.0.7559.59 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Low)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-18"/>
	<updated date="2026-01-22"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-0908/">CVE-2026-0908 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0908">CVE-2026-0908 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256614">SUSE bug 1256614</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037894" comment="chromedriver-144.0.7559.59-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010037895" comment="chromium-144.0.7559.59-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20260915" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-0915</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-0915" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0915" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-0915" ref_url="https://www.suse.com/security/cve/CVE-2026-0915" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2786" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003249.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4772" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0371-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024041.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0680-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024494.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0896-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024696.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20178-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024006.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20198-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024021.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20527-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024495.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20536-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024559.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024576.html" source="SUSE-SU"/>
    <description>
    Calling getnetbyaddr or getnetbyaddr_r with a configured nsswitch.conf that specifies the library's DNS backend for networks and queries for a zero-valued network in the GNU C Library version 2.0 to version 2.42 can leak stack contents to the configured DNS resolver.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0915/">CVE-2026-0915 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0915">CVE-2026-0915 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256822">SUSE bug 1256822</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041421" comment="cross-aarch64-glibc-devel-2.40-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041605" comment="cross-aarch64-glibc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041422" comment="cross-ppc64le-glibc-devel-2.40-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041606" comment="cross-ppc64le-glibc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041423" comment="cross-riscv64-glibc-devel-2.40-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041607" comment="cross-riscv64-glibc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041424" comment="cross-s390x-glibc-devel-2.40-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041608" comment="cross-s390x-glibc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041425" comment="glibc-2.40-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151368" comment="glibc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041426" comment="glibc-devel-2.40-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151370" comment="glibc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041427" comment="glibc-devel-static-2.40-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152567" comment="glibc-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041428" comment="glibc-extra-2.40-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151371" comment="glibc-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041429" comment="glibc-gconv-modules-extra-2.40-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041609" comment="glibc-gconv-modules-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041430" comment="glibc-html-2.40-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152569" comment="glibc-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041431" comment="glibc-i18ndata-2.40-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152570" comment="glibc-i18ndata is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041432" comment="glibc-info-2.40-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151372" comment="glibc-info is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041433" comment="glibc-lang-2.40-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009651309" comment="glibc-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041434" comment="glibc-locale-2.40-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151373" comment="glibc-locale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041435" comment="glibc-locale-base-2.40-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009251612" comment="glibc-locale-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041436" comment="glibc-profile-2.40-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152572" comment="glibc-profile is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041437" comment="glibc-utils-2.40-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152575" comment="glibc-utils is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20260959" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-0959</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-0959" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0959" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-0959" ref_url="https://www.suse.com/security/cve/CVE-2026-0959" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1169-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024065.html" source="SUSE-SU"/>
    <description>
    IEEE 802.11 protocol dissector crash in Wireshark 4.6.0 to 4.6.2 and 4.4.0 to 4.4.12 allows denial of service
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0959/">CVE-2026-0959 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-0959">CVE-2026-0959 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256734">SUSE bug 1256734</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041589" comment="libwireshark18-4.4.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041611" comment="libwireshark18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041590" comment="libwiretap15-4.4.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041612" comment="libwiretap15 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041591" comment="libwsutil16-4.4.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041613" comment="libwsutil16 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041592" comment="wireshark-4.4.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041593" comment="wireshark-devel-4.4.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041594" comment="wireshark-ui-qt-4.4.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20260961" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-0961</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-0961" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0961" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-0961" ref_url="https://www.suse.com/security/cve/CVE-2026-0961" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:1169-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024065.html" source="SUSE-SU"/>
    <description>
    BLF file parser crash in Wireshark 4.6.0 to 4.6.2 and 4.4.0 to 4.4.12 allows denial of service
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0961/">CVE-2026-0961 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-0961">CVE-2026-0961 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256738">SUSE bug 1256738</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041589" comment="libwireshark18-4.4.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041611" comment="libwireshark18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041590" comment="libwiretap15-4.4.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041612" comment="libwiretap15 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041591" comment="libwsutil16-4.4.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041613" comment="libwsutil16 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041592" comment="wireshark-4.4.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041593" comment="wireshark-devel-4.4.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041594" comment="wireshark-ui-qt-4.4.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20260962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-0962</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-0962" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0962" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-0962" ref_url="https://www.suse.com/security/cve/CVE-2026-0962" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0237-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023848.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1169-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045264.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20222-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024065.html" source="SUSE-SU"/>
    <description>
    SOME/IP-SD protocol dissector crash in Wireshark 4.6.0 to 4.6.2 and 4.4.0 to 4.4.12 allows denial of service
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0962/">CVE-2026-0962 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-0962">CVE-2026-0962 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256739">SUSE bug 1256739</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041589" comment="libwireshark18-4.4.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041611" comment="libwireshark18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041590" comment="libwiretap15-4.4.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041612" comment="libwiretap15 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041591" comment="libwsutil16-4.4.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041613" comment="libwsutil16 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041592" comment="wireshark-4.4.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151250" comment="wireshark is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041593" comment="wireshark-devel-4.4.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153033" comment="wireshark-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041594" comment="wireshark-ui-qt-4.4.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153034" comment="wireshark-ui-qt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20260988" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-0988</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-0988" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0988" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-0988" ref_url="https://www.suse.com/security/cve/CVE-2026-0988" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0264-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0266-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023905.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0286-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023912.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0458-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024133.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20446-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024480.html" source="SUSE-SU"/>
    <description>
    A flaw was found in glib. Missing validation of offset and count parameters in the g_buffered_input_stream_peek() function can lead to an integer overflow during length calculation. When specially crafted values are provided, this overflow results in an incorrect size being passed to memcpy(), triggering a buffer overflow. This can cause application crashes, leading to a Denial of Service (DoS).
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-02-28"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0988/">CVE-2026-0988 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0988">CVE-2026-0988 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257049">SUSE bug 1257049</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041570" comment="gio-branding-upstream-2.84.4-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009241263" comment="gio-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041571" comment="glib2-devel-2.84.4-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151142" comment="glib2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041572" comment="glib2-devel-static-2.84.4-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009241266" comment="glib2-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041573" comment="glib2-doc-2.84.4-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009862594" comment="glib2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041574" comment="glib2-lang-2.84.4-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151143" comment="glib2-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041575" comment="glib2-tests-devel-2.84.4-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009755645" comment="glib2-tests-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041576" comment="glib2-tools-2.84.4-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151144" comment="glib2-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041577" comment="libgio-2_0-0-2.84.4-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151145" comment="libgio-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041578" comment="libgirepository-2_0-0-2.84.4-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037220" comment="libgirepository-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041579" comment="libglib-2_0-0-2.84.4-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151147" comment="libglib-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041580" comment="libgmodule-2_0-0-2.84.4-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151149" comment="libgmodule-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041581" comment="libgobject-2_0-0-2.84.4-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151151" comment="libgobject-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041582" comment="libgthread-2_0-0-2.84.4-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151153" comment="libgthread-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041583" comment="typelib-1_0-GIRepository-3_0-2.84.4-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037221" comment="typelib-1_0-GIRepository-3_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041584" comment="typelib-1_0-GLib-2_0-2.84.4-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037222" comment="typelib-1_0-GLib-2_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041585" comment="typelib-1_0-GLibUnix-2_0-2.84.4-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037223" comment="typelib-1_0-GLibUnix-2_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041586" comment="typelib-1_0-GModule-2_0-2.84.4-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037224" comment="typelib-1_0-GModule-2_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041587" comment="typelib-1_0-GObject-2_0-2.84.4-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037225" comment="typelib-1_0-GObject-2_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041588" comment="typelib-1_0-Gio-2_0-2.84.4-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037226" comment="typelib-1_0-Gio-2_0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20260989" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-0989</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-0989" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0989" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-0989" ref_url="https://www.suse.com/security/cve/CVE-2026-0989" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0334-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023988.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0336-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023986.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0391-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024076.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024094.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024102.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20353-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024278.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024731.html" source="SUSE-SU"/>
    <description>
    A flaw was identified in the RelaxNG parser of libxml2 related to how external schema inclusions are handled. The parser does not enforce a limit on inclusion depth when resolving nested &lt;include&gt; directives. Specially crafted or overly complex schemas can cause excessive recursion during parsing. This may lead to stack exhaustion and application crashes, creating a denial-of-service risk.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-06"/>
	<updated date="2026-03-19"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0989/">CVE-2026-0989 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0989">CVE-2026-0989 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256804">SUSE bug 1256804</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042230" comment="libxml2-2-2.13.8-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151137" comment="libxml2-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042231" comment="libxml2-devel-2.13.8-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151139" comment="libxml2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042232" comment="libxml2-doc-2.13.8-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152664" comment="libxml2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042233" comment="libxml2-tools-2.13.8-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151140" comment="libxml2-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042234" comment="python313-libxml2-2.13.8-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010042235" comment="python313-libxml2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20260990" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-0990</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-0990" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0990" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-0990" ref_url="https://www.suse.com/security/cve/CVE-2026-0990" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0568-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024731.html" source="SUSE-SU"/>
    <description>
    A flaw was found in libxml2, an XML parsing library. This uncontrolled recursion vulnerability occurs in the xmlCatalogXMLResolveURI function when an XML catalog contains a delegate URI entry that references itself. A remote attacker could exploit this configuration-dependent issue by providing a specially crafted XML catalog, leading to infinite recursion and call stack exhaustion. This ultimately results in a segmentation fault, causing a Denial of Service (DoS) by crashing affected applications.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0990/">CVE-2026-0990 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0990">CVE-2026-0990 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256806">SUSE bug 1256806</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047326" comment="libexslt0-1.1.43-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010030589" comment="libexslt0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047327" comment="libxml2-2-2.13.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151137" comment="libxml2-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047328" comment="libxml2-devel-2.13.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151139" comment="libxml2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047329" comment="libxml2-doc-2.13.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152664" comment="libxml2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047330" comment="libxml2-tools-2.13.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151140" comment="libxml2-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047331" comment="libxslt-devel-1.1.43-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009155744" comment="libxslt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047332" comment="libxslt-tools-1.1.43-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009155747" comment="libxslt-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047333" comment="libxslt1-1.1.43-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009155748" comment="libxslt1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047334" comment="python313-libxml2-2.13.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010042235" comment="python313-libxml2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20260992" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-0992</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-0992" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0992" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-0992" ref_url="https://www.suse.com/security/cve/CVE-2026-0992" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0568-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024731.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the libxml2 library. This uncontrolled resource consumption vulnerability occurs when processing XML catalogs that contain repeated &lt;nextCatalog&gt; elements pointing to the same downstream catalog. A remote attacker can exploit this by supplying crafted catalogs, causing the parser to redundantly traverse catalog chains. This leads to excessive CPU consumption and degrades application availability, resulting in a denial-of-service condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0992/">CVE-2026-0992 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-0992">CVE-2026-0992 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256808">SUSE bug 1256808</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047326" comment="libexslt0-1.1.43-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010030589" comment="libexslt0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047327" comment="libxml2-2-2.13.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151137" comment="libxml2-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047328" comment="libxml2-devel-2.13.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151139" comment="libxml2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047329" comment="libxml2-doc-2.13.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152664" comment="libxml2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047330" comment="libxml2-tools-2.13.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151140" comment="libxml2-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047331" comment="libxslt-devel-1.1.43-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009155744" comment="libxslt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047332" comment="libxslt-tools-1.1.43-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009155747" comment="libxslt-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047333" comment="libxslt1-1.1.43-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009155748" comment="libxslt1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047334" comment="python313-libxml2-2.13.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010042235" comment="python313-libxml2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20260994" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-0994</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-0994" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-0994" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-0994" ref_url="https://www.suse.com/security/cve/CVE-2026-0994" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3095" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003209.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3219" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0374-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024046.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0517-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024258.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0563-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0618-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20352-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024279.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20490-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024482.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20753-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024831.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20907-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025106.html" source="SUSE-SU"/>
    <description>
    A denial-of-service (DoS) vulnerability exists in google.protobuf.json_format.ParseDict() in Python, where the max_recursion_depth limit can be bypassed when parsing nested google.protobuf.Any messages.

Due to missing recursion depth accounting inside the internal Any-handling logic, an attacker can supply deeply nested Any structures that bypass the intended recursion limit, eventually exhausting Python's recursion stack and causing a RecursionError.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-25"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-0994/">CVE-2026-0994 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-0994">CVE-2026-0994 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257173">SUSE bug 1257173</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050202" comment="libprotobuf-lite28_3_0-28.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010050223" comment="libprotobuf-lite28_3_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050016" comment="libprotobuf28_3_0-28.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010050224" comment="libprotobuf28_3_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050203" comment="libprotoc28_3_0-28.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010050225" comment="libprotoc28_3_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050017" comment="libutf8_range-28_3_0-28.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010050226" comment="libutf8_range-28_3_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050204" comment="protobuf-devel-28.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677909" comment="protobuf-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050205" comment="protobuf-java-28.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009677910" comment="protobuf-java is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050206" comment="protobuf-java-bom-28.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010007673" comment="protobuf-java-bom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050207" comment="protobuf-java-javadoc-28.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010050227" comment="protobuf-java-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050208" comment="protobuf-java-parent-28.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010007674" comment="protobuf-java-parent is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050209" comment="python313-protobuf-5.28.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010050228" comment="python313-protobuf is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20261207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-1207</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-1207" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1207" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-1207" ref_url="https://www.suse.com/security/cve/CVE-2026-1207" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024108.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4.2.28.
Raster lookups on ``RasterField`` (only implemented on PostGIS) allows remote attackers to inject SQL via the band index parameter.
Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected.
Django would like to thank Tarek Nakkouch for reporting this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-08"/>
	<updated date="2026-02-12"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-1207/">CVE-2026-1207 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1207">CVE-2026-1207 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257405">SUSE bug 1257405</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042368" comment="python313-Django-5.2.4-bp160.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025481" comment="python313-Django is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20261220" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-1220</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-1220" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1220" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-1220" ref_url="https://www.suse.com/security/cve/CVE-2026-1220" source="SUSE CVE"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-25"/>
	<updated date="2026-01-25"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-1220/">CVE-2026-1220 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1220">CVE-2026-1220 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257011">SUSE bug 1257011</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039736" comment="chromedriver-144.0.7559.96-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039737" comment="chromium-144.0.7559.96-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20261285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-1285</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-1285" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1285" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-1285" ref_url="https://www.suse.com/security/cve/CVE-2026-1285" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024108.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4.2.28.
`django.utils.text.Truncator.chars()` and `Truncator.words()` methods (with `html=True`) and the `truncatechars_html` and `truncatewords_html` template filters allow a remote attacker to cause a potential denial-of-service via crafted inputs containing a large number of unmatched HTML end tags.
Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected.
Django would like to thank Seokchan Yoon for reporting this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-08"/>
	<updated date="2026-02-12"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-1285/">CVE-2026-1285 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1285">CVE-2026-1285 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257406">SUSE bug 1257406</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042368" comment="python313-Django-5.2.4-bp160.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025481" comment="python313-Django is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20261287" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-1287</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-1287" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1287" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-1287" ref_url="https://www.suse.com/security/cve/CVE-2026-1287" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024108.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4.2.28.
`FilteredRelation` is subject to SQL injection in column aliases via control characters, using a suitably crafted dictionary, with dictionary expansion, as the `**kwargs` passed to `QuerySet` methods `annotate()`, `aggregate()`, `extra()`, `values()`, `values_list()`, and `alias()`.
Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected.
Django would like to thank Solomon Kebede for reporting this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-08"/>
	<updated date="2026-02-12"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-1287/">CVE-2026-1287 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1287">CVE-2026-1287 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257407">SUSE bug 1257407</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042368" comment="python313-Django-5.2.4-bp160.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025481" comment="python313-Django is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20261299" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-1299</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-1299" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1299" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-1299" ref_url="https://www.suse.com/security/cve/CVE-2026-1299" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2128" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002475.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4165" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003253.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4168" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003263.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4216" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003265.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4463" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002569.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4473" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002580.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4746" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002594.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6464" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002649.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024676.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0884-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024681.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0891-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024691.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0897-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024695.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1062-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1090-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024967.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1107-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025017.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1117-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025015.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20543-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024596.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024622.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20951-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045288.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20956-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045283.html" source="SUSE-SU"/>
    <description>
    The 
email module, specifically the "BytesGenerator" class, didn't properly quote newlines for email headers when 
serializing an email message allowing for header injection when an email
 is serialized. This is only applicable if using "LiteralHeader" writing headers that don't respect email folding rules, the new behavior will reject the incorrectly folded headers in "BytesGenerator".
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-22"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" cvss4="8.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1299/">CVE-2026-1299 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1299">CVE-2026-1299 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257181">SUSE bug 1257181</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044584" comment="libpython3_13-1_0-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039739" comment="libpython3_13-1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044585" comment="libpython3_13-1_0-x86-64-v3-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039740" comment="libpython3_13-1_0-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044586" comment="libpython3_13t1_0-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039741" comment="libpython3_13t1_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044587" comment="python313-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039742" comment="python313 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044588" comment="python313-base-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039743" comment="python313-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044589" comment="python313-base-x86-64-v3-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039744" comment="python313-base-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044590" comment="python313-curses-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039745" comment="python313-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044591" comment="python313-dbm-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039746" comment="python313-dbm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044592" comment="python313-devel-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039747" comment="python313-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044593" comment="python313-doc-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039748" comment="python313-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044594" comment="python313-doc-devhelp-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039749" comment="python313-doc-devhelp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044595" comment="python313-idle-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039750" comment="python313-idle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044596" comment="python313-nogil-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039751" comment="python313-nogil is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044597" comment="python313-nogil-base-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039752" comment="python313-nogil-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044598" comment="python313-nogil-curses-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039753" comment="python313-nogil-curses is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044599" comment="python313-nogil-dbm-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039754" comment="python313-nogil-dbm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044600" comment="python313-nogil-devel-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039755" comment="python313-nogil-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044601" comment="python313-nogil-idle-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039756" comment="python313-nogil-idle is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044602" comment="python313-nogil-testsuite-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039757" comment="python313-nogil-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044603" comment="python313-nogil-tk-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039758" comment="python313-nogil-tk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044604" comment="python313-nogil-tools-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039759" comment="python313-nogil-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044605" comment="python313-testsuite-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039760" comment="python313-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044606" comment="python313-tk-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039761" comment="python313-tk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044607" comment="python313-tools-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039762" comment="python313-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044608" comment="python313-x86-64-v3-3.13.12-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039763" comment="python313-x86-64-v3 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20261312" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-1312</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-1312" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1312" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-1312" ref_url="https://www.suse.com/security/cve/CVE-2026-1312" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0440-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024108.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in 6.0 before 6.0.2, 5.2 before 5.2.11, and 4.2 before 4.2.28.
`.QuerySet.order_by()` is subject to SQL injection in column aliases containing periods when the same alias is, using a suitably crafted dictionary, with dictionary expansion, used in `FilteredRelation`.
Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected.
Django would like to thank Solomon Kebede for reporting this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-08"/>
	<updated date="2026-02-12"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-1312/">CVE-2026-1312 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1312">CVE-2026-1312 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257408">SUSE bug 1257408</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042368" comment="python313-Django-5.2.4-bp160.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025481" comment="python313-Django is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20261467" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-1467</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-1467" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1467" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-1467" ref_url="https://www.suse.com/security/cve/CVE-2026-1467" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20649-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024801.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025111.html" source="SUSE-SU"/>
    <description>
    A flaw was found in libsoup, an HTTP client library. This vulnerability, known as CRLF (Carriage Return Line Feed) Injection, occurs when an HTTP proxy is configured and the library improperly handles URL-decoded input used to create the Host header. A remote attacker can exploit this by providing a specially crafted URL containing CRLF sequences, allowing them to inject additional HTTP headers or complete HTTP request bodies. This can lead to unintended or unauthorized HTTP requests being forwarded by the proxy, potentially impacting downstream services.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-14"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1467/">CVE-2026-1467 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-1467">CVE-2026-1467 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257398">SUSE bug 1257398</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048654" comment="libsoup-2_4-1-2.74.3-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151596" comment="libsoup-2_4-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050015" comment="libsoup-3_0-0-3.6.6-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698059" comment="libsoup-3_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050176" comment="libsoup-devel-3.6.6-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151597" comment="libsoup-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050177" comment="libsoup-lang-3.6.6-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151598" comment="libsoup-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048655" comment="libsoup2-devel-2.74.3-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009957647" comment="libsoup2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048656" comment="libsoup2-lang-2.74.3-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698060" comment="libsoup2-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048657" comment="typelib-1_0-Soup-2_4-2.74.3-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151599" comment="typelib-1_0-Soup-2_4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050178" comment="typelib-1_0-Soup-3_0-3.6.6-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698061" comment="typelib-1_0-Soup-3_0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20261484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-1484</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-1484" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1484" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-1484" ref_url="https://www.suse.com/security/cve/CVE-2026-1484" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20446-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024480.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the GLib Base64 encoding routine when processing very large input data. Due to incorrect use of integer types during length calculation, the library may miscalculate buffer boundaries. This can cause memory writes outside the allocated buffer. Applications that process untrusted or extremely large Base64 input using GLib may crash or behave unpredictably.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-02-28"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1484/">CVE-2026-1484 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1484">CVE-2026-1484 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257355">SUSE bug 1257355</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041570" comment="gio-branding-upstream-2.84.4-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009241263" comment="gio-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041571" comment="glib2-devel-2.84.4-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151142" comment="glib2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041572" comment="glib2-devel-static-2.84.4-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009241266" comment="glib2-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041573" comment="glib2-doc-2.84.4-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009862594" comment="glib2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041574" comment="glib2-lang-2.84.4-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151143" comment="glib2-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041575" comment="glib2-tests-devel-2.84.4-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009755645" comment="glib2-tests-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041576" comment="glib2-tools-2.84.4-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151144" comment="glib2-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041577" comment="libgio-2_0-0-2.84.4-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151145" comment="libgio-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041578" comment="libgirepository-2_0-0-2.84.4-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037220" comment="libgirepository-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041579" comment="libglib-2_0-0-2.84.4-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151147" comment="libglib-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041580" comment="libgmodule-2_0-0-2.84.4-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151149" comment="libgmodule-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041581" comment="libgobject-2_0-0-2.84.4-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151151" comment="libgobject-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041582" comment="libgthread-2_0-0-2.84.4-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151153" comment="libgthread-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041583" comment="typelib-1_0-GIRepository-3_0-2.84.4-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037221" comment="typelib-1_0-GIRepository-3_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041584" comment="typelib-1_0-GLib-2_0-2.84.4-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037222" comment="typelib-1_0-GLib-2_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041585" comment="typelib-1_0-GLibUnix-2_0-2.84.4-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037223" comment="typelib-1_0-GLibUnix-2_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041586" comment="typelib-1_0-GModule-2_0-2.84.4-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037224" comment="typelib-1_0-GModule-2_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041587" comment="typelib-1_0-GObject-2_0-2.84.4-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037225" comment="typelib-1_0-GObject-2_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041588" comment="typelib-1_0-Gio-2_0-2.84.4-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037226" comment="typelib-1_0-Gio-2_0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20261485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-1485</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-1485" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1485" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-1485" ref_url="https://www.suse.com/security/cve/CVE-2026-1485" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20446-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024480.html" source="SUSE-SU"/>
    <description>
    A flaw was found in Glib's content type parsing logic. This buffer underflow vulnerability occurs because the length of a header line is stored in a signed integer, which can lead to integer wraparound for very large inputs. This results in pointer underflow and out-of-bounds memory access. Exploitation requires a local user to install or process a specially crafted treemagic file, which can lead to local denial of service or application instability.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-02-28"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1485/">CVE-2026-1485 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1485">CVE-2026-1485 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257354">SUSE bug 1257354</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041570" comment="gio-branding-upstream-2.84.4-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009241263" comment="gio-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041571" comment="glib2-devel-2.84.4-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151142" comment="glib2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041572" comment="glib2-devel-static-2.84.4-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009241266" comment="glib2-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041573" comment="glib2-doc-2.84.4-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009862594" comment="glib2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041574" comment="glib2-lang-2.84.4-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151143" comment="glib2-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041575" comment="glib2-tests-devel-2.84.4-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009755645" comment="glib2-tests-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041576" comment="glib2-tools-2.84.4-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151144" comment="glib2-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041577" comment="libgio-2_0-0-2.84.4-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151145" comment="libgio-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041578" comment="libgirepository-2_0-0-2.84.4-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037220" comment="libgirepository-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041579" comment="libglib-2_0-0-2.84.4-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151147" comment="libglib-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041580" comment="libgmodule-2_0-0-2.84.4-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151149" comment="libgmodule-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041581" comment="libgobject-2_0-0-2.84.4-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151151" comment="libgobject-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041582" comment="libgthread-2_0-0-2.84.4-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151153" comment="libgthread-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041583" comment="typelib-1_0-GIRepository-3_0-2.84.4-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037221" comment="typelib-1_0-GIRepository-3_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041584" comment="typelib-1_0-GLib-2_0-2.84.4-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037222" comment="typelib-1_0-GLib-2_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041585" comment="typelib-1_0-GLibUnix-2_0-2.84.4-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037223" comment="typelib-1_0-GLibUnix-2_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041586" comment="typelib-1_0-GModule-2_0-2.84.4-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037224" comment="typelib-1_0-GModule-2_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041587" comment="typelib-1_0-GObject-2_0-2.84.4-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037225" comment="typelib-1_0-GObject-2_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041588" comment="typelib-1_0-Gio-2_0-2.84.4-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037226" comment="typelib-1_0-Gio-2_0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20261489" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-1489</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-1489" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1489" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-1489" ref_url="https://www.suse.com/security/cve/CVE-2026-1489" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0355-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024001.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0372-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024048.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024047.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20210-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024050.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20221-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024066.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20446-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20493-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024480.html" source="SUSE-SU"/>
    <description>
    A flaw was found in GLib. An integer overflow vulnerability in its Unicode case conversion implementation can lead to memory corruption. By processing specially crafted and extremely large Unicode strings, an attacker could trigger an undersized memory allocation, resulting in out-of-bounds writes. This could cause applications utilizing GLib for string conversion to crash or become unstable.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-02-28"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1489/">CVE-2026-1489 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1489">CVE-2026-1489 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257353">SUSE bug 1257353</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041570" comment="gio-branding-upstream-2.84.4-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009241263" comment="gio-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041571" comment="glib2-devel-2.84.4-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151142" comment="glib2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041572" comment="glib2-devel-static-2.84.4-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009241266" comment="glib2-devel-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041573" comment="glib2-doc-2.84.4-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009862594" comment="glib2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041574" comment="glib2-lang-2.84.4-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151143" comment="glib2-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041575" comment="glib2-tests-devel-2.84.4-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009755645" comment="glib2-tests-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041576" comment="glib2-tools-2.84.4-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151144" comment="glib2-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041577" comment="libgio-2_0-0-2.84.4-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151145" comment="libgio-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041578" comment="libgirepository-2_0-0-2.84.4-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037220" comment="libgirepository-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041579" comment="libglib-2_0-0-2.84.4-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151147" comment="libglib-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041580" comment="libgmodule-2_0-0-2.84.4-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151149" comment="libgmodule-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041581" comment="libgobject-2_0-0-2.84.4-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151151" comment="libgobject-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041582" comment="libgthread-2_0-0-2.84.4-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151153" comment="libgthread-2_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041583" comment="typelib-1_0-GIRepository-3_0-2.84.4-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037221" comment="typelib-1_0-GIRepository-3_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041584" comment="typelib-1_0-GLib-2_0-2.84.4-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037222" comment="typelib-1_0-GLib-2_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041585" comment="typelib-1_0-GLibUnix-2_0-2.84.4-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037223" comment="typelib-1_0-GLibUnix-2_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041586" comment="typelib-1_0-GModule-2_0-2.84.4-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037224" comment="typelib-1_0-GModule-2_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041587" comment="typelib-1_0-GObject-2_0-2.84.4-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037225" comment="typelib-1_0-GObject-2_0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041588" comment="typelib-1_0-Gio-2_0-2.84.4-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037226" comment="typelib-1_0-Gio-2_0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20261504" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-1504</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-1504" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1504" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-1504" ref_url="https://www.suse.com/security/cve/CVE-2026-1504" source="SUSE CVE"/>
    <description>
    Inappropriate implementation in Background Fetch API in Google Chrome prior to 144.0.7559.110 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-02-03"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-1504/">CVE-2026-1504 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1504">CVE-2026-1504 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257404">SUSE bug 1257404</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041602" comment="chromedriver-144.0.7559.109-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041603" comment="chromium-144.0.7559.109-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20261536" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-1536</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-1536" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1536" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-1536" ref_url="https://www.suse.com/security/cve/CVE-2026-1536" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20649-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044819.html" source="SUSE-SU"/>
    <description>
    A flaw was found in libsoup. An attacker who can control the input for the Content-Disposition header can inject CRLF (Carriage Return Line Feed) sequences into the header value. These sequences are then interpreted verbatim when the HTTP request or response is constructed, allowing arbitrary HTTP headers to be injected. This vulnerability can lead to HTTP header injection or HTTP response splitting without requiring authentication or user interaction.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-11"/>
	<updated date="2026-03-27"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1536/">CVE-2026-1536 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-1536">CVE-2026-1536 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257440">SUSE bug 1257440</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042593" comment="libsoup-3_0-0-3.6.5-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698059" comment="libsoup-3_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042594" comment="libsoup-devel-3.6.5-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151597" comment="libsoup-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042595" comment="libsoup-lang-3.6.5-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151598" comment="libsoup-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042596" comment="typelib-1_0-Soup-3_0-3.6.5-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698061" comment="typelib-1_0-Soup-3_0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20261539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-1539</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-1539" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1539" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-1539" ref_url="https://www.suse.com/security/cve/CVE-2026-1539" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20649-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024801.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025111.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the libsoup HTTP library that can cause proxy authentication credentials to be sent to unintended destinations. When handling HTTP redirects, libsoup removes the Authorization header but does not remove the Proxy-Authorization header if the request is redirected to a different host. As a result, sensitive proxy credentials may be leaked to third-party servers. Applications using libsoup for HTTP communication may unintentionally expose proxy authentication data.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-14"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:L/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1539/">CVE-2026-1539 at SUSE</cve>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-1539">CVE-2026-1539 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257441">SUSE bug 1257441</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048654" comment="libsoup-2_4-1-2.74.3-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151596" comment="libsoup-2_4-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050015" comment="libsoup-3_0-0-3.6.6-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698059" comment="libsoup-3_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050176" comment="libsoup-devel-3.6.6-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151597" comment="libsoup-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050177" comment="libsoup-lang-3.6.6-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151598" comment="libsoup-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048655" comment="libsoup2-devel-2.74.3-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009957647" comment="libsoup2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048656" comment="libsoup2-lang-2.74.3-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698060" comment="libsoup2-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048657" comment="typelib-1_0-Soup-2_4-2.74.3-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151599" comment="typelib-1_0-Soup-2_4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050178" comment="typelib-1_0-Soup-3_0-3.6.6-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698061" comment="typelib-1_0-Soup-3_0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20261615" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-1615</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-1615" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1615" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-1615" ref_url="https://www.suse.com/security/cve/CVE-2026-1615" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:1008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024627.html" source="SUSE-SU"/>
    <description>
    Versions of the package jsonpath before 1.3.0 are vulnerable to Arbitrary Code Injection via unsafe evaluation of user-supplied JSON Path expressions. The library relies on the static-eval module to process JSON Path input, which is not designed to handle untrusted data safely. An attacker can exploit this vulnerability by supplying a malicious JSON Path expression that, when evaluated, executes arbitrary JavaScript code, leading to Remote Code Execution in Node.js environments or Cross-site Scripting (XSS) in browser contexts. This affects all methods that evaluate JSON Paths against objects, including .query, .nodes, .paths, .value, .parent, and .apply.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-19"/>
	<updated date="2026-04-08"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2026-1615/">CVE-2026-1615 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1615">CVE-2026-1615 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257897">SUSE bug 1257897</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044293" comment="golang-github-prometheus-prometheus-3.5.0-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630838" comment="golang-github-prometheus-prometheus is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20261703" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-1703</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-1703" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1703" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-1703" ref_url="https://www.suse.com/security/cve/CVE-2026-1703" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0420-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024090.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0805-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024567.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20423-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024347.html" source="SUSE-SU"/>
    <description>
    When pip is installing and extracting a maliciously crafted wheel archive, files may be extracted outside the installation directory. The path traversal is limited to prefixes of the installation directory, thus isn't able to inject or overwrite executable files in typical situations.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-15"/>
	<updated date="2026-03-06"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N" cvss4="2.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1703/">CVE-2026-1703 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1703">CVE-2026-1703 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257599">SUSE bug 1257599</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010043887" comment="python313-pip-25.0.1-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010043910" comment="python313-pip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010043888" comment="python313-pip-wheel-25.0.1-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010043911" comment="python313-pip-wheel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20261709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-1709</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-1709" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1709" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-1709" ref_url="https://www.suse.com/security/cve/CVE-2026-1709" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2224" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003201.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20912-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025103.html" source="SUSE-SU"/>
    <description>
    A flaw was found in Keylime. The Keylime registrar, since version 7.12.0, does not enforce client-side Transport Layer Security (TLS) authentication. This authentication bypass vulnerability allows unauthenticated clients with network access to perform administrative operations, including listing agents, retrieving public Trusted Platform Module (TPM) data, and deleting agents, by connecting without presenting a client certificate.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-11"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1709/">CVE-2026-1709 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-1709">CVE-2026-1709 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257895">SUSE bug 1257895</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050714" comment="keylime-config-7.14.0+0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009704319" comment="keylime-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050715" comment="keylime-firewalld-7.14.0+0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009704320" comment="keylime-firewalld is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050716" comment="keylime-logrotate-7.14.0+0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009777628" comment="keylime-logrotate is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050717" comment="keylime-registrar-7.14.0+0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009704321" comment="keylime-registrar is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050718" comment="keylime-tenant-7.14.0+0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033448" comment="keylime-tenant is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050719" comment="keylime-tpm_cert_store-7.14.0+0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009704322" comment="keylime-tpm_cert_store is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050720" comment="keylime-verifier-7.14.0+0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009704323" comment="keylime-verifier is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050721" comment="python313-keylime-7.14.0+0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033449" comment="python313-keylime is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20261757" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-1757</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-1757" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1757" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-1757" ref_url="https://www.suse.com/security/cve/CVE-2026-1757" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0568-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024338.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0605-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024371.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0606-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024370.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0782-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024536.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20631-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024645.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024753.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20707-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024731.html" source="SUSE-SU"/>
    <description>
    A flaw was identified in the interactive shell of the xmllint utility, part of the libxml2 project, where memory allocated for user input is not properly released under certain conditions. When a user submits input consisting only of whitespace, the program skips command execution but fails to free the allocated buffer. Repeating this action causes memory to continuously accumulate. Over time, this can exhaust system memory and terminate the xmllint process, creating a denial-of-service condition on the local system.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-19"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1757/">CVE-2026-1757 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1757">CVE-2026-1757 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257593">SUSE bug 1257593</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047326" comment="libexslt0-1.1.43-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010030589" comment="libexslt0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047327" comment="libxml2-2-2.13.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151137" comment="libxml2-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047328" comment="libxml2-devel-2.13.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151139" comment="libxml2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047329" comment="libxml2-doc-2.13.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152664" comment="libxml2-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047330" comment="libxml2-tools-2.13.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151140" comment="libxml2-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047331" comment="libxslt-devel-1.1.43-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009155744" comment="libxslt-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047332" comment="libxslt-tools-1.1.43-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009155747" comment="libxslt-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047333" comment="libxslt1-1.1.43-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009155748" comment="libxslt1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047334" comment="python313-libxml2-2.13.8-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010042235" comment="python313-libxml2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20261760" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-1760</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-1760" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1760" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-1760" ref_url="https://www.suse.com/security/cve/CVE-2026-1760" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0788-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024530.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0792-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024564.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0796-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024565.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0811-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024600.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024636.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20649-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20727-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024801.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025111.html" source="SUSE-SU"/>
    <description>
    A flaw was found in SoupServer. This HTTP request smuggling vulnerability occurs because SoupServer improperly handles requests that combine Transfer-Encoding: chunked and Connection: keep-alive headers. A remote, unauthenticated client can exploit this by sending specially crafted requests, causing SoupServer to fail to close the connection as required by RFC 9112. This allows the attacker to smuggle additional requests over the persistent connection, leading to unintended request processing and potential denial-of-service (DoS) conditions.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-14"/>
	<updated date="2026-04-02"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1760/">CVE-2026-1760 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1760">CVE-2026-1760 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257597">SUSE bug 1257597</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048654" comment="libsoup-2_4-1-2.74.3-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151596" comment="libsoup-2_4-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050015" comment="libsoup-3_0-0-3.6.6-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698059" comment="libsoup-3_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050176" comment="libsoup-devel-3.6.6-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151597" comment="libsoup-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050177" comment="libsoup-lang-3.6.6-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151598" comment="libsoup-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048655" comment="libsoup2-devel-2.74.3-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009957647" comment="libsoup2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048656" comment="libsoup2-lang-2.74.3-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698060" comment="libsoup2-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048657" comment="typelib-1_0-Soup-2_4-2.74.3-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151599" comment="typelib-1_0-Soup-2_4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050178" comment="typelib-1_0-Soup-3_0-3.6.6-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698061" comment="typelib-1_0-Soup-3_0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20261761" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-1761</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-1761" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1761" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-1761" ref_url="https://www.suse.com/security/cve/CVE-2026-1761" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2049" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002479.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2214" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002486.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2215" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002487.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2216" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003178.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024092.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0419-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024091.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0431-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024117.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0497-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024351.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0579-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024354.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20238-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024098.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20339-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024259.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20445-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20649-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044819.html" source="SUSE-SU"/>
    <description>
    A flaw was found in libsoup. This stack-based buffer overflow vulnerability occurs during the parsing of multipart HTTP responses due to an incorrect length calculation. A remote attacker can exploit this by sending a specially crafted multipart HTTP response, which can lead to memory corruption. This issue may result in application crashes or arbitrary code execution in applications that process untrusted server responses, and it does not require authentication or user interaction.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-11"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1761/">CVE-2026-1761 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1761">CVE-2026-1761 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257598">SUSE bug 1257598</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045715" comment="libsoup-2_4-1-2.74.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151596" comment="libsoup-2_4-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042593" comment="libsoup-3_0-0-3.6.5-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698059" comment="libsoup-3_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042594" comment="libsoup-devel-3.6.5-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151597" comment="libsoup-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042595" comment="libsoup-lang-3.6.5-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151598" comment="libsoup-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045716" comment="libsoup2-devel-2.74.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009957647" comment="libsoup2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045717" comment="libsoup2-lang-2.74.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698060" comment="libsoup2-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045718" comment="typelib-1_0-Soup-2_4-2.74.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151599" comment="typelib-1_0-Soup-2_4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042596" comment="typelib-1_0-Soup-3_0-3.6.5-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698061" comment="typelib-1_0-Soup-3_0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20261837" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-1837</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-1837" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1837" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-1837" ref_url="https://www.suse.com/security/cve/CVE-2026-1837" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0648-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025110.html" source="SUSE-SU"/>
    <description>
    A specially-crafted file can cause libjxl's decoder to write pixel data to uninitialized unallocated memory. Soon after that data from another uninitialized unallocated region is copied to pixel data.

This can be done by requesting color transformation of grayscale images to another grayscale color space. Buffers allocated for 1-float-per-pixel are used as if they are allocated for 3-float-per-pixel. That happens only if LCMS2 is used as CMS engine. There is another CMS engine available (selected by build flags).
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-25"/>
	<updated date="2026-04-02"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1837/">CVE-2026-1837 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1837">CVE-2026-1837 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258091">SUSE bug 1258091</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050179" comment="libjxl-devel-0.11.2-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771646" comment="libjxl-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050180" comment="libjxl-tools-0.11.2-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771647" comment="libjxl-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050181" comment="libjxl0_11-0.11.2-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010050221" comment="libjxl0_11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050182" comment="libjxl0_11-x86-64-v3-0.11.2-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010050222" comment="libjxl0_11-x86-64-v3 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20261861" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-1861</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-1861" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1861" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-1861" ref_url="https://www.suse.com/security/cve/CVE-2026-1861" source="SUSE CVE"/>
    <description>
    Heap buffer overflow in libvpx in Google Chrome prior to 144.0.7559.132 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-08"/>
	<updated date="2026-02-08"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-1861/">CVE-2026-1861 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1861">CVE-2026-1861 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257650">SUSE bug 1257650</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042366" comment="chromedriver-144.0.7559.132-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042367" comment="chromium-144.0.7559.132-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20261862" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-1862</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-1862" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1862" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-1862" ref_url="https://www.suse.com/security/cve/CVE-2026-1862" source="SUSE CVE"/>
    <description>
    Type Confusion in V8 in Google Chrome prior to 144.0.7559.132 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-08"/>
	<updated date="2026-02-08"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-1862/">CVE-2026-1862 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1862">CVE-2026-1862 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257650">SUSE bug 1257650</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042366" comment="chromedriver-144.0.7559.132-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010042367" comment="chromium-144.0.7559.132-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20261965" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-1965</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-1965" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1965" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-1965" ref_url="https://www.suse.com/security/cve/CVE-2026-1965" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20668-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20722-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025098.html" source="SUSE-SU"/>
    <description>
    libcurl can in some circumstances reuse the wrong connection when asked to do
an Negotiate-authenticated HTTP or HTTPS request.

libcurl features a pool of recent connections so that subsequent requests can
reuse an existing connection to avoid overhead.

When reusing a connection a range of criterion must first be met. Due to a
logical error in the code, a request that was issued by an application could
wrongfully reuse an existing connection to the same server that was
authenticated using different credentials. One underlying reason being that
Negotiate sometimes authenticates *connections* and not *requests*, contrary
to how HTTP is designed to work.

An application that allows Negotiate authentication to a server (that responds
wanting Negotiate) with `user1:password1` and then does another operation to
the same server also using Negotiate but with `user2:password2` (while the
previous connection is still alive) - the second request wrongly reused the
same connection and since it then sees that the Negotiate negotiation is
already made, it just sends the request over that connection thinking it uses
the user2 credentials when it is in fact still using the connection
authenticated for user1...

The set of authentication methods to use is set with  `CURLOPT_HTTPAUTH`.

Applications can disable libcurl's reuse of connections and thus mitigate this
problem, by using one of the following libcurl options to alter how
connections are or are not reused: `CURLOPT_FRESH_CONNECT`,
`CURLOPT_MAXCONNECTS` and `CURLMOPT_MAX_HOST_CONNECTIONS` (if using the
curl_multi API).
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:N" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:N/SC:H/SI:H/SA:N" href="https://www.suse.com/security/cve/CVE-2026-1965/">CVE-2026-1965 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-1965">CVE-2026-1965 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259362">SUSE bug 1259362</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050024" comment="curl-8.14.1-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051760" comment="curl-fish-completion-8.14.1-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010031781" comment="curl-fish-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050729" comment="curl-zsh-completion-8.14.1-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010031782" comment="curl-zsh-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050730" comment="libcurl-devel-8.14.1-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151178" comment="libcurl-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050731" comment="libcurl-devel-doc-8.14.1-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010031783" comment="libcurl-devel-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050025" comment="libcurl4-8.14.1-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20261998" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-1998</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-1998" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-1998" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-1998" ref_url="https://www.suse.com/security/cve/CVE-2026-1998" source="SUSE CVE"/>
    <description>
    A flaw has been found in micropython up to 1.27.0. This vulnerability affects the function mp_import_all of the file py/runtime.c. This manipulation causes memory corruption. The attack needs to be launched locally. The exploit has been published and may be used. Patch name: 570744d06c5ba9dba59b4c3f432ca4f0abd396b6. It is suggested to install a patch to address this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-12"/>
	<updated date="2026-02-19"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-1998/">CVE-2026-1998 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-1998">CVE-2026-1998 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257803">SUSE bug 1257803</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010043206" comment="micropython-1.26.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025793" comment="micropython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010043207" comment="mpremote-1.26.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025794" comment="mpremote is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010043208" comment="mpy-tools-1.26.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025795" comment="mpy-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262003" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2003</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2003" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2003" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2003" ref_url="https://www.suse.com/security/cve/CVE-2026-2003" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3730" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003231.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3896" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003213.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4110" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003208.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4546" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002581.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4547" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045348.html" source="SUSE-SU"/>
    <description>
    Improper validation of type "oidvector" in PostgreSQL allows a database user to disclose a few bytes of server memory.  We have not ruled out viability of attacks that arrange for presence of confidential information in disclosed bytes, but they seem unlikely.  Versions before PostgreSQL 18.2, 17.8, 16.12, 15.16, and 14.21 are affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2026-2003/">CVE-2026-2003 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2003">CVE-2026-2003 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258008">SUSE bug 1258008</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050748" comment="libecpg6-18.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151069" comment="libecpg6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050749" comment="libpq5-18.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151071" comment="libpq5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045662" comment="postgresql14-14.21-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009657383" comment="postgresql14 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045663" comment="postgresql14-contrib-14.21-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009657384" comment="postgresql14-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045664" comment="postgresql14-devel-14.21-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009657385" comment="postgresql14-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045665" comment="postgresql14-docs-14.21-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009657387" comment="postgresql14-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045666" comment="postgresql14-llvmjit-14.21-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009657388" comment="postgresql14-llvmjit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045667" comment="postgresql14-llvmjit-devel-14.21-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698138" comment="postgresql14-llvmjit-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045668" comment="postgresql14-plperl-14.21-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009657389" comment="postgresql14-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045669" comment="postgresql14-plpython-14.21-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009657390" comment="postgresql14-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045670" comment="postgresql14-pltcl-14.21-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009657391" comment="postgresql14-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045671" comment="postgresql14-server-14.21-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009657392" comment="postgresql14-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045672" comment="postgresql14-server-devel-14.21-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009657393" comment="postgresql14-server-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045673" comment="postgresql14-test-14.21-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009657394" comment="postgresql14-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045674" comment="postgresql15-15.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009742699" comment="postgresql15 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045675" comment="postgresql15-contrib-15.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009742700" comment="postgresql15-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045676" comment="postgresql15-devel-15.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009742701" comment="postgresql15-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045677" comment="postgresql15-docs-15.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009742702" comment="postgresql15-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045678" comment="postgresql15-llvmjit-15.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009742703" comment="postgresql15-llvmjit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045679" comment="postgresql15-llvmjit-devel-15.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009742704" comment="postgresql15-llvmjit-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045680" comment="postgresql15-plperl-15.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009742705" comment="postgresql15-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045681" comment="postgresql15-plpython-15.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009742706" comment="postgresql15-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045682" comment="postgresql15-pltcl-15.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009742707" comment="postgresql15-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045683" comment="postgresql15-server-15.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009742708" comment="postgresql15-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045684" comment="postgresql15-server-devel-15.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009742709" comment="postgresql15-server-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045685" comment="postgresql15-test-15.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009742710" comment="postgresql15-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052621" comment="postgresql16-16.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009811566" comment="postgresql16 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052622" comment="postgresql16-contrib-16.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009811567" comment="postgresql16-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052623" comment="postgresql16-devel-16.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009811568" comment="postgresql16-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052624" comment="postgresql16-docs-16.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009811570" comment="postgresql16-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052625" comment="postgresql16-llvmjit-16.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009811571" comment="postgresql16-llvmjit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052626" comment="postgresql16-llvmjit-devel-16.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009811572" comment="postgresql16-llvmjit-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052627" comment="postgresql16-plperl-16.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009811573" comment="postgresql16-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052628" comment="postgresql16-plpython-16.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009811574" comment="postgresql16-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052629" comment="postgresql16-pltcl-16.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009811575" comment="postgresql16-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052630" comment="postgresql16-server-16.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009811576" comment="postgresql16-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052631" comment="postgresql16-server-devel-16.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009811577" comment="postgresql16-server-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052632" comment="postgresql16-test-16.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009811578" comment="postgresql16-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050190" comment="postgresql17-17.9-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009954906" comment="postgresql17 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050191" comment="postgresql17-contrib-17.9-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009954907" comment="postgresql17-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050192" comment="postgresql17-devel-17.9-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009954908" comment="postgresql17-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050193" comment="postgresql17-docs-17.9-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009954909" comment="postgresql17-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050194" comment="postgresql17-llvmjit-17.9-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009954910" comment="postgresql17-llvmjit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050195" comment="postgresql17-llvmjit-devel-17.9-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009954911" comment="postgresql17-llvmjit-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050196" comment="postgresql17-plperl-17.9-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009954912" comment="postgresql17-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050197" comment="postgresql17-plpython-17.9-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009954913" comment="postgresql17-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050198" comment="postgresql17-pltcl-17.9-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009954914" comment="postgresql17-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050199" comment="postgresql17-server-17.9-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009954915" comment="postgresql17-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050200" comment="postgresql17-server-devel-17.9-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009954916" comment="postgresql17-server-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050201" comment="postgresql17-test-17.9-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009954917" comment="postgresql17-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050750" comment="postgresql18-18.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033162" comment="postgresql18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050751" comment="postgresql18-contrib-18.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033163" comment="postgresql18-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050752" comment="postgresql18-devel-18.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033164" comment="postgresql18-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051761" comment="postgresql18-devel-mini-18.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041624" comment="postgresql18-devel-mini is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050753" comment="postgresql18-docs-18.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033165" comment="postgresql18-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051762" comment="postgresql18-llvmjit-18.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033166" comment="postgresql18-llvmjit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051763" comment="postgresql18-llvmjit-devel-18.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033167" comment="postgresql18-llvmjit-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050754" comment="postgresql18-plperl-18.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033168" comment="postgresql18-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050755" comment="postgresql18-plpython-18.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033169" comment="postgresql18-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050756" comment="postgresql18-pltcl-18.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033170" comment="postgresql18-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050757" comment="postgresql18-server-18.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033171" comment="postgresql18-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050758" comment="postgresql18-server-devel-18.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033172" comment="postgresql18-server-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051764" comment="postgresql18-test-18.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033173" comment="postgresql18-test is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262004" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2004</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2004" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2004" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2004" ref_url="https://www.suse.com/security/cve/CVE-2026-2004" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3730" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003231.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3896" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003213.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4024" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002561.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4059" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002565.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4063" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002560.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4064" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002566.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4110" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003208.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4528" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002576.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4546" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002581.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4547" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045348.html" source="SUSE-SU"/>
    <description>
    Missing validation of type of input in PostgreSQL intarray extension selectivity estimator function allows an object creator to execute arbitrary code as the operating system user running the database.  Versions before PostgreSQL 18.2, 17.8, 16.12, 15.16, and 14.21 are affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2004/">CVE-2026-2004 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2004">CVE-2026-2004 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258009">SUSE bug 1258009</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050748" comment="libecpg6-18.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151069" comment="libecpg6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050749" comment="libpq5-18.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151071" comment="libpq5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045662" comment="postgresql14-14.21-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009657383" comment="postgresql14 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045663" comment="postgresql14-contrib-14.21-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009657384" comment="postgresql14-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045664" comment="postgresql14-devel-14.21-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009657385" comment="postgresql14-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045665" comment="postgresql14-docs-14.21-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009657387" comment="postgresql14-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045666" comment="postgresql14-llvmjit-14.21-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009657388" comment="postgresql14-llvmjit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045667" comment="postgresql14-llvmjit-devel-14.21-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698138" comment="postgresql14-llvmjit-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045668" comment="postgresql14-plperl-14.21-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009657389" comment="postgresql14-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045669" comment="postgresql14-plpython-14.21-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009657390" comment="postgresql14-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045670" comment="postgresql14-pltcl-14.21-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009657391" comment="postgresql14-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045671" comment="postgresql14-server-14.21-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009657392" comment="postgresql14-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045672" comment="postgresql14-server-devel-14.21-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009657393" comment="postgresql14-server-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045673" comment="postgresql14-test-14.21-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009657394" comment="postgresql14-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045674" comment="postgresql15-15.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009742699" comment="postgresql15 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045675" comment="postgresql15-contrib-15.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009742700" comment="postgresql15-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045676" comment="postgresql15-devel-15.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009742701" comment="postgresql15-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045677" comment="postgresql15-docs-15.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009742702" comment="postgresql15-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045678" comment="postgresql15-llvmjit-15.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009742703" comment="postgresql15-llvmjit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045679" comment="postgresql15-llvmjit-devel-15.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009742704" comment="postgresql15-llvmjit-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045680" comment="postgresql15-plperl-15.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009742705" comment="postgresql15-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045681" comment="postgresql15-plpython-15.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009742706" comment="postgresql15-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045682" comment="postgresql15-pltcl-15.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009742707" comment="postgresql15-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045683" comment="postgresql15-server-15.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009742708" comment="postgresql15-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045684" comment="postgresql15-server-devel-15.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009742709" comment="postgresql15-server-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045685" comment="postgresql15-test-15.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009742710" comment="postgresql15-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052621" comment="postgresql16-16.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009811566" comment="postgresql16 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052622" comment="postgresql16-contrib-16.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009811567" comment="postgresql16-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052623" comment="postgresql16-devel-16.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009811568" comment="postgresql16-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052624" comment="postgresql16-docs-16.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009811570" comment="postgresql16-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052625" comment="postgresql16-llvmjit-16.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009811571" comment="postgresql16-llvmjit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052626" comment="postgresql16-llvmjit-devel-16.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009811572" comment="postgresql16-llvmjit-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052627" comment="postgresql16-plperl-16.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009811573" comment="postgresql16-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052628" comment="postgresql16-plpython-16.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009811574" comment="postgresql16-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052629" comment="postgresql16-pltcl-16.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009811575" comment="postgresql16-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052630" comment="postgresql16-server-16.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009811576" comment="postgresql16-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052631" comment="postgresql16-server-devel-16.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009811577" comment="postgresql16-server-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052632" comment="postgresql16-test-16.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009811578" comment="postgresql16-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050190" comment="postgresql17-17.9-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009954906" comment="postgresql17 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050191" comment="postgresql17-contrib-17.9-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009954907" comment="postgresql17-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050192" comment="postgresql17-devel-17.9-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009954908" comment="postgresql17-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050193" comment="postgresql17-docs-17.9-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009954909" comment="postgresql17-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050194" comment="postgresql17-llvmjit-17.9-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009954910" comment="postgresql17-llvmjit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050195" comment="postgresql17-llvmjit-devel-17.9-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009954911" comment="postgresql17-llvmjit-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050196" comment="postgresql17-plperl-17.9-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009954912" comment="postgresql17-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050197" comment="postgresql17-plpython-17.9-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009954913" comment="postgresql17-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050198" comment="postgresql17-pltcl-17.9-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009954914" comment="postgresql17-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050199" comment="postgresql17-server-17.9-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009954915" comment="postgresql17-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050200" comment="postgresql17-server-devel-17.9-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009954916" comment="postgresql17-server-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050201" comment="postgresql17-test-17.9-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009954917" comment="postgresql17-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050750" comment="postgresql18-18.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033162" comment="postgresql18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050751" comment="postgresql18-contrib-18.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033163" comment="postgresql18-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050752" comment="postgresql18-devel-18.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033164" comment="postgresql18-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051761" comment="postgresql18-devel-mini-18.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041624" comment="postgresql18-devel-mini is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050753" comment="postgresql18-docs-18.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033165" comment="postgresql18-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051762" comment="postgresql18-llvmjit-18.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033166" comment="postgresql18-llvmjit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051763" comment="postgresql18-llvmjit-devel-18.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033167" comment="postgresql18-llvmjit-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050754" comment="postgresql18-plperl-18.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033168" comment="postgresql18-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050755" comment="postgresql18-plpython-18.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033169" comment="postgresql18-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050756" comment="postgresql18-pltcl-18.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033170" comment="postgresql18-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050757" comment="postgresql18-server-18.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033171" comment="postgresql18-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050758" comment="postgresql18-server-devel-18.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033172" comment="postgresql18-server-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051764" comment="postgresql18-test-18.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033173" comment="postgresql18-test is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262005" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2005</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2005" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2005" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2005" ref_url="https://www.suse.com/security/cve/CVE-2026-2005" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3730" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003231.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3896" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003213.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4024" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002561.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4059" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002565.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4063" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002560.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4064" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002566.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4110" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003208.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4528" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002576.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4546" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002581.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4547" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045348.html" source="SUSE-SU"/>
    <description>
    Heap buffer overflow in PostgreSQL pgcrypto allows a ciphertext provider to execute arbitrary code as the operating system user running the database.  Versions before PostgreSQL 18.2, 17.8, 16.12, 15.16, and 14.21 are affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2005/">CVE-2026-2005 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2005">CVE-2026-2005 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258010">SUSE bug 1258010</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050748" comment="libecpg6-18.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151069" comment="libecpg6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050749" comment="libpq5-18.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151071" comment="libpq5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045662" comment="postgresql14-14.21-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009657383" comment="postgresql14 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045663" comment="postgresql14-contrib-14.21-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009657384" comment="postgresql14-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045664" comment="postgresql14-devel-14.21-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009657385" comment="postgresql14-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045665" comment="postgresql14-docs-14.21-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009657387" comment="postgresql14-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045666" comment="postgresql14-llvmjit-14.21-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009657388" comment="postgresql14-llvmjit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045667" comment="postgresql14-llvmjit-devel-14.21-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698138" comment="postgresql14-llvmjit-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045668" comment="postgresql14-plperl-14.21-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009657389" comment="postgresql14-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045669" comment="postgresql14-plpython-14.21-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009657390" comment="postgresql14-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045670" comment="postgresql14-pltcl-14.21-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009657391" comment="postgresql14-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045671" comment="postgresql14-server-14.21-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009657392" comment="postgresql14-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045672" comment="postgresql14-server-devel-14.21-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009657393" comment="postgresql14-server-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045673" comment="postgresql14-test-14.21-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009657394" comment="postgresql14-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045674" comment="postgresql15-15.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009742699" comment="postgresql15 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045675" comment="postgresql15-contrib-15.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009742700" comment="postgresql15-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045676" comment="postgresql15-devel-15.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009742701" comment="postgresql15-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045677" comment="postgresql15-docs-15.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009742702" comment="postgresql15-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045678" comment="postgresql15-llvmjit-15.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009742703" comment="postgresql15-llvmjit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045679" comment="postgresql15-llvmjit-devel-15.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009742704" comment="postgresql15-llvmjit-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045680" comment="postgresql15-plperl-15.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009742705" comment="postgresql15-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045681" comment="postgresql15-plpython-15.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009742706" comment="postgresql15-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045682" comment="postgresql15-pltcl-15.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009742707" comment="postgresql15-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045683" comment="postgresql15-server-15.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009742708" comment="postgresql15-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045684" comment="postgresql15-server-devel-15.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009742709" comment="postgresql15-server-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045685" comment="postgresql15-test-15.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009742710" comment="postgresql15-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052621" comment="postgresql16-16.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009811566" comment="postgresql16 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052622" comment="postgresql16-contrib-16.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009811567" comment="postgresql16-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052623" comment="postgresql16-devel-16.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009811568" comment="postgresql16-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052624" comment="postgresql16-docs-16.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009811570" comment="postgresql16-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052625" comment="postgresql16-llvmjit-16.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009811571" comment="postgresql16-llvmjit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052626" comment="postgresql16-llvmjit-devel-16.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009811572" comment="postgresql16-llvmjit-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052627" comment="postgresql16-plperl-16.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009811573" comment="postgresql16-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052628" comment="postgresql16-plpython-16.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009811574" comment="postgresql16-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052629" comment="postgresql16-pltcl-16.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009811575" comment="postgresql16-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052630" comment="postgresql16-server-16.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009811576" comment="postgresql16-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052631" comment="postgresql16-server-devel-16.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009811577" comment="postgresql16-server-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052632" comment="postgresql16-test-16.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009811578" comment="postgresql16-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050190" comment="postgresql17-17.9-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009954906" comment="postgresql17 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050191" comment="postgresql17-contrib-17.9-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009954907" comment="postgresql17-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050192" comment="postgresql17-devel-17.9-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009954908" comment="postgresql17-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050193" comment="postgresql17-docs-17.9-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009954909" comment="postgresql17-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050194" comment="postgresql17-llvmjit-17.9-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009954910" comment="postgresql17-llvmjit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050195" comment="postgresql17-llvmjit-devel-17.9-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009954911" comment="postgresql17-llvmjit-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050196" comment="postgresql17-plperl-17.9-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009954912" comment="postgresql17-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050197" comment="postgresql17-plpython-17.9-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009954913" comment="postgresql17-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050198" comment="postgresql17-pltcl-17.9-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009954914" comment="postgresql17-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050199" comment="postgresql17-server-17.9-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009954915" comment="postgresql17-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050200" comment="postgresql17-server-devel-17.9-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009954916" comment="postgresql17-server-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050201" comment="postgresql17-test-17.9-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009954917" comment="postgresql17-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050750" comment="postgresql18-18.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033162" comment="postgresql18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050751" comment="postgresql18-contrib-18.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033163" comment="postgresql18-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050752" comment="postgresql18-devel-18.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033164" comment="postgresql18-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051761" comment="postgresql18-devel-mini-18.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041624" comment="postgresql18-devel-mini is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050753" comment="postgresql18-docs-18.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033165" comment="postgresql18-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051762" comment="postgresql18-llvmjit-18.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033166" comment="postgresql18-llvmjit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051763" comment="postgresql18-llvmjit-devel-18.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033167" comment="postgresql18-llvmjit-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050754" comment="postgresql18-plperl-18.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033168" comment="postgresql18-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050755" comment="postgresql18-plpython-18.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033169" comment="postgresql18-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050756" comment="postgresql18-pltcl-18.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033170" comment="postgresql18-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050757" comment="postgresql18-server-18.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033171" comment="postgresql18-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050758" comment="postgresql18-server-devel-18.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033172" comment="postgresql18-server-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051764" comment="postgresql18-test-18.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033173" comment="postgresql18-test is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262006" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2006</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2006" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2006" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2006" ref_url="https://www.suse.com/security/cve/CVE-2026-2006" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3730" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003231.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3896" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003213.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4024" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002561.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4059" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002565.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4063" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002560.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4064" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002566.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4110" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003208.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4528" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002576.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4546" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002581.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4547" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002570.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0586-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024360.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024359.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0614-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024381.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024380.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024379.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0768-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024549.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0769-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024548.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024547.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0771-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024546.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0784-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024534.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0785-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024533.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0786-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024532.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0787-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024531.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0882-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024683.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0883-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024682.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024619.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20588-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024618.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20906-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025095.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20983-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045348.html" source="SUSE-SU"/>
    <description>
    Missing validation of multibyte character length in PostgreSQL text manipulation allows a database user to issue crafted queries that achieve a buffer overrun.  That suffices to execute arbitrary code as the operating system user running the database.  Versions before PostgreSQL 18.2, 17.8, 16.12, 15.16, and 14.21 are affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2006/">CVE-2026-2006 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2006">CVE-2026-2006 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258011">SUSE bug 1258011</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050748" comment="libecpg6-18.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151069" comment="libecpg6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050749" comment="libpq5-18.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151071" comment="libpq5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045662" comment="postgresql14-14.21-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009657383" comment="postgresql14 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045663" comment="postgresql14-contrib-14.21-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009657384" comment="postgresql14-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045664" comment="postgresql14-devel-14.21-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009657385" comment="postgresql14-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045665" comment="postgresql14-docs-14.21-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009657387" comment="postgresql14-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045666" comment="postgresql14-llvmjit-14.21-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009657388" comment="postgresql14-llvmjit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045667" comment="postgresql14-llvmjit-devel-14.21-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698138" comment="postgresql14-llvmjit-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045668" comment="postgresql14-plperl-14.21-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009657389" comment="postgresql14-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045669" comment="postgresql14-plpython-14.21-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009657390" comment="postgresql14-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045670" comment="postgresql14-pltcl-14.21-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009657391" comment="postgresql14-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045671" comment="postgresql14-server-14.21-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009657392" comment="postgresql14-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045672" comment="postgresql14-server-devel-14.21-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009657393" comment="postgresql14-server-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045673" comment="postgresql14-test-14.21-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009657394" comment="postgresql14-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045674" comment="postgresql15-15.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009742699" comment="postgresql15 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045675" comment="postgresql15-contrib-15.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009742700" comment="postgresql15-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045676" comment="postgresql15-devel-15.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009742701" comment="postgresql15-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045677" comment="postgresql15-docs-15.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009742702" comment="postgresql15-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045678" comment="postgresql15-llvmjit-15.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009742703" comment="postgresql15-llvmjit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045679" comment="postgresql15-llvmjit-devel-15.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009742704" comment="postgresql15-llvmjit-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045680" comment="postgresql15-plperl-15.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009742705" comment="postgresql15-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045681" comment="postgresql15-plpython-15.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009742706" comment="postgresql15-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045682" comment="postgresql15-pltcl-15.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009742707" comment="postgresql15-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045683" comment="postgresql15-server-15.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009742708" comment="postgresql15-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045684" comment="postgresql15-server-devel-15.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009742709" comment="postgresql15-server-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045685" comment="postgresql15-test-15.16-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009742710" comment="postgresql15-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052621" comment="postgresql16-16.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009811566" comment="postgresql16 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052622" comment="postgresql16-contrib-16.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009811567" comment="postgresql16-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052623" comment="postgresql16-devel-16.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009811568" comment="postgresql16-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052624" comment="postgresql16-docs-16.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009811570" comment="postgresql16-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052625" comment="postgresql16-llvmjit-16.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009811571" comment="postgresql16-llvmjit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052626" comment="postgresql16-llvmjit-devel-16.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009811572" comment="postgresql16-llvmjit-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052627" comment="postgresql16-plperl-16.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009811573" comment="postgresql16-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052628" comment="postgresql16-plpython-16.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009811574" comment="postgresql16-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052629" comment="postgresql16-pltcl-16.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009811575" comment="postgresql16-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052630" comment="postgresql16-server-16.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009811576" comment="postgresql16-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052631" comment="postgresql16-server-devel-16.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009811577" comment="postgresql16-server-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052632" comment="postgresql16-test-16.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009811578" comment="postgresql16-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050190" comment="postgresql17-17.9-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009954906" comment="postgresql17 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050191" comment="postgresql17-contrib-17.9-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009954907" comment="postgresql17-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050192" comment="postgresql17-devel-17.9-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009954908" comment="postgresql17-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050193" comment="postgresql17-docs-17.9-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009954909" comment="postgresql17-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050194" comment="postgresql17-llvmjit-17.9-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009954910" comment="postgresql17-llvmjit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050195" comment="postgresql17-llvmjit-devel-17.9-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009954911" comment="postgresql17-llvmjit-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050196" comment="postgresql17-plperl-17.9-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009954912" comment="postgresql17-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050197" comment="postgresql17-plpython-17.9-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009954913" comment="postgresql17-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050198" comment="postgresql17-pltcl-17.9-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009954914" comment="postgresql17-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050199" comment="postgresql17-server-17.9-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009954915" comment="postgresql17-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050200" comment="postgresql17-server-devel-17.9-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009954916" comment="postgresql17-server-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050201" comment="postgresql17-test-17.9-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009954917" comment="postgresql17-test is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050750" comment="postgresql18-18.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033162" comment="postgresql18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050751" comment="postgresql18-contrib-18.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033163" comment="postgresql18-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050752" comment="postgresql18-devel-18.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033164" comment="postgresql18-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051761" comment="postgresql18-devel-mini-18.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041624" comment="postgresql18-devel-mini is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050753" comment="postgresql18-docs-18.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033165" comment="postgresql18-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051762" comment="postgresql18-llvmjit-18.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033166" comment="postgresql18-llvmjit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051763" comment="postgresql18-llvmjit-devel-18.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033167" comment="postgresql18-llvmjit-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050754" comment="postgresql18-plperl-18.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033168" comment="postgresql18-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050755" comment="postgresql18-plpython-18.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033169" comment="postgresql18-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050756" comment="postgresql18-pltcl-18.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033170" comment="postgresql18-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050757" comment="postgresql18-server-18.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033171" comment="postgresql18-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050758" comment="postgresql18-server-devel-18.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033172" comment="postgresql18-server-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051764" comment="postgresql18-test-18.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033173" comment="postgresql18-test is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262007" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2007</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2007" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2007" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2007" ref_url="https://www.suse.com/security/cve/CVE-2026-2007" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0584-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0585-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024361.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0881-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024684.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025095.html" source="SUSE-SU"/>
    <description>
    Heap buffer overflow in PostgreSQL pg_trgm allows a database user to achieve unknown impacts via a crafted input string.  The attacker has limited control over the byte patterns to be written, but we have not ruled out the viability of attacks that lead to privilege escalation.  PostgreSQL 18.1 and 18.0 are affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2026-2007/">CVE-2026-2007 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2007">CVE-2026-2007 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258012">SUSE bug 1258012</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050748" comment="libecpg6-18.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151069" comment="libecpg6 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050749" comment="libpq5-18.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151071" comment="libpq5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050750" comment="postgresql18-18.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033162" comment="postgresql18 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050751" comment="postgresql18-contrib-18.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033163" comment="postgresql18-contrib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050752" comment="postgresql18-devel-18.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033164" comment="postgresql18-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051761" comment="postgresql18-devel-mini-18.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041624" comment="postgresql18-devel-mini is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050753" comment="postgresql18-docs-18.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033165" comment="postgresql18-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051762" comment="postgresql18-llvmjit-18.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033166" comment="postgresql18-llvmjit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051763" comment="postgresql18-llvmjit-devel-18.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033167" comment="postgresql18-llvmjit-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050754" comment="postgresql18-plperl-18.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033168" comment="postgresql18-plperl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050755" comment="postgresql18-plpython-18.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033169" comment="postgresql18-plpython is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050756" comment="postgresql18-pltcl-18.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033170" comment="postgresql18-pltcl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050757" comment="postgresql18-server-18.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033171" comment="postgresql18-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050758" comment="postgresql18-server-devel-18.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033172" comment="postgresql18-server-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051764" comment="postgresql18-test-18.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033173" comment="postgresql18-test is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202621226" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-21226</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-21226" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21226" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-21226" ref_url="https://www.suse.com/security/cve/CVE-2026-21226" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0476-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024138.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024603.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024601.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-03"/>
	<updated date="2026-03-06"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-21226/">CVE-2026-21226 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21226">CVE-2026-21226 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257703">SUSE bug 1257703</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010046377" comment="python313-azure-core-1.32.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010046378" comment="python313-azure-core is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202621441" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-21441</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-21441" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21441" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-21441" ref_url="https://www.suse.com/security/cve/CVE-2026-21441" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1087" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003188.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1088" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003216.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1089" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003205.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1239" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003190.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1240" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002454.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1619" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002467.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1704" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002462.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1706" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002464.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1729" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0255-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023893.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0443-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024105.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0635-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024387.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20131-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043740.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20157-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20270-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024214.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20364-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024321.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20591-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024616.html" source="SUSE-SU"/>
    <description>
    urllib3 is an HTTP client library for Python. urllib3's streaming API is designed for the efficient handling of large HTTP responses by reading the content in chunks, rather than loading the entire response body into memory at once. urllib3 can perform decoding or decompression based on the HTTP `Content-Encoding` header (e.g., `gzip`, `deflate`, `br`, or `zstd`). When using the streaming API, the library decompresses only the necessary bytes, enabling partial content consumption. Starting in version 1.22 and prior to version 2.6.3, for HTTP redirect responses, the library would read the entire response body to drain the connection and decompress the content unnecessarily. This decompression occurred even before any read methods were called, and configured read limits did not restrict the amount of decompressed data. As a result, there was no safeguard against decompression bombs. A malicious server could exploit this to trigger excessive resource consumption on the client. Applications and libraries are affected when they stream content from untrusted sources by setting `preload_content=False` when they do not disable redirects. Users should upgrade to at least urllib3 v2.6.3, in which the library does not decode content of redirect responses when `preload_content=False`. If upgrading is not immediately possible, disable redirects by setting `redirect=False` for requests to untrusted source.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-25"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="2.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-21441/">CVE-2026-21441 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-21441">CVE-2026-21441 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256331">SUSE bug 1256331</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039707" comment="python313-urllib3-2.5.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039777" comment="python313-urllib3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045689" comment="python313-urllib3_1-1.26.20-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010045810" comment="python313-urllib3_1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202621637" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-21637</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-21637" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21637" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-21637" ref_url="https://www.suse.com/security/cve/CVE-2026-21637" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2420" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002499.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2421" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002504.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2422" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002490.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2781" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003224.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2782" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003228.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2783" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003252.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:7350" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1299-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024339.html" source="SUSE-SU"/>
    <description>
    A flaw in Node.js TLS error handling allows remote attackers to crash or exhaust resources of a TLS server when `pskCallback` or `ALPNCallback` are in use. Synchronous exceptions thrown during these callbacks bypass standard TLS error handling paths (tlsClientError and error), causing either immediate process termination or silent file descriptor leaks that eventually lead to denial of service. Because these callbacks process attacker-controlled input during the TLS handshake, a remote client can repeatedly trigger the issue. This vulnerability affects TLS servers using PSK or ALPN callbacks across Node.js versions where these callbacks throw without being safely wrapped.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-18"/>
	<updated date="2026-04-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-21637/">CVE-2026-21637 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-21637">CVE-2026-21637 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256576">SUSE bug 1256576</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044193" comment="corepack22-22.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961686" comment="corepack22 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044194" comment="nodejs22-22.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961687" comment="nodejs22 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044195" comment="nodejs22-devel-22.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961688" comment="nodejs22-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044196" comment="nodejs22-docs-22.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961689" comment="nodejs22-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044197" comment="npm22-22.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961690" comment="npm22 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202621925" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-21925</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-21925" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21925" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-21925" ref_url="https://www.suse.com/security/cve/CVE-2026-21925" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0847" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002501.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0927" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002409.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0928" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002427.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0931" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002458.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0932" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002431.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0933" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024071.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-21925/">CVE-2026-21925 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21925">CVE-2026-21925 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257034">SUSE bug 1257034</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041438" comment="java-17-openjdk-17.0.18.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009704325" comment="java-17-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041439" comment="java-17-openjdk-demo-17.0.18.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009704327" comment="java-17-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041440" comment="java-17-openjdk-devel-17.0.18.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009704328" comment="java-17-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041441" comment="java-17-openjdk-headless-17.0.18.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009704329" comment="java-17-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041442" comment="java-17-openjdk-javadoc-17.0.18.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009704330" comment="java-17-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041443" comment="java-17-openjdk-jmods-17.0.18.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009704331" comment="java-17-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041444" comment="java-17-openjdk-src-17.0.18.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009704332" comment="java-17-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041344" comment="java-21-openjdk-21.0.10.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009875276" comment="java-21-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041345" comment="java-21-openjdk-demo-21.0.10.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009875277" comment="java-21-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041346" comment="java-21-openjdk-devel-21.0.10.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009875278" comment="java-21-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041347" comment="java-21-openjdk-headless-21.0.10.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009875279" comment="java-21-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041348" comment="java-21-openjdk-javadoc-21.0.10.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009875280" comment="java-21-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041349" comment="java-21-openjdk-jmods-21.0.10.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009875281" comment="java-21-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041350" comment="java-21-openjdk-src-21.0.10.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009875282" comment="java-21-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041478" comment="java-25-openjdk-25.0.2.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041639" comment="java-25-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041479" comment="java-25-openjdk-demo-25.0.2.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041640" comment="java-25-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041480" comment="java-25-openjdk-devel-25.0.2.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041641" comment="java-25-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041481" comment="java-25-openjdk-headless-25.0.2.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041642" comment="java-25-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041482" comment="java-25-openjdk-javadoc-25.0.2.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041643" comment="java-25-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041483" comment="java-25-openjdk-jmods-25.0.2.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041644" comment="java-25-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041484" comment="java-25-openjdk-src-25.0.2.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041645" comment="java-25-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202621932" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-21932</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-21932" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21932" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-21932" ref_url="https://www.suse.com/security/cve/CVE-2026-21932" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024071.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-02-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2026-21932/">CVE-2026-21932 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21932">CVE-2026-21932 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257036">SUSE bug 1257036</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041438" comment="java-17-openjdk-17.0.18.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009704325" comment="java-17-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041439" comment="java-17-openjdk-demo-17.0.18.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009704327" comment="java-17-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041440" comment="java-17-openjdk-devel-17.0.18.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009704328" comment="java-17-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041441" comment="java-17-openjdk-headless-17.0.18.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009704329" comment="java-17-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041442" comment="java-17-openjdk-javadoc-17.0.18.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009704330" comment="java-17-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041443" comment="java-17-openjdk-jmods-17.0.18.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009704331" comment="java-17-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041444" comment="java-17-openjdk-src-17.0.18.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009704332" comment="java-17-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041344" comment="java-21-openjdk-21.0.10.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009875276" comment="java-21-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041345" comment="java-21-openjdk-demo-21.0.10.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009875277" comment="java-21-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041346" comment="java-21-openjdk-devel-21.0.10.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009875278" comment="java-21-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041347" comment="java-21-openjdk-headless-21.0.10.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009875279" comment="java-21-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041348" comment="java-21-openjdk-javadoc-21.0.10.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009875280" comment="java-21-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041349" comment="java-21-openjdk-jmods-21.0.10.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009875281" comment="java-21-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041350" comment="java-21-openjdk-src-21.0.10.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009875282" comment="java-21-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041478" comment="java-25-openjdk-25.0.2.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041639" comment="java-25-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041479" comment="java-25-openjdk-demo-25.0.2.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041640" comment="java-25-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041480" comment="java-25-openjdk-devel-25.0.2.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041641" comment="java-25-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041481" comment="java-25-openjdk-headless-25.0.2.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041642" comment="java-25-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041482" comment="java-25-openjdk-javadoc-25.0.2.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041643" comment="java-25-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041483" comment="java-25-openjdk-jmods-25.0.2.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041644" comment="java-25-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041484" comment="java-25-openjdk-src-25.0.2.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041645" comment="java-25-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202621933" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-21933</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-21933" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21933" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-21933" ref_url="https://www.suse.com/security/cve/CVE-2026-21933" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0847" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002501.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0927" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002409.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0928" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002427.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0931" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002458.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0932" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002431.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0933" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024071.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-21933/">CVE-2026-21933 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21933">CVE-2026-21933 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257037">SUSE bug 1257037</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041438" comment="java-17-openjdk-17.0.18.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009704325" comment="java-17-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041439" comment="java-17-openjdk-demo-17.0.18.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009704327" comment="java-17-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041440" comment="java-17-openjdk-devel-17.0.18.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009704328" comment="java-17-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041441" comment="java-17-openjdk-headless-17.0.18.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009704329" comment="java-17-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041442" comment="java-17-openjdk-javadoc-17.0.18.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009704330" comment="java-17-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041443" comment="java-17-openjdk-jmods-17.0.18.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009704331" comment="java-17-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041444" comment="java-17-openjdk-src-17.0.18.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009704332" comment="java-17-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041344" comment="java-21-openjdk-21.0.10.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009875276" comment="java-21-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041345" comment="java-21-openjdk-demo-21.0.10.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009875277" comment="java-21-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041346" comment="java-21-openjdk-devel-21.0.10.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009875278" comment="java-21-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041347" comment="java-21-openjdk-headless-21.0.10.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009875279" comment="java-21-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041348" comment="java-21-openjdk-javadoc-21.0.10.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009875280" comment="java-21-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041349" comment="java-21-openjdk-jmods-21.0.10.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009875281" comment="java-21-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041350" comment="java-21-openjdk-src-21.0.10.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009875282" comment="java-21-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041478" comment="java-25-openjdk-25.0.2.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041639" comment="java-25-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041479" comment="java-25-openjdk-demo-25.0.2.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041640" comment="java-25-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041480" comment="java-25-openjdk-devel-25.0.2.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041641" comment="java-25-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041481" comment="java-25-openjdk-headless-25.0.2.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041642" comment="java-25-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041482" comment="java-25-openjdk-javadoc-25.0.2.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041643" comment="java-25-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041483" comment="java-25-openjdk-jmods-25.0.2.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041644" comment="java-25-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041484" comment="java-25-openjdk-src-25.0.2.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041645" comment="java-25-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202621945" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-21945</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-21945" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-21945" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-21945" ref_url="https://www.suse.com/security/cve/CVE-2026-21945" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:0847" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002501.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0927" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002409.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0928" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002427.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0931" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002458.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0932" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-January/002431.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:0933" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003160.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0341-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023991.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0342-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023990.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0363-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024035.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0382-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024059.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0389-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024078.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0390-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024077.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0414-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024088.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0415-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024087.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0441-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024107.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0504-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024244.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20190-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024026.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20199-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20215-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024071.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-21945/">CVE-2026-21945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-21945">CVE-2026-21945 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257038">SUSE bug 1257038</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041438" comment="java-17-openjdk-17.0.18.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009704325" comment="java-17-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041439" comment="java-17-openjdk-demo-17.0.18.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009704327" comment="java-17-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041440" comment="java-17-openjdk-devel-17.0.18.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009704328" comment="java-17-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041441" comment="java-17-openjdk-headless-17.0.18.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009704329" comment="java-17-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041442" comment="java-17-openjdk-javadoc-17.0.18.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009704330" comment="java-17-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041443" comment="java-17-openjdk-jmods-17.0.18.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009704331" comment="java-17-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041444" comment="java-17-openjdk-src-17.0.18.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009704332" comment="java-17-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041344" comment="java-21-openjdk-21.0.10.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009875276" comment="java-21-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041345" comment="java-21-openjdk-demo-21.0.10.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009875277" comment="java-21-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041346" comment="java-21-openjdk-devel-21.0.10.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009875278" comment="java-21-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041347" comment="java-21-openjdk-headless-21.0.10.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009875279" comment="java-21-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041348" comment="java-21-openjdk-javadoc-21.0.10.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009875280" comment="java-21-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041349" comment="java-21-openjdk-jmods-21.0.10.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009875281" comment="java-21-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041350" comment="java-21-openjdk-src-21.0.10.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009875282" comment="java-21-openjdk-src is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041478" comment="java-25-openjdk-25.0.2.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041639" comment="java-25-openjdk is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041479" comment="java-25-openjdk-demo-25.0.2.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041640" comment="java-25-openjdk-demo is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041480" comment="java-25-openjdk-devel-25.0.2.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041641" comment="java-25-openjdk-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041481" comment="java-25-openjdk-headless-25.0.2.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041642" comment="java-25-openjdk-headless is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041482" comment="java-25-openjdk-javadoc-25.0.2.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041643" comment="java-25-openjdk-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041483" comment="java-25-openjdk-jmods-25.0.2.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041644" comment="java-25-openjdk-jmods is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041484" comment="java-25-openjdk-src-25.0.2.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041645" comment="java-25-openjdk-src is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202622036" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-22036</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-22036" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22036" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-22036" ref_url="https://www.suse.com/security/cve/CVE-2026-22036" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0295-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0301-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023926.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0435-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0457-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024134.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20436-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024339.html" source="SUSE-SU"/>
    <description>
    Undici is an HTTP/1.1 client for Node.js. Prior to 7.18.0 and 6.23.0, the number of links in the decompression chain is unbounded and the default maxHeaderSize allows a malicious server to insert thousands compression steps leading to high CPU usage and excessive memory allocation. This vulnerability is fixed in 7.18.0 and 6.23.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-18"/>
	<updated date="2026-02-19"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22036/">CVE-2026-22036 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22036">CVE-2026-22036 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256843">SUSE bug 1256843</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044193" comment="corepack22-22.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961686" comment="corepack22 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044194" comment="nodejs22-22.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961687" comment="nodejs22 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044195" comment="nodejs22-devel-22.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961688" comment="nodejs22-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044196" comment="nodejs22-docs-22.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961689" comment="nodejs22-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044197" comment="npm22-22.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009961690" comment="npm22 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262239" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2239</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2239" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2239" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2239" ref_url="https://www.suse.com/security/cve/CVE-2026-2239" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024372.html" source="SUSE-SU"/>
    <description>
    A flaw was found in GIMP. Heap-buffer-overflow vulnerability exists in the fread_pascal_string function when processing a specially crafted PSD (Photoshop Document) file. This occurs because the buffer allocated for a Pascal string is not properly null-terminated, leading to an out-of-bounds read when strlen() is subsequently called. Successfully exploiting this vulnerability can cause the application to crash, resulting in an application level Denial of Service.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-04-04"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-2239/">CVE-2026-2239 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2239">CVE-2026-2239 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257959">SUSE bug 1257959</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045797" comment="gimp-3.0.8-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151540" comment="gimp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045798" comment="gimp-devel-3.0.8-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153688" comment="gimp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045799" comment="gimp-extension-goat-excercises-3.0.8-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037906" comment="gimp-extension-goat-excercises is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045800" comment="gimp-lang-3.0.8-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151542" comment="gimp-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045801" comment="gimp-plugin-aa-3.0.8-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151543" comment="gimp-plugin-aa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045802" comment="gimp-plugin-python3-3.0.8-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037907" comment="gimp-plugin-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045803" comment="gimp-vala-3.0.8-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037908" comment="gimp-vala is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045804" comment="libgimp-3_0-0-3.0.8-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037909" comment="libgimp-3_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045805" comment="libgimpui-3_0-0-3.0.8-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037910" comment="libgimpui-3_0-0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202622693" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-22693</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-22693" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22693" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-22693" ref_url="https://www.suse.com/security/cve/CVE-2026-22693" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0287-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023911.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024824.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20922-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045230.html" source="SUSE-SU"/>
    <description>
    HarfBuzz is a text shaping engine. Prior to version 12.3.0, a null pointer dereference vulnerability exists in the SubtableUnicodesCache::create function located in src/hb-ot-cmap-table.hh. The function fails to check if hb_malloc returns NULL before using placement new to construct an object at the returned pointer address. When hb_malloc fails to allocate memory (which can occur in low-memory conditions or when using custom allocators that simulate allocation failures), it returns NULL. The code then attempts to call the constructor on this null pointer using placement new syntax, resulting in undefined behavior and a Segmentation Fault. This issue has been patched in version 12.3.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22693/">CVE-2026-22693 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-22693">CVE-2026-22693 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256459">SUSE bug 1256459</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050759" comment="harfbuzz-devel-11.4.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153259" comment="harfbuzz-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050760" comment="harfbuzz-tools-11.4.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153260" comment="harfbuzz-tools is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050761" comment="libharfbuzz-cairo0-11.4.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039428" comment="libharfbuzz-cairo0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050027" comment="libharfbuzz-gobject0-11.4.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009704571" comment="libharfbuzz-gobject0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050762" comment="libharfbuzz-icu0-11.4.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153261" comment="libharfbuzz-icu0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050763" comment="libharfbuzz-subset0-11.4.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009704573" comment="libharfbuzz-subset0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050028" comment="libharfbuzz0-11.4.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153263" comment="libharfbuzz0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050029" comment="typelib-1_0-HarfBuzz-0_0-11.4.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009704575" comment="typelib-1_0-HarfBuzz-0_0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202622695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-22695</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-22695" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22695" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-22695" ref_url="https://www.suse.com/security/cve/CVE-2026-22695" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3405" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003222.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3576" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002577.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4306" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002568.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4728" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002586.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0192-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023828.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20127-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024563.html" source="SUSE-SU"/>
    <description>
    LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From 1.6.51 to 1.6.53, there is a heap buffer over-read in the libpng simplified API function png_image_finish_read when processing interlaced 16-bit PNGs with 8-bit output format and non-minimal row stride. This is a regression introduced by the fix for CVE-2025-65018. This vulnerability is fixed in 1.6.54.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-25"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22695/">CVE-2026-22695 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22695">CVE-2026-22695 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256525">SUSE bug 1256525</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039686" comment="libpng16-16-1.6.44-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151414" comment="libpng16-16 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039687" comment="libpng16-16-x86-64-v3-1.6.44-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037228" comment="libpng16-16-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039688" comment="libpng16-compat-devel-1.6.44-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151416" comment="libpng16-compat-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039689" comment="libpng16-compat-devel-x86-64-v3-1.6.44-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037229" comment="libpng16-compat-devel-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039690" comment="libpng16-devel-1.6.44-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151417" comment="libpng16-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039691" comment="libpng16-devel-x86-64-v3-1.6.44-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037230" comment="libpng16-devel-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039692" comment="libpng16-tools-1.6.44-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153137" comment="libpng16-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202622701" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-22701</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-22701" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22701" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-22701" ref_url="https://www.suse.com/security/cve/CVE-2026-22701" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0220-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023865.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0335-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023987.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20216-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024068.html" source="SUSE-SU"/>
    <description>
    filelock is a platform-independent file lock for Python. Prior to version 3.20.3, a TOCTOU race condition vulnerability exists in the SoftFileLock implementation of the filelock package. An attacker with local filesystem access and permission to create symlinks can exploit a race condition between the permission validation and file creation to cause lock operations to fail or behave unexpectedly. The vulnerability occurs in the _acquire() method between raise_on_not_writable_file() (permission check) and os.open() (file creation). During this race window, an attacker can create a symlink at the lock file path, potentially causing the lock to operate on an unintended target file or leading to denial of service. This issue has been patched in version 3.20.3.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-02-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22701/">CVE-2026-22701 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-22701">CVE-2026-22701 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256457">SUSE bug 1256457</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041485" comment="python313-filelock-3.18.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041635" comment="python313-filelock is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202622702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-22702</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-22702" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22702" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-22702" ref_url="https://www.suse.com/security/cve/CVE-2026-22702" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0233-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023852.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20129-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043742.html" source="SUSE-SU"/>
    <description>
    virtualenv is a tool for creating isolated virtual python environments. Prior to version 20.36.1, TOCTOU (Time-of-Check-Time-of-Use) vulnerabilities in virtualenv allow local attackers to perform symlink-based attacks on directory creation operations. An attacker with local access can exploit a race condition between directory existence checks and creation to redirect virtualenv's app_data and lock file operations to attacker-controlled locations. This issue has been patched in version 20.36.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-25"/>
	<updated date="2026-01-29"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22702/">CVE-2026-22702 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-22702">CVE-2026-22702 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256458">SUSE bug 1256458</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039704" comment="python313-virtualenv-20.29.3-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039778" comment="python313-virtualenv is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202622703" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-22703</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-22703" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22703" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-22703" ref_url="https://www.suse.com/security/cve/CVE-2026-22703" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025109.html" source="SUSE-SU"/>
    <description>
    Cosign provides code signing and transparency for containers and binaries. Prior to versions 2.6.2 and 3.0.4, Cosign bundle can be crafted to successfully verify an artifact even if the embedded Rekor entry does not reference the artifact's digest, signature or public key. When verifying a Rekor entry, Cosign verifies the Rekor entry signature, and also compares the artifact's digest, the user's public key from either a Fulcio certificate or provided by the user, and the artifact signature to the Rekor entry contents. Without these comparisons, Cosign would accept any response from Rekor as valid. A malicious actor that has compromised a user's identity or signing key could construct a valid Cosign bundle by including any arbitrary Rekor entry, thus preventing the user from being able to audit the signing event. This issue has been patched in versions 2.6.2 and 3.0.4.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-25"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2026-22703/">CVE-2026-22703 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22703">CVE-2026-22703 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256496">SUSE bug 1256496</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050183" comment="cosign-3.0.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009707674" comment="cosign is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050184" comment="cosign-bash-completion-3.0.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010050218" comment="cosign-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050185" comment="cosign-fish-completion-3.0.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010050219" comment="cosign-fish-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050186" comment="cosign-zsh-completion-3.0.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010050220" comment="cosign-zsh-completion is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202622770" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-22770</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-22770" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22770" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-22770" ref_url="https://www.suse.com/security/cve/CVE-2026-22770" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024110.html" source="SUSE-SU"/>
    <description>
    ImageMagick is free and open-source software used for editing and manipulating digital images. The BilateralBlurImage method will allocate a set of double buffers inside AcquireBilateralTLS. But, in versions prior to 7.1.2-13, the last element in the set is not properly initialized. This will result in a release of an invalid pointer inside DestroyBilateralTLS when the memory allocation fails. Version 7.1.2-13 contains a patch for the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-11"/>
	<updated date="2026-03-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22770/">CVE-2026-22770 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22770">CVE-2026-22770 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256969">SUSE bug 1256969</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047932" comment="ImageMagick-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047933" comment="ImageMagick-config-7-SUSE-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047934" comment="ImageMagick-config-7-upstream-limited-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977490" comment="ImageMagick-config-7-upstream-limited is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047935" comment="ImageMagick-config-7-upstream-open-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977491" comment="ImageMagick-config-7-upstream-open is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047936" comment="ImageMagick-config-7-upstream-secure-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977492" comment="ImageMagick-config-7-upstream-secure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047937" comment="ImageMagick-config-7-upstream-websafe-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977493" comment="ImageMagick-config-7-upstream-websafe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047938" comment="ImageMagick-devel-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047939" comment="ImageMagick-doc-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047940" comment="ImageMagick-extra-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047941" comment="libMagick++-7_Q16HDRI5-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698047" comment="libMagick++-7_Q16HDRI5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047942" comment="libMagick++-devel-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047943" comment="libMagickCore-7_Q16HDRI10-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698048" comment="libMagickCore-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047944" comment="libMagickWand-7_Q16HDRI10-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698049" comment="libMagickWand-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047945" comment="perl-PerlMagick-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202622772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-22772</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-22772" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22772" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-22772" ref_url="https://www.suse.com/security/cve/CVE-2026-22772" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025109.html" source="SUSE-SU"/>
    <description>
    Fulcio is a certificate authority for issuing code signing certificates for an OpenID Connect (OIDC) identity. Prior to 1.8.5, Fulcio's metaRegex() function uses unanchored regex, allowing attackers to bypass MetaIssuer URL validation and trigger SSRF to arbitrary internal services. Since the SSRF only can trigger GET requests, the request cannot mutate state. The response from the GET request is not returned to the caller so data exfiltration is not possible. A malicious actor could attempt to probe an internal network through Blind SSRF. This vulnerability is fixed in 1.8.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22772/">CVE-2026-22772 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22772">CVE-2026-22772 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256532">SUSE bug 1256532</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050183" comment="cosign-3.0.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009707674" comment="cosign is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050184" comment="cosign-bash-completion-3.0.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010050218" comment="cosign-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050185" comment="cosign-fish-completion-3.0.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010050219" comment="cosign-fish-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050186" comment="cosign-zsh-completion-3.0.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010050220" comment="cosign-zsh-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041604" comment="hauler-1.4.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010033447" comment="hauler is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202622791" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-22791</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-22791" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22791" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-22791" ref_url="https://www.suse.com/security/cve/CVE-2026-22791" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0291-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024341.html" source="SUSE-SU"/>
    <description>
    openCryptoki is a PKCS#11 library and tools for Linux and AIX. In 3.25.0 and 3.26.0, there is a heap buffer overflow vulnerability in the CKM_ECDH_AES_KEY_WRAP implementation allows an attacker with local access to cause out-of-bounds writes in the host process by supplying a compressed EC public key and invoking C_WrapKey. This can lead to heap corruption, or denial-of-service.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-16"/>
	<updated date="2026-02-19"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22791/">CVE-2026-22791 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22791">CVE-2026-22791 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256673">SUSE bug 1256673</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044013" comment="openCryptoki-3.26.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009857998" comment="openCryptoki is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044014" comment="openCryptoki-64bit-3.26.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009857999" comment="openCryptoki-64bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044015" comment="openCryptoki-devel-3.26.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009858000" comment="openCryptoki-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202622795" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-22795</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-22795" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22795" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-22795" ref_url="https://www.suse.com/security/cve/CVE-2026-22795" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1473" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024331.html" source="SUSE-SU"/>
    <description>
    Issue summary: An invalid or NULL pointer dereference can happen in
an application processing a malformed PKCS#12 file.

Impact summary: An application processing a malformed PKCS#12 file can be
caused to dereference an invalid or NULL pointer on memory read, resulting
in a Denial of Service.

A type confusion vulnerability exists in PKCS#12 parsing code where
an ASN1_TYPE union member is accessed without first validating the type,
causing an invalid pointer read.

The location is constrained to a 1-byte address space, meaning any
attempted pointer manipulation can only target addresses between 0x00 and 0xFF.
This range corresponds to the zero page, which is unmapped on most modern
operating systems and will reliably result in a crash, leading only to a
Denial of Service. Exploiting this issue also requires a user or application
to process a maliciously crafted PKCS#12 file. It is uncommon to accept
untrusted PKCS#12 files in applications as they are usually used to store
private keys which are trusted by definition. For these reasons, the issue
was assessed as Low severity.

The FIPS modules in 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,
as the PKCS12 implementation is outside the OpenSSL FIPS module boundary.

OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0 and 1.1.1 are vulnerable to this issue.

OpenSSL 1.0.2 is not affected by this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22795/">CVE-2026-22795 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-22795">CVE-2026-22795 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256839">SUSE bug 1256839</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041595" comment="libopenssl-3-devel-3.5.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700693" comment="libopenssl-3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041596" comment="libopenssl-3-fips-provider-3.5.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009868077" comment="libopenssl-3-fips-provider is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041597" comment="libopenssl-3-fips-provider-x86-64-v3-3.5.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010034160" comment="libopenssl-3-fips-provider-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041598" comment="libopenssl3-3.5.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700695" comment="libopenssl3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041599" comment="libopenssl3-x86-64-v3-3.5.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010034161" comment="libopenssl3-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041600" comment="openssl-3-3.5.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700697" comment="openssl-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041601" comment="openssl-3-doc-3.5.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700698" comment="openssl-3-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202622796" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-22796</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-22796" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22796" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-22796" ref_url="https://www.suse.com/security/cve/CVE-2026-22796" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1473" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003157.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0309-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0310-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0311-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023934.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0312-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023933.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0331-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023981.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0332-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023983.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0333-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023989.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0343-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023992.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0346-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023997.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0358-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024014.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0359-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024013.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0360-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024012.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024156.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20211-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024049.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20223-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024064.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20349-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024281.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20373-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024318.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20418-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024331.html" source="SUSE-SU"/>
    <description>
    Issue summary: A type confusion vulnerability exists in the signature
verification of signed PKCS#7 data where an ASN1_TYPE union member is
accessed without first validating the type, causing an invalid or NULL
pointer dereference when processing malformed PKCS#7 data.

Impact summary: An application performing signature verification of PKCS#7
data or calling directly the PKCS7_digest_from_attributes() function can be
caused to dereference an invalid or NULL pointer when reading, resulting in
a Denial of Service.

The function PKCS7_digest_from_attributes() accesses the message digest attribute
value without validating its type. When the type is not V_ASN1_OCTET_STRING,
this results in accessing invalid memory through the ASN1_TYPE union, causing
a crash.

Exploiting this vulnerability requires an attacker to provide a malformed
signed PKCS#7 to an application that verifies it. The impact of the
exploit is just a Denial of Service, the PKCS7 API is legacy and applications
should be using the CMS API instead. For these reasons the issue was
assessed as Low severity.

The FIPS modules in 3.5, 3.4, 3.3 and 3.0 are not affected by this issue,
as the PKCS#7 parsing implementation is outside the OpenSSL FIPS module
boundary.

OpenSSL 3.6, 3.5, 3.4, 3.3, 3.0, 1.1.1 and 1.0.2 are vulnerable to this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2026-22796/">CVE-2026-22796 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-22796">CVE-2026-22796 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256840">SUSE bug 1256840</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041595" comment="libopenssl-3-devel-3.5.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700693" comment="libopenssl-3-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041596" comment="libopenssl-3-fips-provider-3.5.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009868077" comment="libopenssl-3-fips-provider is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041597" comment="libopenssl-3-fips-provider-x86-64-v3-3.5.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010034160" comment="libopenssl-3-fips-provider-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041598" comment="libopenssl3-3.5.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700695" comment="libopenssl3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041599" comment="libopenssl3-x86-64-v3-3.5.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010034161" comment="libopenssl3-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041600" comment="openssl-3-3.5.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700697" comment="openssl-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041601" comment="openssl-3-doc-3.5.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009700698" comment="openssl-3-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202622801" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-22801</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-22801" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22801" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-22801" ref_url="https://www.suse.com/security/cve/CVE-2026-22801" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3405" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003222.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3576" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002577.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4306" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002568.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4728" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002586.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0234-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023851.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20127-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20155-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023947.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024563.html" source="SUSE-SU"/>
    <description>
    LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From 1.6.26 to 1.6.53, there is an integer truncation in the libpng simplified write API functions png_write_image_16bit and png_write_image_8bit causes heap buffer over-read when the caller provides a negative row stride (for bottom-up image layouts) or a stride exceeding 65535 bytes. The bug was introduced in libpng 1.6.26 (October 2016) by casts added to silence compiler warnings on 16-bit systems. This vulnerability is fixed in 1.6.54.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-25"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="7/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22801/">CVE-2026-22801 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22801">CVE-2026-22801 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256526">SUSE bug 1256526</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039686" comment="libpng16-16-1.6.44-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151414" comment="libpng16-16 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039687" comment="libpng16-16-x86-64-v3-1.6.44-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037228" comment="libpng16-16-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039688" comment="libpng16-compat-devel-1.6.44-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151416" comment="libpng16-compat-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039689" comment="libpng16-compat-devel-x86-64-v3-1.6.44-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037229" comment="libpng16-compat-devel-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039690" comment="libpng16-devel-1.6.44-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151417" comment="libpng16-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039691" comment="libpng16-devel-x86-64-v3-1.6.44-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037230" comment="libpng16-devel-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039692" comment="libpng16-tools-1.6.44-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153137" comment="libpng16-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202622851" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-22851</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-22851" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22851" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-22851" ref_url="https://www.suse.com/security/cve/CVE-2026-22851" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023993.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1, a race condition between the RDPGFX dynamic virtual channel thread and the SDL render thread leads to a heap use-after-free. Specifically, an escaped pointer to sdl-&gt;primary (SDL_Surface) is accessed after it has been freed during RDPGFX ResetGraphics handling. This vulnerability is fixed in 3.20.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-13"/>
	<updated date="2026-03-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22851/">CVE-2026-22851 at SUSE</cve>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22851">CVE-2026-22851 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256717">SUSE bug 1256717</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048376" comment="freerdp-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151908" comment="freerdp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048377" comment="freerdp-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151909" comment="freerdp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048378" comment="freerdp-proxy-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287971" comment="freerdp-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048379" comment="freerdp-proxy-plugins-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048429" comment="freerdp-proxy-plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048380" comment="freerdp-sdl-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048430" comment="freerdp-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048381" comment="freerdp-server-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245861" comment="freerdp-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048382" comment="freerdp-wayland-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245862" comment="freerdp-wayland is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048383" comment="libfreerdp-server-proxy3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048431" comment="libfreerdp-server-proxy3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048384" comment="libfreerdp3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048432" comment="libfreerdp3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048385" comment="librdtk0-0-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048433" comment="librdtk0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048386" comment="libuwac0-0-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245863" comment="libuwac0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048387" comment="libwinpr3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048434" comment="libwinpr3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048388" comment="rdtk0-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048435" comment="rdtk0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048389" comment="uwac0-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048436" comment="uwac0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048390" comment="winpr-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009877482" comment="winpr-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202622852" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-22852</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-22852" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22852" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-22852" ref_url="https://www.suse.com/security/cve/CVE-2026-22852" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:6340" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003289.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6727" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002648.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6918" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0417-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024272.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1, a malicious RDP server can trigger a heap-buffer-overflow write in the FreeRDP client when processing Audio Input (AUDIN) format lists. audin_process_formats reuses callback-&gt;formats_count across multiple MSG_SNDIN_FORMATS PDUs and writes past the newly allocated formats array, causing memory corruption and a crash. This vulnerability is fixed in 3.20.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22852/">CVE-2026-22852 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22852">CVE-2026-22852 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256718">SUSE bug 1256718</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048376" comment="freerdp-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151908" comment="freerdp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048377" comment="freerdp-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151909" comment="freerdp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048378" comment="freerdp-proxy-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287971" comment="freerdp-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048379" comment="freerdp-proxy-plugins-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048429" comment="freerdp-proxy-plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048380" comment="freerdp-sdl-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048430" comment="freerdp-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048381" comment="freerdp-server-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245861" comment="freerdp-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048382" comment="freerdp-wayland-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245862" comment="freerdp-wayland is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047341" comment="freerdp2-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010047350" comment="freerdp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047342" comment="freerdp2-devel-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010047351" comment="freerdp2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047343" comment="freerdp2-proxy-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010047352" comment="freerdp2-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047344" comment="freerdp2-server-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010047353" comment="freerdp2-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048383" comment="libfreerdp-server-proxy3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048431" comment="libfreerdp-server-proxy3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047345" comment="libfreerdp2-2-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009877480" comment="libfreerdp2-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048384" comment="libfreerdp3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048432" comment="libfreerdp3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048385" comment="librdtk0-0-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048433" comment="librdtk0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048386" comment="libuwac0-0-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245863" comment="libuwac0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047346" comment="libwinpr2-2-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009877481" comment="libwinpr2-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048387" comment="libwinpr3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048434" comment="libwinpr3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048388" comment="rdtk0-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048435" comment="rdtk0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048389" comment="uwac0-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048436" comment="uwac0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048390" comment="winpr-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009877482" comment="winpr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047347" comment="winpr2-devel-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245865" comment="winpr2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202622853" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-22853</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-22853" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22853" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-22853" ref_url="https://www.suse.com/security/cve/CVE-2026-22853" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023993.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1, RDPEAR's NDR array reader does not perform bounds checking on the on-wire element count and can write past the heap buffer allocated from hints, causing a heap buffer overflow in ndr_read_uint8Array. This vulnerability is fixed in 3.20.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-13"/>
	<updated date="2026-03-13"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22853/">CVE-2026-22853 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22853">CVE-2026-22853 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256719">SUSE bug 1256719</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048376" comment="freerdp-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151908" comment="freerdp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048377" comment="freerdp-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151909" comment="freerdp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048378" comment="freerdp-proxy-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287971" comment="freerdp-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048379" comment="freerdp-proxy-plugins-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048429" comment="freerdp-proxy-plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048380" comment="freerdp-sdl-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048430" comment="freerdp-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048381" comment="freerdp-server-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245861" comment="freerdp-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048382" comment="freerdp-wayland-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245862" comment="freerdp-wayland is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048383" comment="libfreerdp-server-proxy3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048431" comment="libfreerdp-server-proxy3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048384" comment="libfreerdp3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048432" comment="libfreerdp3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048385" comment="librdtk0-0-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048433" comment="librdtk0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048386" comment="libuwac0-0-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245863" comment="libuwac0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048387" comment="libwinpr3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048434" comment="libwinpr3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048388" comment="rdtk0-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048435" comment="rdtk0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048389" comment="uwac0-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048436" comment="uwac0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048390" comment="winpr-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009877482" comment="winpr-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202622854" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-22854</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-22854" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22854" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-22854" ref_url="https://www.suse.com/security/cve/CVE-2026-22854" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:6340" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003289.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6727" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002648.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6918" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0417-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024272.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1, a heap-buffer-overflow occurs in drive read when a server-controlled read length is used to read file data into an IRP output stream buffer without a hard upper bound, allowing an oversized read to overwrite heap memory. This vulnerability is fixed in 3.20.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22854/">CVE-2026-22854 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22854">CVE-2026-22854 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256720">SUSE bug 1256720</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048376" comment="freerdp-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151908" comment="freerdp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048377" comment="freerdp-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151909" comment="freerdp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048378" comment="freerdp-proxy-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287971" comment="freerdp-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048379" comment="freerdp-proxy-plugins-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048429" comment="freerdp-proxy-plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048380" comment="freerdp-sdl-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048430" comment="freerdp-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048381" comment="freerdp-server-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245861" comment="freerdp-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048382" comment="freerdp-wayland-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245862" comment="freerdp-wayland is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047341" comment="freerdp2-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010047350" comment="freerdp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047342" comment="freerdp2-devel-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010047351" comment="freerdp2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047343" comment="freerdp2-proxy-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010047352" comment="freerdp2-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047344" comment="freerdp2-server-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010047353" comment="freerdp2-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048383" comment="libfreerdp-server-proxy3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048431" comment="libfreerdp-server-proxy3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047345" comment="libfreerdp2-2-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009877480" comment="libfreerdp2-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048384" comment="libfreerdp3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048432" comment="libfreerdp3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048385" comment="librdtk0-0-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048433" comment="librdtk0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048386" comment="libuwac0-0-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245863" comment="libuwac0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047346" comment="libwinpr2-2-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009877481" comment="libwinpr2-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048387" comment="libwinpr3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048434" comment="libwinpr3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048388" comment="rdtk0-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048435" comment="rdtk0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048389" comment="uwac0-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048436" comment="uwac0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048390" comment="winpr-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009877482" comment="winpr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047347" comment="winpr2-devel-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245865" comment="winpr2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202622855" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-22855</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-22855" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22855" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-22855" ref_url="https://www.suse.com/security/cve/CVE-2026-22855" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3067" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003218.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3334" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002530.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3975" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024554.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1, a heap out-of-bounds read occurs in the smartcard SetAttrib path when cbAttrLen does not match the actual NDR buffer length. This vulnerability is fixed in 3.20.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-13"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H" cvss4="6.1/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22855/">CVE-2026-22855 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22855">CVE-2026-22855 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256721">SUSE bug 1256721</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048376" comment="freerdp-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151908" comment="freerdp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048377" comment="freerdp-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151909" comment="freerdp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048378" comment="freerdp-proxy-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287971" comment="freerdp-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048379" comment="freerdp-proxy-plugins-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048429" comment="freerdp-proxy-plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048380" comment="freerdp-sdl-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048430" comment="freerdp-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048381" comment="freerdp-server-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245861" comment="freerdp-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048382" comment="freerdp-wayland-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245862" comment="freerdp-wayland is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048383" comment="libfreerdp-server-proxy3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048431" comment="libfreerdp-server-proxy3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048384" comment="libfreerdp3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048432" comment="libfreerdp3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048385" comment="librdtk0-0-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048433" comment="librdtk0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048386" comment="libuwac0-0-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245863" comment="libuwac0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048387" comment="libwinpr3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048434" comment="libwinpr3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048388" comment="rdtk0-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048435" comment="rdtk0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048389" comment="uwac0-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048436" comment="uwac0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048390" comment="winpr-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009877482" comment="winpr-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202622856" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-22856</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-22856" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22856" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-22856" ref_url="https://www.suse.com/security/cve/CVE-2026-22856" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:6340" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003289.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6727" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002648.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6918" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0417-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024272.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1, a race in the serial channel IRP thread tracking allows a heap use-after-free when one thread removes an entry from serial-&gt;IrpThreads while another reads it. This vulnerability is fixed in 3.20.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22856/">CVE-2026-22856 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22856">CVE-2026-22856 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256722">SUSE bug 1256722</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048376" comment="freerdp-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151908" comment="freerdp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048377" comment="freerdp-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151909" comment="freerdp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048378" comment="freerdp-proxy-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287971" comment="freerdp-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048379" comment="freerdp-proxy-plugins-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048429" comment="freerdp-proxy-plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048380" comment="freerdp-sdl-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048430" comment="freerdp-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048381" comment="freerdp-server-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245861" comment="freerdp-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048382" comment="freerdp-wayland-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245862" comment="freerdp-wayland is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047341" comment="freerdp2-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010047350" comment="freerdp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047342" comment="freerdp2-devel-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010047351" comment="freerdp2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047343" comment="freerdp2-proxy-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010047352" comment="freerdp2-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047344" comment="freerdp2-server-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010047353" comment="freerdp2-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048383" comment="libfreerdp-server-proxy3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048431" comment="libfreerdp-server-proxy3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047345" comment="libfreerdp2-2-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009877480" comment="libfreerdp2-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048384" comment="libfreerdp3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048432" comment="libfreerdp3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048385" comment="librdtk0-0-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048433" comment="librdtk0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048386" comment="libuwac0-0-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245863" comment="libuwac0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047346" comment="libwinpr2-2-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009877481" comment="libwinpr2-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048387" comment="libwinpr3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048434" comment="libwinpr3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048388" comment="rdtk0-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048435" comment="rdtk0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048389" comment="uwac0-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048436" comment="uwac0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048390" comment="winpr-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009877482" comment="winpr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047347" comment="winpr2-devel-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245865" comment="winpr2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202622857" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-22857</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-22857" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22857" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-22857" ref_url="https://www.suse.com/security/cve/CVE-2026-22857" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024554.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1, a heap use-after-free occurs in irp_thread_func because the IRP is freed by irp-&gt;Complete() and then accessed again on the error path. This vulnerability is fixed in 3.20.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-13"/>
	<updated date="2026-03-13"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22857/">CVE-2026-22857 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22857">CVE-2026-22857 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256723">SUSE bug 1256723</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048376" comment="freerdp-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151908" comment="freerdp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048377" comment="freerdp-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151909" comment="freerdp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048378" comment="freerdp-proxy-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287971" comment="freerdp-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048379" comment="freerdp-proxy-plugins-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048429" comment="freerdp-proxy-plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048380" comment="freerdp-sdl-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048430" comment="freerdp-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048381" comment="freerdp-server-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245861" comment="freerdp-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048382" comment="freerdp-wayland-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245862" comment="freerdp-wayland is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048383" comment="libfreerdp-server-proxy3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048431" comment="libfreerdp-server-proxy3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048384" comment="libfreerdp3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048432" comment="libfreerdp3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048385" comment="librdtk0-0-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048433" comment="librdtk0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048386" comment="libuwac0-0-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245863" comment="libuwac0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048387" comment="libwinpr3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048434" comment="libwinpr3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048388" comment="rdtk0-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048435" comment="rdtk0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048389" comment="uwac0-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048436" comment="uwac0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048390" comment="winpr-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009877482" comment="winpr-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202622858" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-22858</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-22858" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22858" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-22858" ref_url="https://www.suse.com/security/cve/CVE-2026-22858" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3067" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003218.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3334" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002530.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3975" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023993.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1, global-buffer-overflow was observed in FreeRDP's Base64 decoding path. The root cause appears to be implementation-defined char signedness: on Arm/AArch64 builds, plain char is treated as unsigned, so the guard c &lt;= 0 can be optimized into a simple c != 0 check. As a result, non-ASCII bytes (e.g., 0x80-0xFF) may bypass the intended range restriction and be used as an index into a global lookup table, causing out-of-bounds access. This vulnerability is fixed in 3.20.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-13"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H" cvss4="6.1/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22858/">CVE-2026-22858 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22858">CVE-2026-22858 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256724">SUSE bug 1256724</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048376" comment="freerdp-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151908" comment="freerdp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048377" comment="freerdp-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151909" comment="freerdp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048378" comment="freerdp-proxy-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287971" comment="freerdp-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048379" comment="freerdp-proxy-plugins-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048429" comment="freerdp-proxy-plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048380" comment="freerdp-sdl-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048430" comment="freerdp-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048381" comment="freerdp-server-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245861" comment="freerdp-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048382" comment="freerdp-wayland-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245862" comment="freerdp-wayland is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048383" comment="libfreerdp-server-proxy3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048431" comment="libfreerdp-server-proxy3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048384" comment="libfreerdp3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048432" comment="libfreerdp3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048385" comment="librdtk0-0-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048433" comment="librdtk0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048386" comment="libuwac0-0-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245863" comment="libuwac0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048387" comment="libwinpr3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048434" comment="libwinpr3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048388" comment="rdtk0-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048435" comment="rdtk0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048389" comment="uwac0-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048436" comment="uwac0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048390" comment="winpr-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009877482" comment="winpr-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202622859" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-22859</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-22859" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22859" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-22859" ref_url="https://www.suse.com/security/cve/CVE-2026-22859" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3067" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003218.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3334" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002530.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3975" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002591.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0417-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024272.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.20.1, the URBDRC client does not perform bounds checking on server-supplied MSUSB_INTERFACE_DESCRIPTOR values and uses them as indices in libusb_udev_complete_msconfig_setup, causing an out-of-bounds read. This vulnerability is fixed in 3.20.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H" cvss4="6.1/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22859/">CVE-2026-22859 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22859">CVE-2026-22859 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256725">SUSE bug 1256725</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048376" comment="freerdp-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151908" comment="freerdp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048377" comment="freerdp-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151909" comment="freerdp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048378" comment="freerdp-proxy-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287971" comment="freerdp-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048379" comment="freerdp-proxy-plugins-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048429" comment="freerdp-proxy-plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048380" comment="freerdp-sdl-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048430" comment="freerdp-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048381" comment="freerdp-server-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245861" comment="freerdp-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048382" comment="freerdp-wayland-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245862" comment="freerdp-wayland is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047341" comment="freerdp2-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010047350" comment="freerdp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047342" comment="freerdp2-devel-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010047351" comment="freerdp2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047343" comment="freerdp2-proxy-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010047352" comment="freerdp2-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047344" comment="freerdp2-server-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010047353" comment="freerdp2-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048383" comment="libfreerdp-server-proxy3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048431" comment="libfreerdp-server-proxy3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047345" comment="libfreerdp2-2-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009877480" comment="libfreerdp2-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048384" comment="libfreerdp3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048432" comment="libfreerdp3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048385" comment="librdtk0-0-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048433" comment="librdtk0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048386" comment="libuwac0-0-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245863" comment="libuwac0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047346" comment="libwinpr2-2-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009877481" comment="libwinpr2-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048387" comment="libwinpr3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048434" comment="libwinpr3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048388" comment="rdtk0-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048435" comment="rdtk0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048389" comment="uwac0-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048436" comment="uwac0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048390" comment="winpr-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009877482" comment="winpr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047347" comment="winpr2-devel-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245865" comment="winpr2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202622976" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-22976</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-22976" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22976" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-22976" ref_url="https://www.suse.com/security/cve/CVE-2026-22976" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: sch_qfq: Fix NULL deref when deactivating inactive aggregate in qfq_reset

`qfq_class-&gt;leaf_qdisc-&gt;q.qlen &gt; 0` does not imply that the class
itself is active.

Two qfq_class objects may point to the same leaf_qdisc. This happens
when:

1. one QFQ qdisc is attached to the dev as the root qdisc, and

2. another QFQ qdisc is temporarily referenced (e.g., via qdisc_get()
/ qdisc_put()) and is pending to be destroyed, as in function
tc_new_tfilter.

When packets are enqueued through the root QFQ qdisc, the shared
leaf_qdisc-&gt;q.qlen increases. At the same time, the second QFQ
qdisc triggers qdisc_put and qdisc_destroy: the qdisc enters
qfq_reset() with its own q-&gt;q.qlen == 0, but its class's leaf
qdisc-&gt;q.qlen &gt; 0. Therefore, the qfq_reset would wrongly deactivate
an inactive aggregate and trigger a null-deref in qfq_deactivate_agg:

[    0.903172] BUG: kernel NULL pointer dereference, address: 0000000000000000
[    0.903571] #PF: supervisor write access in kernel mode
[    0.903860] #PF: error_code(0x0002) - not-present page
[    0.904177] PGD 10299b067 P4D 10299b067 PUD 10299c067 PMD 0
[    0.904502] Oops: Oops: 0002 [#1] SMP NOPTI
[    0.904737] CPU: 0 UID: 0 PID: 135 Comm: exploit Not tainted 6.19.0-rc3+ #2 NONE
[    0.905157] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.17.0-0-gb52ca86e094d-prebuilt.qemu.org 04/01/2014
[    0.905754] RIP: 0010:qfq_deactivate_agg (include/linux/list.h:992 (discriminator 2) include/linux/list.h:1006 (discriminator 2) net/sched/sch_qfq.c:1367 (discriminator 2) net/sched/sch_qfq.c:1393 (discriminator 2))
[    0.906046] Code: 0f 84 4d 01 00 00 48 89 70 18 8b 4b 10 48 c7 c2 ff ff ff ff 48 8b 78 08 48 d3 e2 48 21 f2 48 2b 13 48 8b 30 48 d3 ea 8b 4b 18 0

Code starting with the faulting instruction
===========================================
   0:	0f 84 4d 01 00 00    	je     0x153
   6:	48 89 70 18          	mov    %rsi,0x18(%rax)
   a:	8b 4b 10             	mov    0x10(%rbx),%ecx
   d:	48 c7 c2 ff ff ff ff 	mov    $0xffffffffffffffff,%rdx
  14:	48 8b 78 08          	mov    0x8(%rax),%rdi
  18:	48 d3 e2             	shl    %cl,%rdx
  1b:	48 21 f2             	and    %rsi,%rdx
  1e:	48 2b 13             	sub    (%rbx),%rdx
  21:	48 8b 30             	mov    (%rax),%rsi
  24:	48 d3 ea             	shr    %cl,%rdx
  27:	8b 4b 18             	mov    0x18(%rbx),%ecx
	...
[    0.907095] RSP: 0018:ffffc900004a39a0 EFLAGS: 00010246
[    0.907368] RAX: ffff8881043a0880 RBX: ffff888102953340 RCX: 0000000000000000
[    0.907723] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[    0.908100] RBP: ffff888102952180 R08: 0000000000000000 R09: 0000000000000000
[    0.908451] R10: ffff8881043a0000 R11: 0000000000000000 R12: ffff888102952000
[    0.908804] R13: ffff888102952180 R14: ffff8881043a0ad8 R15: ffff8881043a0880
[    0.909179] FS:  000000002a1a0380(0000) GS:ffff888196d8d000(0000) knlGS:0000000000000000
[    0.909572] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[    0.909857] CR2: 0000000000000000 CR3: 0000000102993002 CR4: 0000000000772ef0
[    0.910247] PKRU: 55555554
[    0.910391] Call Trace:
[    0.910527]  &lt;TASK&gt;
[    0.910638]  qfq_reset_qdisc (net/sched/sch_qfq.c:357 net/sched/sch_qfq.c:1485)
[    0.910826]  qdisc_reset (include/linux/skbuff.h:2195 include/linux/skbuff.h:2501 include/linux/skbuff.h:3424 include/linux/skbuff.h:3430 net/sched/sch_generic.c:1036)
[    0.911040]  __qdisc_destroy (net/sched/sch_generic.c:1076)
[    0.911236]  tc_new_tfilter (net/sched/cls_api.c:2447)
[    0.911447]  rtnetlink_rcv_msg (net/core/rtnetlink.c:6958)
[    0.911663]  ? __pfx_rtnetlink_rcv_msg (net/core/rtnetlink.c:6861)
[    0.911894]  netlink_rcv_skb (net/netlink/af_netlink.c:2550)
[    0.912100]  netlink_unicast (net/netlink/af_netlink.c:1319 net/netlink/af_netlink.c:1344)
[    0.912296]  ? __alloc_skb (net/core/skbuff.c:706)
[    0.912484]  netlink_sendmsg (net/netlink/af
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22976/">CVE-2026-22976 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22976">CVE-2026-22976 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257035">SUSE bug 1257035</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202622977" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-22977</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-22977" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22977" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-22977" ref_url="https://www.suse.com/security/cve/CVE-2026-22977" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: sock: fix hardened usercopy panic in sock_recv_errqueue

skbuff_fclone_cache was created without defining a usercopy region,
[1] unlike skbuff_head_cache which properly whitelists the cb[] field.
[2] This causes a usercopy BUG() when CONFIG_HARDENED_USERCOPY is
enabled and the kernel attempts to copy sk_buff.cb data to userspace
via sock_recv_errqueue() -&gt; put_cmsg().

The crash occurs when: 1. TCP allocates an skb using alloc_skb_fclone()
   (from skbuff_fclone_cache) [1]
2. The skb is cloned via skb_clone() using the pre-allocated fclone
[3] 3. The cloned skb is queued to sk_error_queue for timestamp
reporting 4. Userspace reads the error queue via recvmsg(MSG_ERRQUEUE)
5. sock_recv_errqueue() calls put_cmsg() to copy serr-&gt;ee from skb-&gt;cb
[4] 6. __check_heap_object() fails because skbuff_fclone_cache has no
   usercopy whitelist [5]

When cloned skbs allocated from skbuff_fclone_cache are used in the
socket error queue, accessing the sock_exterr_skb structure in skb-&gt;cb
via put_cmsg() triggers a usercopy hardening violation:

[    5.379589] usercopy: Kernel memory exposure attempt detected from SLUB object 'skbuff_fclone_cache' (offset 296, size 16)!
[    5.382796] kernel BUG at mm/usercopy.c:102!
[    5.383923] Oops: invalid opcode: 0000 [#1] SMP KASAN NOPTI
[    5.384903] CPU: 1 UID: 0 PID: 138 Comm: poc_put_cmsg Not tainted 6.12.57 #7
[    5.384903] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014
[    5.384903] RIP: 0010:usercopy_abort+0x6c/0x80
[    5.384903] Code: 1a 86 51 48 c7 c2 40 15 1a 86 41 52 48 c7 c7 c0 15 1a 86 48 0f 45 d6 48 c7 c6 80 15 1a 86 48 89 c1 49 0f 45 f3 e8 84 27 88 ff &lt;0f&gt; 0b 490
[    5.384903] RSP: 0018:ffffc900006f77a8 EFLAGS: 00010246
[    5.384903] RAX: 000000000000006f RBX: ffff88800f0ad2a8 RCX: 1ffffffff0f72e74
[    5.384903] RDX: 0000000000000000 RSI: 0000000000000004 RDI: ffffffff87b973a0
[    5.384903] RBP: 0000000000000010 R08: 0000000000000000 R09: fffffbfff0f72e74
[    5.384903] R10: 0000000000000003 R11: 79706f6372657375 R12: 0000000000000001
[    5.384903] R13: ffff88800f0ad2b8 R14: ffffea00003c2b40 R15: ffffea00003c2b00
[    5.384903] FS:  0000000011bc4380(0000) GS:ffff8880bf100000(0000) knlGS:0000000000000000
[    5.384903] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[    5.384903] CR2: 000056aa3b8e5fe4 CR3: 000000000ea26004 CR4: 0000000000770ef0
[    5.384903] PKRU: 55555554
[    5.384903] Call Trace:
[    5.384903]  &lt;TASK&gt;
[    5.384903]  __check_heap_object+0x9a/0xd0
[    5.384903]  __check_object_size+0x46c/0x690
[    5.384903]  put_cmsg+0x129/0x5e0
[    5.384903]  sock_recv_errqueue+0x22f/0x380
[    5.384903]  tls_sw_recvmsg+0x7ed/0x1960
[    5.384903]  ? srso_alias_return_thunk+0x5/0xfbef5
[    5.384903]  ? schedule+0x6d/0x270
[    5.384903]  ? srso_alias_return_thunk+0x5/0xfbef5
[    5.384903]  ? mutex_unlock+0x81/0xd0
[    5.384903]  ? __pfx_mutex_unlock+0x10/0x10
[    5.384903]  ? __pfx_tls_sw_recvmsg+0x10/0x10
[    5.384903]  ? _raw_spin_lock_irqsave+0x8f/0xf0
[    5.384903]  ? _raw_read_unlock_irqrestore+0x20/0x40
[    5.384903]  ? srso_alias_return_thunk+0x5/0xfbef5

The crash offset 296 corresponds to skb2-&gt;cb within skbuff_fclones:
  - sizeof(struct sk_buff) = 232 - offsetof(struct sk_buff, cb) = 40 -
  offset of skb2.cb in fclones = 232 + 40 = 272 - crash offset 296 =
  272 + 24 (inside sock_exterr_skb.ee)

This patch uses a local stack variable as a bounce buffer to avoid the hardened usercopy check failure.

[1] https://elixir.bootlin.com/linux/v6.12.62/source/net/ipv4/tcp.c#L885
[2] https://elixir.bootlin.com/linux/v6.12.62/source/net/core/skbuff.c#L5104
[3] https://elixir.bootlin.com/linux/v6.12.62/source/net/core/skbuff.c#L5566
[4] https://elixir.bootlin.com/linux/v6.12.62/source/net/core/skbuff.c#L5491
[5] https://elixir.bootlin.com/linux/v6.12.62/source/mm/slub.c#L5719
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22977/">CVE-2026-22977 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22977">CVE-2026-22977 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257053">SUSE bug 1257053</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202622978" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-22978</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-22978" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22978" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-22978" ref_url="https://www.suse.com/security/cve/CVE-2026-22978" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: avoid kernel-infoleak from struct iw_point

struct iw_point has a 32bit hole on 64bit arches.

struct iw_point {
  void __user   *pointer;       /* Pointer to the data  (in user space) */
  __u16         length;         /* number of fields or size in bytes */
  __u16         flags;          /* Optional params */
};

Make sure to zero the structure to avoid disclosing 32bits of kernel data
to user space.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-22978/">CVE-2026-22978 at SUSE</cve>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22978">CVE-2026-22978 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257227">SUSE bug 1257227</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202622979" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-22979</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-22979" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22979" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-22979" ref_url="https://www.suse.com/security/cve/CVE-2026-22979" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: fix memory leak in skb_segment_list for GRO packets

When skb_segment_list() is called during packet forwarding, it handles
packets that were aggregated by the GRO engine.

Historically, the segmentation logic in skb_segment_list assumes that
individual segments are split from a parent SKB and may need to carry
their own socket memory accounting. Accordingly, the code transfers
truesize from the parent to the newly created segments.

Prior to commit ed4cccef64c1 ("gro: fix ownership transfer"), this
truesize subtraction in skb_segment_list() was valid because fragments
still carry a reference to the original socket.

However, commit ed4cccef64c1 ("gro: fix ownership transfer") changed
this behavior by ensuring that fraglist entries are explicitly
orphaned (skb-&gt;sk = NULL) to prevent illegal orphaning later in the
stack. This change meant that the entire socket memory charge remained
with the head SKB, but the corresponding accounting logic in
skb_segment_list() was never updated.

As a result, the current code unconditionally adds each fragment's
truesize to delta_truesize and subtracts it from the parent SKB. Since
the fragments are no longer charged to the socket, this subtraction
results in an effective under-count of memory when the head is freed.
This causes sk_wmem_alloc to remain non-zero, preventing socket
destruction and leading to a persistent memory leak.

The leak can be observed via KMEMLEAK when tearing down the networking
environment:

unreferenced object 0xffff8881e6eb9100 (size 2048):
  comm "ping", pid 6720, jiffies 4295492526
  backtrace:
    kmem_cache_alloc_noprof+0x5c6/0x800
    sk_prot_alloc+0x5b/0x220
    sk_alloc+0x35/0xa00
    inet6_create.part.0+0x303/0x10d0
    __sock_create+0x248/0x640
    __sys_socket+0x11b/0x1d0

Since skb_segment_list() is exclusively used for SKB_GSO_FRAGLIST
packets constructed by GRO, the truesize adjustment is removed.

The call to skb_release_head_state() must be preserved. As documented in
commit cf673ed0e057 ("net: fix fraglist segmentation reference count
leak"), it is still required to correctly drop references to SKB
extensions that may be overwritten during __copy_skb_header().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2026-22979/">CVE-2026-22979 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22979">CVE-2026-22979 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257228">SUSE bug 1257228</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202622980" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-22980</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-22980" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22980" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-22980" ref_url="https://www.suse.com/security/cve/CVE-2026-22980" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfsd: provide locking for v4_end_grace

Writing to v4_end_grace can race with server shutdown and result in
memory being accessed after it was freed - reclaim_str_hashtbl in
particularly.

We cannot hold nfsd_mutex across the nfsd4_end_grace() call as that is
held while client_tracking_op-&gt;init() is called and that can wait for
an upcall to nfsdcltrack which can write to v4_end_grace, resulting in a
deadlock.

nfsd4_end_grace() is also called by the landromat work queue and this
doesn't require locking as server shutdown will stop the work and wait
for it before freeing anything that nfsd4_end_grace() might access.

However, we must be sure that writing to v4_end_grace doesn't restart
the work item after shutdown has already waited for it.  For this we
add a new flag protected with nn-&gt;client_lock.  It is set only while it
is safe to make client tracking calls, and v4_end_grace only schedules
work while the flag is set with the spinlock held.

So this patch adds a nfsd_net field "client_tracking_active" which is
set as described.  Another field "grace_end_forced", is set when
v4_end_grace is written.  After this is set, and providing
client_tracking_active is set, the laundromat is scheduled.
This "grace_end_forced" field bypasses other checks for whether the
grace period has finished.

This resolves a race which can result in use-after-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-22980/">CVE-2026-22980 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22980">CVE-2026-22980 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257222">SUSE bug 1257222</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202622981" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-22981</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-22981" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22981" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-22981" ref_url="https://www.suse.com/security/cve/CVE-2026-22981" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

idpf: detach and close netdevs while handling a reset

Protect the reset path from callbacks by setting the netdevs to detached
state and close any netdevs in UP state until the reset handling has
completed. During a reset, the driver will de-allocate resources for the
vport, and there is no guarantee that those will recover, which is why the
existing vport_ctrl_lock does not provide sufficient protection.

idpf_detach_and_close() is called right before reset handling. If the
reset handling succeeds, the netdevs state is recovered via call to
idpf_attach_and_open(). If the reset handling fails the netdevs remain
down. The detach/down calls are protected with RTNL lock to avoid racing
with callbacks. On the recovery side the attach can be done without
holding the RTNL lock as there are no callbacks expected at that point,
due to detach/close always being done first in that flow.

The previous logic restoring the netdevs state based on the
IDPF_VPORT_UP_REQUESTED flag in the init task is not needed anymore, hence
the removal of idpf_set_vport_state(). The IDPF_VPORT_UP_REQUESTED is
still being used to restore the state of the netdevs following the reset,
but has no use outside of the reset handling flow.

idpf_init_hard_reset() is converted to void, since it was used as such and
there is no error handling being done based on its return value.

Before this change, invoking hard and soft resets simultaneously will
cause the driver to lose the vport state:
ip -br a
&lt;inf&gt;	UP
echo 1 &gt; /sys/class/net/ens801f0/device/reset&amp; \
ethtool -L ens801f0 combined 8
ip -br a
&lt;inf&gt;	DOWN
ip link set &lt;inf&gt; up
ip -br a
&lt;inf&gt;	DOWN

Also in case of a failure in the reset path, the netdev is left
exposed to external callbacks, while vport resources are not
initialized, leading to a crash on subsequent ifup/down:
[408471.398966] idpf 0000:83:00.0: HW reset detected
[408471.411744] idpf 0000:83:00.0: Device HW Reset initiated
[408472.277901] idpf 0000:83:00.0: The driver was unable to contact the device's firmware. Check that the FW is running. Driver state= 0x2
[408508.125551] BUG: kernel NULL pointer dereference, address: 0000000000000078
[408508.126112] #PF: supervisor read access in kernel mode
[408508.126687] #PF: error_code(0x0000) - not-present page
[408508.127256] PGD 2aae2f067 P4D 0
[408508.127824] Oops: Oops: 0000 [#1] SMP NOPTI
...
[408508.130871] RIP: 0010:idpf_stop+0x39/0x70 [idpf]
...
[408508.139193] Call Trace:
[408508.139637]  &lt;TASK&gt;
[408508.140077]  __dev_close_many+0xbb/0x260
[408508.140533]  __dev_change_flags+0x1cf/0x280
[408508.140987]  netif_change_flags+0x26/0x70
[408508.141434]  dev_change_flags+0x3d/0xb0
[408508.141878]  devinet_ioctl+0x460/0x890
[408508.142321]  inet_ioctl+0x18e/0x1d0
[408508.142762]  ? _copy_to_user+0x22/0x70
[408508.143207]  sock_do_ioctl+0x3d/0xe0
[408508.143652]  sock_ioctl+0x10e/0x330
[408508.144091]  ? find_held_lock+0x2b/0x80
[408508.144537]  __x64_sys_ioctl+0x96/0xe0
[408508.144979]  do_syscall_64+0x79/0x3d0
[408508.145415]  entry_SYSCALL_64_after_hwframe+0x76/0x7e
[408508.145860] RIP: 0033:0x7f3e0bb4caff
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-22981/">CVE-2026-22981 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22981">CVE-2026-22981 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257225">SUSE bug 1257225</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202622982" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-22982</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-22982" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22982" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-22982" ref_url="https://www.suse.com/security/cve/CVE-2026-22982" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: mscc: ocelot: Fix crash when adding interface under a lag

Commit 15faa1f67ab4 ("lan966x: Fix crash when adding interface under a lag")
fixed a similar issue in the lan966x driver caused by a NULL pointer dereference.
The ocelot_set_aggr_pgids() function in the ocelot driver has similar logic
and is susceptible to the same crash.

This issue specifically affects the ocelot_vsc7514.c frontend, which leaves
unused ports as NULL pointers. The felix_vsc9959.c frontend is unaffected as
it uses the DSA framework which registers all ports.

Fix this by checking if the port pointer is valid before accessing it.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22982/">CVE-2026-22982 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22982">CVE-2026-22982 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257179">SUSE bug 1257179</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202622984" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-22984</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-22984" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22984" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-22984" ref_url="https://www.suse.com/security/cve/CVE-2026-22984" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

libceph: prevent potential out-of-bounds reads in handle_auth_done()

Perform an explicit bounds check on payload_len to avoid a possible
out-of-bounds access in the callout.

[ idryomov: changelog ]
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-22984/">CVE-2026-22984 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22984">CVE-2026-22984 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257217">SUSE bug 1257217</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202622985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-22985</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-22985" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22985" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-22985" ref_url="https://www.suse.com/security/cve/CVE-2026-22985" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

idpf: Fix RSS LUT NULL pointer crash on early ethtool operations

The RSS LUT is not initialized until the interface comes up, causing
the following NULL pointer crash when ethtool operations like rxhash on/off
are performed before the interface is brought up for the first time.

Move RSS LUT initialization from ndo_open to vport creation to ensure LUT
is always available. This enables RSS configuration via ethtool before
bringing the interface up. Simplify LUT management by maintaining all
changes in the driver's soft copy and programming zeros to the indirection
table when rxhash is disabled. Defer HW programming until the interface
comes up if it is down during rxhash and LUT configuration changes.

Steps to reproduce:
** Load idpf driver; interfaces will be created
	modprobe idpf
** Before bringing the interfaces up, turn rxhash off
	ethtool -K eth2 rxhash off

[89408.371875] BUG: kernel NULL pointer dereference, address: 0000000000000000
[89408.371908] #PF: supervisor read access in kernel mode
[89408.371924] #PF: error_code(0x0000) - not-present page
[89408.371940] PGD 0 P4D 0
[89408.371953] Oops: Oops: 0000 [#1] SMP NOPTI
&lt;snip&gt;
[89408.372052] RIP: 0010:memcpy_orig+0x16/0x130
[89408.372310] Call Trace:
[89408.372317]  &lt;TASK&gt;
[89408.372326]  ? idpf_set_features+0xfc/0x180 [idpf]
[89408.372363]  __netdev_update_features+0x295/0xde0
[89408.372384]  ethnl_set_features+0x15e/0x460
[89408.372406]  genl_family_rcv_msg_doit+0x11f/0x180
[89408.372429]  genl_rcv_msg+0x1ad/0x2b0
[89408.372446]  ? __pfx_ethnl_set_features+0x10/0x10
[89408.372465]  ? __pfx_genl_rcv_msg+0x10/0x10
[89408.372482]  netlink_rcv_skb+0x58/0x100
[89408.372502]  genl_rcv+0x2c/0x50
[89408.372516]  netlink_unicast+0x289/0x3e0
[89408.372533]  netlink_sendmsg+0x215/0x440
[89408.372551]  __sys_sendto+0x234/0x240
[89408.372571]  __x64_sys_sendto+0x28/0x30
[89408.372585]  x64_sys_call+0x1909/0x1da0
[89408.372604]  do_syscall_64+0x7a/0xfa0
[89408.373140]  ? clear_bhb_loop+0x60/0xb0
[89408.373647]  entry_SYSCALL_64_after_hwframe+0x76/0x7e
[89408.378887]  &lt;/TASK&gt;
&lt;snip&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22985/">CVE-2026-22985 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22985">CVE-2026-22985 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257277">SUSE bug 1257277</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202622986" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-22986</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-22986" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22986" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-22986" ref_url="https://www.suse.com/security/cve/CVE-2026-22986" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gpiolib: fix race condition for gdev-&gt;srcu

If two drivers were calling gpiochip_add_data_with_key(), one may be
traversing the srcu-protected list in gpio_name_to_desc(), meanwhile
other has just added its gdev in gpiodev_add_to_list_unlocked().
This creates a non-mutexed and non-protected timeframe, when one
instance is dereferencing and using &amp;gdev-&gt;srcu, before the other
has initialized it, resulting in crash:

[    4.935481] Unable to handle kernel paging request at virtual address ffff800272bcc000
[    4.943396] Mem abort info:
[    4.943400]   ESR = 0x0000000096000005
[    4.943403]   EC = 0x25: DABT (current EL), IL = 32 bits
[    4.943407]   SET = 0, FnV = 0
[    4.943410]   EA = 0, S1PTW = 0
[    4.943413]   FSC = 0x05: level 1 translation fault
[    4.943416] Data abort info:
[    4.943418]   ISV = 0, ISS = 0x00000005, ISS2 = 0x00000000
[    4.946220]   CM = 0, WnR = 0, TnD = 0, TagAccess = 0
[    4.955261]   GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0
[    4.955268] swapper pgtable: 4k pages, 48-bit VAs, pgdp=0000000038e6c000
[    4.961449] [ffff800272bcc000] pgd=0000000000000000
[    4.969203] , p4d=1000000039739003
[    4.979730] , pud=0000000000000000
[    4.980210] phandle (CPU): 0x0000005e, phandle (BE): 0x5e000000 for node "reset"
[    4.991736] Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP
...
[    5.121359] pc : __srcu_read_lock+0x44/0x98
[    5.131091] lr : gpio_name_to_desc+0x60/0x1a0
[    5.153671] sp : ffff8000833bb430
[    5.298440]
[    5.298443] Call trace:
[    5.298445]  __srcu_read_lock+0x44/0x98
[    5.309484]  gpio_name_to_desc+0x60/0x1a0
[    5.320692]  gpiochip_add_data_with_key+0x488/0xf00
    5.946419] ---[ end trace 0000000000000000 ]---

Move initialization code for gdev fields before it is added to
gpio_devices, with adjacent initialization code.
Adjust goto statements  to reflect modified order of operations

[Bartosz: fixed a build issue, removed stray newline]
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22986/">CVE-2026-22986 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22986">CVE-2026-22986 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257276">SUSE bug 1257276</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202622988" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-22988</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-22988" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22988" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-22988" ref_url="https://www.suse.com/security/cve/CVE-2026-22988" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

arp: do not assume dev_hard_header() does not change skb-&gt;head

arp_create() is the only dev_hard_header() caller
making assumption about skb-&gt;head being unchanged.

A recent commit broke this assumption.

Initialize @arp pointer after dev_hard_header() call.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="6/CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22988/">CVE-2026-22988 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22988">CVE-2026-22988 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257282">SUSE bug 1257282</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202622989" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-22989</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-22989" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22989" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-22989" ref_url="https://www.suse.com/security/cve/CVE-2026-22989" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfsd: check that server is running in unlock_filesystem

If we are trying to unlock the filesystem via an administrative
interface and nfsd isn't running, it crashes the server. This
happens currently because nfsd4_revoke_states() access state
structures (eg., conf_id_hashtbl) that has been freed as a part
of the server shutdown.

[   59.465072] Call trace:
[   59.465308]  nfsd4_revoke_states+0x1b4/0x898 [nfsd] (P)
[   59.465830]  write_unlock_fs+0x258/0x440 [nfsd]
[   59.466278]  nfsctl_transaction_write+0xb0/0x120 [nfsd]
[   59.466780]  vfs_write+0x1f0/0x938
[   59.467088]  ksys_write+0xfc/0x1f8
[   59.467395]  __arm64_sys_write+0x74/0xb8
[   59.467746]  invoke_syscall.constprop.0+0xdc/0x1e8
[   59.468177]  do_el0_svc+0x154/0x1d8
[   59.468489]  el0_svc+0x40/0xe0
[   59.468767]  el0t_64_sync_handler+0xa0/0xe8
[   59.469138]  el0t_64_sync+0x1ac/0x1b0

Ensure this can't happen by taking the nfsd_mutex and checking that
the server is still up, and then holding the mutex across the call to
nfsd4_revoke_states().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-27"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22989/">CVE-2026-22989 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22989">CVE-2026-22989 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257279">SUSE bug 1257279</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202622990" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-22990</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-22990" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22990" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-22990" ref_url="https://www.suse.com/security/cve/CVE-2026-22990" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

libceph: replace overzealous BUG_ON in osdmap_apply_incremental()

If the osdmap is (maliciously) corrupted such that the incremental
osdmap epoch is different from what is expected, there is no need to
BUG.  Instead, just declare the incremental osdmap to be invalid.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22990/">CVE-2026-22990 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22990">CVE-2026-22990 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257221">SUSE bug 1257221</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202622991" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-22991</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-22991" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22991" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-22991" ref_url="https://www.suse.com/security/cve/CVE-2026-22991" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

libceph: make free_choose_arg_map() resilient to partial allocation

free_choose_arg_map() may dereference a NULL pointer if its caller fails
after a partial allocation.

For example, in decode_choose_args(), if allocation of arg_map-&gt;args
fails, execution jumps to the fail label and free_choose_arg_map() is
called. Since arg_map-&gt;size is updated to a non-zero value before memory
allocation, free_choose_arg_map() will iterate over arg_map-&gt;args and
dereference a NULL pointer.

To prevent this potential NULL pointer dereference and make
free_choose_arg_map() more resilient, add checks for pointers before
iterating.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-22991/">CVE-2026-22991 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22991">CVE-2026-22991 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257220">SUSE bug 1257220</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202622992" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-22992</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-22992" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22992" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-22992" ref_url="https://www.suse.com/security/cve/CVE-2026-22992" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

libceph: return the handler error from mon_handle_auth_done()

Currently any error from ceph_auth_handle_reply_done() is propagated
via finish_auth() but isn't returned from mon_handle_auth_done().  This
results in higher layers learning that (despite the monitor considering
us to be successfully authenticated) something went wrong in the
authentication phase and reacting accordingly, but msgr2 still trying
to proceed with establishing the session in the background.  In the
case of secure mode this can trigger a WARN in setup_crypto() and later
lead to a NULL pointer dereference inside of prepare_auth_signature().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-22992/">CVE-2026-22992 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22992">CVE-2026-22992 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257218">SUSE bug 1257218</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202622993" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-22993</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-22993" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22993" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-22993" ref_url="https://www.suse.com/security/cve/CVE-2026-22993" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

idpf: Fix RSS LUT NULL ptr issue after soft reset

During soft reset, the RSS LUT is freed and not restored unless the
interface is up. If an ethtool command that accesses the rss lut is
attempted immediately after reset, it will result in NULL ptr
dereference. Also, there is no need to reset the rss lut if the soft reset
does not involve queue count change.

After soft reset, set the RSS LUT to default values based on the updated
queue count only if the reset was a result of a queue count change and
the LUT was not configured by the user. In all other cases, don't touch
the LUT.

Steps to reproduce:

** Bring the interface down (if up)
ifconfig eth1 down

** update the queue count (eg., 27-&gt;20)
ethtool -L eth1 combined 20

** display the RSS LUT
ethtool -x eth1

[82375.558338] BUG: kernel NULL pointer dereference, address: 0000000000000000
[82375.558373] #PF: supervisor read access in kernel mode
[82375.558391] #PF: error_code(0x0000) - not-present page
[82375.558408] PGD 0 P4D 0
[82375.558421] Oops: Oops: 0000 [#1] SMP NOPTI
&lt;snip&gt;
[82375.558516] RIP: 0010:idpf_get_rxfh+0x108/0x150 [idpf]
[82375.558786] Call Trace:
[82375.558793]  &lt;TASK&gt;
[82375.558804]  rss_prepare.isra.0+0x187/0x2a0
[82375.558827]  rss_prepare_data+0x3a/0x50
[82375.558845]  ethnl_default_doit+0x13d/0x3e0
[82375.558863]  genl_family_rcv_msg_doit+0x11f/0x180
[82375.558886]  genl_rcv_msg+0x1ad/0x2b0
[82375.558902]  ? __pfx_ethnl_default_doit+0x10/0x10
[82375.558920]  ? __pfx_genl_rcv_msg+0x10/0x10
[82375.558937]  netlink_rcv_skb+0x58/0x100
[82375.558957]  genl_rcv+0x2c/0x50
[82375.558971]  netlink_unicast+0x289/0x3e0
[82375.558988]  netlink_sendmsg+0x215/0x440
[82375.559005]  __sys_sendto+0x234/0x240
[82375.559555]  __x64_sys_sendto+0x28/0x30
[82375.560068]  x64_sys_call+0x1909/0x1da0
[82375.560576]  do_syscall_64+0x7a/0xfa0
[82375.561076]  ? clear_bhb_loop+0x60/0xb0
[82375.561567]  entry_SYSCALL_64_after_hwframe+0x76/0x7e
&lt;snip&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22993/">CVE-2026-22993 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22993">CVE-2026-22993 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257180">SUSE bug 1257180</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202622996" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-22996</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-22996" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22996" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-22996" ref_url="https://www.suse.com/security/cve/CVE-2026-22996" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: Don't store mlx5e_priv in mlx5e_dev devlink priv

mlx5e_priv is an unstable structure that can be memset(0) if profile
attaching fails, mlx5e_priv in mlx5e_dev devlink private is used to
reference the netdev and mdev associated with that struct. Instead,
store netdev directly into mlx5e_dev and get mdev from the containing
mlx5_adev aux device structure.

This fixes a kernel oops in mlx5e_remove when switchdev mode fails due
to change profile failure.

$ devlink dev eswitch set pci/0000:00:03.0 mode switchdev
Error: mlx5_core: Failed setting eswitch to offloads.
dmesg:
workqueue: Failed to create a rescuer kthread for wq "mlx5e": -EINTR
mlx5_core 0012:03:00.1: mlx5e_netdev_init_profile:6214:(pid 37199): mlx5e_priv_init failed, err=-12
mlx5_core 0012:03:00.1 gpu3rdma1: mlx5e_netdev_change_profile: new profile init failed, -12
workqueue: Failed to create a rescuer kthread for wq "mlx5e": -EINTR
mlx5_core 0012:03:00.1: mlx5e_netdev_init_profile:6214:(pid 37199): mlx5e_priv_init failed, err=-12
mlx5_core 0012:03:00.1 gpu3rdma1: mlx5e_netdev_change_profile: failed to rollback to orig profile, -12

$ devlink dev reload pci/0000:00:03.0 ==&gt; oops

BUG: kernel NULL pointer dereference, address: 0000000000000520
 #PF: supervisor read access in kernel mode
 #PF: error_code(0x0000) - not-present page
PGD 0 P4D 0
Oops: Oops: 0000 [#1] SMP NOPTI
CPU: 3 UID: 0 PID: 521 Comm: devlink Not tainted 6.18.0-rc5+ #117 PREEMPT(voluntary)
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-2.fc40 04/01/2014
RIP: 0010:mlx5e_remove+0x68/0x130
RSP: 0018:ffffc900034838f0 EFLAGS: 00010246
RAX: ffff88810283c380 RBX: ffff888101874400 RCX: ffffffff826ffc45
RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000
RBP: ffff888102d789c0 R08: ffff8881007137f0 R09: ffff888100264e10
R10: ffffc90003483898 R11: ffffc900034838a0 R12: ffff888100d261a0
R13: ffff888100d261a0 R14: ffff8881018749a0 R15: ffff888101874400
FS:  00007f8565fea740(0000) GS:ffff88856a759000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000520 CR3: 000000010b11a004 CR4: 0000000000370ef0
Call Trace:
 &lt;TASK&gt;
 device_release_driver_internal+0x19c/0x200
 bus_remove_device+0xc6/0x130
 device_del+0x160/0x3d0
 ? devl_param_driverinit_value_get+0x2d/0x90
 mlx5_detach_device+0x89/0xe0
 mlx5_unload_one_devl_locked+0x3a/0x70
 mlx5_devlink_reload_down+0xc8/0x220
 devlink_reload+0x7d/0x260
 devlink_nl_reload_doit+0x45b/0x5a0
 genl_family_rcv_msg_doit+0xe8/0x140
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-22996/">CVE-2026-22996 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22996">CVE-2026-22996 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257203">SUSE bug 1257203</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202622997" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-22997</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-22997" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22997" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-22997" ref_url="https://www.suse.com/security/cve/CVE-2026-22997" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: can: j1939: j1939_xtp_rx_rts_session_active(): deactivate session upon receiving the second rts

Since j1939_session_deactivate_activate_next() in j1939_tp_rxtimer() is
called only when the timer is enabled, we need to call
j1939_session_deactivate_activate_next() if we cancelled the timer.
Otherwise, refcount for j1939_session leaks, which will later appear as

| unregister_netdevice: waiting for vcan0 to become free. Usage count = 2.

problem.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-22997/">CVE-2026-22997 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22997">CVE-2026-22997 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257202">SUSE bug 1257202</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202622998" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-22998</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-22998" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22998" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-22998" ref_url="https://www.suse.com/security/cve/CVE-2026-22998" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2264" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002483.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2722" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003230.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvme-tcp: fix NULL pointer dereferences in nvmet_tcp_build_pdu_iovec

Commit efa56305908b ("nvmet-tcp: Fix a kernel panic when host sends an invalid H2C PDU length")
added ttag bounds checking and data_offset
validation in nvmet_tcp_handle_h2c_data_pdu(), but it did not validate
whether the command's data structures (cmd-&gt;req.sg and cmd-&gt;iov) have
been properly initialized before processing H2C_DATA PDUs.

The nvmet_tcp_build_pdu_iovec() function dereferences these pointers
without NULL checks. This can be triggered by sending H2C_DATA PDU
immediately after the ICREQ/ICRESP handshake, before
sending a CONNECT command or NVMe write command.

Attack vectors that trigger NULL pointer dereferences:
1. H2C_DATA PDU sent before CONNECT -&gt; both pointers NULL
2. H2C_DATA PDU for READ command -&gt; cmd-&gt;req.sg allocated, cmd-&gt;iov NULL
3. H2C_DATA PDU for uninitialized command slot -&gt; both pointers NULL

The fix validates both cmd-&gt;req.sg and cmd-&gt;iov before calling
nvmet_tcp_build_pdu_iovec(). Both checks are required because:
- Uninitialized commands: both NULL
- READ commands: cmd-&gt;req.sg allocated, cmd-&gt;iov NULL
- WRITE commands: both allocated
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22998/">CVE-2026-22998 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22998">CVE-2026-22998 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257209">SUSE bug 1257209</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202622999" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-22999</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-22999" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-22999" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-22999" ref_url="https://www.suse.com/security/cve/CVE-2026-22999" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1131-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1180-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1188-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1212-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1221-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1222-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1236-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1237-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1239-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1242-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1244-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1248-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1254-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1259-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1261-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1263-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1265-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1268-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045421.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1269-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1270-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1271-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1274-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1278-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1279-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1280-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045412.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1283-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045410.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1284-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1285-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1287-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1288-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1297-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1298-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21005-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21006-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21007-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21009-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045397.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21020-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21051-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21053-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21054-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21055-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21056-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21057-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21058-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21059-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21060-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21061-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21071-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21072-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21073-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21074-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21075-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21076-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21077-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21078-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21079-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21080-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21081-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21082-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21083-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21084-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21085-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21086-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21087-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21088-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21089-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21090-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21091-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045433.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: sch_qfq: do not free existing class in qfq_change_class()

Fixes qfq_change_class() error case.

cl-&gt;qdisc and cl should only be freed if a new class and qdisc
were allocated, or we risk various UAF.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-22999/">CVE-2026-22999 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-22999">CVE-2026-22999 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257236">SUSE bug 1257236</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257238">SUSE bug 1257238</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623000" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23000</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23000" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23000" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23000" ref_url="https://www.suse.com/security/cve/CVE-2026-23000" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: Fix crash on profile change rollback failure

mlx5e_netdev_change_profile can fail to attach a new profile and can
fail to rollback to old profile, in such case, we could end up with a
dangling netdev with a fully reset netdev_priv. A retry to change
profile, e.g. another attempt to call mlx5e_netdev_change_profile via
switchdev mode change, will crash trying to access the now NULL
priv-&gt;mdev.

This fix allows mlx5e_netdev_change_profile() to handle previous
failures and an empty priv, by not assuming priv is valid.

Pass netdev and mdev to all flows requiring
mlx5e_netdev_change_profile() and avoid passing priv.
In mlx5e_netdev_change_profile() check if current priv is valid, and if
not, just attach the new profile without trying to access the old one.

This fixes the following oops, when enabling switchdev mode for the 2nd
time after first time failure:

 ## Enabling switchdev mode first time:

mlx5_core 0012:03:00.1: E-Switch: Supported tc chains and prios offload
workqueue: Failed to create a rescuer kthread for wq "mlx5e": -EINTR
mlx5_core 0012:03:00.1: mlx5e_netdev_init_profile:6214:(pid 37199): mlx5e_priv_init failed, err=-12
mlx5_core 0012:03:00.1 gpu3rdma1: mlx5e_netdev_change_profile: new profile init failed, -12
workqueue: Failed to create a rescuer kthread for wq "mlx5e": -EINTR
mlx5_core 0012:03:00.1: mlx5e_netdev_init_profile:6214:(pid 37199): mlx5e_priv_init failed, err=-12
mlx5_core 0012:03:00.1 gpu3rdma1: mlx5e_netdev_change_profile: failed to rollback to orig profile, -12
                                                                         ^^^^^^^^
mlx5_core 0000:00:03.0: E-Switch: Disable: mode(LEGACY), nvfs(0), necvfs(0), active vports(0)

 ## retry: Enabling switchdev mode 2nd time:

mlx5_core 0000:00:03.0: E-Switch: Supported tc chains and prios offload
BUG: kernel NULL pointer dereference, address: 0000000000000038
 #PF: supervisor read access in kernel mode
 #PF: error_code(0x0000) - not-present page
PGD 0 P4D 0
Oops: Oops: 0000 [#1] SMP NOPTI
CPU: 13 UID: 0 PID: 520 Comm: devlink Not tainted 6.18.0-rc4+ #91 PREEMPT(voluntary)
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-2.fc40 04/01/2014
RIP: 0010:mlx5e_detach_netdev+0x3c/0x90
Code: 50 00 00 f0 80 4f 78 02 48 8b bf e8 07 00 00 48 85 ff 74 16 48 8b 73 78 48 d1 ee 83 e6 01 83 f6 01 40 0f b6 f6 e8 c4 42 00 00 &lt;48&gt; 8b 45 38 48 85 c0 74 08 48 89 df e8 cc 47 40 1e 48 8b bb f0 07
RSP: 0018:ffffc90000673890 EFLAGS: 00010246
RAX: 0000000000000000 RBX: ffff8881036a89c0 RCX: 0000000000000000
RDX: ffff888113f63800 RSI: ffffffff822fe720 RDI: 0000000000000000
RBP: 0000000000000000 R08: 0000000000002dcd R09: 0000000000000000
R10: ffffc900006738e8 R11: 00000000ffffffff R12: 0000000000000000
R13: 0000000000000000 R14: ffff8881036a89c0 R15: 0000000000000000
FS:  00007fdfb8384740(0000) GS:ffff88856a9d6000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000038 CR3: 0000000112ae0005 CR4: 0000000000370ef0
Call Trace:
 &lt;TASK&gt;
 mlx5e_netdev_change_profile+0x45/0xb0
 mlx5e_vport_rep_load+0x27b/0x2d0
 mlx5_esw_offloads_rep_load+0x72/0xf0
 esw_offloads_enable+0x5d0/0x970
 mlx5_eswitch_enable_locked+0x349/0x430
 ? is_mp_supported+0x57/0xb0
 mlx5_devlink_eswitch_mode_set+0x26b/0x430
 devlink_nl_eswitch_set_doit+0x6f/0xf0
 genl_family_rcv_msg_doit+0xe8/0x140
 genl_rcv_msg+0x18b/0x290
 ? __pfx_devlink_nl_pre_doit+0x10/0x10
 ? __pfx_devlink_nl_eswitch_set_doit+0x10/0x10
 ? __pfx_devlink_nl_post_doit+0x10/0x10
 ? __pfx_genl_rcv_msg+0x10/0x10
 netlink_rcv_skb+0x52/0x100
 genl_rcv+0x28/0x40
 netlink_unicast+0x282/0x3e0
 ? __alloc_skb+0xd6/0x190
 netlink_sendmsg+0x1f7/0x430
 __sys_sendto+0x213/0x220
 ? __sys_recvmsg+0x6a/0xd0
 __x64_sys_sendto+0x24/0x30
 do_syscall_64+0x50/0x1f0
 entry_SYSCALL_64_after_hwframe+0x76/0x7e
RIP: 0033:0x7fdfb8495047
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23000/">CVE-2026-23000 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23000">CVE-2026-23000 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257234">SUSE bug 1257234</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623001" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23001</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23001" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23001" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23001" ref_url="https://www.suse.com/security/cve/CVE-2026-23001" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3963" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002557.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3966" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003268.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0474-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024140.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0475-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024139.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0495-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024159.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0496-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024158.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1131-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

macvlan: fix possible UAF in macvlan_forward_source()

Add RCU protection on (struct macvlan_source_entry)-&gt;vlan.

Whenever macvlan_hash_del_source() is called, we must clear
entry-&gt;vlan pointer before RCU grace period starts.

This allows macvlan_forward_source() to skip over
entries queued for freeing.

Note that macvlan_dev are already RCU protected, as they
are embedded in a standard netdev (netdev_priv(ndev)).

https: //lore.kernel.org/netdev/695fb1e8.050a0220.1c677c.039f.GAE@google.com/T/#u
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23001/">CVE-2026-23001 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23001">CVE-2026-23001 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257232">SUSE bug 1257232</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257233">SUSE bug 1257233</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623002" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23002</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23002" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23002" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23002" ref_url="https://www.suse.com/security/cve/CVE-2026-23002" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

lib/buildid: use __kernel_read() for sleepable context

Prevent a "BUG: unable to handle kernel NULL pointer dereference in
filemap_read_folio".

For the sleepable context, convert freader to use __kernel_read() instead
of direct page cache access via read_cache_folio().  This simplifies the
faultable code path by using the standard kernel file reading interface
which handles all the complexity of reading file data.

At the moment we are not changing the code for non-sleepable context which
uses filemap_get_folio() and only succeeds if the target folios are
already in memory and up-to-date.  The reason is to keep the patch simple
and easier to backport to stable kernels.

Syzbot repro does not crash the kernel anymore and the selftests run
successfully.

In the follow up we will make __kernel_read() with IOCB_NOWAIT work for
non-sleepable contexts.  In addition, I would like to replace the
secretmem check with a more generic approach and will add fstest for the
buildid code.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23002/">CVE-2026-23002 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23002">CVE-2026-23002 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257243">SUSE bug 1257243</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623003" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23003</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23003" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23003" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23003" ref_url="https://www.suse.com/security/cve/CVE-2026-23003" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ip6_tunnel: use skb_vlan_inet_prepare() in __ip6_tnl_rcv()

Blamed commit did not take care of VLAN encapsulations
as spotted by syzbot [1].

Use skb_vlan_inet_prepare() instead of pskb_inet_may_pull().

[1]
 BUG: KMSAN: uninit-value in __INET_ECN_decapsulate include/net/inet_ecn.h:253 [inline]
 BUG: KMSAN: uninit-value in INET_ECN_decapsulate include/net/inet_ecn.h:275 [inline]
 BUG: KMSAN: uninit-value in IP6_ECN_decapsulate+0x7a8/0x1fa0 include/net/inet_ecn.h:321
  __INET_ECN_decapsulate include/net/inet_ecn.h:253 [inline]
  INET_ECN_decapsulate include/net/inet_ecn.h:275 [inline]
  IP6_ECN_decapsulate+0x7a8/0x1fa0 include/net/inet_ecn.h:321
  ip6ip6_dscp_ecn_decapsulate+0x16f/0x1b0 net/ipv6/ip6_tunnel.c:729
  __ip6_tnl_rcv+0xed9/0x1b50 net/ipv6/ip6_tunnel.c:860
  ip6_tnl_rcv+0xc3/0x100 net/ipv6/ip6_tunnel.c:903
 gre_rcv+0x1529/0x1b90 net/ipv6/ip6_gre.c:-1
  ip6_protocol_deliver_rcu+0x1c89/0x2c60 net/ipv6/ip6_input.c:438
  ip6_input_finish+0x1f4/0x4a0 net/ipv6/ip6_input.c:489
  NF_HOOK include/linux/netfilter.h:318 [inline]
  ip6_input+0x9c/0x330 net/ipv6/ip6_input.c:500
  ip6_mc_input+0x7ca/0xc10 net/ipv6/ip6_input.c:590
  dst_input include/net/dst.h:474 [inline]
  ip6_rcv_finish+0x958/0x990 net/ipv6/ip6_input.c:79
  NF_HOOK include/linux/netfilter.h:318 [inline]
  ipv6_rcv+0xf1/0x3c0 net/ipv6/ip6_input.c:311
  __netif_receive_skb_one_core net/core/dev.c:6139 [inline]
  __netif_receive_skb+0x1df/0xac0 net/core/dev.c:6252
  netif_receive_skb_internal net/core/dev.c:6338 [inline]
  netif_receive_skb+0x57/0x630 net/core/dev.c:6397
  tun_rx_batched+0x1df/0x980 drivers/net/tun.c:1485
  tun_get_user+0x5c0e/0x6c60 drivers/net/tun.c:1953
  tun_chr_write_iter+0x3e9/0x5c0 drivers/net/tun.c:1999
  new_sync_write fs/read_write.c:593 [inline]
  vfs_write+0xbe2/0x15d0 fs/read_write.c:686
  ksys_write fs/read_write.c:738 [inline]
  __do_sys_write fs/read_write.c:749 [inline]
  __se_sys_write fs/read_write.c:746 [inline]
  __x64_sys_write+0x1fb/0x4d0 fs/read_write.c:746
  x64_sys_call+0x30ab/0x3e70 arch/x86/include/generated/asm/syscalls_64.h:2
  do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
  do_syscall_64+0xd3/0xf80 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

Uninit was created at:
  slab_post_alloc_hook mm/slub.c:4960 [inline]
  slab_alloc_node mm/slub.c:5263 [inline]
  kmem_cache_alloc_node_noprof+0x9e7/0x17a0 mm/slub.c:5315
  kmalloc_reserve+0x13c/0x4b0 net/core/skbuff.c:586
  __alloc_skb+0x805/0x1040 net/core/skbuff.c:690
  alloc_skb include/linux/skbuff.h:1383 [inline]
  alloc_skb_with_frags+0xc5/0xa60 net/core/skbuff.c:6712
  sock_alloc_send_pskb+0xacc/0xc60 net/core/sock.c:2995
  tun_alloc_skb drivers/net/tun.c:1461 [inline]
  tun_get_user+0x1142/0x6c60 drivers/net/tun.c:1794
  tun_chr_write_iter+0x3e9/0x5c0 drivers/net/tun.c:1999
  new_sync_write fs/read_write.c:593 [inline]
  vfs_write+0xbe2/0x15d0 fs/read_write.c:686
  ksys_write fs/read_write.c:738 [inline]
  __do_sys_write fs/read_write.c:749 [inline]
  __se_sys_write fs/read_write.c:746 [inline]
  __x64_sys_write+0x1fb/0x4d0 fs/read_write.c:746
  x64_sys_call+0x30ab/0x3e70 arch/x86/include/generated/asm/syscalls_64.h:2
  do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
  do_syscall_64+0xd3/0xf80 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

CPU: 0 UID: 0 PID: 6465 Comm: syz.0.17 Not tainted syzkaller #0 PREEMPT(none)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23003/">CVE-2026-23003 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23003">CVE-2026-23003 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257246">SUSE bug 1257246</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623004" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23004</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23004" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23004" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23004" ref_url="https://www.suse.com/security/cve/CVE-2026-23004" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1131-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dst: fix races in rt6_uncached_list_del() and rt_del_uncached_list()

syzbot was able to crash the kernel in rt6_uncached_list_flush_dev()
in an interesting way [1]

Crash happens in list_del_init()/INIT_LIST_HEAD() while writing
list-&gt;prev, while the prior write on list-&gt;next went well.

static inline void INIT_LIST_HEAD(struct list_head *list)
{
	WRITE_ONCE(list-&gt;next, list); // This went well
	WRITE_ONCE(list-&gt;prev, list); // Crash, @list has been freed.
}

Issue here is that rt6_uncached_list_del() did not attempt to lock
ul-&gt;lock, as list_empty(&amp;rt-&gt;dst.rt_uncached) returned
true because the WRITE_ONCE(list-&gt;next, list) happened on the other CPU.

We might use list_del_init_careful() and list_empty_careful(),
or make sure rt6_uncached_list_del() always grabs the spinlock
whenever rt-&gt;dst.rt_uncached_list has been set.

A similar fix is neeed for IPv4.

[1]

 BUG: KASAN: slab-use-after-free in INIT_LIST_HEAD include/linux/list.h:46 [inline]
 BUG: KASAN: slab-use-after-free in list_del_init include/linux/list.h:296 [inline]
 BUG: KASAN: slab-use-after-free in rt6_uncached_list_flush_dev net/ipv6/route.c:191 [inline]
 BUG: KASAN: slab-use-after-free in rt6_disable_ip+0x633/0x730 net/ipv6/route.c:5020
Write of size 8 at addr ffff8880294cfa78 by task kworker/u8:14/3450

CPU: 0 UID: 0 PID: 3450 Comm: kworker/u8:14 Tainted: G             L      syzkaller #0 PREEMPT_{RT,(full)}
Tainted: [L]=SOFTLOCKUP
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025
Workqueue: netns cleanup_net
Call Trace:
 &lt;TASK&gt;
  dump_stack_lvl+0xe8/0x150 lib/dump_stack.c:120
  print_address_description mm/kasan/report.c:378 [inline]
  print_report+0xca/0x240 mm/kasan/report.c:482
  kasan_report+0x118/0x150 mm/kasan/report.c:595
  INIT_LIST_HEAD include/linux/list.h:46 [inline]
  list_del_init include/linux/list.h:296 [inline]
  rt6_uncached_list_flush_dev net/ipv6/route.c:191 [inline]
  rt6_disable_ip+0x633/0x730 net/ipv6/route.c:5020
  addrconf_ifdown+0x143/0x18a0 net/ipv6/addrconf.c:3853
 addrconf_notify+0x1bc/0x1050 net/ipv6/addrconf.c:-1
  notifier_call_chain+0x19d/0x3a0 kernel/notifier.c:85
  call_netdevice_notifiers_extack net/core/dev.c:2268 [inline]
  call_netdevice_notifiers net/core/dev.c:2282 [inline]
  netif_close_many+0x29c/0x410 net/core/dev.c:1785
  unregister_netdevice_many_notify+0xb50/0x2330 net/core/dev.c:12353
  ops_exit_rtnl_list net/core/net_namespace.c:187 [inline]
  ops_undo_list+0x3dc/0x990 net/core/net_namespace.c:248
  cleanup_net+0x4de/0x7b0 net/core/net_namespace.c:696
  process_one_work kernel/workqueue.c:3257 [inline]
  process_scheduled_works+0xad1/0x1770 kernel/workqueue.c:3340
  worker_thread+0x8a0/0xda0 kernel/workqueue.c:3421
  kthread+0x711/0x8a0 kernel/kthread.c:463
  ret_from_fork+0x510/0xa50 arch/x86/kernel/process.c:158
  ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:246
 &lt;/TASK&gt;

Allocated by task 803:
  kasan_save_stack mm/kasan/common.c:57 [inline]
  kasan_save_track+0x3e/0x80 mm/kasan/common.c:78
  unpoison_slab_object mm/kasan/common.c:340 [inline]
  __kasan_slab_alloc+0x6c/0x80 mm/kasan/common.c:366
  kasan_slab_alloc include/linux/kasan.h:253 [inline]
  slab_post_alloc_hook mm/slub.c:4953 [inline]
  slab_alloc_node mm/slub.c:5263 [inline]
  kmem_cache_alloc_noprof+0x18d/0x6c0 mm/slub.c:5270
  dst_alloc+0x105/0x170 net/core/dst.c:89
  ip6_dst_alloc net/ipv6/route.c:342 [inline]
  icmp6_dst_alloc+0x75/0x460 net/ipv6/route.c:3333
  mld_sendpack+0x683/0xe60 net/ipv6/mcast.c:1844
  mld_send_cr net/ipv6/mcast.c:2154 [inline]
  mld_ifc_work+0x83e/0xd60 net/ipv6/mcast.c:2693
  process_one_work kernel/workqueue.c:3257 [inline]
  process_scheduled_works+0xad1/0x1770 kernel/workqueue.c:3340
  worker_thread+0x8a0/0xda0 kernel/workqueue.c:3421
  kthread+0x711/0x8a0 kernel/kthread.c:463
  ret_from_fork+0x510/0xa50 arch/x86/kernel/process.c:158
  ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entr
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23004/">CVE-2026-23004 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23004">CVE-2026-23004 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257231">SUSE bug 1257231</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258655">SUSE bug 1258655</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623005" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23005</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23005" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23005" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23005" ref_url="https://www.suse.com/security/cve/CVE-2026-23005" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

x86/fpu: Clear XSTATE_BV[i] in guest XSAVE state whenever XFD[i]=1

When loading guest XSAVE state via KVM_SET_XSAVE, and when updating XFD in
response to a guest WRMSR, clear XFD-disabled features in the saved (or to
be restored) XSTATE_BV to ensure KVM doesn't attempt to load state for
features that are disabled via the guest's XFD.  Because the kernel
executes XRSTOR with the guest's XFD, saving XSTATE_BV[i]=1 with XFD[i]=1
will cause XRSTOR to #NM and panic the kernel.

E.g. if fpu_update_guest_xfd() sets XFD without clearing XSTATE_BV:

  ------------[ cut here ]------------
  WARNING: arch/x86/kernel/traps.c:1524 at exc_device_not_available+0x101/0x110, CPU#29: amx_test/848
  Modules linked in: kvm_intel kvm irqbypass
  CPU: 29 UID: 1000 PID: 848 Comm: amx_test Not tainted 6.19.0-rc2-ffa07f7fd437-x86_amx_nm_xfd_non_init-vm #171 NONE
  Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015
  RIP: 0010:exc_device_not_available+0x101/0x110
  Call Trace:
   &lt;TASK&gt;
   asm_exc_device_not_available+0x1a/0x20
  RIP: 0010:restore_fpregs_from_fpstate+0x36/0x90
   switch_fpu_return+0x4a/0xb0
   kvm_arch_vcpu_ioctl_run+0x1245/0x1e40 [kvm]
   kvm_vcpu_ioctl+0x2c3/0x8f0 [kvm]
   __x64_sys_ioctl+0x8f/0xd0
   do_syscall_64+0x62/0x940
   entry_SYSCALL_64_after_hwframe+0x4b/0x53
   &lt;/TASK&gt;
  ---[ end trace 0000000000000000 ]---

This can happen if the guest executes WRMSR(MSR_IA32_XFD) to set XFD[18] = 1,
and a host IRQ triggers kernel_fpu_begin() prior to the vmexit handler's
call to fpu_update_guest_xfd().

and if userspace stuffs XSTATE_BV[i]=1 via KVM_SET_XSAVE:

  ------------[ cut here ]------------
  WARNING: arch/x86/kernel/traps.c:1524 at exc_device_not_available+0x101/0x110, CPU#14: amx_test/867
  Modules linked in: kvm_intel kvm irqbypass
  CPU: 14 UID: 1000 PID: 867 Comm: amx_test Not tainted 6.19.0-rc2-2dace9faccd6-x86_amx_nm_xfd_non_init-vm #168 NONE
  Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 0.0.0 02/06/2015
  RIP: 0010:exc_device_not_available+0x101/0x110
  Call Trace:
   &lt;TASK&gt;
   asm_exc_device_not_available+0x1a/0x20
  RIP: 0010:restore_fpregs_from_fpstate+0x36/0x90
   fpu_swap_kvm_fpstate+0x6b/0x120
   kvm_load_guest_fpu+0x30/0x80 [kvm]
   kvm_arch_vcpu_ioctl_run+0x85/0x1e40 [kvm]
   kvm_vcpu_ioctl+0x2c3/0x8f0 [kvm]
   __x64_sys_ioctl+0x8f/0xd0
   do_syscall_64+0x62/0x940
   entry_SYSCALL_64_after_hwframe+0x4b/0x53
   &lt;/TASK&gt;
  ---[ end trace 0000000000000000 ]---

The new behavior is consistent with the AMX architecture.  Per Intel's SDM,
XSAVE saves XSTATE_BV as '0' for components that are disabled via XFD
(and non-compacted XSAVE saves the initial configuration of the state
component):

  If XSAVE, XSAVEC, XSAVEOPT, or XSAVES is saving the state component i,
  the instruction does not generate #NM when XCR0[i] = IA32_XFD[i] = 1;
  instead, it operates as if XINUSE[i] = 0 (and the state component was
  in its initial state): it saves bit i of XSTATE_BV field of the XSAVE
  header as 0; in addition, XSAVE saves the initial configuration of the
  state component (the other instructions do not save state component i).

Alternatively, KVM could always do XRSTOR with XFD=0, e.g. by using
a constant XFD based on the set of enabled features when XSAVEing for
a struct fpu_guest.  However, having XSTATE_BV[i]=1 for XFD-disabled
features can only happen in the above interrupt case, or in similar
scenarios involving preemption on preemptible kernels, because
fpu_swap_kvm_fpstate()'s call to save_fpregs_to_fpstate() saves the
outgoing FPU state with the current XFD; and that is (on all but the
first WRMSR to XFD) the guest XFD.

Therefore, XFD can only go out of sync with XSTATE_BV in the above
interrupt case, or in similar scenarios involving preemption on
preemptible kernels, and it we can consider it (de facto) part of KVM
ABI that KVM_GET_XSAVE returns XSTATE_BV[i]=0 for XFD-disabled features.

[Move clea
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23005/">CVE-2026-23005 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23005">CVE-2026-23005 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257245">SUSE bug 1257245</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623006" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23006</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23006" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23006" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23006" ref_url="https://www.suse.com/security/cve/CVE-2026-23006" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: tlv320adcx140: fix null pointer

The "snd_soc_component" in "adcx140_priv" was only used once but never
set. It was only used for reaching "dev" which is already present in
"adcx140_priv".
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-23006/">CVE-2026-23006 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23006">CVE-2026-23006 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257208">SUSE bug 1257208</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623010" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23010</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23010" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23010" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23010" ref_url="https://www.suse.com/security/cve/CVE-2026-23010" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0471-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024142.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv6: Fix use-after-free in inet6_addr_del().

syzbot reported use-after-free of inet6_ifaddr in
inet6_addr_del(). [0]

The cited commit accidentally moved ipv6_del_addr() for
mngtmpaddr before reading its ifp-&gt;flags for temporary
addresses in inet6_addr_del().

Let's move ipv6_del_addr() down to fix the UAF.

[0]:
BUG: KASAN: slab-use-after-free in inet6_addr_del.constprop.0+0x67a/0x6b0 net/ipv6/addrconf.c:3117
Read of size 4 at addr ffff88807b89c86c by task syz.3.1618/9593

CPU: 0 UID: 0 PID: 9593 Comm: syz.3.1618 Not tainted syzkaller #0 PREEMPT(full)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025
Call Trace:
 &lt;TASK&gt;
 __dump_stack lib/dump_stack.c:94 [inline]
 dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:120
 print_address_description mm/kasan/report.c:378 [inline]
 print_report+0xcd/0x630 mm/kasan/report.c:482
 kasan_report+0xe0/0x110 mm/kasan/report.c:595
 inet6_addr_del.constprop.0+0x67a/0x6b0 net/ipv6/addrconf.c:3117
 addrconf_del_ifaddr+0x11e/0x190 net/ipv6/addrconf.c:3181
 inet6_ioctl+0x1e5/0x2b0 net/ipv6/af_inet6.c:582
 sock_do_ioctl+0x118/0x280 net/socket.c:1254
 sock_ioctl+0x227/0x6b0 net/socket.c:1375
 vfs_ioctl fs/ioctl.c:51 [inline]
 __do_sys_ioctl fs/ioctl.c:597 [inline]
 __se_sys_ioctl fs/ioctl.c:583 [inline]
 __x64_sys_ioctl+0x18e/0x210 fs/ioctl.c:583
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xcd/0xf80 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f164cf8f749
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f164de64038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 00007f164d1e5fa0 RCX: 00007f164cf8f749
RDX: 0000200000000000 RSI: 0000000000008936 RDI: 0000000000000003
RBP: 00007f164d013f91 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007f164d1e6038 R14: 00007f164d1e5fa0 R15: 00007ffde15c8288
 &lt;/TASK&gt;

Allocated by task 9593:
 kasan_save_stack+0x33/0x60 mm/kasan/common.c:56
 kasan_save_track+0x14/0x30 mm/kasan/common.c:77
 poison_kmalloc_redzone mm/kasan/common.c:397 [inline]
 __kasan_kmalloc+0xaa/0xb0 mm/kasan/common.c:414
 kmalloc_noprof include/linux/slab.h:957 [inline]
 kzalloc_noprof include/linux/slab.h:1094 [inline]
 ipv6_add_addr+0x4e3/0x2010 net/ipv6/addrconf.c:1120
 inet6_addr_add+0x256/0x9b0 net/ipv6/addrconf.c:3050
 addrconf_add_ifaddr+0x1fc/0x450 net/ipv6/addrconf.c:3160
 inet6_ioctl+0x103/0x2b0 net/ipv6/af_inet6.c:580
 sock_do_ioctl+0x118/0x280 net/socket.c:1254
 sock_ioctl+0x227/0x6b0 net/socket.c:1375
 vfs_ioctl fs/ioctl.c:51 [inline]
 __do_sys_ioctl fs/ioctl.c:597 [inline]
 __se_sys_ioctl fs/ioctl.c:583 [inline]
 __x64_sys_ioctl+0x18e/0x210 fs/ioctl.c:583
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xcd/0xf80 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

Freed by task 6099:
 kasan_save_stack+0x33/0x60 mm/kasan/common.c:56
 kasan_save_track+0x14/0x30 mm/kasan/common.c:77
 kasan_save_free_info+0x3b/0x60 mm/kasan/generic.c:584
 poison_slab_object mm/kasan/common.c:252 [inline]
 __kasan_slab_free+0x5f/0x80 mm/kasan/common.c:284
 kasan_slab_free include/linux/kasan.h:234 [inline]
 slab_free_hook mm/slub.c:2540 [inline]
 slab_free_freelist_hook mm/slub.c:2569 [inline]
 slab_free_bulk mm/slub.c:6696 [inline]
 kmem_cache_free_bulk mm/slub.c:7383 [inline]
 kmem_cache_free_bulk+0x2bf/0x680 mm/slub.c:7362
 kfree_bulk include/linux/slab.h:830 [inline]
 kvfree_rcu_bulk+0x1b7/0x1e0 mm/slab_common.c:1523
 kvfree_rcu_drain_ready mm/slab_common.c:1728 [inline]
 kfree_rcu_monitor+0x1d0/0x2f0 mm/slab_common.c:1801
 process_one_work+0x9ba/0x1b20 kernel/workqueue.c:3257
 process_scheduled_works kernel/workqu
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2026-23010/">CVE-2026-23010 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23010">CVE-2026-23010 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257332">SUSE bug 1257332</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623011" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23011</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23011" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23011" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23011" ref_url="https://www.suse.com/security/cve/CVE-2026-23011" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024124.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0472-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024141.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0473-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024136.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0587-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20477-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20479-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024407.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20498-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024476.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20520-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024455.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20555-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20570-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024574.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024614.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20615-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024605.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ipv4: ip_gre: make ipgre_header() robust

Analog to commit db5b4e39c4e6 ("ip6_gre: make ip6gre_header() robust")

Over the years, syzbot found many ways to crash the kernel
in ipgre_header() [1].

This involves team or bonding drivers ability to dynamically
change their dev-&gt;needed_headroom and/or dev-&gt;hard_header_len

In this particular crash mld_newpack() allocated an skb
with a too small reserve/headroom, and by the time mld_sendpack()
was called, syzbot managed to attach an ipgre device.

[1]
skbuff: skb_under_panic: text:ffffffff89ea3cb7 len:2030915468 put:2030915372 head:ffff888058b43000 data:ffff887fdfa6e194 tail:0x120 end:0x6c0 dev:team0
 kernel BUG at net/core/skbuff.c:213 !
Oops: invalid opcode: 0000 [#1] SMP KASAN PTI
CPU: 1 UID: 0 PID: 1322 Comm: kworker/1:9 Not tainted syzkaller #0 PREEMPT(full)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025
Workqueue: mld mld_ifc_work
 RIP: 0010:skb_panic+0x157/0x160 net/core/skbuff.c:213
Call Trace:
 &lt;TASK&gt;
  skb_under_panic net/core/skbuff.c:223 [inline]
  skb_push+0xc3/0xe0 net/core/skbuff.c:2641
  ipgre_header+0x67/0x290 net/ipv4/ip_gre.c:897
  dev_hard_header include/linux/netdevice.h:3436 [inline]
  neigh_connected_output+0x286/0x460 net/core/neighbour.c:1618
  NF_HOOK_COND include/linux/netfilter.h:307 [inline]
  ip6_output+0x340/0x550 net/ipv6/ip6_output.c:247
  NF_HOOK+0x9e/0x380 include/linux/netfilter.h:318
  mld_sendpack+0x8d4/0xe60 net/ipv6/mcast.c:1855
  mld_send_cr net/ipv6/mcast.c:2154 [inline]
  mld_ifc_work+0x83e/0xd60 net/ipv6/mcast.c:2693
  process_one_work kernel/workqueue.c:3257 [inline]
  process_scheduled_works+0xad1/0x1770 kernel/workqueue.c:3340
  worker_thread+0x8a0/0xda0 kernel/workqueue.c:3421
  kthread+0x711/0x8a0 kernel/kthread.c:463
  ret_from_fork+0x510/0xa50 arch/x86/kernel/process.c:158
  ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:246
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-03-31"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-23011/">CVE-2026-23011 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23011">CVE-2026-23011 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257207">SUSE bug 1257207</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045719" comment="cluster-md-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045720" comment="cluster-md-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045721" comment="cluster-md-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045722" comment="cluster-md-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045723" comment="dlm-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045724" comment="dlm-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045725" comment="dlm-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045726" comment="dlm-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045727" comment="dtb-allwinner-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045728" comment="dtb-altera-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045729" comment="dtb-amazon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045730" comment="dtb-amd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045731" comment="dtb-amlogic-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045732" comment="dtb-apm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045733" comment="dtb-apple-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045734" comment="dtb-arm-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045735" comment="dtb-broadcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045736" comment="dtb-cavium-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045737" comment="dtb-exynos-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045738" comment="dtb-freescale-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045739" comment="dtb-hisilicon-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045740" comment="dtb-lg-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045741" comment="dtb-marvell-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045742" comment="dtb-mediatek-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045743" comment="dtb-nvidia-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045744" comment="dtb-qcom-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045745" comment="dtb-renesas-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045746" comment="dtb-rockchip-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045747" comment="dtb-socionext-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045748" comment="dtb-sprd-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045749" comment="dtb-xilinx-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045750" comment="gfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045751" comment="gfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045752" comment="gfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045753" comment="gfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045754" comment="kernel-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045756" comment="kernel-64kb-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045757" comment="kernel-64kb-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045758" comment="kernel-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045760" comment="kernel-azure-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045761" comment="kernel-azure-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045762" comment="kernel-azure-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045763" comment="kernel-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045764" comment="kernel-default-base-6.12.0-160000.26.1.160000.2.7 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045766" comment="kernel-default-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045767" comment="kernel-default-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045768" comment="kernel-default-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045770" comment="kernel-docs-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045771" comment="kernel-docs-html-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045772" comment="kernel-kvmsmall-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045774" comment="kernel-kvmsmall-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045775" comment="kernel-macros-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045776" comment="kernel-obs-build-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045777" comment="kernel-obs-qa-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045778" comment="kernel-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045780" comment="kernel-rt-extra-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045781" comment="kernel-rt-optional-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045782" comment="kernel-rt-vdso-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045783" comment="kernel-source-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045784" comment="kernel-source-vanilla-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045785" comment="kernel-syms-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045786" comment="kernel-zfcpdump-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045787" comment="kselftests-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045788" comment="kselftests-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045789" comment="kselftests-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045790" comment="kselftests-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045791" comment="ocfs2-kmp-64kb-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045792" comment="ocfs2-kmp-azure-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045793" comment="ocfs2-kmp-default-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045794" comment="ocfs2-kmp-rt-6.12.0-160000.26.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623017" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23017</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23017" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23017" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23017" ref_url="https://www.suse.com/security/cve/CVE-2026-23017" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

idpf: fix error handling in the init_task on load

If the init_task fails during a driver load, we end up without vports and
netdevs, effectively failing the entire process. In that state a
subsequent reset will result in a crash as the service task attempts to
access uninitialized resources. Following trace is from an error in the
init_task where the CREATE_VPORT (op 501) is rejected by the FW:

[40922.763136] idpf 0000:83:00.0: Device HW Reset initiated
[40924.449797] idpf 0000:83:00.0: Transaction failed (op 501)
[40958.148190] idpf 0000:83:00.0: HW reset detected
[40958.161202] BUG: kernel NULL pointer dereference, address: 00000000000000a8
...
[40958.168094] Workqueue: idpf-0000:83:00.0-vc_event idpf_vc_event_task [idpf]
[40958.168865] RIP: 0010:idpf_vc_event_task+0x9b/0x350 [idpf]
...
[40958.177932] Call Trace:
[40958.178491]  &lt;TASK&gt;
[40958.179040]  process_one_work+0x226/0x6d0
[40958.179609]  worker_thread+0x19e/0x340
[40958.180158]  ? __pfx_worker_thread+0x10/0x10
[40958.180702]  kthread+0x10f/0x250
[40958.181238]  ? __pfx_kthread+0x10/0x10
[40958.181774]  ret_from_fork+0x251/0x2b0
[40958.182307]  ? __pfx_kthread+0x10/0x10
[40958.182834]  ret_from_fork_asm+0x1a/0x30
[40958.183370]  &lt;/TASK&gt;

Fix the error handling in the init_task to make sure the service and
mailbox tasks are disabled if the error happens during load. These are
started in idpf_vc_core_init(), which spawns the init_task and has no way
of knowing if it failed. If the error happens on reset, following
successful driver load, the tasks can still run, as that will allow the
netdevs to attempt recovery through another reset. Stop the PTP callbacks
either way as those will be restarted by the call to idpf_vc_core_init()
during a successful reset.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23017/">CVE-2026-23017 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23017">CVE-2026-23017 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257552">SUSE bug 1257552</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623018" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23018</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23018" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23018" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23018" ref_url="https://www.suse.com/security/cve/CVE-2026-23018" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: release path before initializing extent tree in btrfs_read_locked_inode()

In btrfs_read_locked_inode() we are calling btrfs_init_file_extent_tree()
while holding a path with a read locked leaf from a subvolume tree, and
btrfs_init_file_extent_tree() may do a GFP_KERNEL allocation, which can
trigger reclaim.

This can create a circular lock dependency which lockdep warns about with
the following splat:

   [6.1433] ======================================================
   [6.1574] WARNING: possible circular locking dependency detected
   [6.1583] 6.18.0+ #4 Tainted: G     U
   [6.1591] ------------------------------------------------------
   [6.1599] kswapd0/117 is trying to acquire lock:
   [6.1606] ffff8d9b6333c5b8 (&amp;delayed_node-&gt;mutex){+.+.}-{3:3}, at: __btrfs_release_delayed_node.part.0+0x39/0x2f0
   [6.1625]
            but task is already holding lock:
   [6.1633] ffffffffa4ab8ce0 (fs_reclaim){+.+.}-{0:0}, at: balance_pgdat+0x195/0xc60
   [6.1646]
            which lock already depends on the new lock.

   [6.1657]
            the existing dependency chain (in reverse order) is:
   [6.1667]
            -&gt; #2 (fs_reclaim){+.+.}-{0:0}:
   [6.1677]        fs_reclaim_acquire+0x9d/0xd0
   [6.1685]        __kmalloc_cache_noprof+0x59/0x750
   [6.1694]        btrfs_init_file_extent_tree+0x90/0x100
   [6.1702]        btrfs_read_locked_inode+0xc3/0x6b0
   [6.1710]        btrfs_iget+0xbb/0xf0
   [6.1716]        btrfs_lookup_dentry+0x3c5/0x8e0
   [6.1724]        btrfs_lookup+0x12/0x30
   [6.1731]        lookup_open.isra.0+0x1aa/0x6a0
   [6.1739]        path_openat+0x5f7/0xc60
   [6.1746]        do_filp_open+0xd6/0x180
   [6.1753]        do_sys_openat2+0x8b/0xe0
   [6.1760]        __x64_sys_openat+0x54/0xa0
   [6.1768]        do_syscall_64+0x97/0x3e0
   [6.1776]        entry_SYSCALL_64_after_hwframe+0x76/0x7e
   [6.1784]
            -&gt; #1 (btrfs-tree-00){++++}-{3:3}:
   [6.1794]        lock_release+0x127/0x2a0
   [6.1801]        up_read+0x1b/0x30
   [6.1808]        btrfs_search_slot+0x8e0/0xff0
   [6.1817]        btrfs_lookup_inode+0x52/0xd0
   [6.1825]        __btrfs_update_delayed_inode+0x73/0x520
   [6.1833]        btrfs_commit_inode_delayed_inode+0x11a/0x120
   [6.1842]        btrfs_log_inode+0x608/0x1aa0
   [6.1849]        btrfs_log_inode_parent+0x249/0xf80
   [6.1857]        btrfs_log_dentry_safe+0x3e/0x60
   [6.1865]        btrfs_sync_file+0x431/0x690
   [6.1872]        do_fsync+0x39/0x80
   [6.1879]        __x64_sys_fsync+0x13/0x20
   [6.1887]        do_syscall_64+0x97/0x3e0
   [6.1894]        entry_SYSCALL_64_after_hwframe+0x76/0x7e
   [6.1903]
            -&gt; #0 (&amp;delayed_node-&gt;mutex){+.+.}-{3:3}:
   [6.1913]        __lock_acquire+0x15e9/0x2820
   [6.1920]        lock_acquire+0xc9/0x2d0
   [6.1927]        __mutex_lock+0xcc/0x10a0
   [6.1934]        __btrfs_release_delayed_node.part.0+0x39/0x2f0
   [6.1944]        btrfs_evict_inode+0x20b/0x4b0
   [6.1952]        evict+0x15a/0x2f0
   [6.1958]        prune_icache_sb+0x91/0xd0
   [6.1966]        super_cache_scan+0x150/0x1d0
   [6.1974]        do_shrink_slab+0x155/0x6f0
   [6.1981]        shrink_slab+0x48e/0x890
   [6.1988]        shrink_one+0x11a/0x1f0
   [6.1995]        shrink_node+0xbfd/0x1320
   [6.1002]        balance_pgdat+0x67f/0xc60
   [6.1321]        kswapd+0x1dc/0x3e0
   [6.1643]        kthread+0xff/0x240
   [6.1965]        ret_from_fork+0x223/0x280
   [6.1287]        ret_from_fork_asm+0x1a/0x30
   [6.1616]
            other info that might help us debug this:

   [6.1561] Chain exists of:
              &amp;delayed_node-&gt;mutex --&gt; btrfs-tree-00 --&gt; fs_reclaim

   [6.1503]  Possible unsafe locking scenario:

   [6.1110]        CPU0                    CPU1
   [6.1411]        ----                    ----
   [6.1707]   lock(fs_reclaim);
   [6.1998]                                lock(btrfs-tree-00);
   [6.1291]                                lock(fs_reclaim);
   [6.1581]   lock(&amp;del
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23018/">CVE-2026-23018 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23018">CVE-2026-23018 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257551">SUSE bug 1257551</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623021" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23021</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23021" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23021" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23021" ref_url="https://www.suse.com/security/cve/CVE-2026-23021" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: usb: pegasus: fix memory leak in update_eth_regs_async()

When asynchronously writing to the device registers and if usb_submit_urb()
fail, the code fail to release allocated to this point resources.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23021/">CVE-2026-23021 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23021">CVE-2026-23021 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257557">SUSE bug 1257557</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623022" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23022</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23022" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23022" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23022" ref_url="https://www.suse.com/security/cve/CVE-2026-23022" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

idpf: fix memory leak in idpf_vc_core_deinit()

Make sure to free hw-&gt;lan_regs. Reported by kmemleak during reset:

unreferenced object 0xff1b913d02a936c0 (size 96):
  comm "kworker/u258:14", pid 2174, jiffies 4294958305
  hex dump (first 32 bytes):
    00 00 00 c0 a8 ba 2d ff 00 00 00 00 00 00 00 00  ......-.........
    00 00 40 08 00 00 00 00 00 00 25 b3 a8 ba 2d ff  ..@.......%...-.
  backtrace (crc 36063c4f):
    __kmalloc_noprof+0x48f/0x890
    idpf_vc_core_init+0x6ce/0x9b0 [idpf]
    idpf_vc_event_task+0x1fb/0x350 [idpf]
    process_one_work+0x226/0x6d0
    worker_thread+0x19e/0x340
    kthread+0x10f/0x250
    ret_from_fork+0x251/0x2b0
    ret_from_fork_asm+0x1a/0x30
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23022/">CVE-2026-23022 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23022">CVE-2026-23022 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257581">SUSE bug 1257581</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623023" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23023</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23023" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23023" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23023" ref_url="https://www.suse.com/security/cve/CVE-2026-23023" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

idpf: fix memory leak in idpf_vport_rel()

Free vport-&gt;rx_ptype_lkup in idpf_vport_rel() to avoid leaking memory
during a reset. Reported by kmemleak:

unreferenced object 0xff450acac838a000 (size 4096):
  comm "kworker/u258:5", pid 7732, jiffies 4296830044
  hex dump (first 32 bytes):
    00 00 00 00 00 10 00 00 00 10 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 10 00 00 00 00 00 00  ................
  backtrace (crc 3da81902):
    __kmalloc_cache_noprof+0x469/0x7a0
    idpf_send_get_rx_ptype_msg+0x90/0x570 [idpf]
    idpf_init_task+0x1ec/0x8d0 [idpf]
    process_one_work+0x226/0x6d0
    worker_thread+0x19e/0x340
    kthread+0x10f/0x250
    ret_from_fork+0x251/0x2b0
    ret_from_fork_asm+0x1a/0x30
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23023/">CVE-2026-23023 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23023">CVE-2026-23023 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257556">SUSE bug 1257556</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23024</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23024" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23024" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23024" ref_url="https://www.suse.com/security/cve/CVE-2026-23024" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

idpf: fix memory leak of flow steer list on rmmod

The flow steering list maintains entries that are added and removed as
ethtool creates and deletes flow steering rules. Module removal with active
entries causes memory leak as the list is not properly cleaned up.

Prevent this by iterating through the remaining entries in the list and
freeing the associated memory during module removal. Add a spinlock
(flow_steer_list_lock) to protect the list access from multiple threads.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23024/">CVE-2026-23024 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23024">CVE-2026-23024 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257572">SUSE bug 1257572</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623026" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23026</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23026" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23026" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23026" ref_url="https://www.suse.com/security/cve/CVE-2026-23026" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dmaengine: qcom: gpi: Fix memory leak in gpi_peripheral_config()

Fix a memory leak in gpi_peripheral_config() where the original memory
pointed to by gchan-&gt;config could be lost if krealloc() fails.

The issue occurs when:
1. gchan-&gt;config points to previously allocated memory
2. krealloc() fails and returns NULL
3. The function directly assigns NULL to gchan-&gt;config, losing the
   reference to the original memory
4. The original memory becomes unreachable and cannot be freed

Fix this by using a temporary variable to hold the krealloc() result
and only updating gchan-&gt;config when the allocation succeeds.

Found via static analysis and code review.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23026/">CVE-2026-23026 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23026">CVE-2026-23026 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257562">SUSE bug 1257562</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623030" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23030</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23030" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23030" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23030" ref_url="https://www.suse.com/security/cve/CVE-2026-23030" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

phy: rockchip: inno-usb2: Fix a double free bug in rockchip_usb2phy_probe()

The for_each_available_child_of_node() calls of_node_put() to
release child_np in each success loop. After breaking from the
loop with the child_np has been released, the code will jump to
the put_child label and will call the of_node_put() again if the
devm_request_threaded_irq() fails. These cause a double free bug.

Fix by returning directly to avoid the duplicate of_node_put().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23030/">CVE-2026-23030 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23030">CVE-2026-23030 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257561">SUSE bug 1257561</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623031" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23031</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23031" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23031" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23031" ref_url="https://www.suse.com/security/cve/CVE-2026-23031" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: gs_usb: gs_usb_receive_bulk_callback(): fix URB memory leak

In gs_can_open(), the URBs for USB-in transfers are allocated, added to the
parent-&gt;rx_submitted anchor and submitted. In the complete callback
gs_usb_receive_bulk_callback(), the URB is processed and resubmitted. In
gs_can_close() the URBs are freed by calling
usb_kill_anchored_urbs(parent-&gt;rx_submitted).

However, this does not take into account that the USB framework unanchors
the URB before the complete function is called. This means that once an
in-URB has been completed, it is no longer anchored and is ultimately not
released in gs_can_close().

Fix the memory leak by anchoring the URB in the
gs_usb_receive_bulk_callback() to the parent-&gt;rx_submitted anchor.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-23031/">CVE-2026-23031 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23031">CVE-2026-23031 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257600">SUSE bug 1257600</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623033" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23033</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23033" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23033" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23033" ref_url="https://www.suse.com/security/cve/CVE-2026-23033" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dmaengine: omap-dma: fix dma_pool resource leak in error paths

The dma_pool created by dma_pool_create() is not destroyed when
dma_async_device_register() or of_dma_controller_register() fails,
causing a resource leak in the probe error paths.

Add dma_pool_destroy() in both error paths to properly release the
allocated dma_pool resource.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23033/">CVE-2026-23033 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23033">CVE-2026-23033 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257570">SUSE bug 1257570</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623035" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23035</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23035" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23035" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23035" ref_url="https://www.suse.com/security/cve/CVE-2026-23035" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: Pass netdev to mlx5e_destroy_netdev instead of priv

mlx5e_priv is an unstable structure that can be memset(0) if profile
attaching fails.

Pass netdev to mlx5e_destroy_netdev() to guarantee it will work on a
valid netdev.

On mlx5e_remove: Check validity of priv-&gt;profile, before attempting
to cleanup any resources that might be not there.

This fixes a kernel oops in mlx5e_remove when switchdev mode fails due
to change profile failure.

$ devlink dev eswitch set pci/0000:00:03.0 mode switchdev
Error: mlx5_core: Failed setting eswitch to offloads.
dmesg:
workqueue: Failed to create a rescuer kthread for wq "mlx5e": -EINTR
mlx5_core 0012:03:00.1: mlx5e_netdev_init_profile:6214:(pid 37199): mlx5e_priv_init failed, err=-12
mlx5_core 0012:03:00.1 gpu3rdma1: mlx5e_netdev_change_profile: new profile init failed, -12
workqueue: Failed to create a rescuer kthread for wq "mlx5e": -EINTR
mlx5_core 0012:03:00.1: mlx5e_netdev_init_profile:6214:(pid 37199): mlx5e_priv_init failed, err=-12
mlx5_core 0012:03:00.1 gpu3rdma1: mlx5e_netdev_change_profile: failed to rollback to orig profile, -12

$ devlink dev reload pci/0000:00:03.0 ==&gt; oops

BUG: kernel NULL pointer dereference, address: 0000000000000370
PGD 0 P4D 0
Oops: Oops: 0000 [#1] SMP NOPTI
CPU: 15 UID: 0 PID: 520 Comm: devlink Not tainted 6.18.0-rc5+ #115 PREEMPT(voluntary)
Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-2.fc40 04/01/2014
RIP: 0010:mlx5e_dcbnl_dscp_app+0x23/0x100
RSP: 0018:ffffc9000083f8b8 EFLAGS: 00010286
RAX: ffff8881126fc380 RBX: ffff8881015ac400 RCX: ffffffff826ffc45
RDX: 0000000000000000 RSI: 0000000000000001 RDI: ffff8881035109c0
RBP: ffff8881035109c0 R08: ffff888101e3e838 R09: ffff888100264e10
R10: ffffc9000083f898 R11: ffffc9000083f8a0 R12: ffff888101b921a0
R13: ffff888101b921a0 R14: ffff8881015ac9a0 R15: ffff8881015ac400
FS:  00007f789a3c8740(0000) GS:ffff88856aa59000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000370 CR3: 000000010b6c0001 CR4: 0000000000370ef0
Call Trace:
 &lt;TASK&gt;
 mlx5e_remove+0x57/0x110
 device_release_driver_internal+0x19c/0x200
 bus_remove_device+0xc6/0x130
 device_del+0x160/0x3d0
 ? devl_param_driverinit_value_get+0x2d/0x90
 mlx5_detach_device+0x89/0xe0
 mlx5_unload_one_devl_locked+0x3a/0x70
 mlx5_devlink_reload_down+0xc8/0x220
 devlink_reload+0x7d/0x260
 devlink_nl_reload_doit+0x45b/0x5a0
 genl_family_rcv_msg_doit+0xe8/0x140
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23035/">CVE-2026-23035 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23035">CVE-2026-23035 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257559">SUSE bug 1257559</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623037" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23037</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23037" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23037" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23037" ref_url="https://www.suse.com/security/cve/CVE-2026-23037" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: etas_es58x: allow partial RX URB allocation to succeed

When es58x_alloc_rx_urbs() fails to allocate the requested number of
URBs but succeeds in allocating some, it returns an error code.
This causes es58x_open() to return early, skipping the cleanup label
'free_urbs', which leads to the anchored URBs being leaked.

As pointed out by maintainer Vincent Mailhol, the driver is designed
to handle partial URB allocation gracefully. Therefore, partial
allocation should not be treated as a fatal error.

Modify es58x_alloc_rx_urbs() to return 0 if at least one URB has been
allocated, restoring the intended behavior and preventing the leak
in es58x_open().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23037/">CVE-2026-23037 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23037">CVE-2026-23037 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257554">SUSE bug 1257554</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623038" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23038</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23038" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23038" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23038" ref_url="https://www.suse.com/security/cve/CVE-2026-23038" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pnfs/flexfiles: Fix memory leak in nfs4_ff_alloc_deviceid_node()

In nfs4_ff_alloc_deviceid_node(), if the allocation for ds_versions fails,
the function jumps to the out_scratch label without freeing the already
allocated dsaddrs list, leading to a memory leak.

Fix this by jumping to the out_err_drain_dsaddrs label, which properly
frees the dsaddrs list before cleaning up other resources.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23038/">CVE-2026-23038 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23038">CVE-2026-23038 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257553">SUSE bug 1257553</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623042" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23042</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23042" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23042" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23042" ref_url="https://www.suse.com/security/cve/CVE-2026-23042" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

idpf: fix aux device unplugging when rdma is not supported by vport

If vport flags do not contain VIRTCHNL2_VPORT_ENABLE_RDMA, driver does not
allocate vdev_info for this vport. This leads to kernel NULL pointer
dereference in idpf_idc_vport_dev_down(), which references vdev_info for
every vport regardless.

Check, if vdev_info was ever allocated before unplugging aux device.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23042/">CVE-2026-23042 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23042">CVE-2026-23042 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257705">SUSE bug 1257705</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623047" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23047</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23047" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23047" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23047" ref_url="https://www.suse.com/security/cve/CVE-2026-23047" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

libceph: make calc_target() set t-&gt;paused, not just clear it

Currently calc_target() clears t-&gt;paused if the request shouldn't be
paused anymore, but doesn't ever set t-&gt;paused even though it's able to
determine when the request should be paused.  Setting t-&gt;paused is left
to __submit_request() which is fine for regular requests but doesn't
work for linger requests -- since __submit_request() doesn't operate
on linger requests, there is nowhere for lreq-&gt;t.paused to be set.
One consequence of this is that watches don't get reestablished on
paused -&gt; unpaused transitions in cases where requests have been paused
long enough for the (paused) unwatch request to time out and for the
subsequent (re)watch request to enter the paused state.  On top of the
watch not getting reestablished, rbd_reregister_watch() gets stuck with
rbd_dev-&gt;watch_mutex held:

  rbd_register_watch
    __rbd_register_watch
      ceph_osdc_watch
        linger_reg_commit_wait

It's waiting for lreq-&gt;reg_commit_wait to be completed, but for that to
happen the respective request needs to end up on need_resend_linger list
and be kicked when requests are unpaused.  There is no chance for that
if the request in question is never marked paused in the first place.

The fact that rbd_dev-&gt;watch_mutex remains taken out forever then
prevents the image from getting unmapped -- "rbd unmap" would inevitably
hang in D state on an attempt to grab the mutex.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23047/">CVE-2026-23047 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23047">CVE-2026-23047 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257682">SUSE bug 1257682</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623049" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23049</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23049" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23049" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23049" ref_url="https://www.suse.com/security/cve/CVE-2026-23049" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/panel-simple: fix connector type for DataImage SCF0700C48GGU18 panel

The connector type for the DataImage SCF0700C48GGU18 panel is missing and
devm_drm_panel_bridge_add() requires connector type to be set. This leads
to a warning and a backtrace in the kernel log and panel does not work:
"
WARNING: CPU: 3 PID: 38 at drivers/gpu/drm/bridge/panel.c:379 devm_drm_of_get_bridge+0xac/0xb8
"
The warning is triggered by a check for valid connector type in
devm_drm_panel_bridge_add(). If there is no valid connector type
set for a panel, the warning is printed and panel is not added.
Fill in the missing connector type to fix the warning and make
the panel operational once again.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23049/">CVE-2026-23049 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23049">CVE-2026-23049 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257723">SUSE bug 1257723</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623050" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23050</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23050" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23050" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23050" ref_url="https://www.suse.com/security/cve/CVE-2026-23050" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pNFS: Fix a deadlock when returning a delegation during open()

Ben Coddington reports seeing a hang in the following stack trace:
  0 [ffffd0b50e1774e0] __schedule at ffffffff9ca05415
  1 [ffffd0b50e177548] schedule at ffffffff9ca05717
  2 [ffffd0b50e177558] bit_wait at ffffffff9ca061e1
  3 [ffffd0b50e177568] __wait_on_bit at ffffffff9ca05cfb
  4 [ffffd0b50e1775c8] out_of_line_wait_on_bit at ffffffff9ca05ea5
  5 [ffffd0b50e177618] pnfs_roc at ffffffffc154207b [nfsv4]
  6 [ffffd0b50e1776b8] _nfs4_proc_delegreturn at ffffffffc1506586 [nfsv4]
  7 [ffffd0b50e177788] nfs4_proc_delegreturn at ffffffffc1507480 [nfsv4]
  8 [ffffd0b50e1777f8] nfs_do_return_delegation at ffffffffc1523e41 [nfsv4]
  9 [ffffd0b50e177838] nfs_inode_set_delegation at ffffffffc1524a75 [nfsv4]
 10 [ffffd0b50e177888] nfs4_process_delegation at ffffffffc14f41dd [nfsv4]
 11 [ffffd0b50e1778a0] _nfs4_opendata_to_nfs4_state at ffffffffc1503edf [nfsv4]
 12 [ffffd0b50e1778c0] _nfs4_open_and_get_state at ffffffffc1504e56 [nfsv4]
 13 [ffffd0b50e177978] _nfs4_do_open at ffffffffc15051b8 [nfsv4]
 14 [ffffd0b50e1779f8] nfs4_do_open at ffffffffc150559c [nfsv4]
 15 [ffffd0b50e177a80] nfs4_atomic_open at ffffffffc15057fb [nfsv4]
 16 [ffffd0b50e177ad0] nfs4_file_open at ffffffffc15219be [nfsv4]
 17 [ffffd0b50e177b78] do_dentry_open at ffffffff9c09e6ea
 18 [ffffd0b50e177ba8] vfs_open at ffffffff9c0a082e
 19 [ffffd0b50e177bd0] dentry_open at ffffffff9c0a0935

The issue is that the delegreturn is being asked to wait for a layout
return that cannot complete because a state recovery was initiated. The
state recovery cannot complete until the open() finishes processing the
delegations it was given.

The solution is to propagate the existing flags that indicate a
non-blocking call to the function pnfs_roc(), so that it knows not to
wait in this situation.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23050/">CVE-2026-23050 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23050">CVE-2026-23050 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257688">SUSE bug 1257688</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623053" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23053</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23053" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23053" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23053" ref_url="https://www.suse.com/security/cve/CVE-2026-23053" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

NFS: Fix a deadlock involving nfs_release_folio()

Wang Zhaolong reports a deadlock involving NFSv4.1 state recovery
waiting on kthreadd, which is attempting to reclaim memory by calling
nfs_release_folio(). The latter cannot make progress due to state
recovery being needed.

It seems that the only safe thing to do here is to kick off a writeback
of the folio, without waiting for completion, or else kicking off an
asynchronous commit.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23053/">CVE-2026-23053 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23053">CVE-2026-23053 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257718">SUSE bug 1257718</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623054" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23054</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23054" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23054" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23054" ref_url="https://www.suse.com/security/cve/CVE-2026-23054" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1131-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: hv_netvsc: reject RSS hash key programming without RX indirection table

RSS configuration requires a valid RX indirection table. When the device
reports a single receive queue, rndis_filter_device_add() does not
allocate an indirection table, accepting RSS hash key updates in this
state leads to a hang.

Fix this by gating netvsc_set_rxfh() on ndc-&gt;rx_table_sz and return
-EOPNOTSUPP when the table is absent. This aligns set_rxfh with the device
capabilities and prevents incorrect behavior.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23054/">CVE-2026-23054 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23054">CVE-2026-23054 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257732">SUSE bug 1257732</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623055" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23055</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23055" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23055" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23055" ref_url="https://www.suse.com/security/cve/CVE-2026-23055" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

i2c: riic: Move suspend handling to NOIRQ phase

Commit 53326135d0e0 ("i2c: riic: Add suspend/resume support") added
suspend support for the Renesas I2C driver and following this change
on RZ/G3E the following WARNING is seen on entering suspend ...

[  134.275704] Freezing remaining freezable tasks completed (elapsed 0.001 seconds)
[  134.285536] ------------[ cut here ]------------
[  134.290298] i2c i2c-2: Transfer while suspended
[  134.295174] WARNING: drivers/i2c/i2c-core.h:56 at __i2c_smbus_xfer+0x1e4/0x214, CPU#0: systemd-sleep/388
[  134.365507] Tainted: [W]=WARN
[  134.368485] Hardware name: Renesas SMARC EVK version 2 based on r9a09g047e57 (DT)
[  134.375961] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[  134.382935] pc : __i2c_smbus_xfer+0x1e4/0x214
[  134.387329] lr : __i2c_smbus_xfer+0x1e4/0x214
[  134.391717] sp : ffff800083f23860
[  134.395040] x29: ffff800083f23860 x28: 0000000000000000 x27: ffff800082ed5d60
[  134.402226] x26: 0000001f4395fd74 x25: 0000000000000007 x24: 0000000000000001
[  134.409408] x23: 0000000000000000 x22: 000000000000006f x21: ffff800083f23936
[  134.416589] x20: ffff0000c090e140 x19: ffff0000c090e0d0 x18: 0000000000000006
[  134.423771] x17: 6f63657320313030 x16: 2e30206465737061 x15: ffff800083f23280
[  134.430953] x14: 0000000000000000 x13: ffff800082b16ce8 x12: 0000000000000f09
[  134.438134] x11: 0000000000000503 x10: ffff800082b6ece8 x9 : ffff800082b16ce8
[  134.445315] x8 : 00000000ffffefff x7 : ffff800082b6ece8 x6 : 80000000fffff000
[  134.452495] x5 : 0000000000000504 x4 : 0000000000000000 x3 : 0000000000000000
[  134.459672] x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff0000c9ee9e80
[  134.466851] Call trace:
[  134.469311]  __i2c_smbus_xfer+0x1e4/0x214 (P)
[  134.473715]  i2c_smbus_xfer+0xbc/0x120
[  134.477507]  i2c_smbus_read_byte_data+0x4c/0x84
[  134.482077]  isl1208_i2c_read_time+0x44/0x178 [rtc_isl1208]
[  134.487703]  isl1208_rtc_read_time+0x14/0x20 [rtc_isl1208]
[  134.493226]  __rtc_read_time+0x44/0x88
[  134.497012]  rtc_read_time+0x3c/0x68
[  134.500622]  rtc_suspend+0x9c/0x170

The warning is triggered because I2C transfers can still be attempted
while the controller is already suspended, due to inappropriate ordering
of the system sleep callbacks.

If the controller is autosuspended, there is no way to wake it up once
runtime PM disabled (in suspend_late()). During system resume, the I2C
controller will be available only after runtime PM is re-enabled
(in resume_early()). However, this may be too late for some devices.

Wake up the controller in the suspend() callback while runtime PM is
still enabled. The I2C controller will remain available until the
suspend_noirq() callback (pm_runtime_force_suspend()) is called. During
resume, the I2C controller can be restored by the resume_noirq() callback
(pm_runtime_force_resume()). Finally, the resume() callback re-enables
autosuspend. As a result, the I2C controller can remain available until
the system enters suspend_noirq() and from resume_noirq().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23055/">CVE-2026-23055 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23055">CVE-2026-23055 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257730">SUSE bug 1257730</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623056" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23056</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23056" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23056" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23056" ref_url="https://www.suse.com/security/cve/CVE-2026-23056" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

uacce: implement mremap in uacce_vm_ops to return -EPERM

The current uacce_vm_ops does not support the mremap operation of
vm_operations_struct. Implement .mremap to return -EPERM to remind
users.

The reason we need to explicitly disable mremap is that when the
driver does not implement .mremap, it uses the default mremap
method. This could lead to a risk scenario:

An application might first mmap address p1, then mremap to p2,
followed by munmap(p1), and finally munmap(p2). Since the default
mremap copies the original vma's vm_private_data (i.e., q) to the
new vma, both munmap operations would trigger vma_close, causing
q-&gt;qfr to be freed twice(qfr will be set to null here, so repeated
release is ok).
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H" cvss4="6.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23056/">CVE-2026-23056 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23056">CVE-2026-23056 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257729">SUSE bug 1257729</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623057" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23057</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23057" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23057" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23057" ref_url="https://www.suse.com/security/cve/CVE-2026-23057" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vsock/virtio: Coalesce only linear skb

vsock/virtio common tries to coalesce buffers in rx queue: if a linear skb
(with a spare tail room) is followed by a small skb (length limited by
GOOD_COPY_LEN = 128), an attempt is made to join them.

Since the introduction of MSG_ZEROCOPY support, assumption that a small skb
will always be linear is incorrect. In the zerocopy case, data is lost and
the linear skb is appended with uninitialized kernel memory.

Of all 3 supported virtio-based transports, only loopback-transport is
affected. G2H virtio-transport rx queue operates on explicitly linear skbs;
see virtio_vsock_alloc_linear_skb() in virtio_vsock_rx_fill(). H2G
vhost-transport may allocate non-linear skbs, but only for sizes that are
not considered for coalescence; see PAGE_ALLOC_COSTLY_ORDER in
virtio_vsock_alloc_skb().

Ensure only linear skbs are coalesced. Note that skb_tailroom(last_skb) &gt; 0
guarantees last_skb is linear.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23057/">CVE-2026-23057 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23057">CVE-2026-23057 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257740">SUSE bug 1257740</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623058" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23058</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23058" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23058" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23058" ref_url="https://www.suse.com/security/cve/CVE-2026-23058" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: ems_usb: ems_usb_read_bulk_callback(): fix URB memory leak

Fix similar memory leak as in commit 7352e1d5932a ("can: gs_usb:
gs_usb_receive_bulk_callback(): fix URB memory leak").

In ems_usb_open(), the URBs for USB-in transfers are allocated, added to
the dev-&gt;rx_submitted anchor and submitted. In the complete callback
ems_usb_read_bulk_callback(), the URBs are processed and resubmitted. In
ems_usb_close() the URBs are freed by calling
usb_kill_anchored_urbs(&amp;dev-&gt;rx_submitted).

However, this does not take into account that the USB framework unanchors
the URB before the complete function is called. This means that once an
in-URB has been completed, it is no longer anchored and is ultimately not
released in ems_usb_close().

Fix the memory leak by anchoring the URB in the
ems_usb_read_bulk_callback() to the dev-&gt;rx_submitted anchor.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23058/">CVE-2026-23058 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23058">CVE-2026-23058 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257739">SUSE bug 1257739</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623059" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23059</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23059" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23059" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23059" ref_url="https://www.suse.com/security/cve/CVE-2026-23059" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: qla2xxx: Sanitize payload size to prevent member overflow

In qla27xx_copy_fpin_pkt() and qla27xx_copy_multiple_pkt(), the frame_size
reported by firmware is used to calculate the copy length into
item-&gt;iocb. However, the iocb member is defined as a fixed-size 64-byte
array within struct purex_item.

If the reported frame_size exceeds 64 bytes, subsequent memcpy calls will
overflow the iocb member boundary. While extra memory might be allocated,
this cross-member write is unsafe and triggers warnings under
CONFIG_FORTIFY_SOURCE.

Fix this by capping total_bytes to the size of the iocb member (64 bytes)
before allocation and copying. This ensures all copies remain within the
bounds of the destination structure member.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6/CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23059/">CVE-2026-23059 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23059">CVE-2026-23059 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257737">SUSE bug 1257737</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623060" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23060</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23060" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23060" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23060" ref_url="https://www.suse.com/security/cve/CVE-2026-23060" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1131-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: authencesn - reject too-short AAD (assoclen&lt;8) to match ESP/ESN spec

authencesn assumes an ESP/ESN-formatted AAD. When assoclen is shorter than
the minimum expected length, crypto_authenc_esn_decrypt() can advance past
the end of the destination scatterlist and trigger a NULL pointer dereference
in scatterwalk_map_and_copy(), leading to a kernel panic (DoS).

Add a minimum AAD length check to fail fast on invalid inputs.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23060/">CVE-2026-23060 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23060">CVE-2026-23060 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257735">SUSE bug 1257735</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623061" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23061</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23061" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23061" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23061" ref_url="https://www.suse.com/security/cve/CVE-2026-23061" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: kvaser_usb: kvaser_usb_read_bulk_callback(): fix URB memory leak

Fix similar memory leak as in commit 7352e1d5932a ("can: gs_usb:
gs_usb_receive_bulk_callback(): fix URB memory leak").

In kvaser_usb_set_{,data_}bittiming() -&gt; kvaser_usb_setup_rx_urbs(), the
URBs for USB-in transfers are allocated, added to the dev-&gt;rx_submitted
anchor and submitted. In the complete callback
kvaser_usb_read_bulk_callback(), the URBs are processed and resubmitted. In
kvaser_usb_remove_interfaces() the URBs are freed by calling
usb_kill_anchored_urbs(&amp;dev-&gt;rx_submitted).

However, this does not take into account that the USB framework unanchors
the URB before the complete function is called. This means that once an
in-URB has been completed, it is no longer anchored and is ultimately not
released in usb_kill_anchored_urbs().

Fix the memory leak by anchoring the URB in the
kvaser_usb_read_bulk_callback() to the dev-&gt;rx_submitted anchor.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-23061/">CVE-2026-23061 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23061">CVE-2026-23061 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257776">SUSE bug 1257776</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23062</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23062" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23062" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23062" ref_url="https://www.suse.com/security/cve/CVE-2026-23062" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

platform/x86: hp-bioscfg: Fix kernel panic in GET_INSTANCE_ID macro

The GET_INSTANCE_ID macro that caused a kernel panic when accessing sysfs
attributes:

1. Off-by-one error: The loop condition used '&lt;=' instead of '&lt;',
   causing access beyond array bounds. Since array indices are 0-based
   and go from 0 to instances_count-1, the loop should use '&lt;'.

2. Missing NULL check: The code dereferenced attr_name_kobj-&gt;name
   without checking if attr_name_kobj was NULL, causing a null pointer
   dereference in min_length_show() and other attribute show functions.

The panic occurred when fwupd tried to read BIOS configuration attributes:

  Oops: general protection fault [#1] SMP KASAN NOPTI
  KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]
  RIP: 0010:min_length_show+0xcf/0x1d0 [hp_bioscfg]

Add a NULL check for attr_name_kobj before dereferencing and corrects
the loop boundary to match the pattern used elsewhere in the driver.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23062/">CVE-2026-23062 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23062">CVE-2026-23062 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257734">SUSE bug 1257734</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623063" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23063</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23063" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23063" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23063" ref_url="https://www.suse.com/security/cve/CVE-2026-23063" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

uacce: ensure safe queue release with state management

Directly calling `put_queue` carries risks since it cannot
guarantee that resources of `uacce_queue` have been fully released
beforehand. So adding a `stop_queue` operation for the
UACCE_CMD_PUT_Q command and leaving the `put_queue` operation to
the final resource release ensures safety.

Queue states are defined as follows:
- UACCE_Q_ZOMBIE: Initial state
- UACCE_Q_INIT: After opening `uacce`
- UACCE_Q_STARTED: After `start` is issued via `ioctl`

When executing `poweroff -f` in virt while accelerator are still
working, `uacce_fops_release` and `uacce_remove` may execute
concurrently. This can cause `uacce_put_queue` within
`uacce_fops_release` to access a NULL `ops` pointer. Therefore, add
state checks to prevent accessing freed pointers.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23063/">CVE-2026-23063 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23063">CVE-2026-23063 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257722">SUSE bug 1257722</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623064" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23064</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23064" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23064" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23064" ref_url="https://www.suse.com/security/cve/CVE-2026-23064" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: act_ife: avoid possible NULL deref

tcf_ife_encode() must make sure ife_encode() does not return NULL.

syzbot reported:

Oops: general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] SMP KASAN NOPTI
KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]
 RIP: 0010:ife_tlv_meta_encode+0x41/0xa0 net/ife/ife.c:166
CPU: 3 UID: 0 PID: 8990 Comm: syz.0.696 Not tainted syzkaller #0 PREEMPT(full)
Call Trace:
 &lt;TASK&gt;
  ife_encode_meta_u32+0x153/0x180 net/sched/act_ife.c:101
  tcf_ife_encode net/sched/act_ife.c:841 [inline]
  tcf_ife_act+0x1022/0x1de0 net/sched/act_ife.c:877
  tc_act include/net/tc_wrapper.h:130 [inline]
  tcf_action_exec+0x1c0/0xa20 net/sched/act_api.c:1152
  tcf_exts_exec include/net/pkt_cls.h:349 [inline]
  mall_classify+0x1a0/0x2a0 net/sched/cls_matchall.c:42
  tc_classify include/net/tc_wrapper.h:197 [inline]
  __tcf_classify net/sched/cls_api.c:1764 [inline]
  tcf_classify+0x7f2/0x1380 net/sched/cls_api.c:1860
  multiq_classify net/sched/sch_multiq.c:39 [inline]
  multiq_enqueue+0xe0/0x510 net/sched/sch_multiq.c:66
  dev_qdisc_enqueue+0x45/0x250 net/core/dev.c:4147
  __dev_xmit_skb net/core/dev.c:4262 [inline]
  __dev_queue_xmit+0x2998/0x46c0 net/core/dev.c:4798
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-23064/">CVE-2026-23064 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23064">CVE-2026-23064 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257765">SUSE bug 1257765</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623065" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23065</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23065" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23065" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23065" ref_url="https://www.suse.com/security/cve/CVE-2026-23065" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

platform/x86/amd: Fix memory leak in wbrf_record()

The tmp buffer is allocated using kcalloc() but is not freed if
acpi_evaluate_dsm() fails. This causes a memory leak in the error path.

Fix this by explicitly freeing the tmp buffer in the error handling
path of acpi_evaluate_dsm().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23065/">CVE-2026-23065 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23065">CVE-2026-23065 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257742">SUSE bug 1257742</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23066</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23066" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23066" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23066" ref_url="https://www.suse.com/security/cve/CVE-2026-23066" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

rxrpc: Fix recvmsg() unconditional requeue

If rxrpc_recvmsg() fails because MSG_DONTWAIT was specified but the call at
the front of the recvmsg queue already has its mutex locked, it requeues
the call - whether or not the call is already queued.  The call may be on
the queue because MSG_PEEK was also passed and so the call was not dequeued
or because the I/O thread requeued it.

The unconditional requeue may then corrupt the recvmsg queue, leading to
things like UAFs or refcount underruns.

Fix this by only requeuing the call if it isn't already on the queue - and
moving it to the front if it is already queued.  If we don't queue it, we
have to put the ref we obtained by dequeuing it.

Also, MSG_PEEK doesn't dequeue the call so shouldn't call
rxrpc_notify_socket() for the call if we didn't use up all the data on the
queue, so fix that also.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23066/">CVE-2026-23066 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23066">CVE-2026-23066 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257726">SUSE bug 1257726</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1257728">SUSE bug 1257728</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623068" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23068</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23068" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23068" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23068" ref_url="https://www.suse.com/security/cve/CVE-2026-23068" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

spi: spi-sprd-adi: Fix double free in probe error path

The driver currently uses spi_alloc_host() to allocate the controller
but registers it using devm_spi_register_controller().

If devm_register_restart_handler() fails, the code jumps to the
put_ctlr label and calls spi_controller_put(). However, since the
controller was registered via a devm function, the device core will
automatically call spi_controller_put() again when the probe fails.
This results in a double-free of the spi_controller structure.

Fix this by switching to devm_spi_alloc_host() and removing the
manual spi_controller_put() call.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-23068/">CVE-2026-23068 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23068">CVE-2026-23068 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257805">SUSE bug 1257805</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623069" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23069</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23069" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23069" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23069" ref_url="https://www.suse.com/security/cve/CVE-2026-23069" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vsock/virtio: fix potential underflow in virtio_transport_get_credit()

The credit calculation in virtio_transport_get_credit() uses unsigned
arithmetic:

  ret = vvs-&gt;peer_buf_alloc - (vvs-&gt;tx_cnt - vvs-&gt;peer_fwd_cnt);

If the peer shrinks its advertised buffer (peer_buf_alloc) while bytes
are in flight, the subtraction can underflow and produce a large
positive value, potentially allowing more data to be queued than the
peer can handle.

Reuse virtio_transport_has_space() which already handles this case and
add a comment to make it clear why we are doing that.

[Stefano: use virtio_transport_has_space() instead of duplicating the code]
[Stefano: tweak the commit message]
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23069/">CVE-2026-23069 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23069">CVE-2026-23069 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257755">SUSE bug 1257755</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623070" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23070</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23070" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23070" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23070" ref_url="https://www.suse.com/security/cve/CVE-2026-23070" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Octeontx2-af: Add proper checks for fwdata

firmware populates MAC address, link modes (supported, advertised)
and EEPROM data in shared firmware structure which kernel access
via MAC block(CGX/RPM).

Accessing fwdata, on boards booted with out MAC block leading to
kernel panics.

Internal error: Oops: 0000000096000005 [#1]  SMP
[   10.460721] Modules linked in:
[   10.463779] CPU: 0 UID: 0 PID: 174 Comm: kworker/0:3 Not tainted 6.19.0-rc5-00154-g76ec646abdf7-dirty #3 PREEMPT
[   10.474045] Hardware name: Marvell OcteonTX CN98XX board (DT)
[   10.479793] Workqueue: events work_for_cpu_fn
[   10.484159] pstate: 80400009 (Nzcv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[   10.491124] pc : rvu_sdp_init+0x18/0x114
[   10.495051] lr : rvu_probe+0xe58/0x1d18
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23070/">CVE-2026-23070 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23070">CVE-2026-23070 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257709">SUSE bug 1257709</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623071" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23071</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23071" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23071" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23071" ref_url="https://www.suse.com/security/cve/CVE-2026-23071" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

regmap: Fix race condition in hwspinlock irqsave routine

Previously, the address of the shared member '&amp;map-&gt;spinlock_flags' was
passed directly to 'hwspin_lock_timeout_irqsave'. This creates a race
condition where multiple contexts contending for the lock could overwrite
the shared flags variable, potentially corrupting the state for the
current lock owner.

Fix this by using a local stack variable 'flags' to store the IRQ state
temporarily.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23071/">CVE-2026-23071 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23071">CVE-2026-23071 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257706">SUSE bug 1257706</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623073" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23073</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23073" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23073" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23073" ref_url="https://www.suse.com/security/cve/CVE-2026-23073" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: rsi: Fix memory corruption due to not set vif driver data size

The struct ieee80211_vif contains trailing space for vif driver data,
when struct ieee80211_vif is allocated, the total memory size that is
allocated is sizeof(struct ieee80211_vif) + size of vif driver data.
The size of vif driver data is set by each WiFi driver as needed.

The RSI911x driver does not set vif driver data size, no trailing space
for vif driver data is therefore allocated past struct ieee80211_vif .
The RSI911x driver does however use the vif driver data to store its
vif driver data structure "struct vif_priv". An access to vif-&gt;drv_priv
leads to access out of struct ieee80211_vif bounds and corruption of
some memory.

In case of the failure observed locally, rsi_mac80211_add_interface()
would write struct vif_priv *vif_info = (struct vif_priv *)vif-&gt;drv_priv;
vif_info-&gt;vap_id = vap_idx. This write corrupts struct fq_tin member
struct list_head new_flows . The flow = list_first_entry(head, struct
fq_flow, flowchain); in fq_tin_reset() then reports non-NULL bogus
address, which when accessed causes a crash.

The trigger is very simple, boot the machine with init=/bin/sh , mount
devtmpfs, sysfs, procfs, and then do "ip link set wlan0 up", "sleep 1",
"ip link set wlan0 down" and the crash occurs.

Fix this by setting the correct size of vif driver data, which is the
size of "struct vif_priv", so that memory is allocated and the driver
can store its driver data in it, instead of corrupting memory around
it.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23073/">CVE-2026-23073 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23073">CVE-2026-23073 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257707">SUSE bug 1257707</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623074" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23074</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23074" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23074" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23074" ref_url="https://www.suse.com/security/cve/CVE-2026-23074" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3083" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002524.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3685" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002623.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1131-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1180-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1187-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1188-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1212-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1221-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1222-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1236-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1237-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1239-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1242-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1244-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1248-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1254-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1258-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1259-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1261-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1262-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1263-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1265-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1266-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1268-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045421.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1269-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1270-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1271-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1274-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1278-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1279-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1280-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045412.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1283-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045410.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1284-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1285-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1287-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1288-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1297-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1298-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21004-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21005-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21006-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21007-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21009-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045397.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21020-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21051-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21053-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21054-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21055-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21056-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21057-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21058-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21059-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21060-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21061-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21070-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21071-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21072-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21073-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21074-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21075-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21076-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21077-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21078-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21079-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21080-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21081-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21082-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21083-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21084-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21085-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21086-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21087-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21088-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21089-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21090-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21091-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045433.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: Enforce that teql can only be used as root qdisc

Design intent of teql is that it is only supposed to be used as root qdisc.
We need to check for that constraint.

Although not important, I will describe the scenario that unearthed this
issue for the curious.

GangMin Kim &lt;km.kim1503@gmail.com&gt; managed to concot a scenario as follows:

ROOT qdisc 1:0 (QFQ)
  ├── class 1:1 (weight=15, lmax=16384) netem with delay 6.4s
   ── class 1:2 (weight=1, lmax=1514) teql

GangMin sends a packet which is enqueued to 1:1 (netem).
Any invocation of dequeue by QFQ from this class will not return a packet
until after 6.4s. In the meantime, a second packet is sent and it lands on
1:2. teql's enqueue will return success and this will activate class 1:2.
Main issue is that teql only updates the parent visible qlen (sch-&gt;q.qlen)
at dequeue. Since QFQ will only call dequeue if peek succeeds (and teql's
peek always returns NULL), dequeue will never be called and thus the qlen
will remain as 0. With that in mind, when GangMin updates 1:2's lmax value,
the qfq_change_class calls qfq_deact_rm_from_agg. Since the child qdisc's
qlen was not incremented, qfq fails to deactivate the class, but still
frees its pointers from the aggregate. So when the first packet is
rescheduled after 6.4 seconds (netem's delay), a dangling pointer is
accessed causing GangMin's causing a UAF.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23074/">CVE-2026-23074 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23074">CVE-2026-23074 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257749">SUSE bug 1257749</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258051">SUSE bug 1258051</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623076" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23076</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23076" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23076" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23076" ref_url="https://www.suse.com/security/cve/CVE-2026-23076" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: ctxfi: Fix potential OOB access in audio mixer handling

In the audio mixer handling code of ctxfi driver, the conf field is
used as a kind of loop index, and it's referred in the index callbacks
(amixer_index() and sum_index()).

As spotted recently by fuzzers, the current code causes OOB access at
those functions.
| UBSAN: array-index-out-of-bounds in /build/reproducible-path/linux-6.17.8/sound/pci/ctxfi/ctamixer.c:347:48
| index 8 is out of range for type 'unsigned char [8]'

After the analysis, the cause was found to be the lack of the proper
(re-)initialization of conj field.

This patch addresses those OOB accesses by adding the proper
initializations of the loop indices.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.2/CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23076/">CVE-2026-23076 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23076">CVE-2026-23076 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257788">SUSE bug 1257788</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623078" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23078</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23078" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23078" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23078" ref_url="https://www.suse.com/security/cve/CVE-2026-23078" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: scarlett2: Fix buffer overflow in config retrieval

The scarlett2_usb_get_config() function has a logic error in the
endianness conversion code that can cause buffer overflows when
count &gt; 1.

The code checks `if (size == 2)` where `size` is the total buffer size in
bytes, then loops `count` times treating each element as u16 (2 bytes).
This causes the loop to access `count * 2` bytes when the buffer only
has `size` bytes allocated.

Fix by checking the element size (config_item-&gt;size) instead of the
total buffer size. This ensures the endianness conversion matches the
actual element type.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:P/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="5.4/CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23078/">CVE-2026-23078 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23078">CVE-2026-23078 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257789">SUSE bug 1257789</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623080" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23080</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23080" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23080" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23080" ref_url="https://www.suse.com/security/cve/CVE-2026-23080" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: mcba_usb: mcba_usb_read_bulk_callback(): fix URB memory leak

Fix similar memory leak as in commit 7352e1d5932a ("can: gs_usb:
gs_usb_receive_bulk_callback(): fix URB memory leak").

In mcba_usb_probe() -&gt; mcba_usb_start(), the URBs for USB-in transfers are
allocated, added to the priv-&gt;rx_submitted anchor and submitted. In the
complete callback mcba_usb_read_bulk_callback(), the URBs are processed and
resubmitted. In mcba_usb_close() -&gt; mcba_urb_unlink() the URBs are freed by
calling usb_kill_anchored_urbs(&amp;priv-&gt;rx_submitted).

However, this does not take into account that the USB framework unanchors
the URB before the complete function is called. This means that once an
in-URB has been completed, it is no longer anchored and is ultimately not
released in usb_kill_anchored_urbs().

Fix the memory leak by anchoring the URB in the
mcba_usb_read_bulk_callback()to the priv-&gt;rx_submitted anchor.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23080/">CVE-2026-23080 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23080">CVE-2026-23080 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257714">SUSE bug 1257714</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623082" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23082</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23082" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23082" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23082" ref_url="https://www.suse.com/security/cve/CVE-2026-23082" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: gs_usb: gs_usb_receive_bulk_callback(): unanchor URL on usb_submit_urb() error

In commit 7352e1d5932a ("can: gs_usb: gs_usb_receive_bulk_callback(): fix
URB memory leak"), the URB was re-anchored before usb_submit_urb() in
gs_usb_receive_bulk_callback() to prevent a leak of this URB during
cleanup.

However, this patch did not take into account that usb_submit_urb() could
fail. The URB remains anchored and
usb_kill_anchored_urbs(&amp;parent-&gt;rx_submitted) in gs_can_close() loops
infinitely since the anchor list never becomes empty.

To fix the bug, unanchor the URB when an usb_submit_urb() error occurs,
also print an info message.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23082/">CVE-2026-23082 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23082">CVE-2026-23082 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257715">SUSE bug 1257715</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623083" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23083</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23083" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23083" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23083" ref_url="https://www.suse.com/security/cve/CVE-2026-23083" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

fou: Don't allow 0 for FOU_ATTR_IPPROTO.

fou_udp_recv() has the same problem mentioned in the previous
patch.

If FOU_ATTR_IPPROTO is set to 0, skb is not freed by
fou_udp_recv() nor "resubmit"-ted in ip_protocol_deliver_rcu().

Let's forbid 0 for FOU_ATTR_IPPROTO.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Low</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23083/">CVE-2026-23083 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23083">CVE-2026-23083 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257745">SUSE bug 1257745</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623084" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23084</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23084" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23084" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23084" ref_url="https://www.suse.com/security/cve/CVE-2026-23084" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

be2net: Fix NULL pointer dereference in be_cmd_get_mac_from_list

When the parameter pmac_id_valid argument of be_cmd_get_mac_from_list() is
set to false, the driver may request the PMAC_ID from the firmware of the
network card, and this function will store that PMAC_ID at the provided
address pmac_id. This is the contract of this function.

However, there is a location within the driver where both
pmac_id_valid == false and pmac_id == NULL are being passed. This could
result in dereferencing a NULL pointer.

To resolve this issue, it is necessary to pass the address of a stub
variable to the function.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-23084/">CVE-2026-23084 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23084">CVE-2026-23084 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257830">SUSE bug 1257830</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623085" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23085</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23085" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23085" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23085" ref_url="https://www.suse.com/security/cve/CVE-2026-23085" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

irqchip/gic-v3-its: Avoid truncating memory addresses

On 32-bit machines with CONFIG_ARM_LPAE, it is possible for lowmem
allocations to be backed by addresses physical memory above the 32-bit
address limit, as found while experimenting with larger VMSPLIT
configurations.

This caused the qemu virt model to crash in the GICv3 driver, which
allocates the 'itt' object using GFP_KERNEL. Since all memory below
the 4GB physical address limit is in ZONE_DMA in this configuration,
kmalloc() defaults to higher addresses for ZONE_NORMAL, and the
ITS driver stores the physical address in a 32-bit 'unsigned long'
variable.

Change the itt_addr variable to the correct phys_addr_t type instead,
along with all other variables in this driver that hold a physical
address.

The gicv5 driver correctly uses u64 variables, while all other irqchip
drivers don't call virt_to_phys or similar interfaces. It's expected that
other device drivers have similar issues, but fixing this one is
sufficient for booting a virtio based guest.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23085/">CVE-2026-23085 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23085">CVE-2026-23085 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257758">SUSE bug 1257758</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623086" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23086</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23086" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23086" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23086" ref_url="https://www.suse.com/security/cve/CVE-2026-23086" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

vsock/virtio: cap TX credit to local buffer size

The virtio transports derives its TX credit directly from peer_buf_alloc,
which is set from the remote endpoint's SO_VM_SOCKETS_BUFFER_SIZE value.

On the host side this means that the amount of data we are willing to
queue for a connection is scaled by a guest-chosen buffer size, rather
than the host's own vsock configuration. A malicious guest can advertise
a large buffer and read slowly, causing the host to allocate a
correspondingly large amount of sk_buff memory.
The same thing would happen in the guest with a malicious host, since
virtio transports share the same code base.

Introduce a small helper, virtio_transport_tx_buf_size(), that
returns min(peer_buf_alloc, buf_alloc), and use it wherever we consume
peer_buf_alloc.

This ensures the effective TX window is bounded by both the peer's
advertised buffer and our own buf_alloc (already clamped to
buffer_max_size via SO_VM_SOCKETS_BUFFER_MAX_SIZE), so a remote peer
cannot force the other to queue more data than allowed by its own
vsock settings.

On an unpatched Ubuntu 22.04 host (~64 GiB RAM), running a PoC with
32 guest vsock connections advertising 2 GiB each and reading slowly
drove Slab/SUnreclaim from ~0.5 GiB to ~57 GiB; the system only
recovered after killing the QEMU process. That said, if QEMU memory is
limited with cgroups, the maximum memory used will be limited.

With this patch applied:

  Before:
    MemFree:        ~61.6 GiB
    Slab:           ~142 MiB
    SUnreclaim:     ~117 MiB

  After 32 high-credit connections:
    MemFree:        ~61.5 GiB
    Slab:           ~178 MiB
    SUnreclaim:     ~152 MiB

Only ~35 MiB increase in Slab/SUnreclaim, no host OOM, and the guest
remains responsive.

Compatibility with non-virtio transports:

  - VMCI uses the AF_VSOCK buffer knobs to size its queue pairs per
    socket based on the local vsk-&gt;buffer_* values; the remote side
    cannot enlarge those queues beyond what the local endpoint
    configured.

  - Hyper-V's vsock transport uses fixed-size VMBus ring buffers and
    an MTU bound; there is no peer-controlled credit field comparable
    to peer_buf_alloc, and the remote endpoint cannot drive in-flight
    kernel memory above those ring sizes.

  - The loopback path reuses virtio_transport_common.c, so it
    naturally follows the same semantics as the virtio transport.

This change is limited to virtio_transport_common.c and thus affects
virtio-vsock, vhost-vsock, and loopback, bringing them in line with the
"remote window intersected with local policy" behaviour that VMCI and
Hyper-V already effectively have.

[Stefano: small adjustments after changing the previous patch]
[Stefano: tweak the commit message]
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H" cvss4="6/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:H" href="https://www.suse.com/security/cve/CVE-2026-23086/">CVE-2026-23086 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23086">CVE-2026-23086 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257757">SUSE bug 1257757</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623088" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23088</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23088" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23088" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23088" ref_url="https://www.suse.com/security/cve/CVE-2026-23088" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

tracing: Fix crash on synthetic stacktrace field usage

When creating a synthetic event based on an existing synthetic event that
had a stacktrace field and the new synthetic event used that field a
kernel crash occurred:

 ~# cd /sys/kernel/tracing
 ~# echo 's:stack unsigned long stack[];' &gt; dynamic_events
 ~# echo 'hist:keys=prev_pid:s0=common_stacktrace if prev_state &amp; 3' &gt;&gt; events/sched/sched_switch/trigger
 ~# echo 'hist:keys=next_pid:s1=$s0:onmatch(sched.sched_switch).trace(stack,$s1)' &gt;&gt; events/sched/sched_switch/trigger

The above creates a synthetic event that takes a stacktrace when a task
schedules out in a non-running state and passes that stacktrace to the
sched_switch event when that task schedules back in. It triggers the
"stack" synthetic event that has a stacktrace as its field (called "stack").

 ~# echo 's:syscall_stack s64 id; unsigned long stack[];' &gt;&gt; dynamic_events
 ~# echo 'hist:keys=common_pid:s2=stack' &gt;&gt; events/synthetic/stack/trigger
 ~# echo 'hist:keys=common_pid:s3=$s2,i0=id:onmatch(synthetic.stack).trace(syscall_stack,$i0,$s3)' &gt;&gt; events/raw_syscalls/sys_exit/trigger

The above makes another synthetic event called "syscall_stack" that
attaches the first synthetic event (stack) to the sys_exit trace event and
records the stacktrace from the stack event with the id of the system call
that is exiting.

When enabling this event (or using it in a historgram):

 ~# echo 1 &gt; events/synthetic/syscall_stack/enable

Produces a kernel crash!

 BUG: unable to handle page fault for address: 0000000000400010
 #PF: supervisor read access in kernel mode
 #PF: error_code(0x0000) - not-present page
 PGD 0 P4D 0
 Oops: Oops: 0000 [#1] SMP PTI
 CPU: 6 UID: 0 PID: 1257 Comm: bash Not tainted 6.16.3+deb14-amd64 #1 PREEMPT(lazy)  Debian 6.16.3-1
 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.17.0-debian-1.17.0-1 04/01/2014
 RIP: 0010:trace_event_raw_event_synth+0x90/0x380
 Code: c5 00 00 00 00 85 d2 0f 84 e1 00 00 00 31 db eb 34 0f 1f 00 66 66 2e 0f 1f 84 00 00 00 00 00 66 66 2e 0f 1f 84 00 00 00 00 00 &lt;49&gt; 8b 04 24 48 83 c3 01 8d 0c c5 08 00 00 00 01 cd 41 3b 5d 40 0f
 RSP: 0018:ffffd2670388f958 EFLAGS: 00010202
 RAX: ffff8ba1065cc100 RBX: 0000000000000000 RCX: 0000000000000000
 RDX: 0000000000000001 RSI: fffff266ffda7b90 RDI: ffffd2670388f9b0
 RBP: 0000000000000010 R08: ffff8ba104e76000 R09: ffffd2670388fa50
 R10: ffff8ba102dd42e0 R11: ffffffff9a908970 R12: 0000000000400010
 R13: ffff8ba10a246400 R14: ffff8ba10a710220 R15: fffff266ffda7b90
 FS:  00007fa3bc63f740(0000) GS:ffff8ba2e0f48000(0000) knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: 0000000000400010 CR3: 0000000107f9e003 CR4: 0000000000172ef0
 Call Trace:
  &lt;TASK&gt;
  ? __tracing_map_insert+0x208/0x3a0
  action_trace+0x67/0x70
  event_hist_trigger+0x633/0x6d0
  event_triggers_call+0x82/0x130
  trace_event_buffer_commit+0x19d/0x250
  trace_event_raw_event_sys_exit+0x62/0xb0
  syscall_exit_work+0x9d/0x140
  do_syscall_64+0x20a/0x2f0
  ? trace_event_raw_event_sched_switch+0x12b/0x170
  ? save_fpregs_to_fpstate+0x3e/0x90
  ? _raw_spin_unlock+0xe/0x30
  ? finish_task_switch.isra.0+0x97/0x2c0
  ? __rseq_handle_notify_resume+0xad/0x4c0
  ? __schedule+0x4b8/0xd00
  ? restore_fpregs_from_fpstate+0x3c/0x90
  ? switch_fpu_return+0x5b/0xe0
  ? do_syscall_64+0x1ef/0x2f0
  ? do_fault+0x2e9/0x540
  ? __handle_mm_fault+0x7d1/0xf70
  ? count_memcg_events+0x167/0x1d0
  ? handle_mm_fault+0x1d7/0x2e0
  ? do_user_addr_fault+0x2c3/0x7f0
  entry_SYSCALL_64_after_hwframe+0x76/0x7e

The reason is that the stacktrace field is not labeled as such, and is
treated as a normal field and not as a dynamic event that it is.

In trace_event_raw_event_synth() the event is field is still treated as a
dynamic array, but the retrieval of the data is considered a normal field,
and the reference is just the meta data:

// Meta data is retrieved instead of a dynamic array
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23088/">CVE-2026-23088 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23088">CVE-2026-23088 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257814">SUSE bug 1257814</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623089" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23089</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23089" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23089" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23089" ref_url="https://www.suse.com/security/cve/CVE-2026-23089" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0617-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024378.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1131-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: usb-audio: Fix use-after-free in snd_usb_mixer_free()

When snd_usb_create_mixer() fails, snd_usb_mixer_free() frees
mixer-&gt;id_elems but the controls already added to the card still
reference the freed memory. Later when snd_card_register() runs,
the OSS mixer layer calls their callbacks and hits a use-after-free read.

Call trace:
  get_ctl_value+0x63f/0x820 sound/usb/mixer.c:411
  get_min_max_with_quirks.isra.0+0x240/0x1f40 sound/usb/mixer.c:1241
  mixer_ctl_feature_info+0x26b/0x490 sound/usb/mixer.c:1381
  snd_mixer_oss_build_test+0x174/0x3a0 sound/core/oss/mixer_oss.c:887
  ...
  snd_card_register+0x4ed/0x6d0 sound/core/init.c:923
  usb_audio_probe+0x5ef/0x2a90 sound/usb/card.c:1025

Fix by calling snd_ctl_remove() for all mixer controls before freeing
id_elems. We save the next pointer first because snd_ctl_remove()
frees the current element.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.2/CVSS:4.0/AV:P/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23089/">CVE-2026-23089 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23089">CVE-2026-23089 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257790">SUSE bug 1257790</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623090" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23090</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23090" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23090" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23090" ref_url="https://www.suse.com/security/cve/CVE-2026-23090" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

slimbus: core: fix device reference leak on report present

Slimbus devices can be allocated dynamically upon reception of
report-present messages.

Make sure to drop the reference taken when looking up already registered
devices.

Note that this requires taking an extra reference in case the device has
not yet been registered and has to be allocated.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23090/">CVE-2026-23090 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23090">CVE-2026-23090 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257759">SUSE bug 1257759</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623091" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23091</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23091" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23091" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23091" ref_url="https://www.suse.com/security/cve/CVE-2026-23091" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

intel_th: fix device leak on output open()

Make sure to drop the reference taken when looking up the th device
during output device open() on errors and on close().

Note that a recent commit fixed the leak in a couple of open() error
paths but not all of them, and the reference is still leaking on
successful open().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23091/">CVE-2026-23091 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23091">CVE-2026-23091 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257813">SUSE bug 1257813</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623094" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23094</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23094" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23094" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23094" ref_url="https://www.suse.com/security/cve/CVE-2026-23094" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

uacce: fix isolate sysfs check condition

uacce supports the device isolation feature. If the driver
implements the isolate_err_threshold_read and
isolate_err_threshold_write callback functions, uacce will create
sysfs files now. Users can read and configure the isolation policy
through sysfs. Currently, sysfs files are created as long as either
isolate_err_threshold_read or isolate_err_threshold_write callback
functions are present.

However, accessing a non-existent callback function may cause the
system to crash. Therefore, intercept the creation of sysfs if
neither read nor write exists; create sysfs if either is supported,
but intercept unsupported operations at the call site.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23094/">CVE-2026-23094 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23094">CVE-2026-23094 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257811">SUSE bug 1257811</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623095" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23095</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23095" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23095" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23095" ref_url="https://www.suse.com/security/cve/CVE-2026-23095" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gue: Fix skb memleak with inner IP protocol 0.

syzbot reported skb memleak below. [0]

The repro generated a GUE packet with its inner protocol 0.

gue_udp_recv() returns -guehdr-&gt;proto_ctype for "resubmit"
in ip_protocol_deliver_rcu(), but this only works with
non-zero protocol number.

Let's drop such packets.

Note that 0 is a valid number (IPv6 Hop-by-Hop Option).

I think it is not practical to encap HOPOPT in GUE, so once
someone starts to complain, we could pass down a resubmit
flag pointer to distinguish two zeros from the upper layer:

  * no error
  * resubmit HOPOPT

[0]
BUG: memory leak
unreferenced object 0xffff888109695a00 (size 240):
  comm "syz.0.17", pid 6088, jiffies 4294943096
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    00 40 c2 10 81 88 ff ff 00 00 00 00 00 00 00 00  .@..............
  backtrace (crc a84b336f):
    kmemleak_alloc_recursive include/linux/kmemleak.h:44 [inline]
    slab_post_alloc_hook mm/slub.c:4958 [inline]
    slab_alloc_node mm/slub.c:5263 [inline]
    kmem_cache_alloc_noprof+0x3b4/0x590 mm/slub.c:5270
    __build_skb+0x23/0x60 net/core/skbuff.c:474
    build_skb+0x20/0x190 net/core/skbuff.c:490
    __tun_build_skb drivers/net/tun.c:1541 [inline]
    tun_build_skb+0x4a1/0xa40 drivers/net/tun.c:1636
    tun_get_user+0xc12/0x2030 drivers/net/tun.c:1770
    tun_chr_write_iter+0x71/0x120 drivers/net/tun.c:1999
    new_sync_write fs/read_write.c:593 [inline]
    vfs_write+0x45d/0x710 fs/read_write.c:686
    ksys_write+0xa7/0x170 fs/read_write.c:738
    do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
    do_syscall_64+0xa4/0xf80 arch/x86/entry/syscall_64.c:94
    entry_SYSCALL_64_after_hwframe+0x77/0x7f
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23095/">CVE-2026-23095 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23095">CVE-2026-23095 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257808">SUSE bug 1257808</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623096" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23096</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23096" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23096" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23096" ref_url="https://www.suse.com/security/cve/CVE-2026-23096" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

uacce: fix cdev handling in the cleanup path

When cdev_device_add fails, it internally releases the cdev memory,
and if cdev_device_del is then executed, it will cause a hang error.
To fix it, we check the return value of cdev_device_add() and clear
uacce-&gt;cdev to avoid calling cdev_device_del in the uacce_remove.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23096/">CVE-2026-23096 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23096">CVE-2026-23096 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257809">SUSE bug 1257809</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623097" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23097</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23097" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23097" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23097" ref_url="https://www.suse.com/security/cve/CVE-2026-23097" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3464" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002536.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3488" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003199.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

migrate: correct lock ordering for hugetlb file folios

Syzbot has found a deadlock (analyzed by Lance Yang):

1) Task (5749): Holds folio_lock, then tries to acquire i_mmap_rwsem(read lock).
2) Task (5754): Holds i_mmap_rwsem(write lock), then tries to acquire
folio_lock.

migrate_pages()
  -&gt; migrate_hugetlbs()
    -&gt; unmap_and_move_huge_page()     &lt;- Takes folio_lock!
      -&gt; remove_migration_ptes()
        -&gt; __rmap_walk_file()
          -&gt; i_mmap_lock_read()       &lt;- Waits for i_mmap_rwsem(read lock)!

hugetlbfs_fallocate()
  -&gt; hugetlbfs_punch_hole()           &lt;- Takes i_mmap_rwsem(write lock)!
    -&gt; hugetlbfs_zero_partial_page()
     -&gt; filemap_lock_hugetlb_folio()
      -&gt; filemap_lock_folio()
        -&gt; __filemap_get_folio        &lt;- Waits for folio_lock!

The migration path is the one taking locks in the wrong order according to
the documentation at the top of mm/rmap.c.  So expand the scope of the
existing i_mmap_lock to cover the calls to remove_migration_ptes() too.

This is (mostly) how it used to be after commit c0d0381ade79.  That was
removed by 336bf30eb765 for both file &amp; anon hugetlb pages when it should
only have been removed for anon hugetlb pages.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23097/">CVE-2026-23097 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23097">CVE-2026-23097 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257815">SUSE bug 1257815</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623099" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23099</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23099" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23099" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23099" ref_url="https://www.suse.com/security/cve/CVE-2026-23099" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bonding: limit BOND_MODE_8023AD to Ethernet devices

BOND_MODE_8023AD makes sense for ARPHRD_ETHER only.

syzbot reported:

 BUG: KASAN: global-out-of-bounds in __hw_addr_create net/core/dev_addr_lists.c:63 [inline]
 BUG: KASAN: global-out-of-bounds in __hw_addr_add_ex+0x25d/0x760 net/core/dev_addr_lists.c:118
Read of size 16 at addr ffffffff8bf94040 by task syz.1.3580/19497

CPU: 1 UID: 0 PID: 19497 Comm: syz.1.3580 Tainted: G             L      syzkaller #0 PREEMPT(full)
Tainted: [L]=SOFTLOCKUP
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025
Call Trace:
 &lt;TASK&gt;
  dump_stack_lvl+0xe8/0x150 lib/dump_stack.c:120
  print_address_description mm/kasan/report.c:378 [inline]
  print_report+0xca/0x240 mm/kasan/report.c:482
  kasan_report+0x118/0x150 mm/kasan/report.c:595
 check_region_inline mm/kasan/generic.c:-1 [inline]
  kasan_check_range+0x2b0/0x2c0 mm/kasan/generic.c:200
  __asan_memcpy+0x29/0x70 mm/kasan/shadow.c:105
  __hw_addr_create net/core/dev_addr_lists.c:63 [inline]
  __hw_addr_add_ex+0x25d/0x760 net/core/dev_addr_lists.c:118
  __dev_mc_add net/core/dev_addr_lists.c:868 [inline]
  dev_mc_add+0xa1/0x120 net/core/dev_addr_lists.c:886
  bond_enslave+0x2b8b/0x3ac0 drivers/net/bonding/bond_main.c:2180
  do_set_master+0x533/0x6d0 net/core/rtnetlink.c:2963
  do_setlink+0xcf0/0x41c0 net/core/rtnetlink.c:3165
  rtnl_changelink net/core/rtnetlink.c:3776 [inline]
  __rtnl_newlink net/core/rtnetlink.c:3935 [inline]
  rtnl_newlink+0x161c/0x1c90 net/core/rtnetlink.c:4072
  rtnetlink_rcv_msg+0x7cf/0xb70 net/core/rtnetlink.c:6958
  netlink_rcv_skb+0x208/0x470 net/netlink/af_netlink.c:2550
  netlink_unicast_kernel net/netlink/af_netlink.c:1318 [inline]
  netlink_unicast+0x82f/0x9e0 net/netlink/af_netlink.c:1344
  netlink_sendmsg+0x805/0xb30 net/netlink/af_netlink.c:1894
  sock_sendmsg_nosec net/socket.c:727 [inline]
  __sock_sendmsg+0x21c/0x270 net/socket.c:742
  ____sys_sendmsg+0x505/0x820 net/socket.c:2592
  ___sys_sendmsg+0x21f/0x2a0 net/socket.c:2646
  __sys_sendmsg+0x164/0x220 net/socket.c:2678
  do_syscall_32_irqs_on arch/x86/entry/syscall_32.c:83 [inline]
  __do_fast_syscall_32+0x1dc/0x560 arch/x86/entry/syscall_32.c:307
  do_fast_syscall_32+0x34/0x80 arch/x86/entry/syscall_32.c:332
 entry_SYSENTER_compat_after_hwframe+0x84/0x8e
 &lt;/TASK&gt;

The buggy address belongs to the variable:
 lacpdu_mcast_addr+0x0/0x40
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23099/">CVE-2026-23099 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23099">CVE-2026-23099 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257816">SUSE bug 1257816</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623100" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23100</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23100" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23100" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23100" ref_url="https://www.suse.com/security/cve/CVE-2026-23100" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/hugetlb: fix hugetlb_pmd_shared()

Patch series "mm/hugetlb: fixes for PMD table sharing (incl.  using
mmu_gather)", v3.

One functional fix, one performance regression fix, and two related
comment fixes.

I cleaned up my prototype I recently shared [1] for the performance fix,
deferring most of the cleanups I had in the prototype to a later point. 
While doing that I identified the other things.

The goal of this patch set is to be backported to stable trees "fairly"
easily. At least patch #1 and #4.

Patch #1 fixes hugetlb_pmd_shared() not detecting any sharing
Patch #2 + #3 are simple comment fixes that patch #4 interacts with.
Patch #4 is a fix for the reported performance regression due to excessive
IPI broadcasts during fork()+exit().

The last patch is all about TLB flushes, IPIs and mmu_gather.
Read: complicated

There are plenty of cleanups in the future to be had + one reasonable
optimization on x86. But that's all out of scope for this series.

Runtime tested, with a focus on fixing the performance regression using
the original reproducer [2] on x86.


This patch (of 4):

We switched from (wrongly) using the page count to an independent shared
count.  Now, shared page tables have a refcount of 1 (excluding
speculative references) and instead use ptdesc-&gt;pt_share_count to identify
sharing.

We didn't convert hugetlb_pmd_shared(), so right now, we would never
detect a shared PMD table as such, because sharing/unsharing no longer
touches the refcount of a PMD table.

Page migration, like mbind() or migrate_pages() would allow for migrating
folios mapped into such shared PMD tables, even though the folios are not
exclusive.  In smaps we would account them as "private" although they are
"shared", and we would be wrongly setting the PM_MMAP_EXCLUSIVE in the
pagemap interface.

Fix it by properly using ptdesc_pmd_is_shared() in hugetlb_pmd_shared().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23100/">CVE-2026-23100 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23100">CVE-2026-23100 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257817">SUSE bug 1257817</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623101" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23101</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23101" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23101" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23101" ref_url="https://www.suse.com/security/cve/CVE-2026-23101" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

leds: led-class: Only Add LED to leds_list when it is fully ready

Before this change the LED was added to leds_list before led_init_core()
gets called adding it the list before led_classdev.set_brightness_work gets
initialized.

This leaves a window where led_trigger_register() of a LED's default
trigger will call led_trigger_set() which calls led_set_brightness()
which in turn will end up queueing the *uninitialized*
led_classdev.set_brightness_work.

This race gets hit by the lenovo-thinkpad-t14s EC driver which registers
2 LEDs with a default trigger provided by snd_ctl_led.ko in quick
succession. The first led_classdev_register() causes an async modprobe of
snd_ctl_led to run and that async modprobe manages to exactly hit
the window where the second LED is on the leds_list without led_init_core()
being called for it, resulting in:

 ------------[ cut here ]------------
 WARNING: CPU: 11 PID: 5608 at kernel/workqueue.c:4234 __flush_work+0x344/0x390
 Hardware name: LENOVO 21N2S01F0B/21N2S01F0B, BIOS N42ET93W (2.23 ) 09/01/2025
 ...
 Call trace:
  __flush_work+0x344/0x390 (P)
  flush_work+0x2c/0x50
  led_trigger_set+0x1c8/0x340
  led_trigger_register+0x17c/0x1c0
  led_trigger_register_simple+0x84/0xe8
  snd_ctl_led_init+0x40/0xf88 [snd_ctl_led]
  do_one_initcall+0x5c/0x318
  do_init_module+0x9c/0x2b8
  load_module+0x7e0/0x998

Close the race window by moving the adding of the LED to leds_list to
after the led_init_core() call.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23101/">CVE-2026-23101 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23101">CVE-2026-23101 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257768">SUSE bug 1257768</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623102" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23102</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23102" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23102" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23102" ref_url="https://www.suse.com/security/cve/CVE-2026-23102" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

arm64/fpsimd: signal: Fix restoration of SVE context

When SME is supported, Restoring SVE signal context can go wrong in a
few ways, including placing the task into an invalid state where the
kernel may read from out-of-bounds memory (and may potentially take a
fatal fault) and/or may kill the task with a SIGKILL.

(1) Restoring a context with SVE_SIG_FLAG_SM set can place the task into
    an invalid state where SVCR.SM is set (and sve_state is non-NULL)
    but TIF_SME is clear, consequently resuting in out-of-bounds memory
    reads and/or killing the task with SIGKILL.

    This can only occur in unusual (but legitimate) cases where the SVE
    signal context has either been modified by userspace or was saved in
    the context of another task (e.g. as with CRIU), as otherwise the
    presence of an SVE signal context with SVE_SIG_FLAG_SM implies that
    TIF_SME is already set.

    While in this state, task_fpsimd_load() will NOT configure SMCR_ELx
    (leaving some arbitrary value configured in hardware) before
    restoring SVCR and attempting to restore the streaming mode SVE
    registers from memory via sve_load_state(). As the value of
    SMCR_ELx.LEN may be larger than the task's streaming SVE vector
    length, this may read memory outside of the task's allocated
    sve_state, reading unrelated data and/or triggering a fault.

    While this can result in secrets being loaded into streaming SVE
    registers, these values are never exposed. As TIF_SME is clear,
    fpsimd_bind_task_to_cpu() will configure CPACR_ELx.SMEN to trap EL0
    accesses to streaming mode SVE registers, so these cannot be
    accessed directly at EL0. As fpsimd_save_user_state() verifies the
    live vector length before saving (S)SVE state to memory, no secret
    values can be saved back to memory (and hence cannot be observed via
    ptrace, signals, etc).

    When the live vector length doesn't match the expected vector length
    for the task, fpsimd_save_user_state() will send a fatal SIGKILL
    signal to the task. Hence the task may be killed after executing
    userspace for some period of time.

(2) Restoring a context with SVE_SIG_FLAG_SM clear does not clear the
    task's SVCR.SM. If SVCR.SM was set prior to restoring the context,
    then the task will be left in streaming mode unexpectedly, and some
    register state will be combined inconsistently, though the task will
    be left in legitimate state from the kernel's PoV.

    This can only occur in unusual (but legitimate) cases where ptrace
    has been used to set SVCR.SM after entry to the sigreturn syscall,
    as syscall entry clears SVCR.SM.

    In these cases, the the provided SVE register data will be loaded
    into the task's sve_state using the non-streaming SVE vector length
    and the FPSIMD registers will be merged into this using the
    streaming SVE vector length.

Fix (1) by setting TIF_SME when setting SVCR.SM. This also requires
ensuring that the task's sme_state has been allocated, but as this could
contain live ZA state, it should not be zeroed. Fix (2) by clearing
SVCR.SM when restoring a SVE signal context with SVE_SIG_FLAG_SM clear.

For consistency, I've pulled the manipulation of SVCR, TIF_SVE, TIF_SME,
and fp_type earlier, immediately after the allocation of
sve_state/sme_state, before the restore of the actual register state.
This makes it easier to ensure that these are always modified
consistently, even if a fault is taken while reading the register data
from the signal context. I do not expect any software to depend on the
exact state restored when a fault is taken while reading the context.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23102/">CVE-2026-23102 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23102">CVE-2026-23102 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257772">SUSE bug 1257772</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623104" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23104</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23104" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23104" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23104" ref_url="https://www.suse.com/security/cve/CVE-2026-23104" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: fix devlink reload call trace

Commit 4da71a77fc3b ("ice: read internal temperature sensor") introduced
internal temperature sensor reading via HWMON. ice_hwmon_init() was added
to ice_init_feature() and ice_hwmon_exit() was added to ice_remove(). As a
result if devlink reload is used to reinit the device and then the driver
is removed, a call trace can occur.

BUG: unable to handle page fault for address: ffffffffc0fd4b5d
Call Trace:
 string+0x48/0xe0
 vsnprintf+0x1f9/0x650
 sprintf+0x62/0x80
 name_show+0x1f/0x30
 dev_attr_show+0x19/0x60

The call trace repeats approximately every 10 minutes when system
monitoring tools (e.g., sadc) attempt to read the orphaned hwmon sysfs
attributes that reference freed module memory.

The sequence is:
1. Driver load, ice_hwmon_init() gets called from ice_init_feature()
2. Devlink reload down, flow does not call ice_remove()
3. Devlink reload up, ice_hwmon_init() gets called from
   ice_init_feature() resulting in a second instance
4. Driver unload, ice_hwmon_exit() called from ice_remove() leaving the
   first hwmon instance orphaned with dangling pointer

Fix this by moving ice_hwmon_exit() from ice_remove() to
ice_deinit_features() to ensure proper cleanup symmetry with
ice_hwmon_init().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23104/">CVE-2026-23104 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23104">CVE-2026-23104 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257763">SUSE bug 1257763</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623105" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23105</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23105" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23105" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23105" ref_url="https://www.suse.com/security/cve/CVE-2026-23105" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/sched: qfq: Use cl_is_active to determine whether class is active in qfq_rm_from_ag

This is more of a preventive patch to make the code more consistent and
to prevent possible exploits that employ child qlen manipulations on qfq.
use cl_is_active instead of relying on the child qdisc's qlen to determine
class activation.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23105/">CVE-2026-23105 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23105">CVE-2026-23105 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257775">SUSE bug 1257775</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623107" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23107</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23107" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23107" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23107" ref_url="https://www.suse.com/security/cve/CVE-2026-23107" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

arm64/fpsimd: signal: Allocate SSVE storage when restoring ZA

The code to restore a ZA context doesn't attempt to allocate the task's
sve_state before setting TIF_SME. Consequently, restoring a ZA context
can place a task into an invalid state where TIF_SME is set but the
task's sve_state is NULL.

In legitimate but uncommon cases where the ZA signal context was NOT
created by the kernel in the context of the same task (e.g. if the task
is saved/restored with something like CRIU), we have no guarantee that
sve_state had been allocated previously. In these cases, userspace can
enter streaming mode without trapping while sve_state is NULL, causing a
later NULL pointer dereference when the kernel attempts to store the
register state:

| # ./sigreturn-za
| Unable to handle kernel NULL pointer dereference at virtual address 0000000000000000
| Mem abort info:
|   ESR = 0x0000000096000046
|   EC = 0x25: DABT (current EL), IL = 32 bits
|   SET = 0, FnV = 0
|   EA = 0, S1PTW = 0
|   FSC = 0x06: level 2 translation fault
| Data abort info:
|   ISV = 0, ISS = 0x00000046, ISS2 = 0x00000000
|   CM = 0, WnR = 1, TnD = 0, TagAccess = 0
|   GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0
| user pgtable: 4k pages, 52-bit VAs, pgdp=0000000101f47c00
| [0000000000000000] pgd=08000001021d8403, p4d=0800000102274403, pud=0800000102275403, pmd=0000000000000000
| Internal error: Oops: 0000000096000046 [#1]  SMP
| Modules linked in:
| CPU: 0 UID: 0 PID: 153 Comm: sigreturn-za Not tainted 6.19.0-rc1 #1 PREEMPT
| Hardware name: linux,dummy-virt (DT)
| pstate: 214000c9 (nzCv daIF +PAN -UAO -TCO +DIT -SSBS BTYPE=--)
| pc : sve_save_state+0x4/0xf0
| lr : fpsimd_save_user_state+0xb0/0x1c0
| sp : ffff80008070bcc0
| x29: ffff80008070bcc0 x28: fff00000c1ca4c40 x27: 63cfa172fb5cf658
| x26: fff00000c1ca5228 x25: 0000000000000000 x24: 0000000000000000
| x23: 0000000000000000 x22: fff00000c1ca4c40 x21: fff00000c1ca4c40
| x20: 0000000000000020 x19: fff00000ff6900f0 x18: 0000000000000000
| x17: fff05e8e0311f000 x16: 0000000000000000 x15: 028fca8f3bdaf21c
| x14: 0000000000000212 x13: fff00000c0209f10 x12: 0000000000000020
| x11: 0000000000200b20 x10: 0000000000000000 x9 : fff00000ff69dcc0
| x8 : 00000000000003f2 x7 : 0000000000000001 x6 : fff00000c1ca5b48
| x5 : fff05e8e0311f000 x4 : 0000000008000000 x3 : 0000000000000000
| x2 : 0000000000000001 x1 : fff00000c1ca5970 x0 : 0000000000000440
| Call trace:
|  sve_save_state+0x4/0xf0 (P)
|  fpsimd_thread_switch+0x48/0x198
|  __switch_to+0x20/0x1c0
|  __schedule+0x36c/0xce0
|  schedule+0x34/0x11c
|  exit_to_user_mode_loop+0x124/0x188
|  el0_interrupt+0xc8/0xd8
|  __el0_irq_handler_common+0x18/0x24
|  el0t_64_irq_handler+0x10/0x1c
|  el0t_64_irq+0x198/0x19c
| Code: 54000040 d51b4408 d65f03c0 d503245f (e5bb5800)
| ---[ end trace 0000000000000000 ]---

Fix this by having restore_za_context() ensure that the task's sve_state
is allocated, matching what we do when taking an SME trap. Any live
SVE/SSVE state (which is restored earlier from a separate signal
context) must be preserved, and hence this is not zeroed.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23107/">CVE-2026-23107 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23107">CVE-2026-23107 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257762">SUSE bug 1257762</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623108" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23108</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23108" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23108" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23108" ref_url="https://www.suse.com/security/cve/CVE-2026-23108" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: usb_8dev: usb_8dev_read_bulk_callback(): fix URB memory leak

Fix similar memory leak as in commit 7352e1d5932a ("can: gs_usb:
gs_usb_receive_bulk_callback(): fix URB memory leak").

In usb_8dev_open() -&gt; usb_8dev_start(), the URBs for USB-in transfers are
allocated, added to the priv-&gt;rx_submitted anchor and submitted. In the
complete callback usb_8dev_read_bulk_callback(), the URBs are processed and
resubmitted. In usb_8dev_close() -&gt; unlink_all_urbs() the URBs are freed by
calling usb_kill_anchored_urbs(&amp;priv-&gt;rx_submitted).

However, this does not take into account that the USB framework unanchors
the URB before the complete function is called. This means that once an
in-URB has been completed, it is no longer anchored and is ultimately not
released in usb_kill_anchored_urbs().

Fix the memory leak by anchoring the URB in the
usb_8dev_read_bulk_callback() to the priv-&gt;rx_submitted anchor.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23108/">CVE-2026-23108 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23108">CVE-2026-23108 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257770">SUSE bug 1257770</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623110" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23110</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23110" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23110" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23110" ref_url="https://www.suse.com/security/cve/CVE-2026-23110" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

scsi: core: Wake up the error handler when final completions race against each other

The fragile ordering between marking commands completed or failed so
that the error handler only wakes when the last running command
completes or times out has race conditions. These race conditions can
cause the SCSI layer to fail to wake the error handler, leaving I/O
through the SCSI host stuck as the error state cannot advance.

First, there is an memory ordering issue within scsi_dec_host_busy().
The write which clears SCMD_STATE_INFLIGHT may be reordered with reads
counting in scsi_host_busy(). While the local CPU will see its own
write, reordering can allow other CPUs in scsi_dec_host_busy() or
scsi_eh_inc_host_failed() to see a raised busy count, causing no CPU to
see a host busy equal to the host_failed count.

This race condition can be prevented with a memory barrier on the error
path to force the write to be visible before counting host busy
commands.

Second, there is a general ordering issue with scsi_eh_inc_host_failed(). By
counting busy commands before incrementing host_failed, it can race with a
final command in scsi_dec_host_busy(), such that scsi_dec_host_busy() does
not see host_failed incremented but scsi_eh_inc_host_failed() counts busy
commands before SCMD_STATE_INFLIGHT is cleared by scsi_dec_host_busy(),
resulting in neither waking the error handler task.

This needs the call to scsi_host_busy() to be moved after host_failed is
incremented to close the race condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23110/">CVE-2026-23110 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23110">CVE-2026-23110 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257761">SUSE bug 1257761</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23111</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23111" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23111" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23111" ref_url="https://www.suse.com/security/cve/CVE-2026-23111" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:6570" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1180-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1187-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1188-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1236-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1239-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1244-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1259-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1261-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1262-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1266-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1271-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1274-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1278-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1279-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1283-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045410.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1284-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21004-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21005-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21006-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21007-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21009-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045397.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21020-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21051-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21053-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21054-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21055-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21056-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21057-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21058-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21059-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21060-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21061-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21070-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21071-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21072-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21073-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21074-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21075-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21076-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21077-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21078-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21079-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21080-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21081-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21082-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21083-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21084-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21085-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21086-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21087-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21088-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21089-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21090-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21091-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045433.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_tables: fix inverted genmask check in nft_map_catchall_activate()

nft_map_catchall_activate() has an inverted element activity check
compared to its non-catchall counterpart nft_mapelem_activate() and
compared to what is logically required.

nft_map_catchall_activate() is called from the abort path to re-activate
catchall map elements that were deactivated during a failed transaction.
It should skip elements that are already active (they don't need
re-activation) and process elements that are inactive (they need to be
restored). Instead, the current code does the opposite: it skips inactive
elements and processes active ones.

Compare the non-catchall activate callback, which is correct:

  nft_mapelem_activate():
    if (nft_set_elem_active(ext, iter-&gt;genmask))
        return 0;   /* skip active, process inactive */

With the buggy catchall version:

  nft_map_catchall_activate():
    if (!nft_set_elem_active(ext, genmask))
        continue;   /* skip inactive, process active */

The consequence is that when a DELSET operation is aborted,
nft_setelem_data_activate() is never called for the catchall element.
For NFT_GOTO verdict elements, this means nft_data_hold() is never
called to restore the chain-&gt;use reference count. Each abort cycle
permanently decrements chain-&gt;use. Once chain-&gt;use reaches zero,
DELCHAIN succeeds and frees the chain while catchall verdict elements
still reference it, resulting in a use-after-free.

This is exploitable for local privilege escalation from an unprivileged
user via user namespaces + nftables on distributions that enable
CONFIG_USER_NS and CONFIG_NF_TABLES.

Fix by removing the negation so the check matches nft_mapelem_activate():
skip active elements, process inactive ones.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23111/">CVE-2026-23111 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23111">CVE-2026-23111 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258181">SUSE bug 1258181</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258183">SUSE bug 1258183</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623112" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23112</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23112" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23112" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23112" ref_url="https://www.suse.com/security/cve/CVE-2026-23112" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvmet-tcp: add bounds checks in nvmet_tcp_build_pdu_iovec

nvmet_tcp_build_pdu_iovec() could walk past cmd-&gt;req.sg when a PDU
length or offset exceeds sg_cnt and then use bogus sg-&gt;length/offset
values, leading to _copy_to_iter() GPF/KASAN. Guard sg_idx, remaining
entries, and sg-&gt;length/offset before building the bvec.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23112/">CVE-2026-23112 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23112">CVE-2026-23112 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258184">SUSE bug 1258184</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623116" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23116</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23116" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23116" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23116" ref_url="https://www.suse.com/security/cve/CVE-2026-23116" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

pmdomain: imx8m-blk-ctrl: Remove separate rst and clk mask for 8mq vpu

For i.MX8MQ platform, the ADB in the VPUMIX domain has no separate reset
and clock enable bits, but is ungated and reset together with the VPUs.
So we can't reset G1 or G2 separately, it may led to the system hang.
Remove rst_mask and clk_mask of imx8mq_vpu_blk_ctl_domain_data.
Let imx8mq_vpu_power_notifier() do really vpu reset.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23116/">CVE-2026-23116 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23116">CVE-2026-23116 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258277">SUSE bug 1258277</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623119" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23119</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23119" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23119" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23119" ref_url="https://www.suse.com/security/cve/CVE-2026-23119" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bonding: provide a net pointer to __skb_flow_dissect()

After 3cbf4ffba5ee ("net: plumb network namespace into __skb_flow_dissect")
we have to provide a net pointer to __skb_flow_dissect(),
either via skb-&gt;dev, skb-&gt;sk, or a user provided pointer.

In the following case, syzbot was able to cook a bare skb.

WARNING: net/core/flow_dissector.c:1131 at __skb_flow_dissect+0xb57/0x68b0 net/core/flow_dissector.c:1131, CPU#1: syz.2.1418/11053
Call Trace:
 &lt;TASK&gt;
  bond_flow_dissect drivers/net/bonding/bond_main.c:4093 [inline]
  __bond_xmit_hash+0x2d7/0xba0 drivers/net/bonding/bond_main.c:4157
  bond_xmit_hash_xdp drivers/net/bonding/bond_main.c:4208 [inline]
  bond_xdp_xmit_3ad_xor_slave_get drivers/net/bonding/bond_main.c:5139 [inline]
  bond_xdp_get_xmit_slave+0x1fd/0x710 drivers/net/bonding/bond_main.c:5515
  xdp_master_redirect+0x13f/0x2c0 net/core/filter.c:4388
  bpf_prog_run_xdp include/net/xdp.h:700 [inline]
  bpf_test_run+0x6b2/0x7d0 net/bpf/test_run.c:421
  bpf_prog_test_run_xdp+0x795/0x10e0 net/bpf/test_run.c:1390
  bpf_prog_test_run+0x2c7/0x340 kernel/bpf/syscall.c:4703
  __sys_bpf+0x562/0x860 kernel/bpf/syscall.c:6182
  __do_sys_bpf kernel/bpf/syscall.c:6274 [inline]
  __se_sys_bpf kernel/bpf/syscall.c:6272 [inline]
  __x64_sys_bpf+0x7c/0x90 kernel/bpf/syscall.c:6272
  do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
  do_syscall_64+0xec/0xf80 arch/x86/entry/syscall_64.c:94
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23119/">CVE-2026-23119 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23119">CVE-2026-23119 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258273">SUSE bug 1258273</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623121" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23121</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23121" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23121" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23121" ref_url="https://www.suse.com/security/cve/CVE-2026-23121" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mISDN: annotate data-race around dev-&gt;work

dev-&gt;work can re read locklessly in mISDN_read()
and mISDN_poll(). Add READ_ONCE()/WRITE_ONCE() annotations.

BUG: KCSAN: data-race in mISDN_ioctl / mISDN_read

write to 0xffff88812d848280 of 4 bytes by task 10864 on cpu 1:
  misdn_add_timer drivers/isdn/mISDN/timerdev.c:175 [inline]
  mISDN_ioctl+0x2fb/0x550 drivers/isdn/mISDN/timerdev.c:233
  vfs_ioctl fs/ioctl.c:51 [inline]
  __do_sys_ioctl fs/ioctl.c:597 [inline]
  __se_sys_ioctl+0xce/0x140 fs/ioctl.c:583
  __x64_sys_ioctl+0x43/0x50 fs/ioctl.c:583
  x64_sys_call+0x14b0/0x3000 arch/x86/include/generated/asm/syscalls_64.h:17
  do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
  do_syscall_64+0xd8/0x2c0 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

read to 0xffff88812d848280 of 4 bytes by task 10857 on cpu 0:
  mISDN_read+0x1f2/0x470 drivers/isdn/mISDN/timerdev.c:112
  do_loop_readv_writev fs/read_write.c:847 [inline]
  vfs_readv+0x3fb/0x690 fs/read_write.c:1020
  do_readv+0xe7/0x210 fs/read_write.c:1080
  __do_sys_readv fs/read_write.c:1165 [inline]
  __se_sys_readv fs/read_write.c:1162 [inline]
  __x64_sys_readv+0x45/0x50 fs/read_write.c:1162
  x64_sys_call+0x2831/0x3000 arch/x86/include/generated/asm/syscalls_64.h:20
  do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
  do_syscall_64+0xd8/0x2c0 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

value changed: 0x00000000 -&gt; 0x00000001
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23121/">CVE-2026-23121 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23121">CVE-2026-23121 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258309">SUSE bug 1258309</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1259135">SUSE bug 1259135</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623123" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23123</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23123" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23123" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23123" ref_url="https://www.suse.com/security/cve/CVE-2026-23123" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

interconnect: debugfs: initialize src_node and dst_node to empty strings

The debugfs_create_str() API assumes that the string pointer is either NULL
or points to valid kmalloc() memory. Leaving the pointer uninitialized can
cause problems.

Initialize src_node and dst_node to empty strings before creating the
debugfs entries to guarantee that reads and writes are safe.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23123/">CVE-2026-23123 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23123">CVE-2026-23123 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258276">SUSE bug 1258276</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623128" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23128</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23128" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23128" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23128" ref_url="https://www.suse.com/security/cve/CVE-2026-23128" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

arm64: Set __nocfi on swsusp_arch_resume()

A DABT is reported[1] on an android based system when resume from hiberate.
This happens because swsusp_arch_suspend_exit() is marked with SYM_CODE_*()
and does not have a CFI hash, but swsusp_arch_resume() will attempt to
verify the CFI hash when calling a copy of swsusp_arch_suspend_exit().

Given that there's an existing requirement that the entrypoint to
swsusp_arch_suspend_exit() is the first byte of the .hibernate_exit.text
section, we cannot fix this by marking swsusp_arch_suspend_exit() with
SYM_FUNC_*(). The simplest fix for now is to disable the CFI check in
swsusp_arch_resume().

Mark swsusp_arch_resume() as __nocfi to disable the CFI check.

[1]
[   22.991934][    T1] Unable to handle kernel paging request at virtual address 0000000109170ffc
[   22.991934][    T1] Mem abort info:
[   22.991934][    T1]   ESR = 0x0000000096000007
[   22.991934][    T1]   EC = 0x25: DABT (current EL), IL = 32 bits
[   22.991934][    T1]   SET = 0, FnV = 0
[   22.991934][    T1]   EA = 0, S1PTW = 0
[   22.991934][    T1]   FSC = 0x07: level 3 translation fault
[   22.991934][    T1] Data abort info:
[   22.991934][    T1]   ISV = 0, ISS = 0x00000007, ISS2 = 0x00000000
[   22.991934][    T1]   CM = 0, WnR = 0, TnD = 0, TagAccess = 0
[   22.991934][    T1]   GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0
[   22.991934][    T1] [0000000109170ffc] user address but active_mm is swapper
[   22.991934][    T1] Internal error: Oops: 0000000096000007 [#1] PREEMPT SMP
[   22.991934][    T1] Dumping ftrace buffer:
[   22.991934][    T1]    (ftrace buffer empty)
[   22.991934][    T1] Modules linked in:
[   22.991934][    T1] CPU: 0 PID: 1 Comm: swapper/0 Not tainted 6.6.98-android15-8-g0b1d2aee7fc3-dirty-4k #1 688c7060a825a3ac418fe53881730b355915a419
[   22.991934][    T1] Hardware name: Unisoc UMS9360-base Board (DT)
[   22.991934][    T1] pstate: 804000c5 (Nzcv daIF +PAN -UAO -TCO -DIT -SSBS BTYPE=--)
[   22.991934][    T1] pc : swsusp_arch_resume+0x2ac/0x344
[   22.991934][    T1] lr : swsusp_arch_resume+0x294/0x344
[   22.991934][    T1] sp : ffffffc08006b960
[   22.991934][    T1] x29: ffffffc08006b9c0 x28: 0000000000000000 x27: 0000000000000000
[   22.991934][    T1] x26: 0000000000000000 x25: 0000000000000000 x24: 0000000000000820
[   22.991934][    T1] x23: ffffffd0817e3000 x22: ffffffd0817e3000 x21: 0000000000000000
[   22.991934][    T1] x20: ffffff8089171000 x19: ffffffd08252c8c8 x18: ffffffc080061058
[   22.991934][    T1] x17: 00000000529c6ef0 x16: 00000000529c6ef0 x15: 0000000000000004
[   22.991934][    T1] x14: ffffff8178c88000 x13: 0000000000000006 x12: 0000000000000000
[   22.991934][    T1] x11: 0000000000000015 x10: 0000000000000001 x9 : ffffffd082533000
[   22.991934][    T1] x8 : 0000000109171000 x7 : 205b5d3433393139 x6 : 392e32322020205b
[   22.991934][    T1] x5 : 000000010916f000 x4 : 000000008164b000 x3 : ffffff808a4e0530
[   22.991934][    T1] x2 : ffffffd08058e784 x1 : 0000000082326000 x0 : 000000010a283000
[   22.991934][    T1] Call trace:
[   22.991934][    T1]  swsusp_arch_resume+0x2ac/0x344
[   22.991934][    T1]  hibernation_restore+0x158/0x18c
[   22.991934][    T1]  load_image_and_restore+0xb0/0xec
[   22.991934][    T1]  software_resume+0xf4/0x19c
[   22.991934][    T1]  software_resume_initcall+0x34/0x78
[   22.991934][    T1]  do_one_initcall+0xe8/0x370
[   22.991934][    T1]  do_initcall_level+0xc8/0x19c
[   22.991934][    T1]  do_initcalls+0x70/0xc0
[   22.991934][    T1]  do_basic_setup+0x1c/0x28
[   22.991934][    T1]  kernel_init_freeable+0xe0/0x148
[   22.991934][    T1]  kernel_init+0x20/0x1a8
[   22.991934][    T1]  ret_from_fork+0x10/0x20
[   22.991934][    T1] Code: a9400a61 f94013e0 f9438923 f9400a64 (b85fc110)

[catalin.marinas@arm.com: commit log updated by Mark Rutland]
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23128/">CVE-2026-23128 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23128">CVE-2026-23128 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258298">SUSE bug 1258298</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623129" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23129</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23129" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23129" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23129" ref_url="https://www.suse.com/security/cve/CVE-2026-23129" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

dpll: Prevent duplicate registrations

Modify the internal registration helpers dpll_xa_ref_{dpll,pin}_add()
to reject duplicate registration attempts.

Previously, if a caller attempted to register the same pin multiple
times (with the same ops, priv, and cookie) on the same device, the core
silently increments the reference count and return success. This behavior
is incorrect because if the caller makes these duplicate registrations
then for the first one dpll_pin_registration is allocated and for others
the associated dpll_pin_ref.refcount is incremented. During the first
unregistration the associated dpll_pin_registration is freed and for
others WARN is fired.

Fix this by updating the logic to return `-EEXIST` if a matching
registration is found to enforce a strict "register once" policy.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23129/">CVE-2026-23129 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23129">CVE-2026-23129 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258299">SUSE bug 1258299</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262313" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2313</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2313" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2313" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2313" ref_url="https://www.suse.com/security/cve/CVE-2026-2313" source="SUSE CVE"/>
    <description>
    Use after free in CSS in Google Chrome prior to 145.0.7632.45 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-20"/>
	<updated date="2026-02-20"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-2313/">CVE-2026-2313 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2313">CVE-2026-2313 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258116">SUSE bug 1258116</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044385" comment="chromedriver-145.0.7632.75-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044386" comment="chromium-145.0.7632.75-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623131" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23131</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23131" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23131" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23131" ref_url="https://www.suse.com/security/cve/CVE-2026-23131" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

platform/x86: hp-bioscfg: Fix kobject warnings for empty attribute names

The hp-bioscfg driver attempts to register kobjects with empty names when
the HP BIOS returns attributes with empty name strings. This causes
multiple kernel warnings:

  kobject: (00000000135fb5e6): attempted to be registered with empty name!
  WARNING: CPU: 14 PID: 3336 at lib/kobject.c:219 kobject_add_internal+0x2eb/0x310

Add validation in hp_init_bios_buffer_attribute() to check if the
attribute name is empty after parsing it from the WMI buffer. If empty,
log a debug message and skip registration of that attribute, allowing the
module to continue processing other valid attributes.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23131/">CVE-2026-23131 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23131">CVE-2026-23131 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258297">SUSE bug 1258297</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623133" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23133</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23133" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23133" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23133" ref_url="https://www.suse.com/security/cve/CVE-2026-23133" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath10k: fix dma_free_coherent() pointer

dma_alloc_coherent() allocates a DMA mapped buffer and stores the
addresses in XXX_unaligned fields.  Those should be reused when freeing
the buffer rather than the aligned addresses.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23133/">CVE-2026-23133 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23133">CVE-2026-23133 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258249">SUSE bug 1258249</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23135</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23135" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23135" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23135" ref_url="https://www.suse.com/security/cve/CVE-2026-23135" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: ath12k: fix dma_free_coherent() pointer

dma_alloc_coherent() allocates a DMA mapped buffer and stores the
addresses in XXX_unaligned fields.  Those should be reused when freeing
the buffer rather than the aligned addresses.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:H/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23135/">CVE-2026-23135 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23135">CVE-2026-23135 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258245">SUSE bug 1258245</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623136" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23136</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23136" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23136" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23136" ref_url="https://www.suse.com/security/cve/CVE-2026-23136" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

libceph: reset sparse-read state in osd_fault()

When a fault occurs, the connection is abandoned, reestablished, and any
pending operations are retried. The OSD client tracks the progress of a
sparse-read reply using a separate state machine, largely independent of
the messenger's state.

If a connection is lost mid-payload or the sparse-read state machine
returns an error, the sparse-read state is not reset. The OSD client
will then interpret the beginning of a new reply as the continuation of
the old one. If this makes the sparse-read machinery enter a failure
state, it may never recover, producing loops like:

  libceph:  [0] got 0 extents
  libceph: data len 142248331 != extent len 0
  libceph: osd0 (1)...:6801 socket error on read
  libceph: data len 142248331 != extent len 0
  libceph: osd0 (1)...:6801 socket error on read

Therefore, reset the sparse-read state in osd_fault(), ensuring retries
start from a clean state.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23136/">CVE-2026-23136 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23136">CVE-2026-23136 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258303">SUSE bug 1258303</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23137</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23137" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23137" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23137" ref_url="https://www.suse.com/security/cve/CVE-2026-23137" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

of: unittest: Fix memory leak in unittest_data_add()

In unittest_data_add(), if of_resolve_phandles() fails, the allocated
unittest_data is not freed, leading to a memory leak.

Fix this by using scope-based cleanup helper __free(kfree) for automatic
resource cleanup. This ensures unittest_data is automatically freed when
it goes out of scope in error paths.

For the success path, use retain_and_null_ptr() to transfer ownership
of the memory to the device tree and prevent double freeing.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23137/">CVE-2026-23137 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23137">CVE-2026-23137 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258232">SUSE bug 1258232</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23139</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23139" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23139" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23139" ref_url="https://www.suse.com/security/cve/CVE-2026-23139" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

netfilter: nf_conncount: update last_gc only when GC has been performed

Currently last_gc is being updated everytime a new connection is
tracked, that means that it is updated even if a GC wasn't performed.
With a sufficiently high packet rate, it is possible to always bypass
the GC, causing the list to grow infinitely.

Update the last_gc value only when a GC has been actually performed.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23139/">CVE-2026-23139 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23139">CVE-2026-23139 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258304">SUSE bug 1258304</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262314" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2314</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2314" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2314" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2314" ref_url="https://www.suse.com/security/cve/CVE-2026-2314" source="SUSE CVE"/>
    <description>
    Heap buffer overflow in Codecs in Google Chrome prior to 145.0.7632.45 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-20"/>
	<updated date="2026-02-20"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-2314/">CVE-2026-2314 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2314">CVE-2026-2314 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258116">SUSE bug 1258116</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044385" comment="chromedriver-145.0.7632.75-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044386" comment="chromium-145.0.7632.75-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623141" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23141</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23141" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23141" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23141" ref_url="https://www.suse.com/security/cve/CVE-2026-23141" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: send: check for inline extents in range_is_hole_in_parent()

Before accessing the disk_bytenr field of a file extent item we need
to check if we are dealing with an inline extent.
This is because for inline extents their data starts at the offset of
the disk_bytenr field. So accessing the disk_bytenr
means we are accessing inline data or in case the inline data is less
than 8 bytes we can actually cause an invalid
memory access if this inline extent item is the first item in the leaf
or access metadata from other items.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23141/">CVE-2026-23141 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23141">CVE-2026-23141 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258377">SUSE bug 1258377</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23142</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23142" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23142" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23142" ref_url="https://www.suse.com/security/cve/CVE-2026-23142" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/damon/sysfs-scheme: cleanup access_pattern subdirs on scheme dir setup failure

When a DAMOS-scheme DAMON sysfs directory setup fails after setup of
access_pattern/ directory, subdirectories of access_pattern/ directory are
not cleaned up.  As a result, DAMON sysfs interface is nearly broken until
the system reboots, and the memory for the unremoved directory is leaked.

Cleanup the directories under such failures.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23142/">CVE-2026-23142 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23142">CVE-2026-23142 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258289">SUSE bug 1258289</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623144" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23144</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23144" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23144" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23144" ref_url="https://www.suse.com/security/cve/CVE-2026-23144" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:6153" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/damon/sysfs: cleanup attrs subdirs on context dir setup failure

When a context DAMON sysfs directory setup is failed after setup of attrs/
directory, subdirectories of attrs/ directory are not cleaned up.  As a
result, DAMON sysfs interface is nearly broken until the system reboots,
and the memory for the unremoved directory is leaked.

Cleanup the directories under such failures.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23144/">CVE-2026-23144 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23144">CVE-2026-23144 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258290">SUSE bug 1258290</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623145" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23145</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23145" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23145" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23145" ref_url="https://www.suse.com/security/cve/CVE-2026-23145" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ext4: fix iloc.bh leak in ext4_xattr_inode_update_ref

The error branch for ext4_xattr_inode_update_ref forget to release the
refcount for iloc.bh. Find this when review code.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23145/">CVE-2026-23145 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23145">CVE-2026-23145 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258326">SUSE bug 1258326</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623146" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23146</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23146" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23146" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23146" ref_url="https://www.suse.com/security/cve/CVE-2026-23146" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: hci_uart: fix null-ptr-deref in hci_uart_write_work

hci_uart_set_proto() sets HCI_UART_PROTO_INIT before calling
hci_uart_register_dev(), which calls proto-&gt;open() to initialize
hu-&gt;priv. However, if a TTY write wakeup occurs during this window,
hci_uart_tx_wakeup() may schedule write_work before hu-&gt;priv is
initialized, leading to a NULL pointer dereference in
hci_uart_write_work() when proto-&gt;dequeue() accesses hu-&gt;priv.

The race condition is:

  CPU0                              CPU1
  ----                              ----
  hci_uart_set_proto()
    set_bit(HCI_UART_PROTO_INIT)
    hci_uart_register_dev()
                                    tty write wakeup
                                      hci_uart_tty_wakeup()
                                        hci_uart_tx_wakeup()
                                          schedule_work(&amp;hu-&gt;write_work)
      proto-&gt;open(hu)
        // initializes hu-&gt;priv
                                    hci_uart_write_work()
                                      hci_uart_dequeue()
                                        proto-&gt;dequeue(hu)
                                          // accesses hu-&gt;priv (NULL!)

Fix this by moving set_bit(HCI_UART_PROTO_INIT) after proto-&gt;open()
succeeds, ensuring hu-&gt;priv is initialized before any work can be
scheduled.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23146/">CVE-2026-23146 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23146">CVE-2026-23146 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258234">SUSE bug 1258234</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623148" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23148</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23148" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23148" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23148" ref_url="https://www.suse.com/security/cve/CVE-2026-23148" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvmet: fix race in nvmet_bio_done() leading to NULL pointer dereference

There is a race condition in nvmet_bio_done() that can cause a NULL
pointer dereference in blk_cgroup_bio_start():

1. nvmet_bio_done() is called when a bio completes
2. nvmet_req_complete() is called, which invokes req-&gt;ops-&gt;queue_response(req)
3. The queue_response callback can re-queue and re-submit the same request
4. The re-submission reuses the same inline_bio from nvmet_req
5. Meanwhile, nvmet_req_bio_put() (called after nvmet_req_complete)
   invokes bio_uninit() for inline_bio, which sets bio-&gt;bi_blkg to NULL
6. The re-submitted bio enters submit_bio_noacct_nocheck()
7. blk_cgroup_bio_start() dereferences bio-&gt;bi_blkg, causing a crash:

  BUG: kernel NULL pointer dereference, address: 0000000000000028
  #PF: supervisor read access in kernel mode
  RIP: 0010:blk_cgroup_bio_start+0x10/0xd0
  Call Trace:
   submit_bio_noacct_nocheck+0x44/0x250
   nvmet_bdev_execute_rw+0x254/0x370 [nvmet]
   process_one_work+0x193/0x3c0
   worker_thread+0x281/0x3a0

Fix this by reordering nvmet_bio_done() to call nvmet_req_bio_put()
BEFORE nvmet_req_complete(). This ensures the bio is cleaned up before
the request can be re-submitted, preventing the race condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-23148/">CVE-2026-23148 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23148">CVE-2026-23148 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258258">SUSE bug 1258258</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262315" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2315</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2315" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2315" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2315" ref_url="https://www.suse.com/security/cve/CVE-2026-2315" source="SUSE CVE"/>
    <description>
    Inappropriate implementation in WebGPU in Google Chrome prior to 145.0.7632.45 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-20"/>
	<updated date="2026-02-20"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-2315/">CVE-2026-2315 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2315">CVE-2026-2315 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258116">SUSE bug 1258116</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044385" comment="chromedriver-145.0.7632.75-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044386" comment="chromium-145.0.7632.75-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23150</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23150" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23150" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23150" ref_url="https://www.suse.com/security/cve/CVE-2026-23150" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfc: llcp: Fix memleak in nfc_llcp_send_ui_frame().

syzbot reported various memory leaks related to NFC, struct
nfc_llcp_sock, sk_buff, nfc_dev, etc. [0]

The leading log hinted that nfc_llcp_send_ui_frame() failed
to allocate skb due to sock_error(sk) being -ENXIO.

ENXIO is set by nfc_llcp_socket_release() when struct
nfc_llcp_local is destroyed by local_cleanup().

The problem is that there is no synchronisation between
nfc_llcp_send_ui_frame() and local_cleanup(), and skb
could be put into local-&gt;tx_queue after it was purged in
local_cleanup():

  CPU1                          CPU2
  ----                          ----
  nfc_llcp_send_ui_frame()      local_cleanup()
  |- do {                       '
     |- pdu = nfc_alloc_send_skb(..., &amp;err)
     |                          .
     |                          |- nfc_llcp_socket_release(local, false, ENXIO);
     |                          |- skb_queue_purge(&amp;local-&gt;tx_queue);      |
     |                          '                                          |
     |- skb_queue_tail(&amp;local-&gt;tx_queue, pdu);                             |
    ...                                                                    |
     |- pdu = nfc_alloc_send_skb(..., &amp;err)                                |
                                       ^._________________________________.'

local_cleanup() is called for struct nfc_llcp_local only
after nfc_llcp_remove_local() unlinks it from llcp_devices.

If we hold local-&gt;tx_queue.lock then, we can synchronise
the thread and nfc_llcp_send_ui_frame().

Let's do that and check list_empty(&amp;local-&gt;list) before
queuing skb to local-&gt;tx_queue in nfc_llcp_send_ui_frame().

[0]:
[   56.074943][ T6096] llcp: nfc_llcp_send_ui_frame: Could not allocate PDU (error=-6)
[   64.318868][ T5813] kmemleak: 6 new suspected memory leaks (see /sys/kernel/debug/kmemleak)
BUG: memory leak
unreferenced object 0xffff8881272f6800 (size 1024):
  comm "syz.0.17", pid 6096, jiffies 4294942766
  hex dump (first 32 bytes):
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
    27 00 03 40 00 00 00 00 00 00 00 00 00 00 00 00  '..@............
  backtrace (crc da58d84d):
    kmemleak_alloc_recursive include/linux/kmemleak.h:44 [inline]
    slab_post_alloc_hook mm/slub.c:4979 [inline]
    slab_alloc_node mm/slub.c:5284 [inline]
    __do_kmalloc_node mm/slub.c:5645 [inline]
    __kmalloc_noprof+0x3e3/0x6b0 mm/slub.c:5658
    kmalloc_noprof include/linux/slab.h:961 [inline]
    sk_prot_alloc+0x11a/0x1b0 net/core/sock.c:2239
    sk_alloc+0x36/0x360 net/core/sock.c:2295
    nfc_llcp_sock_alloc+0x37/0x130 net/nfc/llcp_sock.c:979
    llcp_sock_create+0x71/0xd0 net/nfc/llcp_sock.c:1044
    nfc_sock_create+0xc9/0xf0 net/nfc/af_nfc.c:31
    __sock_create+0x1a9/0x340 net/socket.c:1605
    sock_create net/socket.c:1663 [inline]
    __sys_socket_create net/socket.c:1700 [inline]
    __sys_socket+0xb9/0x1a0 net/socket.c:1747
    __do_sys_socket net/socket.c:1761 [inline]
    __se_sys_socket net/socket.c:1759 [inline]
    __x64_sys_socket+0x1b/0x30 net/socket.c:1759
    do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
    do_syscall_64+0xa4/0xfa0 arch/x86/entry/syscall_64.c:94
    entry_SYSCALL_64_after_hwframe+0x77/0x7f

BUG: memory leak
unreferenced object 0xffff88810fbd9800 (size 240):
  comm "syz.0.17", pid 6096, jiffies 4294942850
  hex dump (first 32 bytes):
    68 f0 ff 08 81 88 ff ff 68 f0 ff 08 81 88 ff ff  h.......h.......
    00 00 00 00 00 00 00 00 00 68 2f 27 81 88 ff ff  .........h/'....
  backtrace (crc 6cc652b1):
    kmemleak_alloc_recursive include/linux/kmemleak.h:44 [inline]
    slab_post_alloc_hook mm/slub.c:4979 [inline]
    slab_alloc_node mm/slub.c:5284 [inline]
    kmem_cache_alloc_node_noprof+0x36f/0x5e0 mm/slub.c:5336
    __alloc_skb+0x203/0x240 net/core/skbuff.c:660
    alloc_skb include/linux/skbuff.h:1383 [inline]
    alloc_skb_with_frags+0x69/0x3f0 net/core/sk
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23150/">CVE-2026-23150 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23150">CVE-2026-23150 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258354">SUSE bug 1258354</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623151" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23151</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23151" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23151" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23151" ref_url="https://www.suse.com/security/cve/CVE-2026-23151" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

Bluetooth: MGMT: Fix memory leak in set_ssp_complete

Fix memory leak in set_ssp_complete() where mgmt_pending_cmd structures
are not freed after being removed from the pending list.

Commit 302a1f674c00 ("Bluetooth: MGMT: Fix possible UAFs") replaced
mgmt_pending_foreach() calls with individual command handling but missed
adding mgmt_pending_free() calls in both error and success paths of
set_ssp_complete(). Other completion functions like set_le_complete()
were fixed correctly in the same commit.

This causes a memory leak of the mgmt_pending_cmd structure and its
associated parameter data for each SSP command that completes.

Add the missing mgmt_pending_free(cmd) calls in both code paths to fix
the memory leak. Also fix the same issue in set_advertising_complete().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23151/">CVE-2026-23151 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23151">CVE-2026-23151 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258237">SUSE bug 1258237</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623152" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23152</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23152" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23152" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23152" ref_url="https://www.suse.com/security/cve/CVE-2026-23152" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

wifi: mac80211: correctly decode TTLM with default link map

TID-To-Link Mapping (TTLM) elements do not contain any link mapping
presence indicator if a default mapping is used and parsing needs to be
skipped.

Note that access points should not explicitly report an advertised TTLM
with a default mapping as that is the implied mapping if the element is
not included, this is even the case when switching back to the default
mapping. However, mac80211 would incorrectly parse the frame and would
also read one byte beyond the end of the element.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.4/CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:A/AC:H/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23152/">CVE-2026-23152 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23152">CVE-2026-23152 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258252">SUSE bug 1258252</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23154</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23154" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23154" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23154" ref_url="https://www.suse.com/security/cve/CVE-2026-23154" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: fix segmentation of forwarding fraglist GRO

This patch enhances GSO segment handling by properly checking
the SKB_GSO_DODGY flag for frag_list GSO packets, addressing
low throughput issues observed when a station accesses IPv4
servers via hotspots with an IPv6-only upstream interface.

Specifically, it fixes a bug in GSO segmentation when forwarding
GRO packets containing a frag_list. The function skb_segment_list
cannot correctly process GRO skbs that have been converted by XLAT,
since XLAT only translates the header of the head skb. Consequently,
skbs in the frag_list may remain untranslated, resulting in protocol
inconsistencies and reduced throughput.

To address this, the patch explicitly sets the SKB_GSO_DODGY flag
for GSO packets in XLAT's IPv4/IPv6 protocol translation helpers
(bpf_skb_proto_4_to_6 and bpf_skb_proto_6_to_4). This marks GSO
packets as potentially modified after protocol translation. As a
result, GSO segmentation will avoid using skb_segment_list and
instead falls back to skb_segment for packets with the SKB_GSO_DODGY
flag. This ensures that only safe and fully translated frag_list
packets are processed by skb_segment_list, resolving protocol
inconsistencies and improving throughput when forwarding GRO packets
converted by XLAT.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23154/">CVE-2026-23154 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23154">CVE-2026-23154 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258286">SUSE bug 1258286</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623155" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23155</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23155" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23155" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23155" ref_url="https://www.suse.com/security/cve/CVE-2026-23155" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

can: gs_usb: gs_usb_receive_bulk_callback(): fix error message

Sinc commit 79a6d1bfe114 ("can: gs_usb: gs_usb_receive_bulk_callback():
unanchor URL on usb_submit_urb() error") a failing resubmit URB will print
an info message.

In the case of a short read where netdev has not yet been assigned,
initialize as NULL to avoid dereferencing an undefined value. Also report
the error value of the failed resubmit.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23155/">CVE-2026-23155 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23155">CVE-2026-23155 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258313">SUSE bug 1258313</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258315">SUSE bug 1258315</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623156" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23156</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23156" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23156" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23156" ref_url="https://www.suse.com/security/cve/CVE-2026-23156" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

efivarfs: fix error propagation in efivar_entry_get()

efivar_entry_get() always returns success even if the underlying
__efivar_entry_get() fails, masking errors.

This may result in uninitialized heap memory being copied to userspace
in the efivarfs_file_read() path.

Fix it by returning the error from __efivar_entry_get().
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:H/A:L" cvss4="5.8/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23156/">CVE-2026-23156 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23156">CVE-2026-23156 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258317">SUSE bug 1258317</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623157" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23157</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23157" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23157" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23157" ref_url="https://www.suse.com/security/cve/CVE-2026-23157" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: do not strictly require dirty metadata threshold for metadata writepages

[BUG]
There is an internal report that over 1000 processes are
waiting at the io_schedule_timeout() of balance_dirty_pages(), causing
a system hang and trigger a kernel coredump.

The kernel is v6.4 kernel based, but the root problem still applies to
any upstream kernel before v6.18.

[CAUSE]
From Jan Kara for his wisdom on the dirty page balance behavior first.

  This cgroup dirty limit was what was actually playing the role here
  because the cgroup had only a small amount of memory and so the dirty
  limit for it was something like 16MB.

  Dirty throttling is responsible for enforcing that nobody can dirty
  (significantly) more dirty memory than there's dirty limit. Thus when
  a task is dirtying pages it periodically enters into balance_dirty_pages()
  and we let it sleep there to slow down the dirtying.

  When the system is over dirty limit already (either globally or within
  a cgroup of the running task), we will not let the task exit from
  balance_dirty_pages() until the number of dirty pages drops below the
  limit.

  So in this particular case, as I already mentioned, there was a cgroup
  with relatively small amount of memory and as a result with dirty limit
  set at 16MB. A task from that cgroup has dirtied about 28MB worth of
  pages in btrfs btree inode and these were practically the only dirty
  pages in that cgroup.

So that means the only way to reduce the dirty pages of that cgroup is
to writeback the dirty pages of btrfs btree inode, and only after that
those processes can exit balance_dirty_pages().

Now back to the btrfs part, btree_writepages() is responsible for
writing back dirty btree inode pages.

The problem here is, there is a btrfs internal threshold that if the
btree inode's dirty bytes are below the 32M threshold, it will not
do any writeback.

This behavior is to batch as much metadata as possible so we won't write
back those tree blocks and then later re-COW them again for another
modification.

This internal 32MiB is higher than the existing dirty page size (28MiB),
meaning no writeback will happen, causing a deadlock between btrfs and
cgroup:

- Btrfs doesn't want to write back btree inode until more dirty pages

- Cgroup/MM doesn't want more dirty pages for btrfs btree inode
  Thus any process touching that btree inode is put into sleep until
  the number of dirty pages is reduced.

Thanks Jan Kara a lot for the analysis of the root cause.

[ENHANCEMENT]
Since kernel commit b55102826d7d ("btrfs: set AS_KERNEL_FILE on the
btree_inode"), btrfs btree inode pages will only be charged to the root
cgroup which should have a much larger limit than btrfs' 32MiB
threshold.
So it should not affect newer kernels.

But for all current LTS kernels, they are all affected by this problem,
and backporting the whole AS_KERNEL_FILE may not be a good idea.

Even for newer kernels I still think it's a good idea to get
rid of the internal threshold at btree_writepages(), since for most cases
cgroup/MM has a better view of full system memory usage than btrfs' fixed
threshold.

For internal callers using btrfs_btree_balance_dirty() since that
function is already doing internal threshold check, we don't need to
bother them.

But for external callers of btree_writepages(), just respect their
requests and write back whatever they want, ignoring the internal
btrfs threshold to avoid such deadlock on btree inode dirty page
balancing.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23157/">CVE-2026-23157 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23157">CVE-2026-23157 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258376">SUSE bug 1258376</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623158" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23158</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23158" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23158" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23158" ref_url="https://www.suse.com/security/cve/CVE-2026-23158" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

gpio: virtuser: fix UAF in configfs release path

The gpio-virtuser configfs release path uses guard(mutex) to protect
the device structure. However, the device is freed before the guard
cleanup runs, causing mutex_unlock() to operate on freed memory.

Specifically, gpio_virtuser_device_config_group_release() destroys
the mutex and frees the device while still inside the guard(mutex)
scope. When the function returns, the guard cleanup invokes
mutex_unlock(&amp;dev-&gt;lock), resulting in a slab use-after-free.

Limit the mutex lifetime by using a scoped_guard() only around the
activation check, so that the lock is released before mutex_destroy()
and kfree() are called.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23158/">CVE-2026-23158 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23158">CVE-2026-23158 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258323">SUSE bug 1258323</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262316" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2316</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2316" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2316" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2316" ref_url="https://www.suse.com/security/cve/CVE-2026-2316" source="SUSE CVE"/>
    <description>
    Insufficient policy enforcement in Frames in Google Chrome prior to 145.0.7632.45 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-20"/>
	<updated date="2026-02-20"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-2316/">CVE-2026-2316 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2316">CVE-2026-2316 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258116">SUSE bug 1258116</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044385" comment="chromedriver-145.0.7632.75-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044386" comment="chromium-145.0.7632.75-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623161" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23161</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23161" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23161" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23161" ref_url="https://www.suse.com/security/cve/CVE-2026-23161" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm/shmem, swap: fix race of truncate and swap entry split

The helper for shmem swap freeing is not handling the order of swap
entries correctly.  It uses xa_cmpxchg_irq to erase the swap entry, but it
gets the entry order before that using xa_get_order without lock
protection, and it may get an outdated order value if the entry is split
or changed in other ways after the xa_get_order and before the
xa_cmpxchg_irq.

And besides, the order could grow and be larger than expected, and cause
truncation to erase data beyond the end border.  For example, if the
target entry and following entries are swapped in or freed, then a large
folio was added in place and swapped out, using the same entry, the
xa_cmpxchg_irq will still succeed, it's very unlikely to happen though.

To fix that, open code the Xarray cmpxchg and put the order retrieval and
value checking in the same critical section.  Also, ensure the order won't
exceed the end border, skip it if the entry goes across the border.

Skipping large swap entries crosses the end border is safe here.  Shmem
truncate iterates the range twice, in the first iteration,
find_lock_entries already filtered such entries, and shmem will swapin the
entries that cross the end border and partially truncate the folio (split
the folio or at least zero part of it).  So in the second loop here, if we
see a swap entry that crosses the end order, it must at least have its
content erased already.

I observed random swapoff hangs and kernel panics when stress testing
ZSWAP with shmem.  After applying this patch, all problems are gone.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23161/">CVE-2026-23161 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23161">CVE-2026-23161 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258355">SUSE bug 1258355</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1259134">SUSE bug 1259134</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623163" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23163</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23163" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23163" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23163" ref_url="https://www.suse.com/security/cve/CVE-2026-23163" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amdgpu: fix NULL pointer dereference in amdgpu_gmc_filter_faults_remove

On APUs such as Raven and Renoir (GC 9.1.0, 9.2.2, 9.3.0), the ih1 and
ih2 interrupt ring buffers are not initialized. This is by design, as
these secondary IH rings are only available on discrete GPUs. See
vega10_ih_sw_init() which explicitly skips ih1/ih2 initialization when
AMD_IS_APU is set.

However, amdgpu_gmc_filter_faults_remove() unconditionally uses ih1 to
get the timestamp of the last interrupt entry. When retry faults are
enabled on APUs (noretry=0), this function is called from the SVM page
fault recovery path, resulting in a NULL pointer dereference when
amdgpu_ih_decode_iv_ts_helper() attempts to access ih-&gt;ring[].

The crash manifests as:

  BUG: kernel NULL pointer dereference, address: 0000000000000004
  RIP: 0010:amdgpu_ih_decode_iv_ts_helper+0x22/0x40 [amdgpu]
  Call Trace:
   amdgpu_gmc_filter_faults_remove+0x60/0x130 [amdgpu]
   svm_range_restore_pages+0xae5/0x11c0 [amdgpu]
   amdgpu_vm_handle_fault+0xc8/0x340 [amdgpu]
   gmc_v9_0_process_interrupt+0x191/0x220 [amdgpu]
   amdgpu_irq_dispatch+0xed/0x2c0 [amdgpu]
   amdgpu_ih_process+0x84/0x100 [amdgpu]

This issue was exposed by commit 1446226d32a4 ("drm/amdgpu: Remove GC HW
IP 9.3.0 from noretry=1") which changed the default for Renoir APU from
noretry=1 to noretry=0, enabling retry fault handling and thus
exercising the buggy code path.

Fix this by adding a check for ih1.ring_size before attempting to use
it. Also restore the soft_ih support from commit dd299441654f ("drm/amdgpu:
Rework retry fault removal").  This is needed if the hardware doesn't
support secondary HW IH rings.

v2: additional updates (Alex)

(cherry picked from commit 6ce8d536c80aa1f059e82184f0d1994436b1d526)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-23163/">CVE-2026-23163 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23163">CVE-2026-23163 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258544">SUSE bug 1258544</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623166" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23166</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23166" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23166" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23166" ref_url="https://www.suse.com/security/cve/CVE-2026-23166" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: Fix NULL pointer dereference in ice_vsi_set_napi_queues

Add NULL pointer checks in ice_vsi_set_napi_queues() to prevent crashes
during resume from suspend when rings[q_idx]-&gt;q_vector is NULL.

Tested adaptor:
60:00.0 Ethernet controller [0200]: Intel Corporation Ethernet Controller E810-XXV for SFP [8086:159b] (rev 02)
        Subsystem: Intel Corporation Ethernet Network Adapter E810-XXV-2 [8086:4003]

SR-IOV state: both disabled and enabled can reproduce this issue.

kernel version: v6.18

Reproduce steps:
Boot up and execute suspend like systemctl suspend or rtcwake.

Log:
&lt;1&gt;[  231.443607] BUG: kernel NULL pointer dereference, address: 0000000000000040
&lt;1&gt;[  231.444052] #PF: supervisor read access in kernel mode
&lt;1&gt;[  231.444484] #PF: error_code(0x0000) - not-present page
&lt;6&gt;[  231.444913] PGD 0 P4D 0
&lt;4&gt;[  231.445342] Oops: Oops: 0000 [#1] SMP NOPTI
&lt;4&gt;[  231.446635] RIP: 0010:netif_queue_set_napi+0xa/0x170
&lt;4&gt;[  231.447067] Code: 31 f6 31 ff c3 cc cc cc cc 0f 1f 80 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 0f 1f 44 00 00 48 85 c9 74 0b &lt;48&gt; 83 79 30 00 0f 84 39 01 00 00 55 41 89 d1 49 89 f8 89 f2 48 89
&lt;4&gt;[  231.447513] RSP: 0018:ffffcc780fc078c0 EFLAGS: 00010202
&lt;4&gt;[  231.447961] RAX: ffff8b848ca30400 RBX: ffff8b848caf2028 RCX: 0000000000000010
&lt;4&gt;[  231.448443] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff8b848dbd4000
&lt;4&gt;[  231.448896] RBP: ffffcc780fc078e8 R08: 0000000000000000 R09: 0000000000000000
&lt;4&gt;[  231.449345] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000001
&lt;4&gt;[  231.449817] R13: ffff8b848dbd4000 R14: ffff8b84833390c8 R15: 0000000000000000
&lt;4&gt;[  231.450265] FS:  00007c7b29e9d740(0000) GS:ffff8b8c068e2000(0000) knlGS:0000000000000000
&lt;4&gt;[  231.450715] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
&lt;4&gt;[  231.451179] CR2: 0000000000000040 CR3: 000000030626f004 CR4: 0000000000f72ef0
&lt;4&gt;[  231.451629] PKRU: 55555554
&lt;4&gt;[  231.452076] Call Trace:
&lt;4&gt;[  231.452549]  &lt;TASK&gt;
&lt;4&gt;[  231.452996]  ? ice_vsi_set_napi_queues+0x4d/0x110 [ice]
&lt;4&gt;[  231.453482]  ice_resume+0xfd/0x220 [ice]
&lt;4&gt;[  231.453977]  ? __pfx_pci_pm_resume+0x10/0x10
&lt;4&gt;[  231.454425]  pci_pm_resume+0x8c/0x140
&lt;4&gt;[  231.454872]  ? __pfx_pci_pm_resume+0x10/0x10
&lt;4&gt;[  231.455347]  dpm_run_callback+0x5f/0x160
&lt;4&gt;[  231.455796]  ? dpm_wait_for_superior+0x107/0x170
&lt;4&gt;[  231.456244]  device_resume+0x177/0x270
&lt;4&gt;[  231.456708]  dpm_resume+0x209/0x2f0
&lt;4&gt;[  231.457151]  dpm_resume_end+0x15/0x30
&lt;4&gt;[  231.457596]  suspend_devices_and_enter+0x1da/0x2b0
&lt;4&gt;[  231.458054]  enter_state+0x10e/0x570

Add defensive checks for both the ring pointer and its q_vector
before dereferencing, allowing the system to resume successfully even when
q_vectors are unmapped.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-23166/">CVE-2026-23166 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23166">CVE-2026-23166 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258272">SUSE bug 1258272</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623167" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23167</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23167" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23167" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23167" ref_url="https://www.suse.com/security/cve/CVE-2026-23167" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nfc: nci: Fix race between rfkill and nci_unregister_device().

syzbot reported the splat below [0] without a repro.

It indicates that struct nci_dev.cmd_wq had been destroyed before
nci_close_device() was called via rfkill.

nci_dev.cmd_wq is only destroyed in nci_unregister_device(), which
(I think) was called from virtual_ncidev_close() when syzbot close()d
an fd of virtual_ncidev.

The problem is that nci_unregister_device() destroys nci_dev.cmd_wq
first and then calls nfc_unregister_device(), which removes the
device from rfkill by rfkill_unregister().

So, the device is still visible via rfkill even after nci_dev.cmd_wq
is destroyed.

Let's unregister the device from rfkill first in nci_unregister_device().

Note that we cannot call nfc_unregister_device() before
nci_close_device() because

  1) nfc_unregister_device() calls device_del() which frees
     all memory allocated by devm_kzalloc() and linked to
     ndev-&gt;conn_info_list

  2) nci_rx_work() could try to queue nci_conn_info to
     ndev-&gt;conn_info_list which could be leaked

Thus, nfc_unregister_device() is split into two functions so we
can remove rfkill interfaces only before nci_close_device().

[0]:
DEBUG_LOCKS_WARN_ON(1)
WARNING: kernel/locking/lockdep.c:238 at hlock_class kernel/locking/lockdep.c:238 [inline], CPU#0: syz.0.8675/6349
WARNING: kernel/locking/lockdep.c:238 at check_wait_context kernel/locking/lockdep.c:4854 [inline], CPU#0: syz.0.8675/6349
WARNING: kernel/locking/lockdep.c:238 at __lock_acquire+0x39d/0x2cf0 kernel/locking/lockdep.c:5187, CPU#0: syz.0.8675/6349
Modules linked in:
CPU: 0 UID: 0 PID: 6349 Comm: syz.0.8675 Not tainted syzkaller #0 PREEMPT(full)
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/13/2026
RIP: 0010:hlock_class kernel/locking/lockdep.c:238 [inline]
RIP: 0010:check_wait_context kernel/locking/lockdep.c:4854 [inline]
RIP: 0010:__lock_acquire+0x3a4/0x2cf0 kernel/locking/lockdep.c:5187
Code: 18 00 4c 8b 74 24 08 75 27 90 e8 17 f2 fc 02 85 c0 74 1c 83 3d 50 e0 4e 0e 00 75 13 48 8d 3d 43 f7 51 0e 48 c7 c6 8b 3a de 8d &lt;67&gt; 48 0f b9 3a 90 31 c0 0f b6 98 c4 00 00 00 41 8b 45 20 25 ff 1f
RSP: 0018:ffffc9000c767680 EFLAGS: 00010046
RAX: 0000000000000001 RBX: 0000000000040000 RCX: 0000000000080000
RDX: ffffc90013080000 RSI: ffffffff8dde3a8b RDI: ffffffff8ff24ca0
RBP: 0000000000000003 R08: ffffffff8fef35a3 R09: 1ffffffff1fde6b4
R10: dffffc0000000000 R11: fffffbfff1fde6b5 R12: 00000000000012a2
R13: ffff888030338ba8 R14: ffff888030338000 R15: ffff888030338b30
FS:  00007fa5995f66c0(0000) GS:ffff8881256f8000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f7e72f842d0 CR3: 00000000485a0000 CR4: 00000000003526f0
Call Trace:
 &lt;TASK&gt;
 lock_acquire+0x106/0x330 kernel/locking/lockdep.c:5868
 touch_wq_lockdep_map+0xcb/0x180 kernel/workqueue.c:3940
 __flush_workqueue+0x14b/0x14f0 kernel/workqueue.c:3982
 nci_close_device+0x302/0x630 net/nfc/nci/core.c:567
 nci_dev_down+0x3b/0x50 net/nfc/nci/core.c:639
 nfc_dev_down+0x152/0x290 net/nfc/core.c:161
 nfc_rfkill_set_block+0x2d/0x100 net/nfc/core.c:179
 rfkill_set_block+0x1d2/0x440 net/rfkill/core.c:346
 rfkill_fop_write+0x461/0x5a0 net/rfkill/core.c:1301
 vfs_write+0x29a/0xb90 fs/read_write.c:684
 ksys_write+0x150/0x270 fs/read_write.c:738
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xe2/0xf80 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7fa59b39acb9
Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 &lt;48&gt; 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007fa5995f6028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
RAX: ffffffffffffffda RBX: 00007fa59b615fa0 RCX: 00007fa59b39acb9
RDX: 0000000000000008 RSI: 0000200000000080 RDI: 0000000000000007
RBP: 00007fa59b408bf7 R08: 
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23167/">CVE-2026-23167 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23167">CVE-2026-23167 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258374">SUSE bug 1258374</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623169" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23169</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23169" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23169" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23169" ref_url="https://www.suse.com/security/cve/CVE-2026-23169" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mptcp: fix race in mptcp_pm_nl_flush_addrs_doit()

syzbot and Eulgyu Kim reported crashes in mptcp_pm_nl_get_local_id()
and/or mptcp_pm_nl_is_backup()

Root cause is list_splice_init() in mptcp_pm_nl_flush_addrs_doit()
which is not RCU ready.

list_splice_init_rcu() can not be called here while holding pernet-&gt;lock
spinlock.

Many thanks to Eulgyu Kim for providing a repro and testing our patches.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.6/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23169/">CVE-2026-23169 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23169">CVE-2026-23169 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258389">SUSE bug 1258389</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262317" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2317</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2317" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2317" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2317" ref_url="https://www.suse.com/security/cve/CVE-2026-2317" source="SUSE CVE"/>
    <description>
    Inappropriate implementation in Animation in Google Chrome prior to 145.0.7632.45 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-20"/>
	<updated date="2026-02-20"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-2317/">CVE-2026-2317 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2317">CVE-2026-2317 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258116">SUSE bug 1258116</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044385" comment="chromedriver-145.0.7632.75-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044386" comment="chromium-145.0.7632.75-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623170" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23170</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23170" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23170" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23170" ref_url="https://www.suse.com/security/cve/CVE-2026-23170" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/imx/tve: fix probe device leak

Make sure to drop the reference taken to the DDC device during probe on
probe failure (e.g. probe deferral) and on driver unbind.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23170/">CVE-2026-23170 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23170">CVE-2026-23170 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258379">SUSE bug 1258379</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623171" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23171</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23171" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23171" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23171" ref_url="https://www.suse.com/security/cve/CVE-2026-23171" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:6153" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bonding: fix use-after-free due to enslave fail after slave array update

Fix a use-after-free which happens due to enslave failure after the new
slave has been added to the array. Since the new slave can be used for Tx
immediately, we can use it after it has been freed by the enslave error
cleanup path which frees the allocated slave memory. Slave update array is
supposed to be called last when further enslave failures are not expected.
Move it after xdp setup to avoid any problems.

It is very easy to reproduce the problem with a simple xdp_pass prog:
 ip l add bond1 type bond mode balance-xor
 ip l set bond1 up
 ip l set dev bond1 xdp object xdp_pass.o sec xdp_pass
 ip l add dumdum type dummy

Then run in parallel:
 while :; do ip l set dumdum master bond1 1&gt;/dev/null 2&gt;&amp;1; done;
 mausezahn bond1 -a own -b rand -A rand -B 1.1.1.1 -c 0 -t tcp "dp=1-1023, flags=syn"

The crash happens almost immediately:
 [  605.602850] Oops: general protection fault, probably for non-canonical address 0xe0e6fc2460000137: 0000 [#1] SMP KASAN NOPTI
 [  605.602916] KASAN: maybe wild-memory-access in range [0x07380123000009b8-0x07380123000009bf]
 [  605.602946] CPU: 0 UID: 0 PID: 2445 Comm: mausezahn Kdump: loaded Tainted: G    B               6.19.0-rc6+ #21 PREEMPT(voluntary)
 [  605.602979] Tainted: [B]=BAD_PAGE
 [  605.602998] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2 04/01/2014
 [  605.603032] RIP: 0010:netdev_core_pick_tx+0xcd/0x210
 [  605.603063] Code: 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 3e 01 00 00 48 b8 00 00 00 00 00 fc ff df 4c 8b 6b 08 49 8d 7d 30 48 89 fa 48 c1 ea 03 &lt;80&gt; 3c 02 00 0f 85 25 01 00 00 49 8b 45 30 4c 89 e2 48 89 ee 48 89
 [  605.603111] RSP: 0018:ffff88817b9af348 EFLAGS: 00010213
 [  605.603145] RAX: dffffc0000000000 RBX: ffff88817d28b420 RCX: 0000000000000000
 [  605.603172] RDX: 00e7002460000137 RSI: 0000000000000008 RDI: 07380123000009be
 [  605.603199] RBP: ffff88817b541a00 R08: 0000000000000001 R09: fffffbfff3ed8c0c
 [  605.603226] R10: ffffffff9f6c6067 R11: 0000000000000001 R12: 0000000000000000
 [  605.603253] R13: 073801230000098e R14: ffff88817d28b448 R15: ffff88817b541a84
 [  605.603286] FS:  00007f6570ef67c0(0000) GS:ffff888221dfa000(0000) knlGS:0000000000000000
 [  605.603319] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 [  605.603343] CR2: 00007f65712fae40 CR3: 000000011371b000 CR4: 0000000000350ef0
 [  605.603373] Call Trace:
 [  605.603392]  &lt;TASK&gt;
 [  605.603410]  __dev_queue_xmit+0x448/0x32a0
 [  605.603434]  ? __pfx_vprintk_emit+0x10/0x10
 [  605.603461]  ? __pfx_vprintk_emit+0x10/0x10
 [  605.603484]  ? __pfx___dev_queue_xmit+0x10/0x10
 [  605.603507]  ? bond_start_xmit+0xbfb/0xc20 [bonding]
 [  605.603546]  ? _printk+0xcb/0x100
 [  605.603566]  ? __pfx__printk+0x10/0x10
 [  605.603589]  ? bond_start_xmit+0xbfb/0xc20 [bonding]
 [  605.603627]  ? add_taint+0x5e/0x70
 [  605.603648]  ? add_taint+0x2a/0x70
 [  605.603670]  ? end_report.cold+0x51/0x75
 [  605.603693]  ? bond_start_xmit+0xbfb/0xc20 [bonding]
 [  605.603731]  bond_start_xmit+0x623/0xc20 [bonding]
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2026-23171/">CVE-2026-23171 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23171">CVE-2026-23171 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258349">SUSE bug 1258349</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623172" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23172</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23172" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23172" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23172" ref_url="https://www.suse.com/security/cve/CVE-2026-23172" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: wwan: t7xx: fix potential skb-&gt;frags overflow in RX path

When receiving data in the DPMAIF RX path,
the t7xx_dpmaif_set_frag_to_skb() function adds
page fragments to an skb without checking if the number of
fragments has exceeded MAX_SKB_FRAGS. This could lead to a buffer overflow
in skb_shinfo(skb)-&gt;frags[] array, corrupting adjacent memory and
potentially causing kernel crashes or other undefined behavior.

This issue was identified through static code analysis by comparing with a
similar vulnerability fixed in the mt76 driver commit b102f0c522cf ("mt76:
fix array overflow on receiving too many fragments for a packet").

The vulnerability could be triggered if the modem firmware sends packets
with excessive fragments. While under normal protocol conditions (MTU 3080
bytes, BAT buffer 3584 bytes),
a single packet should not require additional
fragments, the kernel should not blindly trust firmware behavior.
Malicious, buggy, or compromised firmware could potentially craft packets
with more fragments than the kernel expects.

Fix this by adding a bounds check before calling skb_add_rx_frag() to
ensure nr_frags does not exceed MAX_SKB_FRAGS.

The check must be performed before unmapping to avoid a page leak
and double DMA unmap during device teardown.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23172/">CVE-2026-23172 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23172">CVE-2026-23172 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258519">SUSE bug 1258519</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623173" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23173</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23173" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23173" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23173" ref_url="https://www.suse.com/security/cve/CVE-2026-23173" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net/mlx5e: TC, delete flows only for existing peers

When deleting TC steering flows, iterate only over actual devcom
peers instead of assuming all possible ports exist. This avoids
touching non-existent peers and ensures cleanup is limited to
devices the driver is currently connected to.

 BUG: kernel NULL pointer dereference, address: 0000000000000008
 #PF: supervisor write access in kernel mode
 #PF: error_code(0x0002) - not-present page
 PGD 133c8a067 P4D 0
 Oops: Oops: 0002 [#1] SMP
 CPU: 19 UID: 0 PID: 2169 Comm: tc Not tainted 6.18.0+ #156 NONE
 Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.16.0-0-gd239552ce722-prebuilt.qemu.org 04/01/2014
 RIP: 0010:mlx5e_tc_del_fdb_peers_flow+0xbe/0x200 [mlx5_core]
 Code: 00 00 a8 08 74 a8 49 8b 46 18 f6 c4 02 74 9f 4c 8d bf a0 12 00 00 4c 89 ff e8 0e e7 96 e1 49 8b 44 24 08 49 8b 0c 24 4c 89 ff &lt;48&gt; 89 41 08 48 89 08 49 89 2c 24 49 89 5c 24 08 e8 7d ce 96 e1 49
 RSP: 0018:ff11000143867528 EFLAGS: 00010246
 RAX: 0000000000000000 RBX: dead000000000122 RCX: 0000000000000000
 RDX: ff11000143691580 RSI: ff110001026e5000 RDI: ff11000106f3d2a0
 RBP: dead000000000100 R08: 00000000000003fd R09: 0000000000000002
 R10: ff11000101c75690 R11: ff1100085faea178 R12: ff11000115f0ae78
 R13: 0000000000000000 R14: ff11000115f0a800 R15: ff11000106f3d2a0
 FS:  00007f35236bf740(0000) GS:ff110008dc809000(0000) knlGS:0000000000000000
 CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
 CR2: 0000000000000008 CR3: 0000000157a01001 CR4: 0000000000373eb0
 Call Trace:
  &lt;TASK&gt;
  mlx5e_tc_del_flow+0x46/0x270 [mlx5_core]
  mlx5e_flow_put+0x25/0x50 [mlx5_core]
  mlx5e_delete_flower+0x2a6/0x3e0 [mlx5_core]
  tc_setup_cb_reoffload+0x20/0x80
  fl_reoffload+0x26f/0x2f0 [cls_flower]
  ? mlx5e_tc_reoffload_flows_work+0xc0/0xc0 [mlx5_core]
  ? mlx5e_tc_reoffload_flows_work+0xc0/0xc0 [mlx5_core]
  tcf_block_playback_offloads+0x9e/0x1c0
  tcf_block_unbind+0x7b/0xd0
  tcf_block_setup+0x186/0x1d0
  tcf_block_offload_cmd.isra.0+0xef/0x130
  tcf_block_offload_unbind+0x43/0x70
  __tcf_block_put+0x85/0x160
  ingress_destroy+0x32/0x110 [sch_ingress]
  __qdisc_destroy+0x44/0x100
  qdisc_graft+0x22b/0x610
  tc_get_qdisc+0x183/0x4d0
  rtnetlink_rcv_msg+0x2d7/0x3d0
  ? rtnl_calcit.isra.0+0x100/0x100
  netlink_rcv_skb+0x53/0x100
  netlink_unicast+0x249/0x320
  ? __alloc_skb+0x102/0x1f0
  netlink_sendmsg+0x1e3/0x420
  __sock_sendmsg+0x38/0x60
  ____sys_sendmsg+0x1ef/0x230
  ? copy_msghdr_from_user+0x6c/0xa0
  ___sys_sendmsg+0x7f/0xc0
  ? ___sys_recvmsg+0x8a/0xc0
  ? __sys_sendto+0x119/0x180
  __sys_sendmsg+0x61/0xb0
  do_syscall_64+0x55/0x640
  entry_SYSCALL_64_after_hwframe+0x4b/0x53
 RIP: 0033:0x7f35238bb764
 Code: 15 b9 86 0c 00 f7 d8 64 89 02 b8 ff ff ff ff eb bf 0f 1f 44 00 00 f3 0f 1e fa 80 3d e5 08 0d 00 00 74 13 b8 2e 00 00 00 0f 05 &lt;48&gt; 3d 00 f0 ff ff 77 4c c3 0f 1f 00 55 48 89 e5 48 83 ec 20 89 55
 RSP: 002b:00007ffed4c35638 EFLAGS: 00000202 ORIG_RAX: 000000000000002e
 RAX: ffffffffffffffda RBX: 000055a2efcc75e0 RCX: 00007f35238bb764
 RDX: 0000000000000000 RSI: 00007ffed4c356a0 RDI: 0000000000000003
 RBP: 00007ffed4c35710 R08: 0000000000000010 R09: 00007f3523984b20
 R10: 0000000000000004 R11: 0000000000000202 R12: 00007ffed4c35790
 R13: 000000006947df8f R14: 000055a2efcc75e0 R15: 00007ffed4c35780
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23173/">CVE-2026-23173 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23173">CVE-2026-23173 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258520">SUSE bug 1258520</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623176" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23176</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23176" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23176" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23176" ref_url="https://www.suse.com/security/cve/CVE-2026-23176" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

platform/x86: toshiba_haps: Fix memory leaks in add/remove routines

toshiba_haps_add() leaks the haps object allocated by it if it returns
an error after allocating that object successfully.

toshiba_haps_remove() does not free the object pointed to by
toshiba_haps before clearing that pointer, so it becomes unreachable
allocated memory.

Address these memory leaks by using devm_kzalloc() for allocating
the memory in question.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23176/">CVE-2026-23176 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23176">CVE-2026-23176 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258256">SUSE bug 1258256</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623177" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23177</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23177" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23177" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23177" ref_url="https://www.suse.com/security/cve/CVE-2026-23177" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

mm, shmem: prevent infinite loop on truncate race

When truncating a large swap entry, shmem_free_swap() returns 0 when the
entry's index doesn't match the given index due to lookup alignment.  The
failure fallback path checks if the entry crosses the end border and
aborts when it happens, so truncate won't erase an unexpected entry or
range.  But one scenario was ignored.

When `index` points to the middle of a large swap entry, and the large
swap entry doesn't go across the end border, find_get_entries() will
return that large swap entry as the first item in the batch with
`indices[0]` equal to `index`.  The entry's base index will be smaller
than `indices[0]`, so shmem_free_swap() will fail and return 0 due to the
"base &lt; index" check.  The code will then call shmem_confirm_swap(), get
the order, check if it crosses the END boundary (which it doesn't), and
retry with the same index.

The next iteration will find the same entry again at the same index with
same indices, leading to an infinite loop.

Fix this by retrying with a round-down index, and abort if the index is
smaller than the truncate range.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23177/">CVE-2026-23177 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23177">CVE-2026-23177 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258324">SUSE bug 1258324</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623178" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23178</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23178" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23178" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23178" ref_url="https://www.suse.com/security/cve/CVE-2026-23178" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

HID: i2c-hid: fix potential buffer overflow in i2c_hid_get_report()

`i2c_hid_xfer` is used to read `recv_len + sizeof(__le16)` bytes of data
into `ihid-&gt;rawbuf`.

The former can come from the userspace in the hidraw driver and is only
bounded by HID_MAX_BUFFER_SIZE(16384) by default (unless we also set
`max_buffer_size` field of `struct hid_ll_driver` which we do not).

The latter has size determined at runtime by the maximum size of
different report types you could receive on any particular device and
can be a much smaller value.

Fix this by truncating `recv_len` to `ihid-&gt;bufsize - sizeof(__le16)`.

The impact is low since access to hidraw devices requires root.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2026-23178/">CVE-2026-23178 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23178">CVE-2026-23178 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258358">SUSE bug 1258358</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623179" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23179</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23179" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23179" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23179" ref_url="https://www.suse.com/security/cve/CVE-2026-23179" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

nvmet-tcp: fixup hang in nvmet_tcp_listen_data_ready()

When the socket is closed while in TCP_LISTEN a callback is run to
flush all outstanding packets, which in turns calls
nvmet_tcp_listen_data_ready() with the sk_callback_lock held.
So we need to check if we are in TCP_LISTEN before attempting
to get the sk_callback_lock() to avoid a deadlock.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23179/">CVE-2026-23179 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23179">CVE-2026-23179 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258394">SUSE bug 1258394</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262318" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2318</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2318" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2318" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2318" ref_url="https://www.suse.com/security/cve/CVE-2026-2318" source="SUSE CVE"/>
    <description>
    Inappropriate implementation in PictureInPicture in Google Chrome prior to 145.0.7632.45 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-20"/>
	<updated date="2026-02-20"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-2318/">CVE-2026-2318 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2318">CVE-2026-2318 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258116">SUSE bug 1258116</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044385" comment="chromedriver-145.0.7632.75-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044386" comment="chromium-145.0.7632.75-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623182" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23182</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23182" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23182" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23182" ref_url="https://www.suse.com/security/cve/CVE-2026-23182" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

spi: tegra: Fix a memory leak in tegra_slink_probe()

In tegra_slink_probe(), when platform_get_irq() fails, it directly
returns from the function with an error code, which causes a memory leak.

Replace it with a goto label to ensure proper cleanup.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23182/">CVE-2026-23182 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23182">CVE-2026-23182 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258259">SUSE bug 1258259</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623188" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23188</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23188" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23188" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23188" ref_url="https://www.suse.com/security/cve/CVE-2026-23188" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

net: usb: r8152: fix resume reset deadlock

rtl8152 can trigger device reset during reset which
potentially can result in a deadlock:

 **** DPM device timeout after 10 seconds; 15 seconds until panic ****
 Call Trace:
 &lt;TASK&gt;
 schedule+0x483/0x1370
 schedule_preempt_disabled+0x15/0x30
 __mutex_lock_common+0x1fd/0x470
 __rtl8152_set_mac_address+0x80/0x1f0
 dev_set_mac_address+0x7f/0x150
 rtl8152_post_reset+0x72/0x150
 usb_reset_device+0x1d0/0x220
 rtl8152_resume+0x99/0xc0
 usb_resume_interface+0x3e/0xc0
 usb_resume_both+0x104/0x150
 usb_resume+0x22/0x110

The problem is that rtl8152 resume calls reset under
tp-&gt;control mutex while reset basically re-enters rtl8152
and attempts to acquire the same tp-&gt;control lock once
again.

Reset INACCESSIBLE device outside of tp-&gt;control mutex
scope to avoid recursive mutex_lock() deadlock.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23188/">CVE-2026-23188 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23188">CVE-2026-23188 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258331">SUSE bug 1258331</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623189" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23189</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23189" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23189" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23189" ref_url="https://www.suse.com/security/cve/CVE-2026-23189" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ceph: fix NULL pointer dereference in ceph_mds_auth_match()

The CephFS kernel client has regression starting from 6.18-rc1.
We have issue in ceph_mds_auth_match() if fs_name == NULL:

    const char fs_name = mdsc-&gt;fsc-&gt;mount_options-&gt;mds_namespace;
    ...
    if (auth-&gt;match.fs_name &amp;&amp; strcmp(auth-&gt;match.fs_name, fs_name)) {
            / fsname mismatch, try next one */
            return 0;
    }

Patrick Donnelly suggested that: In summary, we should definitely start
decoding `fs_name` from the MDSMap and do strict authorizations checks
against it. Note that the `-o mds_namespace=foo` should only be used for
selecting the file system to mount and nothing else. It's possible
no mds_namespace is specified but the kernel will mount the only
file system that exists which may have name "foo".

This patch reworks ceph_mdsmap_decode() and namespace_equals() with
the goal of supporting the suggested concept. Now struct ceph_mdsmap
contains m_fs_name field that receives copy of extracted FS name
by ceph_extract_encoded_string(). For the case of "old" CephFS file
systems, it is used "cephfs" name.

[ idryomov: replace redundant %*pE with %s in ceph_mdsmap_decode(),
  get rid of a series of strlen() calls in ceph_namespace_match(),
  drop changes to namespace_equals() body to avoid treating empty
  mds_namespace as equal, drop changes to ceph_mdsc_handle_fsmap()
  as namespace_equals() isn't an equivalent substitution there ]
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23189/">CVE-2026-23189 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23189">CVE-2026-23189 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258308">SUSE bug 1258308</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262319" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2319</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2319" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2319" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2319" ref_url="https://www.suse.com/security/cve/CVE-2026-2319" source="SUSE CVE"/>
    <description>
    Race in DevTools in Google Chrome prior to 145.0.7632.45 allowed a remote attacker who convinced a user to engage in specific UI gestures and install a malicious extension to potentially exploit object corruption via a malicious file. (Chromium security severity: Medium)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-20"/>
	<updated date="2026-02-20"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-2319/">CVE-2026-2319 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2319">CVE-2026-2319 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258116">SUSE bug 1258116</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044385" comment="chromedriver-145.0.7632.75-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044386" comment="chromium-145.0.7632.75-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623190" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23190</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23190" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23190" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23190" ref_url="https://www.suse.com/security/cve/CVE-2026-23190" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ASoC: amd: fix memory leak in acp3x pdm dma ops
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23190/">CVE-2026-23190 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23190">CVE-2026-23190 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258397">SUSE bug 1258397</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623191" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23191</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23191" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23191" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23191" ref_url="https://www.suse.com/security/cve/CVE-2026-23191" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:6153" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0928-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024762.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0961-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024805.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1130-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025020.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1131-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: aloop: Fix racy access at PCM trigger

The PCM trigger callback of aloop driver tries to check the PCM state
and stop the stream of the tied substream in the corresponding cable.
Since both check and stop operations are performed outside the cable
lock, this may result in UAF when a program attempts to trigger
frequently while opening/closing the tied stream, as spotted by
fuzzers.

For addressing the UAF, this patch changes two things:
- It covers the most of code in loopback_check_format() with
  cable-&gt;lock spinlock, and add the proper NULL checks.  This avoids
  already some racy accesses.
- In addition, now we try to check the state of the capture PCM stream
  that may be stopped in this function, which was the major pain point
  leading to UAF.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23191/">CVE-2026-23191 at SUSE</cve>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23191">CVE-2026-23191 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258395">SUSE bug 1258395</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258396">SUSE bug 1258396</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623198" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23198</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23198" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23198" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23198" ref_url="https://www.suse.com/security/cve/CVE-2026-23198" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

KVM: Don't clobber irqfd routing type when deassigning irqfd

When deassigning a KVM_IRQFD, don't clobber the irqfd's copy of the IRQ's
routing entry as doing so breaks kvm_arch_irq_bypass_del_producer() on x86
and arm64, which explicitly look for KVM_IRQ_ROUTING_MSI.  Instead, to
handle a concurrent routing update, verify that the irqfd is still active
before consuming the routing information.  As evidenced by the x86 and
arm64 bugs, and another bug in kvm_arch_update_irqfd_routing() (see below),
clobbering the entry type without notifying arch code is surprising and
error prone.

As a bonus, checking that the irqfd is active provides a convenient
location for documenting _why_ KVM must not consume the routing entry for
an irqfd that is in the process of being deassigned: once the irqfd is
deleted from the list (which happens *before* the eventfd is detached), it
will no longer receive updates via kvm_irq_routing_update(), and so KVM
could deliver an event using stale routing information (relative to
KVM_SET_GSI_ROUTING returning to userspace).

As an even better bonus, explicitly checking for the irqfd being active
fixes a similar bug to the one the clobbering is trying to prevent: if an
irqfd is deactivated, and then its routing is changed,
kvm_irq_routing_update() won't invoke kvm_arch_update_irqfd_routing()
(because the irqfd isn't in the list).  And so if the irqfd is in bypass
mode, IRQs will continue to be posted using the old routing information.

As for kvm_arch_irq_bypass_del_producer(), clobbering the routing type
results in KVM incorrectly keeping the IRQ in bypass mode, which is
especially problematic on AMD as KVM tracks IRQs that are being posted to
a vCPU in a list whose lifetime is tied to the irqfd.

Without the help of KASAN to detect use-after-free, the most common
sympton on AMD is a NULL pointer deref in amd_iommu_update_ga() due to
the memory for irqfd structure being re-allocated and zeroed, resulting
in irqfd-&gt;irq_bypass_data being NULL when read by
avic_update_iommu_vcpu_affinity():

  BUG: kernel NULL pointer dereference, address: 0000000000000018
  #PF: supervisor read access in kernel mode
  #PF: error_code(0x0000) - not-present page
  PGD 40cf2b9067 P4D 40cf2b9067 PUD 408362a067 PMD 0
  Oops: Oops: 0000 [#1] SMP
  CPU: 6 UID: 0 PID: 40383 Comm: vfio_irq_test
  Tainted: G     U  W  O        6.19.0-smp--5dddc257e6b2-irqfd #31 NONE
  Tainted: [U]=USER, [W]=WARN, [O]=OOT_MODULE
  Hardware name: Google, Inc. Arcadia_IT_80/Arcadia_IT_80, BIOS 34.78.2-0 09/05/2025
  RIP: 0010:amd_iommu_update_ga+0x19/0xe0
  Call Trace:
   &lt;TASK&gt;
   avic_update_iommu_vcpu_affinity+0x3d/0x90 [kvm_amd]
   __avic_vcpu_load+0xf4/0x130 [kvm_amd]
   kvm_arch_vcpu_load+0x89/0x210 [kvm]
   vcpu_load+0x30/0x40 [kvm]
   kvm_arch_vcpu_ioctl_run+0x45/0x620 [kvm]
   kvm_vcpu_ioctl+0x571/0x6a0 [kvm]
   __se_sys_ioctl+0x6d/0xb0
   do_syscall_64+0x6f/0x9d0
   entry_SYSCALL_64_after_hwframe+0x4b/0x53
  RIP: 0033:0x46893b
    &lt;/TASK&gt;
  ---[ end trace 0000000000000000 ]---

If AVIC is inhibited when the irfd is deassigned, the bug will manifest as
list corruption, e.g. on the next irqfd assignment.

  list_add corruption. next-&gt;prev should be prev (ffff8d474d5cd588),
                       but was 0000000000000000. (next=ffff8d8658f86530).
  ------------[ cut here ]------------
  kernel BUG at lib/list_debug.c:31!
  Oops: invalid opcode: 0000 [#1] SMP
  CPU: 128 UID: 0 PID: 80818 Comm: vfio_irq_test
  Tainted: G     U  W  O        6.19.0-smp--f19dc4d680ba-irqfd #28 NONE
  Tainted: [U]=USER, [W]=WARN, [O]=OOT_MODULE
  Hardware name: Google, Inc. Arcadia_IT_80/Arcadia_IT_80, BIOS 34.78.2-0 09/05/2025
  RIP: 0010:__list_add_valid_or_report+0x97/0xc0
  Call Trace:
   &lt;TASK&gt;
   avic_pi_update_irte+0x28e/0x2b0 [kvm_amd]
   kvm_pi_update_irte+0xbf/0x190 [kvm]
   kvm_arch_irq_bypass_add_producer+0x72/0x90 [kvm]
   irq_bypass_register_consumer+0xcd/0x170 [irqbypa
---truncated---
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23198/">CVE-2026-23198 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23198">CVE-2026-23198 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258321">SUSE bug 1258321</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262320" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2320</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2320" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2320" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2320" ref_url="https://www.suse.com/security/cve/CVE-2026-2320" source="SUSE CVE"/>
    <description>
    Inappropriate implementation in File input in Google Chrome prior to 145.0.7632.45 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-20"/>
	<updated date="2026-02-20"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-2320/">CVE-2026-2320 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2320">CVE-2026-2320 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258116">SUSE bug 1258116</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044385" comment="chromedriver-145.0.7632.75-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044386" comment="chromium-145.0.7632.75-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623202" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23202</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23202" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23202" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23202" ref_url="https://www.suse.com/security/cve/CVE-2026-23202" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

spi: tegra210-quad: Protect curr_xfer in tegra_qspi_combined_seq_xfer

The curr_xfer field is read by the IRQ handler without holding the lock
to check if a transfer is in progress. When clearing curr_xfer in the
combined sequence transfer loop, protect it with the spinlock to prevent
a race with the interrupt handler.

Protect the curr_xfer clearing at the exit path of
tegra_qspi_combined_seq_xfer() with the spinlock to prevent a race
with the interrupt handler that reads this field.

Without this protection, the IRQ handler could read a partially updated
curr_xfer value, leading to NULL pointer dereference or use-after-free.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23202/">CVE-2026-23202 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23202">CVE-2026-23202 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258338">SUSE bug 1258338</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1261033">SUSE bug 1261033</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623207" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23207</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23207" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23207" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23207" ref_url="https://www.suse.com/security/cve/CVE-2026-23207" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

spi: tegra210-quad: Protect curr_xfer check in IRQ handler

Now that all other accesses to curr_xfer are done under the lock,
protect the curr_xfer NULL check in tegra_qspi_isr_thread() with the
spinlock. Without this protection, the following race can occur:

  CPU0 (ISR thread)              CPU1 (timeout path)
  ----------------               -------------------
  if (!tqspi-&gt;curr_xfer)
    // sees non-NULL
                                 spin_lock()
                                 tqspi-&gt;curr_xfer = NULL
                                 spin_unlock()
  handle_*_xfer()
    spin_lock()
    t = tqspi-&gt;curr_xfer  // NULL!
    ... t-&gt;len ...        // NULL dereference!

With this patch, all curr_xfer accesses are now properly synchronized.

Although all accesses to curr_xfer are done under the lock, in
tegra_qspi_isr_thread() it checks for NULL, releases the lock and
reacquires it later in handle_cpu_based_xfer()/handle_dma_based_xfer().
There is a potential for an update in between, which could cause a NULL
pointer dereference.

To handle this, add a NULL check inside the handlers after acquiring
the lock. This ensures that if the timeout path has already cleared
curr_xfer, the handler will safely return without dereferencing the
NULL pointer.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23207/">CVE-2026-23207 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23207">CVE-2026-23207 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258524">SUSE bug 1258524</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623208" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23208</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23208" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23208" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23208" ref_url="https://www.suse.com/security/cve/CVE-2026-23208" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ALSA: usb-audio: Prevent excessive number of frames

In this case, the user constructed the parameters with maxpacksize 40
for rate 22050 / pps 1000, and packsize[0] 22 packsize[1] 23. The buffer
size for each data URB is maxpacksize * packets, which in this example
is 40 * 6 = 240; When the user performs a write operation to send audio
data into the ALSA PCM playback stream, the calculated number of frames
is packsize[0] * packets = 264, which exceeds the allocated URB buffer
size, triggering the out-of-bounds (OOB) issue reported by syzbot [1].

Added a check for the number of single data URB frames when calculating
the number of frames to prevent [1].

[1]
BUG: KASAN: slab-out-of-bounds in copy_to_urb+0x261/0x460 sound/usb/pcm.c:1487
Write of size 264 at addr ffff88804337e800 by task syz.0.17/5506
Call Trace:
 copy_to_urb+0x261/0x460 sound/usb/pcm.c:1487
 prepare_playback_urb+0x953/0x13d0 sound/usb/pcm.c:1611
 prepare_outbound_urb+0x377/0xc50 sound/usb/endpoint.c:333
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2026-23208/">CVE-2026-23208 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23208">CVE-2026-23208 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258468">SUSE bug 1258468</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23209</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23209" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23209" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23209" ref_url="https://www.suse.com/security/cve/CVE-2026-23209" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:6037" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002632.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6153" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003248.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0984-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024841.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1003-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1077-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024956.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1078-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024954.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1131-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045154.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1180-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045276.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1185-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045275.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1187-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045273.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1188-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1189-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1212-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045322.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1221-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045330.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1222-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045333.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1225-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1231-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045356.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1236-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045362.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1237-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1239-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1242-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1244-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1248-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1254-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1258-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045428.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1259-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045427.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1261-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045426.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1262-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045425.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1263-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045424.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1265-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045423.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1266-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045422.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1268-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045421.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1269-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045419.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1270-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045418.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1271-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045417.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1272-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045416.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1274-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045415.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1278-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045414.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1279-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045413.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1280-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045412.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1281-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045411.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1283-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045410.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1284-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045409.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1285-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045377.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1287-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045430.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1288-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045429.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1293-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1294-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025308.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1297-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045431.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1298-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045501.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21004-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045402.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21005-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21006-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21007-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045399.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21008-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21009-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045397.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21020-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025300.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025299.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025298.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21043-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21044-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025296.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21045-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21046-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025294.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21047-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21048-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025292.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21049-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21050-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21051-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045473.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21052-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045472.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21053-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045471.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21054-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045470.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21055-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045469.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21056-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045468.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21057-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045467.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21058-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045466.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21059-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045465.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21060-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045464.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21061-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045463.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21070-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21071-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21072-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21073-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045451.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21074-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045450.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21075-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045449.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21076-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045448.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21077-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045447.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21078-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045446.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21079-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045445.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21080-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045444.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21081-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045443.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21082-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045442.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21083-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045441.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21084-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045440.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21085-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045439.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21086-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21087-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045437.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21088-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045436.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21089-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21090-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045434.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21091-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045433.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

macvlan: fix error recovery in macvlan_common_newlink()

valis provided a nice repro to crash the kernel:

ip link add p1 type veth peer p2
ip link set address 00:00:00:00:00:20 dev p1
ip link set up dev p1
ip link set up dev p2

ip link add mv0 link p2 type macvlan mode source
ip link add invalid% link p2 type macvlan mode source macaddr add 00:00:00:00:00:20

ping -c1 -I p1 1.2.3.4

He also gave a very detailed analysis:

&lt;quote valis&gt;

The issue is triggered when a new macvlan link is created  with
MACVLAN_MODE_SOURCE mode and MACVLAN_MACADDR_ADD (or
MACVLAN_MACADDR_SET) parameter, lower device already has a macvlan
port and register_netdevice() called from macvlan_common_newlink()
fails (e.g. because of the invalid link name).

In this case macvlan_hash_add_source is called from
macvlan_change_sources() / macvlan_common_newlink():

This adds a reference to vlan to the port's vlan_source_hash using
macvlan_source_entry.

vlan is a pointer to the priv data of the link that is being created.

When register_netdevice() fails, the error is returned from
macvlan_newlink() to rtnl_newlink_create():

        if (ops-&gt;newlink)
                err = ops-&gt;newlink(dev, &amp;params, extack);
        else
                err = register_netdevice(dev);
        if (err &lt; 0) {
                free_netdev(dev);
                goto out;
        }

and free_netdev() is called, causing a kvfree() on the struct
net_device that is still referenced in the source entry attached to
the lower device's macvlan port.

Now all packets sent on the macvlan port with a matching source mac
address will trigger a use-after-free in macvlan_forward_source().

&lt;/quote valis&gt;

With all that, my fix is to make sure we call macvlan_flush_sources()
regardless of @create value whenever "goto destroy_macvlan_port;"
path is taken.

Many thanks to valis for following up on this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23209/">CVE-2026-23209 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23209">CVE-2026-23209 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258518">SUSE bug 1258518</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258784">SUSE bug 1258784</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262321" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2321</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2321" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2321" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2321" ref_url="https://www.suse.com/security/cve/CVE-2026-2321" source="SUSE CVE"/>
    <description>
    Use after free in Ozone in Google Chrome prior to 145.0.7632.45 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-20"/>
	<updated date="2026-02-20"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-2321/">CVE-2026-2321 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2321">CVE-2026-2321 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258116">SUSE bug 1258116</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044385" comment="chromedriver-145.0.7632.75-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044386" comment="chromium-145.0.7632.75-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23210</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23210" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23210" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23210" ref_url="https://www.suse.com/security/cve/CVE-2026-23210" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:6570" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003272.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

ice: Fix PTP NULL pointer dereference during VSI rebuild

Fix race condition where PTP periodic work runs while VSI is being
rebuilt, accessing NULL vsi-&gt;rx_rings.

The sequence was:
1. ice_ptp_prepare_for_reset() cancels PTP work
2. ice_ptp_rebuild() immediately queues PTP work
3. VSI rebuild happens AFTER ice_ptp_rebuild()
4. PTP work runs and accesses NULL vsi-&gt;rx_rings

Fix: Keep PTP work cancelled during rebuild, only queue it after
VSI rebuild completes in ice_rebuild().

Added ice_ptp_queue_work() helper function to encapsulate the logic
for queuing PTP work, ensuring it's only queued when PTP is supported
and the state is ICE_PTP_READY.

Error log:
[  121.392544] ice 0000:60:00.1: PTP reset successful
[  121.392692] BUG: kernel NULL pointer dereference, address: 0000000000000000
[  121.392712] #PF: supervisor read access in kernel mode
[  121.392720] #PF: error_code(0x0000) - not-present page
[  121.392727] PGD 0
[  121.392734] Oops: Oops: 0000 [#1] SMP NOPTI
[  121.392746] CPU: 8 UID: 0 PID: 1005 Comm: ice-ptp-0000:60 Tainted: G S                  6.19.0-rc6+ #4 PREEMPT(voluntary)
[  121.392761] Tainted: [S]=CPU_OUT_OF_SPEC
[  121.392773] RIP: 0010:ice_ptp_update_cached_phctime+0xbf/0x150 [ice]
[  121.393042] Call Trace:
[  121.393047]  &lt;TASK&gt;
[  121.393055]  ice_ptp_periodic_work+0x69/0x180 [ice]
[  121.393202]  kthread_worker_fn+0xa2/0x260
[  121.393216]  ? __pfx_ice_ptp_periodic_work+0x10/0x10 [ice]
[  121.393359]  ? __pfx_kthread_worker_fn+0x10/0x10
[  121.393371]  kthread+0x10d/0x230
[  121.393382]  ? __pfx_kthread+0x10/0x10
[  121.393393]  ret_from_fork+0x273/0x2b0
[  121.393407]  ? __pfx_kthread+0x10/0x10
[  121.393417]  ret_from_fork_asm+0x1a/0x30
[  121.393432]  &lt;/TASK&gt;
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="5.7/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23210/">CVE-2026-23210 at SUSE</cve>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23210">CVE-2026-23210 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258517">SUSE bug 1258517</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623213" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23213</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23213" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23213" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23213" ref_url="https://www.suse.com/security/cve/CVE-2026-23213" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

drm/amd/pm: Disable MMIO access during SMU Mode 1 reset

During Mode 1 reset, the ASIC undergoes a reset cycle and becomes
temporarily inaccessible via PCIe. Any attempt to access MMIO registers
during this window (e.g., from interrupt handlers or other driver threads)
can result in uncompleted PCIe transactions, leading to NMI panics or
system hangs.

To prevent this, set the `no_hw_access` flag to true immediately after
triggering the reset. This signals other driver components to skip
register accesses while the device is offline.

A memory barrier `smp_mb()` is added to ensure the flag update is
globally visible to all cores before the driver enters the sleep/wait
state.

(cherry picked from commit 7edb503fe4b6d67f47d8bb0dfafb8e699bb0f8a4)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23213/">CVE-2026-23213 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23213">CVE-2026-23213 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258465">SUSE bug 1258465</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623214" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23214</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23214" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23214" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23214" ref_url="https://www.suse.com/security/cve/CVE-2026-23214" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1041-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024928.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

btrfs: reject new transactions if the fs is fully read-only

[BUG]
There is a bug report where a heavily fuzzed fs is mounted with all
rescue mount options, which leads to the following warnings during
unmount:

  BTRFS: Transaction aborted (error -22)
  Modules linked in:
  CPU: 0 UID: 0 PID: 9758 Comm: repro.out Not tainted
  6.19.0-rc5-00002-gb71e635feefc #7 PREEMPT(full)
  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014
  RIP: 0010:find_free_extent_update_loop fs/btrfs/extent-tree.c:4208 [inline]
  RIP: 0010:find_free_extent+0x52f0/0x5d20 fs/btrfs/extent-tree.c:4611
  Call Trace:
   &lt;TASK&gt;
   btrfs_reserve_extent+0x2cd/0x790 fs/btrfs/extent-tree.c:4705
   btrfs_alloc_tree_block+0x1e1/0x10e0 fs/btrfs/extent-tree.c:5157
   btrfs_force_cow_block+0x578/0x2410 fs/btrfs/ctree.c:517
   btrfs_cow_block+0x3c4/0xa80 fs/btrfs/ctree.c:708
   btrfs_search_slot+0xcad/0x2b50 fs/btrfs/ctree.c:2130
   btrfs_truncate_inode_items+0x45d/0x2350 fs/btrfs/inode-item.c:499
   btrfs_evict_inode+0x923/0xe70 fs/btrfs/inode.c:5628
   evict+0x5f4/0xae0 fs/inode.c:837
   __dentry_kill+0x209/0x660 fs/dcache.c:670
   finish_dput+0xc9/0x480 fs/dcache.c:879
   shrink_dcache_for_umount+0xa0/0x170 fs/dcache.c:1661
   generic_shutdown_super+0x67/0x2c0 fs/super.c:621
   kill_anon_super+0x3b/0x70 fs/super.c:1289
   btrfs_kill_super+0x41/0x50 fs/btrfs/super.c:2127
   deactivate_locked_super+0xbc/0x130 fs/super.c:474
   cleanup_mnt+0x425/0x4c0 fs/namespace.c:1318
   task_work_run+0x1d4/0x260 kernel/task_work.c:233
   exit_task_work include/linux/task_work.h:40 [inline]
   do_exit+0x694/0x22f0 kernel/exit.c:971
   do_group_exit+0x21c/0x2d0 kernel/exit.c:1112
   __do_sys_exit_group kernel/exit.c:1123 [inline]
   __se_sys_exit_group kernel/exit.c:1121 [inline]
   __x64_sys_exit_group+0x3f/0x40 kernel/exit.c:1121
   x64_sys_call+0x2210/0x2210 arch/x86/include/generated/asm/syscalls_64.h:232
   do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
   do_syscall_64+0xe8/0xf80 arch/x86/entry/syscall_64.c:94
   entry_SYSCALL_64_after_hwframe+0x77/0x7f
  RIP: 0033:0x44f639
  Code: Unable to access opcode bytes at 0x44f60f.
  RSP: 002b:00007ffc15c4e088 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7
  RAX: ffffffffffffffda RBX: 00000000004c32f0 RCX: 000000000044f639
  RDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000001
  RBP: 0000000000000001 R08: ffffffffffffffc0 R09: 0000000000000000
  R10: 0000000000000000 R11: 0000000000000246 R12: 00000000004c32f0
  R13: 0000000000000001 R14: 0000000000000000 R15: 0000000000000001
   &lt;/TASK&gt;

Since rescue mount options will mark the full fs read-only, there should
be no new transaction triggered.

But during unmount we will evict all inodes, which can trigger a new
transaction, and triggers warnings on a heavily corrupted fs.

[CAUSE]
Btrfs allows new transaction even on a read-only fs, this is to allow
log replay happen even on read-only mounts, just like what ext4/xfs do.

However with rescue mount options, the fs is fully read-only and cannot
be remounted read-write, thus in that case we should also reject any new
transactions.

[FIX]
If we find the fs has rescue mount options, we should treat the fs as
error, so that no new transaction can be started.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="5.1/CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23214/">CVE-2026-23214 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23214">CVE-2026-23214 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258464">SUSE bug 1258464</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262322" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2322</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2322" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2322" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2322" ref_url="https://www.suse.com/security/cve/CVE-2026-2322" source="SUSE CVE"/>
    <description>
    Inappropriate implementation in File input in Google Chrome prior to 145.0.7632.45 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-20"/>
	<updated date="2026-02-20"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-2322/">CVE-2026-2322 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2322">CVE-2026-2322 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258116">SUSE bug 1258116</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044385" comment="chromedriver-145.0.7632.75-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044386" comment="chromium-145.0.7632.75-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623221" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23221</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23221" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23221" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23221" ref_url="https://www.suse.com/security/cve/CVE-2026-23221" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

bus: fsl-mc: fix use-after-free in driver_override_show()

The driver_override_show() function reads the driver_override string
without holding the device_lock. However, driver_override_store() uses
driver_set_override(), which modifies and frees the string while holding
the device_lock.

This can result in a concurrent use-after-free if the string is freed
by the store function while being read by the show function.

Fix this by holding the device_lock around the read operation.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://www.suse.com/security/cve/CVE-2026-23221/">CVE-2026-23221 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23221">CVE-2026-23221 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258660">SUSE bug 1258660</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623222" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23222</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23222" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23222" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23222" ref_url="https://www.suse.com/security/cve/CVE-2026-23222" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: omap - Allocate OMAP_CRYPTO_FORCE_COPY scatterlists correctly

The existing allocation of scatterlists in omap_crypto_copy_sg_lists()
was allocating an array of scatterlist pointers, not scatterlist objects,
resulting in a 4x too small allocation.

Use sizeof(*new_sg) to get the correct object size.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23222/">CVE-2026-23222 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23222">CVE-2026-23222 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258484">SUSE bug 1258484</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623223" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23223</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23223" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23223" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23223" ref_url="https://www.suse.com/security/cve/CVE-2026-23223" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

xfs: fix UAF in xchk_btree_check_block_owner

We cannot dereference bs-&gt;cur when trying to determine if bs-&gt;cur
aliases bs-&gt;sc-&gt;sa.{bno,rmap}_cur after the latter has been freed.
Fix this by sampling before type before any freeing could happen.
The correct temporal ordering was broken when we removed xfs_btnum_t.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23223/">CVE-2026-23223 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23223">CVE-2026-23223 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258483">SUSE bug 1258483</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623224" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23224</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23224" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23224" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23224" ref_url="https://www.suse.com/security/cve/CVE-2026-23224" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

erofs: fix UAF issue for file-backed mounts w/ directio option

[    9.269940][ T3222] Call trace:
[    9.269948][ T3222]  ext4_file_read_iter+0xac/0x108
[    9.269979][ T3222]  vfs_iocb_iter_read+0xac/0x198
[    9.269993][ T3222]  erofs_fileio_rq_submit+0x12c/0x180
[    9.270008][ T3222]  erofs_fileio_submit_bio+0x14/0x24
[    9.270030][ T3222]  z_erofs_runqueue+0x834/0x8ac
[    9.270054][ T3222]  z_erofs_read_folio+0x120/0x220
[    9.270083][ T3222]  filemap_read_folio+0x60/0x120
[    9.270102][ T3222]  filemap_fault+0xcac/0x1060
[    9.270119][ T3222]  do_pte_missing+0x2d8/0x1554
[    9.270131][ T3222]  handle_mm_fault+0x5ec/0x70c
[    9.270142][ T3222]  do_page_fault+0x178/0x88c
[    9.270167][ T3222]  do_translation_fault+0x38/0x54
[    9.270183][ T3222]  do_mem_abort+0x54/0xac
[    9.270208][ T3222]  el0_da+0x44/0x7c
[    9.270227][ T3222]  el0t_64_sync_handler+0x5c/0xf4
[    9.270253][ T3222]  el0t_64_sync+0x1bc/0x1c0

EROFS may encounter above panic when enabling file-backed mount w/
directio mount option, the root cause is it may suffer UAF in below
race condition:

- z_erofs_read_folio                          wq s_dio_done_wq
 - z_erofs_runqueue
  - erofs_fileio_submit_bio
   - erofs_fileio_rq_submit
    - vfs_iocb_iter_read
     - ext4_file_read_iter
      - ext4_dio_read_iter
       - iomap_dio_rw
       : bio was submitted and return -EIOCBQUEUED
                                              - dio_aio_complete_work
                                               - dio_complete
                                                - dio-&gt;iocb-&gt;ki_complete (erofs_fileio_ki_complete())
                                                 - kfree(rq)
                                                 : it frees iocb, iocb.ki_filp can be UAF in file_accessed().
       - file_accessed
       : access NULL file point

Introduce a reference count in struct erofs_fileio_rq, and initialize it
as two, both erofs_fileio_ki_complete() and erofs_fileio_rq_submit() will
decrease reference count, the last one decreasing the reference count
to zero will free rq.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23224/">CVE-2026-23224 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23224">CVE-2026-23224 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258461">SUSE bug 1258461</bugzilla>
	<bugzilla href="https://bugzilla.suse.com/1258463">SUSE bug 1258463</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623229" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23229</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23229" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23229" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23229" ref_url="https://www.suse.com/security/cve/CVE-2026-23229" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0962-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024803.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1081-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024953.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20667-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024746.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20711-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024715.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20713-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024771.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20720-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024766.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20772-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024862.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20794-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024871.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20845-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024969.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025054.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

crypto: virtio - Add spinlock protection with virtqueue notification

When VM boots with one virtio-crypto PCI device and builtin backend,
run openssl benchmark command with multiple processes, such as
  openssl speed -evp aes-128-cbc -engine afalg  -seconds 10 -multi 32

openssl processes will hangup and there is error reported like this:
 virtio_crypto virtio0: dataq.0:id 3 is not a head!

It seems that the data virtqueue need protection when it is handled
for virtio done notification. If the spinlock protection is added
in virtcrypto_done_task(), openssl benchmark with multiple processes
works well.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23229/">CVE-2026-23229 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23229">CVE-2026-23229 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258429">SUSE bug 1258429</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262323" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2323</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2323" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2323" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2323" ref_url="https://www.suse.com/security/cve/CVE-2026-2323" source="SUSE CVE"/>
    <description>
    Inappropriate implementation in Downloads in Google Chrome prior to 145.0.7632.45 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-20"/>
	<updated date="2026-02-20"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-2323/">CVE-2026-2323 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2323">CVE-2026-2323 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258116">SUSE bug 1258116</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044385" comment="chromedriver-145.0.7632.75-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044386" comment="chromium-145.0.7632.75-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623230" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23230</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23230" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23230" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23230" ref_url="https://www.suse.com/security/cve/CVE-2026-23230" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20838-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20873-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024968.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20931-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045221.html" source="SUSE-SU"/>
    <description>
    In the Linux kernel, the following vulnerability has been resolved:

smb: client: split cached_fid bitfields to avoid shared-byte RMW races

is_open, has_lease and on_list are stored in the same bitfield byte in
struct cached_fid but are updated in different code paths that may run
concurrently. Bitfield assignments generate byte read-modify-write
operations (e.g. `orb $mask, addr` on x86_64), so updating one flag can
restore stale values of the others.

A possible interleaving is:
    CPU1: load old byte (has_lease=1, on_list=1)
    CPU2: clear both flags (store 0)
    CPU1: RMW store (old | IS_OPEN) -&gt; reintroduces cleared bits

To avoid this class of races, convert these flags to separate bool
fields.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.8/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H" cvss4="5.8/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23230/">CVE-2026-23230 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23230">CVE-2026-23230 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258430">SUSE bug 1258430</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051803" comment="cluster-md-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623416" comment="cluster-md-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051804" comment="cluster-md-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623277" comment="cluster-md-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051805" comment="cluster-md-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623278" comment="cluster-md-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051806" comment="cluster-md-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342853" comment="cluster-md-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051807" comment="dlm-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623418" comment="dlm-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051808" comment="dlm-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623279" comment="dlm-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051809" comment="dlm-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623280" comment="dlm-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051810" comment="dlm-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342855" comment="dlm-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051811" comment="dtb-allwinner-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630924" comment="dtb-allwinner is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051812" comment="dtb-altera-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630925" comment="dtb-altera is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051813" comment="dtb-amazon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701757" comment="dtb-amazon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051814" comment="dtb-amd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630926" comment="dtb-amd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051815" comment="dtb-amlogic-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630927" comment="dtb-amlogic is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051816" comment="dtb-apm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630928" comment="dtb-apm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051817" comment="dtb-apple-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009701758" comment="dtb-apple is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051818" comment="dtb-arm-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630929" comment="dtb-arm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051819" comment="dtb-broadcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630930" comment="dtb-broadcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051820" comment="dtb-cavium-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630931" comment="dtb-cavium is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051821" comment="dtb-exynos-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630932" comment="dtb-exynos is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051822" comment="dtb-freescale-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630933" comment="dtb-freescale is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051823" comment="dtb-hisilicon-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630934" comment="dtb-hisilicon is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051824" comment="dtb-lg-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630935" comment="dtb-lg is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051825" comment="dtb-marvell-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630936" comment="dtb-marvell is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051826" comment="dtb-mediatek-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630937" comment="dtb-mediatek is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051827" comment="dtb-nvidia-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630938" comment="dtb-nvidia is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051828" comment="dtb-qcom-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630939" comment="dtb-qcom is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051829" comment="dtb-renesas-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630940" comment="dtb-renesas is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051830" comment="dtb-rockchip-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630941" comment="dtb-rockchip is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051831" comment="dtb-socionext-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630942" comment="dtb-socionext is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051832" comment="dtb-sprd-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630943" comment="dtb-sprd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051833" comment="dtb-xilinx-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630944" comment="dtb-xilinx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051834" comment="gfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623420" comment="gfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051835" comment="gfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623281" comment="gfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051836" comment="gfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623282" comment="gfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051837" comment="gfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342857" comment="gfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051838" comment="kernel-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623422" comment="kernel-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051839" comment="kernel-64kb-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623424" comment="kernel-64kb-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051840" comment="kernel-64kb-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623426" comment="kernel-64kb-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051841" comment="kernel-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623283" comment="kernel-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051842" comment="kernel-azure-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623286" comment="kernel-azure-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051843" comment="kernel-azure-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623427" comment="kernel-azure-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051844" comment="kernel-azure-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009769740" comment="kernel-azure-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051845" comment="kernel-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151354" comment="kernel-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051846" comment="kernel-default-base-6.12.0-160000.27.1.160000.2.8 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151960" comment="kernel-default-base is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051847" comment="kernel-default-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623289" comment="kernel-default-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051848" comment="kernel-default-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623428" comment="kernel-default-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051849" comment="kernel-default-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772193" comment="kernel-default-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051850" comment="kernel-docs-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151357" comment="kernel-docs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051851" comment="kernel-docs-html-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151961" comment="kernel-docs-html is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051852" comment="kernel-kvmsmall-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177719" comment="kernel-kvmsmall is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051853" comment="kernel-kvmsmall-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009772194" comment="kernel-kvmsmall-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051854" comment="kernel-macros-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151358" comment="kernel-macros is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051855" comment="kernel-obs-build-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151966" comment="kernel-obs-build is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051856" comment="kernel-obs-qa-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151967" comment="kernel-obs-qa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051857" comment="kernel-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342860" comment="kernel-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051858" comment="kernel-rt-extra-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342862" comment="kernel-rt-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051859" comment="kernel-rt-optional-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771784" comment="kernel-rt-optional is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051860" comment="kernel-rt-vdso-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009771785" comment="kernel-rt-vdso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051861" comment="kernel-source-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151360" comment="kernel-source is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051862" comment="kernel-source-vanilla-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151974" comment="kernel-source-vanilla is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051863" comment="kernel-syms-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151361" comment="kernel-syms is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051864" comment="kernel-zfcpdump-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623303" comment="kernel-zfcpdump is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051865" comment="kselftests-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623436" comment="kselftests-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051866" comment="kselftests-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623305" comment="kselftests-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051867" comment="kselftests-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009168714" comment="kselftests-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051868" comment="kselftests-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342868" comment="kselftests-kmp-rt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051869" comment="ocfs2-kmp-64kb-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623438" comment="ocfs2-kmp-64kb is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051870" comment="ocfs2-kmp-azure-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623306" comment="ocfs2-kmp-azure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051871" comment="ocfs2-kmp-default-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009623307" comment="ocfs2-kmp-default is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051872" comment="ocfs2-kmp-rt-6.12.0-160000.27.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009342870" comment="ocfs2-kmp-rt is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623490" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23490</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23490" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23490" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23490" ref_url="https://www.suse.com/security/cve/CVE-2026-23490" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1903" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003192.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1904" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002484.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:1906" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002485.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3359" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003255.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4141" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002592.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4146" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002558.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4148" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002610.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0252-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023896.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0300-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023925.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0430-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024118.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20133-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-January/043738.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20158-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023944.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20447-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024435.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20482-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024488.html" source="SUSE-SU"/>
    <description>
    pyasn1 is a generic ASN.1 library for Python. Prior to 0.6.2, a Denial-of-Service issue has been found that leads to memory exhaustion from malformed RELATIVE-OID with excessive continuation octets. This vulnerability is fixed in 0.6.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-25"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-23490/">CVE-2026-23490 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23490">CVE-2026-23490 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256902">SUSE bug 1256902</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039708" comment="python313-pyasn1-0.6.1-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039779" comment="python313-pyasn1 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623530" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23530</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23530" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23530" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23530" ref_url="https://www.suse.com/security/cve/CVE-2026-23530" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2048" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003229.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2081" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002474.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3037" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0417-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024272.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.21.0,`freerdp_bitmap_decompress_planar` does not validate `nSrcWidth`/`nSrcHeight` against `planar-&gt;maxWidth`/`maxHeight` before RLE decode. A malicious server can trigger a client-side heap buffer overflow, causing a crash (DoS) and potential heap corruption with code-execution risk depending on allocator behavior and surrounding heap layout. Version 3.21.0 contains a patch for the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23530/">CVE-2026-23530 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23530">CVE-2026-23530 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256940">SUSE bug 1256940</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048376" comment="freerdp-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151908" comment="freerdp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048377" comment="freerdp-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151909" comment="freerdp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048378" comment="freerdp-proxy-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287971" comment="freerdp-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048379" comment="freerdp-proxy-plugins-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048429" comment="freerdp-proxy-plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048380" comment="freerdp-sdl-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048430" comment="freerdp-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048381" comment="freerdp-server-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245861" comment="freerdp-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048382" comment="freerdp-wayland-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245862" comment="freerdp-wayland is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047341" comment="freerdp2-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010047350" comment="freerdp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047342" comment="freerdp2-devel-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010047351" comment="freerdp2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047343" comment="freerdp2-proxy-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010047352" comment="freerdp2-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047344" comment="freerdp2-server-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010047353" comment="freerdp2-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048383" comment="libfreerdp-server-proxy3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048431" comment="libfreerdp-server-proxy3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047345" comment="libfreerdp2-2-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009877480" comment="libfreerdp2-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048384" comment="libfreerdp3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048432" comment="libfreerdp3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048385" comment="librdtk0-0-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048433" comment="librdtk0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048386" comment="libuwac0-0-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245863" comment="libuwac0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047346" comment="libwinpr2-2-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009877481" comment="libwinpr2-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048387" comment="libwinpr3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048434" comment="libwinpr3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048388" comment="rdtk0-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048435" comment="rdtk0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048389" comment="uwac0-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048436" comment="uwac0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048390" comment="winpr-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009877482" comment="winpr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047347" comment="winpr2-devel-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245865" comment="winpr2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623531" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23531</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23531" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23531" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23531" ref_url="https://www.suse.com/security/cve/CVE-2026-23531" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2048" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003229.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2081" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002474.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3037" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0417-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024272.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.21.0, in ClearCodec, when `glyphData` is present, `clear_decompress` calls `freerdp_image_copy_no_overlap` without validating the destination rectangle, allowing an out-of-bounds read/write via crafted RDPGFX surface updates. A malicious server can trigger a client-side heap buffer overflow, causing a crash (DoS) and potential heap corruption with code-execution risk depending on allocator behavior and surrounding heap layout. Version 3.21.0 contains a patch for the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23531/">CVE-2026-23531 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23531">CVE-2026-23531 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256941">SUSE bug 1256941</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048376" comment="freerdp-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151908" comment="freerdp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048377" comment="freerdp-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151909" comment="freerdp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048378" comment="freerdp-proxy-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287971" comment="freerdp-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048379" comment="freerdp-proxy-plugins-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048429" comment="freerdp-proxy-plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048380" comment="freerdp-sdl-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048430" comment="freerdp-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048381" comment="freerdp-server-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245861" comment="freerdp-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048382" comment="freerdp-wayland-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245862" comment="freerdp-wayland is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047341" comment="freerdp2-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010047350" comment="freerdp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047342" comment="freerdp2-devel-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010047351" comment="freerdp2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047343" comment="freerdp2-proxy-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010047352" comment="freerdp2-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047344" comment="freerdp2-server-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010047353" comment="freerdp2-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048383" comment="libfreerdp-server-proxy3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048431" comment="libfreerdp-server-proxy3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047345" comment="libfreerdp2-2-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009877480" comment="libfreerdp2-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048384" comment="libfreerdp3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048432" comment="libfreerdp3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048385" comment="librdtk0-0-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048433" comment="librdtk0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048386" comment="libuwac0-0-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245863" comment="libuwac0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047346" comment="libwinpr2-2-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009877481" comment="libwinpr2-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048387" comment="libwinpr3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048434" comment="libwinpr3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048388" comment="rdtk0-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048435" comment="rdtk0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048389" comment="uwac0-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048436" comment="uwac0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048390" comment="winpr-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009877482" comment="winpr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047347" comment="winpr2-devel-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245865" comment="winpr2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623532" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23532</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23532" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23532" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23532" ref_url="https://www.suse.com/security/cve/CVE-2026-23532" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2048" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003229.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2081" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002474.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3037" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0417-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024272.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.21.0, a client-side heap buffer overflow occurs in the  FreeRDP client's `gdi_SurfaceToSurface` path due to a mismatch between destination rectangle clamping and the actual copy size. A malicious server can trigger a client-side heap buffer overflow, causing a crash (DoS) and potential heap corruption with code-execution risk depending on allocator behavior and surrounding heap layout. Version 3.21.0 contains a patch for the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23532/">CVE-2026-23532 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23532">CVE-2026-23532 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256942">SUSE bug 1256942</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048376" comment="freerdp-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151908" comment="freerdp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048377" comment="freerdp-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151909" comment="freerdp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048378" comment="freerdp-proxy-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287971" comment="freerdp-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048379" comment="freerdp-proxy-plugins-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048429" comment="freerdp-proxy-plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048380" comment="freerdp-sdl-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048430" comment="freerdp-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048381" comment="freerdp-server-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245861" comment="freerdp-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048382" comment="freerdp-wayland-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245862" comment="freerdp-wayland is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047341" comment="freerdp2-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010047350" comment="freerdp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047342" comment="freerdp2-devel-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010047351" comment="freerdp2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047343" comment="freerdp2-proxy-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010047352" comment="freerdp2-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047344" comment="freerdp2-server-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010047353" comment="freerdp2-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048383" comment="libfreerdp-server-proxy3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048431" comment="libfreerdp-server-proxy3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047345" comment="libfreerdp2-2-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009877480" comment="libfreerdp2-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048384" comment="libfreerdp3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048432" comment="libfreerdp3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048385" comment="librdtk0-0-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048433" comment="librdtk0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048386" comment="libuwac0-0-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245863" comment="libuwac0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047346" comment="libwinpr2-2-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009877481" comment="libwinpr2-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048387" comment="libwinpr3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048434" comment="libwinpr3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048388" comment="rdtk0-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048435" comment="rdtk0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048389" comment="uwac0-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048436" comment="uwac0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048390" comment="winpr-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009877482" comment="winpr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047347" comment="winpr2-devel-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245865" comment="winpr2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623533" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23533</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23533" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23533" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23533" ref_url="https://www.suse.com/security/cve/CVE-2026-23533" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2048" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003229.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2081" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002474.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3037" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024554.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.21.0, a client-side heap buffer overflow occurs in the RDPGFX ClearCodec decode path when maliciously crafted residual data causes out-of-bounds writes during color output. A malicious server can trigger a client-side heap buffer overflow, causing a crash (DoS) and potential heap corruption with code-execution risk depending on allocator behavior and surrounding heap layout. Version 3.21.0 contains a patch for the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-13"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23533/">CVE-2026-23533 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23533">CVE-2026-23533 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256943">SUSE bug 1256943</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048376" comment="freerdp-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151908" comment="freerdp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048377" comment="freerdp-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151909" comment="freerdp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048378" comment="freerdp-proxy-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287971" comment="freerdp-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048379" comment="freerdp-proxy-plugins-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048429" comment="freerdp-proxy-plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048380" comment="freerdp-sdl-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048430" comment="freerdp-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048381" comment="freerdp-server-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245861" comment="freerdp-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048382" comment="freerdp-wayland-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245862" comment="freerdp-wayland is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048383" comment="libfreerdp-server-proxy3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048431" comment="libfreerdp-server-proxy3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048384" comment="libfreerdp3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048432" comment="libfreerdp3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048385" comment="librdtk0-0-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048433" comment="librdtk0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048386" comment="libuwac0-0-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245863" comment="libuwac0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048387" comment="libwinpr3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048434" comment="libwinpr3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048388" comment="rdtk0-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048435" comment="rdtk0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048389" comment="uwac0-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048436" comment="uwac0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048390" comment="winpr-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009877482" comment="winpr-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623534" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23534</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23534" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23534" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23534" ref_url="https://www.suse.com/security/cve/CVE-2026-23534" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2048" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003229.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2081" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002474.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3037" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0417-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024093.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0421-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024089.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0449-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024126.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0559-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024272.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.21.0, a client-side heap buffer overflow occurs in the ClearCodec bands decode path when crafted band coordinates allow writes past the end of the destination surface buffer. A malicious server can trigger a client-side heap buffer overflow, causing a crash (DoS) and potential heap corruption with code-execution risk depending on allocator behavior and surrounding heap layout. Version 3.21.0 contains a patch for the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23534/">CVE-2026-23534 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23534">CVE-2026-23534 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256944">SUSE bug 1256944</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048376" comment="freerdp-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151908" comment="freerdp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048377" comment="freerdp-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151909" comment="freerdp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048378" comment="freerdp-proxy-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287971" comment="freerdp-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048379" comment="freerdp-proxy-plugins-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048429" comment="freerdp-proxy-plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048380" comment="freerdp-sdl-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048430" comment="freerdp-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048381" comment="freerdp-server-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245861" comment="freerdp-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048382" comment="freerdp-wayland-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245862" comment="freerdp-wayland is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047341" comment="freerdp2-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010047350" comment="freerdp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047342" comment="freerdp2-devel-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010047351" comment="freerdp2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047343" comment="freerdp2-proxy-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010047352" comment="freerdp2-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047344" comment="freerdp2-server-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010047353" comment="freerdp2-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048383" comment="libfreerdp-server-proxy3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048431" comment="libfreerdp-server-proxy3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047345" comment="libfreerdp2-2-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009877480" comment="libfreerdp2-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048384" comment="libfreerdp3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048432" comment="libfreerdp3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048385" comment="librdtk0-0-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048433" comment="librdtk0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048386" comment="libuwac0-0-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245863" comment="libuwac0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047346" comment="libwinpr2-2-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009877481" comment="libwinpr2-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048387" comment="libwinpr3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048434" comment="libwinpr3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048388" comment="rdtk0-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048435" comment="rdtk0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048389" comment="uwac0-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048436" comment="uwac0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048390" comment="winpr-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009877482" comment="winpr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047347" comment="winpr2-devel-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245865" comment="winpr2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262369" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2369</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2369" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2369" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2369" ref_url="https://www.suse.com/security/cve/CVE-2026-2369" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20649-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025111.html" source="SUSE-SU"/>
    <description>
    A flaw was found in libsoup. An integer underflow vulnerability occurs when processing content with a zero-length resource, leading to a buffer overread. This can allow an attacker to potentially access sensitive information or cause an application level denial of service.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-14"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-2369/">CVE-2026-2369 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2369">CVE-2026-2369 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258120">SUSE bug 1258120</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048654" comment="libsoup-2_4-1-2.74.3-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151596" comment="libsoup-2_4-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050015" comment="libsoup-3_0-0-3.6.6-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698059" comment="libsoup-3_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050176" comment="libsoup-devel-3.6.6-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151597" comment="libsoup-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050177" comment="libsoup-lang-3.6.6-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151598" comment="libsoup-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048655" comment="libsoup2-devel-2.74.3-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009957647" comment="libsoup2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048656" comment="libsoup2-lang-2.74.3-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698060" comment="libsoup2-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048657" comment="typelib-1_0-Soup-2_4-2.74.3-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151599" comment="typelib-1_0-Soup-2_4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050178" comment="typelib-1_0-Soup-3_0-3.6.6-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698061" comment="typelib-1_0-Soup-3_0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623732" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23732</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23732" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23732" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23732" ref_url="https://www.suse.com/security/cve/CVE-2026-23732" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:6340" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003289.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6727" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002648.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6918" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024554.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.21.0, FastGlyph parsing trusts `cbData`/remaining length and never validates against the minimum size implied by `cx/cy`. A malicious server can trigger a client-side global buffer overflow, causing a crash (DoS). Version 3.21.0 contains a patch for the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-13"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23732/">CVE-2026-23732 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23732">CVE-2026-23732 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256945">SUSE bug 1256945</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048376" comment="freerdp-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151908" comment="freerdp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048377" comment="freerdp-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151909" comment="freerdp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048378" comment="freerdp-proxy-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287971" comment="freerdp-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048379" comment="freerdp-proxy-plugins-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048429" comment="freerdp-proxy-plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048380" comment="freerdp-sdl-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048430" comment="freerdp-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048381" comment="freerdp-server-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245861" comment="freerdp-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048382" comment="freerdp-wayland-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245862" comment="freerdp-wayland is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048383" comment="libfreerdp-server-proxy3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048431" comment="libfreerdp-server-proxy3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048384" comment="libfreerdp3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048432" comment="libfreerdp3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048385" comment="librdtk0-0-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048433" comment="librdtk0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048386" comment="libuwac0-0-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245863" comment="libuwac0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048387" comment="libwinpr3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048434" comment="libwinpr3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048388" comment="rdtk0-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048435" comment="rdtk0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048389" comment="uwac0-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048436" comment="uwac0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048390" comment="winpr-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009877482" comment="winpr-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623874" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23874</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23874" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23874" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23874" ref_url="https://www.suse.com/security/cve/CVE-2026-23874" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024242.html" source="SUSE-SU"/>
    <description>
    ImageMagick is free and open-source software used for editing and manipulating digital images. Versions prior to 7.1.2-13 have a stack overflow via infinite recursion in MSL (Magick Scripting Language) `&lt;write&gt;` command when writing to MSL format. Version 7.1.2-13 fixes the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-11"/>
	<updated date="2026-03-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23874/">CVE-2026-23874 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23874">CVE-2026-23874 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256976">SUSE bug 1256976</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047932" comment="ImageMagick-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047933" comment="ImageMagick-config-7-SUSE-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047934" comment="ImageMagick-config-7-upstream-limited-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977490" comment="ImageMagick-config-7-upstream-limited is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047935" comment="ImageMagick-config-7-upstream-open-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977491" comment="ImageMagick-config-7-upstream-open is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047936" comment="ImageMagick-config-7-upstream-secure-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977492" comment="ImageMagick-config-7-upstream-secure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047937" comment="ImageMagick-config-7-upstream-websafe-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977493" comment="ImageMagick-config-7-upstream-websafe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047938" comment="ImageMagick-devel-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047939" comment="ImageMagick-doc-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047940" comment="ImageMagick-extra-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047941" comment="libMagick++-7_Q16HDRI5-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698047" comment="libMagick++-7_Q16HDRI5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047942" comment="libMagick++-devel-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047943" comment="libMagickCore-7_Q16HDRI10-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698048" comment="libMagickCore-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047944" comment="libMagickWand-7_Q16HDRI10-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698049" comment="libMagickWand-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047945" comment="perl-PerlMagick-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623876" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23876</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23876" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23876" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23876" ref_url="https://www.suse.com/security/cve/CVE-2026-23876" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024242.html" source="SUSE-SU"/>
    <description>
    ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-13 and 6.9.13-38, a heap buffer overflow vulnerability in the XBM image decoder (ReadXBMImage) allows an attacker to write controlled data past the allocated heap buffer when processing a maliciously crafted image file. Any operation that reads or identifies an image can trigger the overflow, making it exploitable via common image upload and processing pipelines. Versions 7.1.2-13 and 6.9.13-38 fix the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-11"/>
	<updated date="2026-03-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23876/">CVE-2026-23876 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23876">CVE-2026-23876 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256962">SUSE bug 1256962</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047932" comment="ImageMagick-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047933" comment="ImageMagick-config-7-SUSE-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047934" comment="ImageMagick-config-7-upstream-limited-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977490" comment="ImageMagick-config-7-upstream-limited is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047935" comment="ImageMagick-config-7-upstream-open-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977491" comment="ImageMagick-config-7-upstream-open is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047936" comment="ImageMagick-config-7-upstream-secure-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977492" comment="ImageMagick-config-7-upstream-secure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047937" comment="ImageMagick-config-7-upstream-websafe-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977493" comment="ImageMagick-config-7-upstream-websafe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047938" comment="ImageMagick-devel-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047939" comment="ImageMagick-doc-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047940" comment="ImageMagick-extra-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047941" comment="libMagick++-7_Q16HDRI5-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698047" comment="libMagick++-7_Q16HDRI5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047942" comment="libMagick++-devel-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047943" comment="libMagickCore-7_Q16HDRI10-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698048" comment="libMagickCore-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047944" comment="libMagickWand-7_Q16HDRI10-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698049" comment="libMagickWand-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047945" comment="perl-PerlMagick-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623883" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23883</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23883" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23883" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23883" ref_url="https://www.suse.com/security/cve/CVE-2026-23883" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2048" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003229.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2081" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002474.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3037" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024555.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.21.0, `xf_Pointer_New` frees `cursorPixels` on failure, then `pointer_free` calls `xf_Pointer_Free` and frees it again, triggering ASan UAF. A malicious server can trigger a client-side use after free, causing a crash (DoS) and potential heap corruption with code-execution risk depending on allocator behavior and surrounding heap layout. Version 3.21.0 contains a patch for the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-13"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23883/">CVE-2026-23883 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23883">CVE-2026-23883 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256946">SUSE bug 1256946</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048376" comment="freerdp-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151908" comment="freerdp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048377" comment="freerdp-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151909" comment="freerdp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048378" comment="freerdp-proxy-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287971" comment="freerdp-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048379" comment="freerdp-proxy-plugins-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048429" comment="freerdp-proxy-plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048380" comment="freerdp-sdl-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048430" comment="freerdp-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048381" comment="freerdp-server-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245861" comment="freerdp-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048382" comment="freerdp-wayland-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245862" comment="freerdp-wayland is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048383" comment="libfreerdp-server-proxy3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048431" comment="libfreerdp-server-proxy3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048384" comment="libfreerdp3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048432" comment="libfreerdp3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048385" comment="librdtk0-0-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048433" comment="librdtk0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048386" comment="libuwac0-0-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245863" comment="libuwac0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048387" comment="libwinpr3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048434" comment="libwinpr3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048388" comment="rdtk0-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048435" comment="rdtk0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048389" comment="uwac0-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048436" comment="uwac0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048390" comment="winpr-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009877482" comment="winpr-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623884" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23884</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23884" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23884" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23884" ref_url="https://www.suse.com/security/cve/CVE-2026-23884" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:2048" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003229.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2081" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002474.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3037" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002573.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023993.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0656-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024454.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024555.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024554.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to version 3.21.0, offscreen bitmap deletion leaves `gdi-&gt;drawing` pointing to freed memory, causing UAF when related update packets arrive. A malicious server can trigger a client-side use after free, causing a crash (DoS) and potential heap corruption with code-execution risk depending on allocator behavior and surrounding heap layout. Version 3.21.0 contains a patch for the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-13"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23884/">CVE-2026-23884 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23884">CVE-2026-23884 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256947">SUSE bug 1256947</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048376" comment="freerdp-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151908" comment="freerdp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048377" comment="freerdp-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151909" comment="freerdp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048378" comment="freerdp-proxy-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287971" comment="freerdp-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048379" comment="freerdp-proxy-plugins-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048429" comment="freerdp-proxy-plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048380" comment="freerdp-sdl-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048430" comment="freerdp-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048381" comment="freerdp-server-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245861" comment="freerdp-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048382" comment="freerdp-wayland-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245862" comment="freerdp-wayland is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048383" comment="libfreerdp-server-proxy3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048431" comment="libfreerdp-server-proxy3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048384" comment="libfreerdp3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048432" comment="libfreerdp3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048385" comment="librdtk0-0-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048433" comment="librdtk0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048386" comment="libuwac0-0-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245863" comment="libuwac0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048387" comment="libwinpr3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048434" comment="libwinpr3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048388" comment="rdtk0-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048435" comment="rdtk0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048389" comment="uwac0-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048436" comment="uwac0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048390" comment="winpr-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009877482" comment="winpr-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623893" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23893</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23893" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23893" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23893" ref_url="https://www.suse.com/security/cve/CVE-2026-23893" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:5587" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002618.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5603" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003273.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5919" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002630.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0351-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023999.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024150.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0569-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024332.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0581-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024355.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0824-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024635.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20345-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024274.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024341.html" source="SUSE-SU"/>
    <description>
    openCryptoki is a PKCS#11 library and provides tooling for Linux and AIX. Versions 2.3.2 and above are vulnerable to symlink-following when running in privileged contexts. A token-group user can redirect file operations to arbitrary filesystem targets by planting symlinks in group-writable token directories, resulting in privilege escalation or data exposure. Token and lock directories are 0770 (group-writable for token users), so any token-group member can plant files and symlinks inside them. When run as root, the base code handling token directory file access, as well as several openCryptoki tools used for administrative purposes, may reset ownership or permissions on existing files inside the token directories. An attacker with token-group membership can exploit the system when an administrator runs a PKCS#11 application or administrative tool that performs chown on files inside the token directory during normal maintenance. This issue is fixed in commit 5e6e4b4, but has not been included in a released version at the time of publication.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-16"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L" href="https://www.suse.com/security/cve/CVE-2026-23893/">CVE-2026-23893 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23893">CVE-2026-23893 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257116">SUSE bug 1257116</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044013" comment="openCryptoki-3.26.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009857998" comment="openCryptoki is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044014" comment="openCryptoki-64bit-3.26.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009857999" comment="openCryptoki-64bit is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044015" comment="openCryptoki-devel-3.26.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009858000" comment="openCryptoki-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623948" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23948</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23948" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23948" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23948" ref_url="https://www.suse.com/security/cve/CVE-2026-23948" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:6340" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003289.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6727" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002648.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6918" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002660.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.22.0, a NULL pointer dereference vulnerability in rdp_write_logon_info_v2() allows a malicious RDP server to crash FreeRDP proxy by sending a specially crafted LogonInfoV2 PDU with cbDomain=0 or cbUserName=0. This vulnerability is fixed in 3.22.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-13"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23948/">CVE-2026-23948 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23948">CVE-2026-23948 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258001">SUSE bug 1258001</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048376" comment="freerdp-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151908" comment="freerdp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048377" comment="freerdp-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151909" comment="freerdp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048378" comment="freerdp-proxy-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287971" comment="freerdp-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048379" comment="freerdp-proxy-plugins-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048429" comment="freerdp-proxy-plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048380" comment="freerdp-sdl-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048430" comment="freerdp-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048381" comment="freerdp-server-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245861" comment="freerdp-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048382" comment="freerdp-wayland-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245862" comment="freerdp-wayland is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048383" comment="libfreerdp-server-proxy3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048431" comment="libfreerdp-server-proxy3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048384" comment="libfreerdp3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048432" comment="libfreerdp3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048385" comment="librdtk0-0-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048433" comment="librdtk0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048386" comment="libuwac0-0-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245863" comment="libuwac0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048387" comment="libwinpr3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048434" comment="libwinpr3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048388" comment="rdtk0-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048435" comment="rdtk0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048389" comment="uwac0-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048436" comment="uwac0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048390" comment="winpr-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009877482" comment="winpr-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623949" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23949</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23949" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23949" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23949" ref_url="https://www.suse.com/security/cve/CVE-2026-23949" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20139-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023954.html" source="SUSE-SU"/>
    <description>
    jaraco.context, an open-source software package that provides some useful decorators and context managers, has a Zip Slip path traversal vulnerability in the `jaraco.context.tarball()` function starting in version 5.2.0 and prior to version 6.1.0. The vulnerability may allow attackers to extract files outside the intended extraction directory when malicious tar archives are processed. The strip_first_component filter splits the path on the first `/` and extracts the second component, while allowing `../` sequences. Paths like `dummy_dir/../../etc/passwd` become `../../etc/passwd`. Note that this suffers from a nested tarball attack as well with multi-level tar files such as `dummy_dir/inner.tar.gz`, where the inner.tar.gz includes a traversal `dummy_dir/../../config/.env` that also gets translated to `../../config/.env`. Version 6.1.0 contains a patch for the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-01-25"/>
	<updated date="2026-01-29"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23949/">CVE-2026-23949 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-23949">CVE-2026-23949 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1256954">SUSE bug 1256954</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010039721" comment="python313-jaraco.context-5.3.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039780" comment="python313-jaraco.context is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623952" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23952</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23952" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23952" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23952" ref_url="https://www.suse.com/security/cve/CVE-2026-23952" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0384-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024057.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0437-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024111.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0438-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024110.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0503-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024242.html" source="SUSE-SU"/>
    <description>
    ImageMagick is free and open-source software used for editing and manipulating digital images. Versions 14.10.1 and below have a NULL pointer dereference vulnerability in the MSL (Magick Scripting Language) parser when processing &lt;comment&gt; tags before images are loaded. This can lead to DoS attack due to assertion failure (debug builds) or NULL pointer dereference (release builds). This issue is fixed in version 14.10.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-11"/>
	<updated date="2026-03-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="7.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23952/">CVE-2026-23952 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23952">CVE-2026-23952 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257076">SUSE bug 1257076</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047932" comment="ImageMagick-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047933" comment="ImageMagick-config-7-SUSE-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047934" comment="ImageMagick-config-7-upstream-limited-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977490" comment="ImageMagick-config-7-upstream-limited is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047935" comment="ImageMagick-config-7-upstream-open-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977491" comment="ImageMagick-config-7-upstream-open is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047936" comment="ImageMagick-config-7-upstream-secure-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977492" comment="ImageMagick-config-7-upstream-secure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047937" comment="ImageMagick-config-7-upstream-websafe-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977493" comment="ImageMagick-config-7-upstream-websafe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047938" comment="ImageMagick-devel-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047939" comment="ImageMagick-doc-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047940" comment="ImageMagick-extra-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047941" comment="libMagick++-7_Q16HDRI5-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698047" comment="libMagick++-7_Q16HDRI5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047942" comment="libMagick++-devel-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047943" comment="libMagickCore-7_Q16HDRI10-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698048" comment="libMagickCore-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047944" comment="libMagickWand-7_Q16HDRI10-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698049" comment="libMagickWand-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047945" comment="perl-PerlMagick-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623991" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23991</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23991" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23991" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23991" ref_url="https://www.suse.com/security/cve/CVE-2026-23991" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0403-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025109.html" source="SUSE-SU"/>
    <description>
    go-tuf is a Go implementation of The Update Framework (TUF). Starting in version 2.0.0 and prior to version 2.3.1, if the TUF repository (or any of its mirrors) returns invalid TUF metadata JSON (valid JSON but not well formed TUF metadata), the client will panic during parsing, causing a denial of service. The panic happens before any signature is validated. This means that a compromised repository/mirror/cache can DoS clients without having access to any signing key. Version 2.3.1 fixes the issue. No known workarounds are available.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-25"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23991/">CVE-2026-23991 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23991">CVE-2026-23991 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257079">SUSE bug 1257079</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050183" comment="cosign-3.0.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009707674" comment="cosign is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050184" comment="cosign-bash-completion-3.0.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010050218" comment="cosign-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050185" comment="cosign-fish-completion-3.0.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010050219" comment="cosign-fish-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050186" comment="cosign-zsh-completion-3.0.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010050220" comment="cosign-zsh-completion is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202623992" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-23992</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-23992" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-23992" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-23992" ref_url="https://www.suse.com/security/cve/CVE-2026-23992" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0403-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024084.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025109.html" source="SUSE-SU"/>
    <description>
    go-tuf is a Go implementation of The Update Framework (TUF). Starting in version 2.0.0 and prior to version 2.3.1, a compromised or misconfigured TUF repository can have the configured value of signature thresholds set to 0, which effectively disables signature verification. This can lead to unauthorized modification to TUF metadata files is possible at rest, or during transit as no integrity checks are made. Version 2.3.1 fixes the issue. As a workaround, always make sure that the TUF metadata roles are configured with a threshold of at least 1.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-25"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-23992/">CVE-2026-23992 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-23992">CVE-2026-23992 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257084">SUSE bug 1257084</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050183" comment="cosign-3.0.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009707674" comment="cosign is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050184" comment="cosign-bash-completion-3.0.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010050218" comment="cosign-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050185" comment="cosign-fish-completion-3.0.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010050219" comment="cosign-fish-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050186" comment="cosign-zsh-completion-3.0.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010050220" comment="cosign-zsh-completion is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202624049" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-24049</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-24049" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24049" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-24049" ref_url="https://www.suse.com/security/cve/CVE-2026-24049" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:1939" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003219.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2090" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002476.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:2710" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002514.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0424-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024122.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0425-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024121.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0460-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024131.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20217-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024070.html" source="SUSE-SU"/>
    <description>
    wheel is a command line tool for manipulating Python wheel files, as defined in PEP 427. In versions 0.40.0 through 0.46.1, the unpack function is vulnerable to file permission modification through mishandling of file permissions after extraction. The logic blindly trusts the filename from the archive header for the chmod operation, even though the extraction process itself might have sanitized the path. Attackers can craft a malicious wheel file that, when unpacked, changes the permissions of critical system files (e.g., /etc/passwd, SSH keys, config files), allowing for Privilege Escalation or arbitrary code execution by modifying now-writable scripts. This issue has been fixed in version 0.46.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.7/CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H" cvss4="7.2/CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:P/VC:N/VI:H/VA:H/SC:H/SI:H/SA:H" href="https://www.suse.com/security/cve/CVE-2026-24049/">CVE-2026-24049 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24049">CVE-2026-24049 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257100">SUSE bug 1257100</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041562" comment="python313-wheel-0.45.1-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041646" comment="python313-wheel is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202624122" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-24122</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-24122" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24122" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-24122" ref_url="https://www.suse.com/security/cve/CVE-2026-24122" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025109.html" source="SUSE-SU"/>
    <description>
    Cosign provides code signing and transparency for containers and binaries. In versions 3.0.4 and below, an issuing certificate with a validity that expires before the leaf certificate will be considered valid during verification even if the provided timestamp would mean the issuing certificate should be considered expired. When verifying artifact signatures using a certificate, Cosign first verifies the certificate chain using the leaf certificate's "not before" timestamp and later checks expiry of the leaf certificate using either a signed timestamp provided by the Rekor transparency log or from a timestamp authority, or using the current time. The root and all issuing certificates are assumed to be valid during the leaf certificate's validity. There is no impact to users of the public Sigstore infrastructure. This may affect private deployments with customized PKIs. This issue has been fixed in version 3.0.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-25"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24122/">CVE-2026-24122 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-24122">CVE-2026-24122 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258540">SUSE bug 1258540</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050183" comment="cosign-3.0.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009707674" comment="cosign is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050184" comment="cosign-bash-completion-3.0.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010050218" comment="cosign-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050185" comment="cosign-fish-completion-3.0.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010050219" comment="cosign-fish-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050186" comment="cosign-zsh-completion-3.0.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010050220" comment="cosign-zsh-completion is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202624137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-24137</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-24137" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24137" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-24137" ref_url="https://www.suse.com/security/cve/CVE-2026-24137" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0592-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024365.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025109.html" source="SUSE-SU"/>
    <description>
    sigstore framework is a common go library shared across sigstore services and clients. In versions 1.10.3 and below, the legacy TUF client (pkg/tuf/client.go) supports caching target files to disk. It constructs a filesystem path by joining a cache base directory with a target name sourced from signed target metadata; however, it does not validate that the resulting path stays within the cache base directory. A malicious TUF repository can trigger arbitrary file overwriting, limited to the permissions that the calling process has. Note that this should only affect clients that are directly using the TUF client in sigstore/sigstore or are using an older version of Cosign. Public Sigstore deployment users are unaffected, as TUF metadata is validated by a quorum of trusted collaborators. This issue has been fixed in version 1.10.4. As a workaround, users can disable disk caching for the legacy client by setting SIGSTORE_NO_CACHE=true in the environment, migrate to https://github.com/sigstore/sigstore-go/tree/main/pkg/tuf, or upgrade to the latest sigstore/sigstore release.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-25"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N" cvss4="6/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24137/">CVE-2026-24137 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-24137">CVE-2026-24137 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257137">SUSE bug 1257137</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050183" comment="cosign-3.0.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009707674" comment="cosign is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050184" comment="cosign-bash-completion-3.0.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010050218" comment="cosign-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050185" comment="cosign-fish-completion-3.0.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010050219" comment="cosign-fish-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050186" comment="cosign-zsh-completion-3.0.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010050220" comment="cosign-zsh-completion is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202624400" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-24400</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-24400" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24400" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-24400" ref_url="https://www.suse.com/security/cve/CVE-2026-24400" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0344-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023994.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20604-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024611.html" source="SUSE-SU"/>
    <description>
    AssertJ provides Fluent testing assertions for Java and the Java Virtual Machine (JVM). Starting in version 1.4.0 and prior to version 3.27.7, an XML External Entity (XXE) vulnerability exists in `org.assertj.core.util.xml.XmlStringPrettyFormatter`: the `toXmlDocument(String)` method initializes `DocumentBuilderFactory` with default settings, without disabling DTDs or external entities. This formatter is used by the `isXmlEqualTo(CharSequence)` assertion for `CharSequence` values. An application is vulnerable only when it uses untrusted XML input with either `isXmlEqualTo(CharSequence)` from `org.assertj.core.api.AbstractCharSequenceAssert` or `xmlPrettyFormat(String)` from `org.assertj.core.util.xml.XmlStringPrettyFormatter`. If untrusted XML input is processed by tone of these methods, an attacker couldnread arbitrary local files via `file://` URIs (e.g., `/etc/passwd`, application configuration files); perform Server-Side Request Forgery (SSRF) via HTTP/HTTPS URIs, and/or cause Denial of Service via "Billion Laughs" entity expansion attacks. `isXmlEqualTo(CharSequence)` has been deprecated in favor of XMLUnit in version 3.18.0 and will be removed in version 4.0. Users of affected versions should, in order of preference: replace `isXmlEqualTo(CharSequence)` with XMLUnit, upgrade to version 3.27.7, or avoid using `isXmlEqualTo(CharSequence)` or `XmlStringPrettyFormatter` with untrusted input. `XmlStringPrettyFormatter` has historically been considered a utility for `isXmlEqualTo(CharSequence)` rather than a feature for AssertJ users, so it is deprecated in version 3.27.7 and removed in version 4.0, with no replacement.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24400/">CVE-2026-24400 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24400">CVE-2026-24400 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257293">SUSE bug 1257293</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047309" comment="assertj-core-3.27.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010040934" comment="assertj-core is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047310" comment="assertj-core-javadoc-3.27.7-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010047355" comment="assertj-core-javadoc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262441" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2441</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2441" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2441" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2441" ref_url="https://www.suse.com/security/cve/CVE-2026-2441" source="SUSE CVE"/>
    <description>
    Use after free in CSS in Google Chrome prior to 145.0.7632.75 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-20"/>
	<updated date="2026-02-24"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2441/">CVE-2026-2441 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2441">CVE-2026-2441 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258185">SUSE bug 1258185</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044385" comment="chromedriver-145.0.7632.75-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044386" comment="chromium-145.0.7632.75-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2443</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2443" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2443" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2443" ref_url="https://www.suse.com/security/cve/CVE-2026-2443" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20649-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025111.html" source="SUSE-SU"/>
    <description>
    A flaw was identified in libsoup, a widely used HTTP library in GNOME-based systems. When processing specially crafted HTTP Range headers, the library may improperly validate requested byte ranges. In certain build configurations, this could allow a remote attacker to access portions of server memory beyond the intended response. Exploitation requires a vulnerable configuration and access to a server using the embedded SoupServer component.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-14"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-2443/">CVE-2026-2443 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2443">CVE-2026-2443 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258170">SUSE bug 1258170</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048654" comment="libsoup-2_4-1-2.74.3-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151596" comment="libsoup-2_4-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050015" comment="libsoup-3_0-0-3.6.6-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698059" comment="libsoup-3_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050176" comment="libsoup-devel-3.6.6-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151597" comment="libsoup-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050177" comment="libsoup-lang-3.6.6-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151598" comment="libsoup-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048655" comment="libsoup2-devel-2.74.3-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009957647" comment="libsoup2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048656" comment="libsoup2-lang-2.74.3-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698060" comment="libsoup2-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048657" comment="typelib-1_0-Soup-2_4-2.74.3-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151599" comment="typelib-1_0-Soup-2_4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050178" comment="typelib-1_0-Soup-3_0-3.6.6-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698061" comment="typelib-1_0-Soup-3_0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2447</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2447" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2447" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2447" ref_url="https://www.suse.com/security/cve/CVE-2026-2447" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3338" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002531.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3339" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003198.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3497" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002538.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3515" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002544.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3516" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003244.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3967" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002556.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3982" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002562.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4447" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0602-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0611-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024386.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0692-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024503.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024621.html" source="SUSE-SU"/>
    <description>
    Heap buffer overflow in libvpx. This vulnerability was fixed in Firefox 147.0.4, Firefox ESR 140.7.1, Firefox ESR 115.32.1, Thunderbird 140.7.2, and Thunderbird 147.0.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-22"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-2447/">CVE-2026-2447 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2447">CVE-2026-2447 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258388">SUSE bug 1258388</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044579" comment="MozillaFirefox-140.7.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044580" comment="MozillaFirefox-branding-upstream-140.7.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044581" comment="MozillaFirefox-devel-140.7.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044582" comment="MozillaFirefox-translations-common-140.7.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044583" comment="MozillaFirefox-translations-other-140.7.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050210" comment="MozillaThunderbird-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050211" comment="MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025480" comment="MozillaThunderbird-openpgp-librnp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050212" comment="MozillaThunderbird-translations-common-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050213" comment="MozillaThunderbird-translations-other-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202624481" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-24481</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-24481" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24481" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-24481" ref_url="https://www.suse.com/security/cve/CVE-2026-24481" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024663.html" source="SUSE-SU"/>
    <description>
    ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, a heap information disclosure vulnerability exists in ImageMagick's PSD (Adobe Photoshop) format handler. When processing a maliciously crafted PSD file containing ZIP-compressed layer data that decompresses to less than the expected size, uninitialized heap memory is leaked into the output image. Versions 7.1.2-15 and 6.9.13-40 contain a patch.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-11"/>
	<updated date="2026-03-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2026-24481/">CVE-2026-24481 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-24481">CVE-2026-24481 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258743">SUSE bug 1258743</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047932" comment="ImageMagick-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047933" comment="ImageMagick-config-7-SUSE-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047934" comment="ImageMagick-config-7-upstream-limited-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977490" comment="ImageMagick-config-7-upstream-limited is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047935" comment="ImageMagick-config-7-upstream-open-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977491" comment="ImageMagick-config-7-upstream-open is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047936" comment="ImageMagick-config-7-upstream-secure-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977492" comment="ImageMagick-config-7-upstream-secure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047937" comment="ImageMagick-config-7-upstream-websafe-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977493" comment="ImageMagick-config-7-upstream-websafe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047938" comment="ImageMagick-devel-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047939" comment="ImageMagick-doc-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047940" comment="ImageMagick-extra-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047941" comment="libMagick++-7_Q16HDRI5-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698047" comment="libMagick++-7_Q16HDRI5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047942" comment="libMagick++-devel-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047943" comment="libMagickCore-7_Q16HDRI10-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698048" comment="libMagickCore-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047944" comment="libMagickWand-7_Q16HDRI10-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698049" comment="libMagickWand-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047945" comment="perl-PerlMagick-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202624484" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-24484</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-24484" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24484" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-24484" ref_url="https://www.suse.com/security/cve/CVE-2026-24484" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024679.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1201-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1202-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025099.html" source="SUSE-SU"/>
    <description>
    ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, Magick fails to check for multi-layer nested mvg conversions to svg, leading to DoS. Versions 7.1.2-15 and 6.9.13-40 contain a patch.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-11"/>
	<updated date="2026-04-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-24484/">CVE-2026-24484 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24484">CVE-2026-24484 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258790">SUSE bug 1258790</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050733" comment="ImageMagick-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050734" comment="ImageMagick-config-7-SUSE-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050735" comment="ImageMagick-config-7-upstream-limited-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977490" comment="ImageMagick-config-7-upstream-limited is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050736" comment="ImageMagick-config-7-upstream-open-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977491" comment="ImageMagick-config-7-upstream-open is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050737" comment="ImageMagick-config-7-upstream-secure-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977492" comment="ImageMagick-config-7-upstream-secure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050738" comment="ImageMagick-config-7-upstream-websafe-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977493" comment="ImageMagick-config-7-upstream-websafe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050739" comment="ImageMagick-devel-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050740" comment="ImageMagick-doc-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050741" comment="ImageMagick-extra-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050742" comment="libMagick++-7_Q16HDRI5-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698047" comment="libMagick++-7_Q16HDRI5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050743" comment="libMagick++-devel-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050744" comment="libMagickCore-7_Q16HDRI10-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698048" comment="libMagickCore-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050745" comment="libMagickWand-7_Q16HDRI10-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698049" comment="libMagickWand-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050746" comment="perl-PerlMagick-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202624485" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-24485</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-24485" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24485" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-24485" ref_url="https://www.suse.com/security/cve/CVE-2026-24485" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024662.html" source="SUSE-SU"/>
    <description>
    ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, when a PCD file does not contain a valid Sync marker, the DecodeImage() function becomes trapped in an infinite loop while searching for the Sync marker, causing the program to become unresponsive and continuously consume CPU resources, ultimately leading to system resource exhaustion and denial of service. Versions 7.1.2-15 and 6.9.13-40 contain a patch.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-11"/>
	<updated date="2026-03-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-24485/">CVE-2026-24485 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-24485">CVE-2026-24485 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258791">SUSE bug 1258791</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047932" comment="ImageMagick-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047933" comment="ImageMagick-config-7-SUSE-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047934" comment="ImageMagick-config-7-upstream-limited-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977490" comment="ImageMagick-config-7-upstream-limited is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047935" comment="ImageMagick-config-7-upstream-open-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977491" comment="ImageMagick-config-7-upstream-open is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047936" comment="ImageMagick-config-7-upstream-secure-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977492" comment="ImageMagick-config-7-upstream-secure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047937" comment="ImageMagick-config-7-upstream-websafe-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977493" comment="ImageMagick-config-7-upstream-websafe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047938" comment="ImageMagick-devel-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047939" comment="ImageMagick-doc-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047940" comment="ImageMagick-extra-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047941" comment="libMagick++-7_Q16HDRI5-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698047" comment="libMagick++-7_Q16HDRI5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047942" comment="libMagick++-devel-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047943" comment="libMagickCore-7_Q16HDRI10-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698048" comment="libMagickCore-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047944" comment="libMagickWand-7_Q16HDRI10-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698049" comment="libMagickWand-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047945" comment="perl-PerlMagick-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202624486" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-24486</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-24486" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24486" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-24486" ref_url="https://www.suse.com/security/cve/CVE-2026-24486" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0307-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-January/023927.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20188-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024028.html" source="SUSE-SU"/>
    <description>
    Python-Multipart is a streaming multipart parser for Python. Prior to version 0.0.22, a Path Traversal vulnerability exists when using non-default configuration options `UPLOAD_DIR` and `UPLOAD_KEEP_FILENAME=True`. An attacker can write uploaded files to arbitrary locations on the filesystem by crafting a malicious filename. Users should upgrade to version 0.0.22 to receive a patch or, as a workaround, avoid using `UPLOAD_KEEP_FILENAME=True` in project configurations.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-02-18"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24486/">CVE-2026-24486 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24486">CVE-2026-24486 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257301">SUSE bug 1257301</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041343" comment="python313-python-multipart-0.0.20-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010041647" comment="python313-python-multipart is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202624491" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-24491</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-24491" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24491" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-24491" ref_url="https://www.suse.com/security/cve/CVE-2026-24491" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:6340" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003289.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6727" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002648.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6918" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024703.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0933-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024773.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0968-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024813.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0969-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024812.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.22.0, video_timer can send client notifications after the control channel is closed, dereferencing a freed callback and triggering a use after free. This vulnerability is fixed in 3.22.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24491/">CVE-2026-24491 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24491">CVE-2026-24491 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257981">SUSE bug 1257981</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048376" comment="freerdp-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151908" comment="freerdp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048377" comment="freerdp-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151909" comment="freerdp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048378" comment="freerdp-proxy-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287971" comment="freerdp-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048379" comment="freerdp-proxy-plugins-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048429" comment="freerdp-proxy-plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048380" comment="freerdp-sdl-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048430" comment="freerdp-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048381" comment="freerdp-server-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245861" comment="freerdp-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048382" comment="freerdp-wayland-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245862" comment="freerdp-wayland is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047341" comment="freerdp2-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010047350" comment="freerdp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047342" comment="freerdp2-devel-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010047351" comment="freerdp2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047343" comment="freerdp2-proxy-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010047352" comment="freerdp2-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047344" comment="freerdp2-server-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010047353" comment="freerdp2-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048383" comment="libfreerdp-server-proxy3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048431" comment="libfreerdp-server-proxy3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047345" comment="libfreerdp2-2-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009877480" comment="libfreerdp2-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048384" comment="libfreerdp3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048432" comment="libfreerdp3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048385" comment="librdtk0-0-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048433" comment="librdtk0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048386" comment="libuwac0-0-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245863" comment="libuwac0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047346" comment="libwinpr2-2-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009877481" comment="libwinpr2-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048387" comment="libwinpr3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048434" comment="libwinpr3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048388" comment="rdtk0-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048435" comment="rdtk0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048389" comment="uwac0-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048436" comment="uwac0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048390" comment="winpr-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009877482" comment="winpr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047347" comment="winpr2-devel-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245865" comment="winpr2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202624515" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-24515</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-24515" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24515" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-24515" ref_url="https://www.suse.com/security/cve/CVE-2026-24515" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024658.html" source="SUSE-SU"/>
    <description>
    In libexpat before 2.7.4, XML_ExternalEntityParserCreate does not copy unknown encoding handler user data.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24515/">CVE-2026-24515 at SUSE</cve>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24515">CVE-2026-24515 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257144">SUSE bug 1257144</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047318" comment="expat-2.7.1-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151330" comment="expat is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047319" comment="libexpat-devel-2.7.1-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151331" comment="libexpat-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047320" comment="libexpat1-2.7.1-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151332" comment="libexpat1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202624675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-24675</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-24675" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24675" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-24675" ref_url="https://www.suse.com/security/cve/CVE-2026-24675" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:6340" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003289.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6727" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002648.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6918" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024553.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.22.0, urb_select_interface can free the device's MS config on error but later code still dereferences it, leading to a use after free in libusb_udev_select_interface. This vulnerability is fixed in 3.22.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24675/">CVE-2026-24675 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24675">CVE-2026-24675 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257982">SUSE bug 1257982</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048376" comment="freerdp-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151908" comment="freerdp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048377" comment="freerdp-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151909" comment="freerdp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048378" comment="freerdp-proxy-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287971" comment="freerdp-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048379" comment="freerdp-proxy-plugins-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048429" comment="freerdp-proxy-plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048380" comment="freerdp-sdl-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048430" comment="freerdp-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048381" comment="freerdp-server-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245861" comment="freerdp-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048382" comment="freerdp-wayland-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245862" comment="freerdp-wayland is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047341" comment="freerdp2-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010047350" comment="freerdp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047342" comment="freerdp2-devel-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010047351" comment="freerdp2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047343" comment="freerdp2-proxy-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010047352" comment="freerdp2-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047344" comment="freerdp2-server-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010047353" comment="freerdp2-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048383" comment="libfreerdp-server-proxy3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048431" comment="libfreerdp-server-proxy3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047345" comment="libfreerdp2-2-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009877480" comment="libfreerdp2-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048384" comment="libfreerdp3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048432" comment="libfreerdp3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048385" comment="librdtk0-0-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048433" comment="librdtk0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048386" comment="libuwac0-0-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245863" comment="libuwac0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047346" comment="libwinpr2-2-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009877481" comment="libwinpr2-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048387" comment="libwinpr3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048434" comment="libwinpr3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048388" comment="rdtk0-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048435" comment="rdtk0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048389" comment="uwac0-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048436" comment="uwac0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048390" comment="winpr-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009877482" comment="winpr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047347" comment="winpr2-devel-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245865" comment="winpr2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202624676" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-24676</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-24676" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24676" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-24676" ref_url="https://www.suse.com/security/cve/CVE-2026-24676" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:6340" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003289.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6727" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002648.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6918" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024553.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.22.0, AUDIN format renegotiation frees the active format list while the capture thread continues using audin-&gt;format, leading to a use after free in audio_format_compatible. This vulnerability is fixed in 3.22.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24676/">CVE-2026-24676 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24676">CVE-2026-24676 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257983">SUSE bug 1257983</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048376" comment="freerdp-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151908" comment="freerdp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048377" comment="freerdp-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151909" comment="freerdp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048378" comment="freerdp-proxy-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287971" comment="freerdp-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048379" comment="freerdp-proxy-plugins-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048429" comment="freerdp-proxy-plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048380" comment="freerdp-sdl-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048430" comment="freerdp-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048381" comment="freerdp-server-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245861" comment="freerdp-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048382" comment="freerdp-wayland-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245862" comment="freerdp-wayland is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047341" comment="freerdp2-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010047350" comment="freerdp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047342" comment="freerdp2-devel-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010047351" comment="freerdp2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047343" comment="freerdp2-proxy-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010047352" comment="freerdp2-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047344" comment="freerdp2-server-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010047353" comment="freerdp2-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048383" comment="libfreerdp-server-proxy3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048431" comment="libfreerdp-server-proxy3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047345" comment="libfreerdp2-2-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009877480" comment="libfreerdp2-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048384" comment="libfreerdp3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048432" comment="libfreerdp3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048385" comment="librdtk0-0-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048433" comment="librdtk0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048386" comment="libuwac0-0-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245863" comment="libuwac0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047346" comment="libwinpr2-2-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009877481" comment="libwinpr2-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048387" comment="libwinpr3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048434" comment="libwinpr3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048388" comment="rdtk0-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048435" comment="rdtk0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048389" comment="uwac0-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048436" comment="uwac0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048390" comment="winpr-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009877482" comment="winpr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047347" comment="winpr2-devel-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245865" comment="winpr2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202624677" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-24677</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-24677" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24677" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-24677" ref_url="https://www.suse.com/security/cve/CVE-2026-24677" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024553.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.22.0, ecam_encoder_compress_h264 trusts server-controlled dimensions and does not validate the source buffer size, leading to an out-of-bounds read in sws_scale. This vulnerability is fixed in 3.22.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-13"/>
	<updated date="2026-03-13"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24677/">CVE-2026-24677 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24677">CVE-2026-24677 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257984">SUSE bug 1257984</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048376" comment="freerdp-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151908" comment="freerdp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048377" comment="freerdp-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151909" comment="freerdp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048378" comment="freerdp-proxy-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287971" comment="freerdp-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048379" comment="freerdp-proxy-plugins-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048429" comment="freerdp-proxy-plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048380" comment="freerdp-sdl-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048430" comment="freerdp-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048381" comment="freerdp-server-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245861" comment="freerdp-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048382" comment="freerdp-wayland-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245862" comment="freerdp-wayland is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048383" comment="libfreerdp-server-proxy3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048431" comment="libfreerdp-server-proxy3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048384" comment="libfreerdp3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048432" comment="libfreerdp3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048385" comment="librdtk0-0-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048433" comment="librdtk0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048386" comment="libuwac0-0-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245863" comment="libuwac0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048387" comment="libwinpr3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048434" comment="libwinpr3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048388" comment="rdtk0-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048435" comment="rdtk0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048389" comment="uwac0-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048436" comment="uwac0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048390" comment="winpr-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009877482" comment="winpr-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202624678" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-24678</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-24678" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24678" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-24678" ref_url="https://www.suse.com/security/cve/CVE-2026-24678" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024553.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.22.0, A capture thread sends sample responses using a freed channel callback after a device channel close, leading to a use after free in ecam_channel_write. This vulnerability is fixed in 3.22.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-13"/>
	<updated date="2026-03-13"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24678/">CVE-2026-24678 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24678">CVE-2026-24678 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257985">SUSE bug 1257985</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048376" comment="freerdp-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151908" comment="freerdp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048377" comment="freerdp-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151909" comment="freerdp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048378" comment="freerdp-proxy-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287971" comment="freerdp-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048379" comment="freerdp-proxy-plugins-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048429" comment="freerdp-proxy-plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048380" comment="freerdp-sdl-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048430" comment="freerdp-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048381" comment="freerdp-server-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245861" comment="freerdp-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048382" comment="freerdp-wayland-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245862" comment="freerdp-wayland is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048383" comment="libfreerdp-server-proxy3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048431" comment="libfreerdp-server-proxy3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048384" comment="libfreerdp3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048432" comment="libfreerdp3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048385" comment="librdtk0-0-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048433" comment="librdtk0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048386" comment="libuwac0-0-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245863" comment="libuwac0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048387" comment="libwinpr3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048434" comment="libwinpr3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048388" comment="rdtk0-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048435" comment="rdtk0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048389" comment="uwac0-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048436" comment="uwac0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048390" comment="winpr-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009877482" comment="winpr-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202624679" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-24679</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-24679" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24679" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-24679" ref_url="https://www.suse.com/security/cve/CVE-2026-24679" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:6340" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003289.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6727" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002648.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6918" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024553.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.22.0, The URBDRC client uses server-supplied interface numbers as array indices without bounds checks, causing an out-of-bounds read in libusb_udev_select_interface. This vulnerability is fixed in 3.22.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24679/">CVE-2026-24679 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24679">CVE-2026-24679 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257986">SUSE bug 1257986</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048376" comment="freerdp-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151908" comment="freerdp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048377" comment="freerdp-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151909" comment="freerdp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048378" comment="freerdp-proxy-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287971" comment="freerdp-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048379" comment="freerdp-proxy-plugins-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048429" comment="freerdp-proxy-plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048380" comment="freerdp-sdl-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048430" comment="freerdp-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048381" comment="freerdp-server-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245861" comment="freerdp-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048382" comment="freerdp-wayland-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245862" comment="freerdp-wayland is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047341" comment="freerdp2-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010047350" comment="freerdp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047342" comment="freerdp2-devel-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010047351" comment="freerdp2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047343" comment="freerdp2-proxy-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010047352" comment="freerdp2-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047344" comment="freerdp2-server-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010047353" comment="freerdp2-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048383" comment="libfreerdp-server-proxy3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048431" comment="libfreerdp-server-proxy3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047345" comment="libfreerdp2-2-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009877480" comment="libfreerdp2-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048384" comment="libfreerdp3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048432" comment="libfreerdp3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048385" comment="librdtk0-0-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048433" comment="librdtk0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048386" comment="libuwac0-0-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245863" comment="libuwac0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047346" comment="libwinpr2-2-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009877481" comment="libwinpr2-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048387" comment="libwinpr3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048434" comment="libwinpr3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048388" comment="rdtk0-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048435" comment="rdtk0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048389" comment="uwac0-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048436" comment="uwac0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048390" comment="winpr-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009877482" comment="winpr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047347" comment="winpr2-devel-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245865" comment="winpr2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202624680" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-24680</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-24680" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24680" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-24680" ref_url="https://www.suse.com/security/cve/CVE-2026-24680" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024553.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.22.0, sdl_Pointer_New frees data on failure, then pointer_free calls sdl_Pointer_Free and frees it again, triggering ASan UAF. This vulnerability is fixed in 3.22.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-13"/>
	<updated date="2026-03-13"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24680/">CVE-2026-24680 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24680">CVE-2026-24680 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257987">SUSE bug 1257987</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048376" comment="freerdp-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151908" comment="freerdp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048377" comment="freerdp-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151909" comment="freerdp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048378" comment="freerdp-proxy-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287971" comment="freerdp-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048379" comment="freerdp-proxy-plugins-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048429" comment="freerdp-proxy-plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048380" comment="freerdp-sdl-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048430" comment="freerdp-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048381" comment="freerdp-server-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245861" comment="freerdp-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048382" comment="freerdp-wayland-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245862" comment="freerdp-wayland is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048383" comment="libfreerdp-server-proxy3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048431" comment="libfreerdp-server-proxy3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048384" comment="libfreerdp3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048432" comment="libfreerdp3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048385" comment="librdtk0-0-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048433" comment="librdtk0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048386" comment="libuwac0-0-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245863" comment="libuwac0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048387" comment="libwinpr3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048434" comment="libwinpr3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048388" comment="rdtk0-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048435" comment="rdtk0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048389" comment="uwac0-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048436" comment="uwac0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048390" comment="winpr-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009877482" comment="winpr-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202624681" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-24681</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-24681" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24681" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-24681" ref_url="https://www.suse.com/security/cve/CVE-2026-24681" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:6340" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003289.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6727" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002648.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6918" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024553.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.22.0, aAsynchronous bulk transfer completions can use a freed channel callback after URBDRC channel close, leading to a use after free in urb_write_completion. This vulnerability is fixed in 3.22.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24681/">CVE-2026-24681 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24681">CVE-2026-24681 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257988">SUSE bug 1257988</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048376" comment="freerdp-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151908" comment="freerdp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048377" comment="freerdp-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151909" comment="freerdp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048378" comment="freerdp-proxy-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287971" comment="freerdp-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048379" comment="freerdp-proxy-plugins-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048429" comment="freerdp-proxy-plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048380" comment="freerdp-sdl-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048430" comment="freerdp-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048381" comment="freerdp-server-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245861" comment="freerdp-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048382" comment="freerdp-wayland-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245862" comment="freerdp-wayland is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047341" comment="freerdp2-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010047350" comment="freerdp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047342" comment="freerdp2-devel-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010047351" comment="freerdp2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047343" comment="freerdp2-proxy-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010047352" comment="freerdp2-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047344" comment="freerdp2-server-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010047353" comment="freerdp2-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048383" comment="libfreerdp-server-proxy3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048431" comment="libfreerdp-server-proxy3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047345" comment="libfreerdp2-2-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009877480" comment="libfreerdp2-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048384" comment="libfreerdp3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048432" comment="libfreerdp3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048385" comment="librdtk0-0-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048433" comment="librdtk0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048386" comment="libuwac0-0-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245863" comment="libuwac0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047346" comment="libwinpr2-2-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009877481" comment="libwinpr2-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048387" comment="libwinpr3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048434" comment="libwinpr3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048388" comment="rdtk0-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048435" comment="rdtk0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048389" comment="uwac0-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048436" comment="uwac0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048390" comment="winpr-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009877482" comment="winpr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047347" comment="winpr2-devel-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245865" comment="winpr2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202624682" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-24682</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-24682" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24682" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-24682" ref_url="https://www.suse.com/security/cve/CVE-2026-24682" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024553.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.22.0, audin_server_recv_formats frees an incorrect number of audio formats on parse failure (i + i), leading to out-of-bounds access in audio_formats_free. This vulnerability is fixed in 3.22.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-13"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24682/">CVE-2026-24682 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24682">CVE-2026-24682 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257989">SUSE bug 1257989</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048376" comment="freerdp-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151908" comment="freerdp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048377" comment="freerdp-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151909" comment="freerdp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048378" comment="freerdp-proxy-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287971" comment="freerdp-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048379" comment="freerdp-proxy-plugins-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048429" comment="freerdp-proxy-plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048380" comment="freerdp-sdl-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048430" comment="freerdp-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048381" comment="freerdp-server-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245861" comment="freerdp-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048382" comment="freerdp-wayland-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245862" comment="freerdp-wayland is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047341" comment="freerdp2-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010047350" comment="freerdp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047342" comment="freerdp2-devel-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010047351" comment="freerdp2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047343" comment="freerdp2-proxy-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010047352" comment="freerdp2-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047344" comment="freerdp2-server-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010047353" comment="freerdp2-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048383" comment="libfreerdp-server-proxy3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048431" comment="libfreerdp-server-proxy3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047345" comment="libfreerdp2-2-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009877480" comment="libfreerdp2-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048384" comment="libfreerdp3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048432" comment="libfreerdp3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048385" comment="librdtk0-0-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048433" comment="librdtk0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048386" comment="libuwac0-0-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245863" comment="libuwac0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047346" comment="libwinpr2-2-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009877481" comment="libwinpr2-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048387" comment="libwinpr3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048434" comment="libwinpr3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048388" comment="rdtk0-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048435" comment="rdtk0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048389" comment="uwac0-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048436" comment="uwac0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048390" comment="winpr-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009877482" comment="winpr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047347" comment="winpr2-devel-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245865" comment="winpr2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202624683" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-24683</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-24683" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24683" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-24683" ref_url="https://www.suse.com/security/cve/CVE-2026-24683" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:6340" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003289.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6727" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002648.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6918" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024553.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol. ainput_send_input_event caches channel_callback in a local variable and later uses it without synchronization; a concurrent channel close can free or reinitialize the callback, leading to a use after free. Prior to 3.22.0, This vulnerability is fixed in 3.22.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24683/">CVE-2026-24683 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24683">CVE-2026-24683 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257990">SUSE bug 1257990</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048376" comment="freerdp-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151908" comment="freerdp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048377" comment="freerdp-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151909" comment="freerdp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048378" comment="freerdp-proxy-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287971" comment="freerdp-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048379" comment="freerdp-proxy-plugins-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048429" comment="freerdp-proxy-plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048380" comment="freerdp-sdl-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048430" comment="freerdp-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048381" comment="freerdp-server-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245861" comment="freerdp-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048382" comment="freerdp-wayland-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245862" comment="freerdp-wayland is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047341" comment="freerdp2-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010047350" comment="freerdp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047342" comment="freerdp2-devel-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010047351" comment="freerdp2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047343" comment="freerdp2-proxy-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010047352" comment="freerdp2-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047344" comment="freerdp2-server-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010047353" comment="freerdp2-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048383" comment="libfreerdp-server-proxy3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048431" comment="libfreerdp-server-proxy3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047345" comment="libfreerdp2-2-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009877480" comment="libfreerdp2-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048384" comment="libfreerdp3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048432" comment="libfreerdp3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048385" comment="librdtk0-0-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048433" comment="librdtk0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048386" comment="libuwac0-0-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245863" comment="libuwac0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047346" comment="libwinpr2-2-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009877481" comment="libwinpr2-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048387" comment="libwinpr3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048434" comment="libwinpr3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048388" comment="rdtk0-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048435" comment="rdtk0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048389" comment="uwac0-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048436" comment="uwac0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048390" comment="winpr-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009877482" comment="winpr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047347" comment="winpr2-devel-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245865" comment="winpr2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202624684" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-24684</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-24684" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24684" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-24684" ref_url="https://www.suse.com/security/cve/CVE-2026-24684" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:6340" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003289.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6727" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002648.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6918" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002660.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0621-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0649-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024398.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0683-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024493.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0762-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024554.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0763-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024553.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1217-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045325.html" source="SUSE-SU"/>
    <description>
    FreeRDP is a free implementation of the Remote Desktop Protocol. Prior to 3.22.0, the RDPSND async playback thread can process queued PDUs after the channel is closed and internal state is freed, leading to a use after free in rdpsnd_treat_wave. This vulnerability is fixed in 3.22.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24684/">CVE-2026-24684 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24684">CVE-2026-24684 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257991">SUSE bug 1257991</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048376" comment="freerdp-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151908" comment="freerdp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048377" comment="freerdp-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151909" comment="freerdp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048378" comment="freerdp-proxy-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009287971" comment="freerdp-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048379" comment="freerdp-proxy-plugins-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048429" comment="freerdp-proxy-plugins is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048380" comment="freerdp-sdl-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048430" comment="freerdp-sdl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048381" comment="freerdp-server-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245861" comment="freerdp-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048382" comment="freerdp-wayland-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245862" comment="freerdp-wayland is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047341" comment="freerdp2-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010047350" comment="freerdp2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047342" comment="freerdp2-devel-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010047351" comment="freerdp2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047343" comment="freerdp2-proxy-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010047352" comment="freerdp2-proxy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047344" comment="freerdp2-server-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010047353" comment="freerdp2-server is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048383" comment="libfreerdp-server-proxy3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048431" comment="libfreerdp-server-proxy3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047345" comment="libfreerdp2-2-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009877480" comment="libfreerdp2-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048384" comment="libfreerdp3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048432" comment="libfreerdp3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048385" comment="librdtk0-0-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048433" comment="librdtk0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048386" comment="libuwac0-0-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245863" comment="libuwac0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047346" comment="libwinpr2-2-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009877481" comment="libwinpr2-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048387" comment="libwinpr3-3-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048434" comment="libwinpr3-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048388" comment="rdtk0-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048435" comment="rdtk0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048389" comment="uwac0-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048436" comment="uwac0-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048390" comment="winpr-devel-3.22.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009877482" comment="winpr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047347" comment="winpr2-devel-2.11.7-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245865" comment="winpr2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202624733" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-24733</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-24733" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24733" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-24733" ref_url="https://www.suse.com/security/cve/CVE-2026-24733" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0922-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024713.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1058-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024949.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20926-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20982-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045349.html" source="SUSE-SU"/>
    <description>
    Improper Input Validation vulnerability in Apache Tomcat.


Tomcat did not limit HTTP/0.9 requests to the GET method. If a security 
constraint was configured to allow HEAD requests to a URI but deny GET 
requests, the user could bypass that constraint on GET requests by 
sending a (specification invalid) HEAD request using HTTP/0.9.


This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.14, from 10.1.0-M1 through 10.1.49, from 9.0.0.M1 through 9.0.112.


Older, EOL versions are also affected.

Users are recommended to upgrade to version 11.0.15 or later, 10.1.50 or later or 9.0.113 or later, which fixes the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-14"/>
	<updated date="2026-04-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24733/">CVE-2026-24733 at SUSE</cve>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24733">CVE-2026-24733 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258385">SUSE bug 1258385</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048642" comment="tomcat-9.0.115-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152844" comment="tomcat is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048643" comment="tomcat-admin-webapps-9.0.115-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152845" comment="tomcat-admin-webapps is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048644" comment="tomcat-docs-webapp-9.0.115-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152846" comment="tomcat-docs-webapp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048645" comment="tomcat-el-3_0-api-9.0.115-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152847" comment="tomcat-el-3_0-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048646" comment="tomcat-embed-9.0.115-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152848" comment="tomcat-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048647" comment="tomcat-javadoc-9.0.115-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152849" comment="tomcat-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048648" comment="tomcat-jsp-2_3-api-9.0.115-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152850" comment="tomcat-jsp-2_3-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048649" comment="tomcat-jsvc-9.0.115-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152851" comment="tomcat-jsvc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048650" comment="tomcat-lib-9.0.115-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152852" comment="tomcat-lib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048651" comment="tomcat-servlet-4_0-api-9.0.115-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236693" comment="tomcat-servlet-4_0-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048652" comment="tomcat-webapps-9.0.115-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152854" comment="tomcat-webapps is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052604" comment="tomcat10-10.1.52-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009844333" comment="tomcat10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052605" comment="tomcat10-admin-webapps-10.1.52-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009844334" comment="tomcat10-admin-webapps is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052606" comment="tomcat10-doc-10.1.52-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009872621" comment="tomcat10-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052607" comment="tomcat10-docs-webapp-10.1.52-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009844335" comment="tomcat10-docs-webapp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052608" comment="tomcat10-el-5_0-api-10.1.52-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009844336" comment="tomcat10-el-5_0-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052609" comment="tomcat10-embed-10.1.52-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009844337" comment="tomcat10-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052610" comment="tomcat10-jsp-3_1-api-10.1.52-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009844338" comment="tomcat10-jsp-3_1-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052611" comment="tomcat10-jsvc-10.1.52-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009844339" comment="tomcat10-jsvc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052612" comment="tomcat10-lib-10.1.52-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009844340" comment="tomcat10-lib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052613" comment="tomcat10-servlet-6_0-api-10.1.52-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009844341" comment="tomcat10-servlet-6_0-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052614" comment="tomcat10-webapps-10.1.52-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009844342" comment="tomcat10-webapps is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051787" comment="tomcat11-11.0.18-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010015348" comment="tomcat11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051788" comment="tomcat11-admin-webapps-11.0.18-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010015349" comment="tomcat11-admin-webapps is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051789" comment="tomcat11-doc-11.0.18-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010015350" comment="tomcat11-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051790" comment="tomcat11-docs-webapp-11.0.18-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010015351" comment="tomcat11-docs-webapp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051791" comment="tomcat11-el-6_0-api-11.0.18-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010015352" comment="tomcat11-el-6_0-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051792" comment="tomcat11-embed-11.0.18-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010015353" comment="tomcat11-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051793" comment="tomcat11-jsp-4_0-api-11.0.18-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010015354" comment="tomcat11-jsp-4_0-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051794" comment="tomcat11-jsvc-11.0.18-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010015355" comment="tomcat11-jsvc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051795" comment="tomcat11-lib-11.0.18-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010015356" comment="tomcat11-lib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051796" comment="tomcat11-servlet-6_1-api-11.0.18-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010015357" comment="tomcat11-servlet-6_1-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051797" comment="tomcat11-webapps-11.0.18-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010015358" comment="tomcat11-webapps is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202624734" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-24734</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-24734" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24734" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-24734" ref_url="https://www.suse.com/security/cve/CVE-2026-24734" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0877-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024680.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0890-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024692.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0932-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024774.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20926-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045226.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20982-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045349.html" source="SUSE-SU"/>
    <description>
    Improper Input Validation vulnerability in Apache Tomcat Native, Apache Tomcat.

When using an OCSP responder, Tomcat Native (and Tomcat's FFM port of the Tomcat Native code) did not complete verification or freshness checks on the OCSP response which could allow certificate revocation to be bypassed.

This issue affects Apache Tomcat Native:   from 1.3.0 through 1.3.4, from 2.0.0 through 2.0.11; Apache Tomcat: from 11.0.0-M1 through 11.0.17, from 10.1.0-M7 through 10.1.51, from 9.0.83 through 9.0.114.


The following versions were EOL at the time the CVE was created but are 
known to be affected: from 1.1.23 through 1.1.34, from 1.2.0 through 1.2.39.  Older EOL versions are not affected.

Apache Tomcat Native users are recommended to upgrade to versions 1.3.5 or later or 2.0.12 or later, which fix the issue.

Apache Tomcat users are recommended to upgrade to versions 11.0.18 or later, 10.1.52 or later or 9.0.115 or later which fix the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-14"/>
	<updated date="2026-04-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2026-24734/">CVE-2026-24734 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24734">CVE-2026-24734 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258387">SUSE bug 1258387</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048642" comment="tomcat-9.0.115-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152844" comment="tomcat is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048643" comment="tomcat-admin-webapps-9.0.115-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152845" comment="tomcat-admin-webapps is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048644" comment="tomcat-docs-webapp-9.0.115-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152846" comment="tomcat-docs-webapp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048645" comment="tomcat-el-3_0-api-9.0.115-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152847" comment="tomcat-el-3_0-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048646" comment="tomcat-embed-9.0.115-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152848" comment="tomcat-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048647" comment="tomcat-javadoc-9.0.115-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152849" comment="tomcat-javadoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048648" comment="tomcat-jsp-2_3-api-9.0.115-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152850" comment="tomcat-jsp-2_3-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048649" comment="tomcat-jsvc-9.0.115-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152851" comment="tomcat-jsvc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048650" comment="tomcat-lib-9.0.115-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152852" comment="tomcat-lib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048651" comment="tomcat-servlet-4_0-api-9.0.115-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009236693" comment="tomcat-servlet-4_0-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048652" comment="tomcat-webapps-9.0.115-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152854" comment="tomcat-webapps is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052604" comment="tomcat10-10.1.52-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009844333" comment="tomcat10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052605" comment="tomcat10-admin-webapps-10.1.52-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009844334" comment="tomcat10-admin-webapps is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052606" comment="tomcat10-doc-10.1.52-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009872621" comment="tomcat10-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052607" comment="tomcat10-docs-webapp-10.1.52-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009844335" comment="tomcat10-docs-webapp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052608" comment="tomcat10-el-5_0-api-10.1.52-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009844336" comment="tomcat10-el-5_0-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052609" comment="tomcat10-embed-10.1.52-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009844337" comment="tomcat10-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052610" comment="tomcat10-jsp-3_1-api-10.1.52-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009844338" comment="tomcat10-jsp-3_1-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052611" comment="tomcat10-jsvc-10.1.52-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009844339" comment="tomcat10-jsvc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052612" comment="tomcat10-lib-10.1.52-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009844340" comment="tomcat10-lib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052613" comment="tomcat10-servlet-6_0-api-10.1.52-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009844341" comment="tomcat10-servlet-6_0-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052614" comment="tomcat10-webapps-10.1.52-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009844342" comment="tomcat10-webapps is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051787" comment="tomcat11-11.0.18-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010015348" comment="tomcat11 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051788" comment="tomcat11-admin-webapps-11.0.18-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010015349" comment="tomcat11-admin-webapps is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051789" comment="tomcat11-doc-11.0.18-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010015350" comment="tomcat11-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051790" comment="tomcat11-docs-webapp-11.0.18-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010015351" comment="tomcat11-docs-webapp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051791" comment="tomcat11-el-6_0-api-11.0.18-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010015352" comment="tomcat11-el-6_0-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051792" comment="tomcat11-embed-11.0.18-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010015353" comment="tomcat11-embed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051793" comment="tomcat11-jsp-4_0-api-11.0.18-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010015354" comment="tomcat11-jsp-4_0-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051794" comment="tomcat11-jsvc-11.0.18-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010015355" comment="tomcat11-jsvc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051795" comment="tomcat11-lib-11.0.18-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010015356" comment="tomcat11-lib is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051796" comment="tomcat11-servlet-6_1-api-11.0.18-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010015357" comment="tomcat11-servlet-6_1-api is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051797" comment="tomcat11-webapps-11.0.18-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010015358" comment="tomcat11-webapps is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202624882" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-24882</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-24882" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24882" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-24882" ref_url="https://www.suse.com/security/cve/CVE-2026-24882" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0434-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024114.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024024.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20444-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024438.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20487-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024483.html" source="SUSE-SU"/>
    <description>
    In GnuPG before 2.5.17, a stack-based buffer overflow exists in tpm2daemon during handling of the PKDECRYPT command for TPM-backed RSA and ECC keys.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-02-28"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.5/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24882/">CVE-2026-24882 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24882">CVE-2026-24882 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257396">SUSE bug 1257396</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041445" comment="dirmngr-2.5.5-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009695558" comment="dirmngr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041446" comment="gpg2-2.5.5-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151446" comment="gpg2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041447" comment="gpg2-lang-2.5.5-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151447" comment="gpg2-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041448" comment="gpg2-tpm-2.5.5-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009999481" comment="gpg2-tpm is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202624883" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-24883</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-24883" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24883" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-24883" ref_url="https://www.suse.com/security/cve/CVE-2026-24883" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20179-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024005.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20195-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024024.html" source="SUSE-SU"/>
    <description>
    In GnuPG before 2.5.17, a long signature packet length causes parse_signature to return success with sig-&gt;data[] set to a NULL value, leading to a denial of service (application crash).
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-03"/>
	<updated date="2026-02-07"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-24883/">CVE-2026-24883 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-24883">CVE-2026-24883 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257395">SUSE bug 1257395</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041445" comment="dirmngr-2.5.5-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009695558" comment="dirmngr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041446" comment="gpg2-2.5.5-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151446" comment="gpg2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041447" comment="gpg2-lang-2.5.5-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151447" comment="gpg2-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010041448" comment="gpg2-tpm-2.5.5-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009999481" comment="gpg2-tpm is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202625210" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-25210</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-25210" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25210" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-25210" ref_url="https://www.suse.com/security/cve/CVE-2026-25210" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0386-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024061.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0646-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024401.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0647-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024400.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024633.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20350-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024280.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20481-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024489.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20627-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024647.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20642-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024658.html" source="SUSE-SU"/>
    <description>
    In libexpat before 2.7.4, the doContent function does not properly determine the buffer size bufSize because there is no integer overflow check for tag buffer reallocation.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:L" cvss4="7.3/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:P/VC:H/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25210/">CVE-2026-25210 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25210">CVE-2026-25210 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257496">SUSE bug 1257496</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047318" comment="expat-2.7.1-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151330" comment="expat is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047319" comment="libexpat-devel-2.7.1-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151331" comment="libexpat-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047320" comment="libexpat1-2.7.1-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151332" comment="libexpat1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202625547" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-25547</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-25547" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25547" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-25547" ref_url="https://www.suse.com/security/cve/CVE-2026-25547" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:7123" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002665.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:7302" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003291.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:7350" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1008-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024921.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1013-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024917.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1035-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024906.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1148-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025055.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1232-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045357.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1250-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20574-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024627.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21022-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21024-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045382.html" source="SUSE-SU"/>
    <description>
    @isaacs/brace-expansion is a hybrid CJS/ESM TypeScript fork of brace-expansion. Prior to version 5.0.1, @isaacs/brace-expansion is vulnerable to a denial of service (DoS) issue caused by unbounded brace range expansion. When an attacker provides a pattern containing repeated numeric brace ranges, the library attempts to eagerly generate every possible combination synchronously. Because the expansion grows exponentially, even a small input can consume excessive CPU and memory and may crash the Node.js process. This issue has been patched in version 5.0.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-19"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25547/">CVE-2026-25547 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-25547">CVE-2026-25547 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257834">SUSE bug 1257834</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044293" comment="golang-github-prometheus-prometheus-3.5.0-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009630838" comment="golang-github-prometheus-prometheus is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044668" comment="openQA-5.1771422749.560a3b26-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017290" comment="openQA is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044669" comment="openQA-auto-update-5.1771422749.560a3b26-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017291" comment="openQA-auto-update is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044670" comment="openQA-bootstrap-5.1771422749.560a3b26-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017292" comment="openQA-bootstrap is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044671" comment="openQA-client-5.1771422749.560a3b26-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017293" comment="openQA-client is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044672" comment="openQA-common-5.1771422749.560a3b26-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017294" comment="openQA-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044673" comment="openQA-continuous-update-5.1771422749.560a3b26-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017295" comment="openQA-continuous-update is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044674" comment="openQA-devel-5.1771422749.560a3b26-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017296" comment="openQA-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044675" comment="openQA-doc-5.1771422749.560a3b26-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017297" comment="openQA-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044676" comment="openQA-local-db-5.1771422749.560a3b26-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017298" comment="openQA-local-db is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044677" comment="openQA-mcp-5.1771422749.560a3b26-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017299" comment="openQA-mcp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044678" comment="openQA-munin-5.1771422749.560a3b26-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017300" comment="openQA-munin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044679" comment="openQA-python-scripts-5.1771422749.560a3b26-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017301" comment="openQA-python-scripts is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044680" comment="openQA-single-instance-5.1771422749.560a3b26-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017302" comment="openQA-single-instance is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044681" comment="openQA-single-instance-nginx-5.1771422749.560a3b26-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017303" comment="openQA-single-instance-nginx is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044682" comment="openQA-worker-5.1771422749.560a3b26-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017304" comment="openQA-worker is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044683" comment="os-autoinst-5.1771353921.c8005c9-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017305" comment="os-autoinst is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044684" comment="os-autoinst-devel-5.1771353921.c8005c9-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017306" comment="os-autoinst-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044685" comment="os-autoinst-ipmi-deps-5.1771353921.c8005c9-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017307" comment="os-autoinst-ipmi-deps is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044686" comment="os-autoinst-openvswitch-5.1771353921.c8005c9-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017308" comment="os-autoinst-openvswitch is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044687" comment="os-autoinst-qemu-kvm-5.1771353921.c8005c9-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017309" comment="os-autoinst-qemu-kvm is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044688" comment="os-autoinst-qemu-x86-5.1771353921.c8005c9-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017310" comment="os-autoinst-qemu-x86 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044689" comment="os-autoinst-s390-deps-5.1771353921.c8005c9-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017311" comment="os-autoinst-s390-deps is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044690" comment="os-autoinst-swtpm-5.1771353921.c8005c9-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010017312" comment="os-autoinst-swtpm is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202625576" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-25576</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-25576" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25576" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-25576" ref_url="https://www.suse.com/security/cve/CVE-2026-25576" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024662.html" source="SUSE-SU"/>
    <description>
    ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, a heap buffer over-read vulnerability exists in multiple raw image format handles. The vulnerability occurs when processing images with -extract dimensions larger than -size dimensions, causing out-of-bounds memory reads from a heap-allocated buffer. Versions 7.1.2-15 and 6.9.13-40 contain a patch.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-11"/>
	<updated date="2026-03-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2026-25576/">CVE-2026-25576 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25576">CVE-2026-25576 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258748">SUSE bug 1258748</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047932" comment="ImageMagick-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047933" comment="ImageMagick-config-7-SUSE-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047934" comment="ImageMagick-config-7-upstream-limited-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977490" comment="ImageMagick-config-7-upstream-limited is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047935" comment="ImageMagick-config-7-upstream-open-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977491" comment="ImageMagick-config-7-upstream-open is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047936" comment="ImageMagick-config-7-upstream-secure-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977492" comment="ImageMagick-config-7-upstream-secure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047937" comment="ImageMagick-config-7-upstream-websafe-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977493" comment="ImageMagick-config-7-upstream-websafe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047938" comment="ImageMagick-devel-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047939" comment="ImageMagick-doc-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047940" comment="ImageMagick-extra-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047941" comment="libMagick++-7_Q16HDRI5-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698047" comment="libMagick++-7_Q16HDRI5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047942" comment="libMagick++-devel-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047943" comment="libMagickCore-7_Q16HDRI10-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698048" comment="libMagickCore-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047944" comment="libMagickWand-7_Q16HDRI10-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698049" comment="libMagickWand-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047945" comment="perl-PerlMagick-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202625637" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-25637</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-25637" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25637" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-25637" ref_url="https://www.suse.com/security/cve/CVE-2026-25637" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024663.html" source="SUSE-SU"/>
    <description>
    ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to version 7.1.2-15, a memory leak in the ASHLAR image writer allows an attacker to exhaust process memory by providing a crafted image that results in small objects that are allocated but never freed. Version 7.1.2-15 contains a patch.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-11"/>
	<updated date="2026-03-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25637/">CVE-2026-25637 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-25637">CVE-2026-25637 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258759">SUSE bug 1258759</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047932" comment="ImageMagick-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047933" comment="ImageMagick-config-7-SUSE-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047934" comment="ImageMagick-config-7-upstream-limited-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977490" comment="ImageMagick-config-7-upstream-limited is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047935" comment="ImageMagick-config-7-upstream-open-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977491" comment="ImageMagick-config-7-upstream-open is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047936" comment="ImageMagick-config-7-upstream-secure-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977492" comment="ImageMagick-config-7-upstream-secure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047937" comment="ImageMagick-config-7-upstream-websafe-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977493" comment="ImageMagick-config-7-upstream-websafe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047938" comment="ImageMagick-devel-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047939" comment="ImageMagick-doc-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047940" comment="ImageMagick-extra-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047941" comment="libMagick++-7_Q16HDRI5-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698047" comment="libMagick++-7_Q16HDRI5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047942" comment="libMagick++-devel-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047943" comment="libMagickCore-7_Q16HDRI10-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698048" comment="libMagickCore-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047944" comment="libMagickWand-7_Q16HDRI10-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698049" comment="libMagickWand-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047945" comment="perl-PerlMagick-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202625638" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-25638</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-25638" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25638" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-25638" ref_url="https://www.suse.com/security/cve/CVE-2026-25638" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024663.html" source="SUSE-SU"/>
    <description>
    ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, memory leak exists in `coders/msl.c`. In the `WriteMSLImage` function of the `msl.c` file, resources are allocated. But the function returns early without releasing these allocated resources. Versions 7.1.2-15 and 6.9.13-40 contain a patch.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-11"/>
	<updated date="2026-03-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25638/">CVE-2026-25638 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-25638">CVE-2026-25638 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258793">SUSE bug 1258793</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047932" comment="ImageMagick-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047933" comment="ImageMagick-config-7-SUSE-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047934" comment="ImageMagick-config-7-upstream-limited-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977490" comment="ImageMagick-config-7-upstream-limited is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047935" comment="ImageMagick-config-7-upstream-open-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977491" comment="ImageMagick-config-7-upstream-open is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047936" comment="ImageMagick-config-7-upstream-secure-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977492" comment="ImageMagick-config-7-upstream-secure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047937" comment="ImageMagick-config-7-upstream-websafe-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977493" comment="ImageMagick-config-7-upstream-websafe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047938" comment="ImageMagick-devel-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047939" comment="ImageMagick-doc-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047940" comment="ImageMagick-extra-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047941" comment="libMagick++-7_Q16HDRI5-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698047" comment="libMagick++-7_Q16HDRI5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047942" comment="libMagick++-devel-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047943" comment="libMagickCore-7_Q16HDRI10-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698048" comment="libMagickCore-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047944" comment="libMagickWand-7_Q16HDRI10-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698049" comment="libMagickWand-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047945" comment="perl-PerlMagick-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202625646" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-25646</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-25646" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25646" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-25646" ref_url="https://www.suse.com/security/cve/CVE-2026-25646" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3031" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003232.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3405" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003222.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3576" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002577.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3968" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002585.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4306" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002568.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:4728" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002586.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6439" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002643.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6445" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002644.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0583-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024363.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0596-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024368.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0597-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024367.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0598-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024366.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0599-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024369.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20523-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024499.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20530-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024563.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20750-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024834.html" source="SUSE-SU"/>
    <description>
    LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. Prior to 1.6.55, an out-of-bounds read vulnerability exists in the png_set_quantize() API function. When the function is called with no histogram and the number of colors in the palette is more than twice the maximum supported by the user's display, certain palettes will cause the function to enter into an infinite loop that reads past the end of an internal heap-allocated buffer. The images that trigger this vulnerability are valid per the PNG specification. This vulnerability is fixed in 1.6.55.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-25"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25646/">CVE-2026-25646 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25646">CVE-2026-25646 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258020">SUSE bug 1258020</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050012" comment="libpng16-16-1.6.44-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151414" comment="libpng16-16 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050165" comment="libpng16-16-x86-64-v3-1.6.44-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037228" comment="libpng16-16-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050166" comment="libpng16-compat-devel-1.6.44-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151416" comment="libpng16-compat-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050167" comment="libpng16-compat-devel-x86-64-v3-1.6.44-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037229" comment="libpng16-compat-devel-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050168" comment="libpng16-devel-1.6.44-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151417" comment="libpng16-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050169" comment="libpng16-devel-x86-64-v3-1.6.44-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037230" comment="libpng16-devel-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050170" comment="libpng16-tools-1.6.44-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153137" comment="libpng16-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202625674" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-25674</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-25674" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25674" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-25674" ref_url="https://www.suse.com/security/cve/CVE-2026-25674" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024579.html" source="SUSE-SU"/>
    <description>
    An issue was discovered in 6.0 before 6.0.3, 5.2 before 5.2.12, and 4.2 before 4.2.29.
Race condition in file-system storage and file-based cache backends in Django allows an attacker to cause file system objects to be created with incorrect permissions via concurrent requests, where one thread's temporary `umask` change affects other threads in multi-threaded environments.
Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected.
Django would like to thank Tarek Nakkouch for reporting this issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-03-18"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.8/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25674/">CVE-2026-25674 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-25674">CVE-2026-25674 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259142">SUSE bug 1259142</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049133" comment="python313-Django-5.2.4-bp160.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025481" comment="python313-Django is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202625679" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-25679</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-25679" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25679" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-25679" ref_url="https://www.suse.com/security/cve/CVE-2026-25679" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:5942" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003279.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5944" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002629.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6382" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003285.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6383" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003287.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6949" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002657.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:7009" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002664.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:7011" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003284.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:7259" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003290.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0993-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024927.html" source="SUSE-SU"/>
    <description>
    url.Parse insufficiently validated the host/authority component and accepted some invalid URLs.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-13"/>
	<updated date="2026-04-11"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25679/">CVE-2026-25679 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-25679">CVE-2026-25679 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259264">SUSE bug 1259264</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048423" comment="go1.26-1.26.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048372" comment="go1.26 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048424" comment="go1.26-doc-1.26.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048373" comment="go1.26-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048425" comment="go1.26-libstd-1.26.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048467" comment="go1.26-libstd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048426" comment="go1.26-race-1.26.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048374" comment="go1.26-race is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202625727" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-25727</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-25727" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25727" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-25727" ref_url="https://www.suse.com/security/cve/CVE-2026-25727" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2026:20990-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045341.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0452-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024129.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0453-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024128.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0470-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024143.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0505-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024243.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0506-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024238.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0514-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024235.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0582-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024364.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024385.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0806-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024566.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0816-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024582.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0819-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024580.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0860-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024670.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20526-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024496.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20534-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024561.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20575-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024626.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20661-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024751.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20684-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024735.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20723-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024764.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20744-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024836.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20748-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024835.html" source="SUSE-SU"/>
    <description>
    time provides date and time handling in Rust. From 0.3.6 to before 0.3.47, when user-provided input is provided to any type that parses with the RFC 2822 format, a denial of service attack via stack exhaustion is possible. The attack relies on formally deprecated and rarely-used features that are part of the RFC 2822 format used in a malicious manner. Ordinary, non-malicious input will never encounter this scenario. A limit to the depth of recursion was added in v0.3.47. From this version, an error will be returned rather than exhausting the stack.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-20"/>
	<updated date="2026-04-10"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25727/">CVE-2026-25727 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25727">CVE-2026-25727 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257901">SUSE bug 1257901</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052692" comment="himmelblau-2.3.8+git0.dec3693-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032129" comment="himmelblau is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052693" comment="himmelblau-qr-greeter-2.3.8+git0.dec3693-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032130" comment="himmelblau-qr-greeter is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052694" comment="himmelblau-sshd-config-2.3.8+git0.dec3693-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032131" comment="himmelblau-sshd-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052695" comment="himmelblau-sso-2.3.8+git0.dec3693-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032132" comment="himmelblau-sso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049112" comment="keylime-ima-policy-0.2.8+116-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010049138" comment="keylime-ima-policy is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052696" comment="libnss_himmelblau2-2.3.8+git0.dec3693-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032133" comment="libnss_himmelblau2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052697" comment="pam-himmelblau-2.3.8+git0.dec3693-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032134" comment="pam-himmelblau is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050011" comment="python313-maturin-1.8.7-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010042322" comment="python313-maturin is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049113" comment="rust-keylime-0.2.8+116-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010049139" comment="rust-keylime is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050171" comment="snpguest-0.10.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010020071" comment="snpguest is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047569" comment="virtiofsd-1.12.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010047298" comment="virtiofsd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044384" comment="wicked2nm-1.4.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010044388" comment="wicked2nm is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202625794" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-25794</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-25794" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25794" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-25794" ref_url="https://www.suse.com/security/cve/CVE-2026-25794" source="SUSE CVE"/>
    <description>
    ImageMagick is free and open-source software used for editing and manipulating digital images. `WriteUHDRImage` in `coders/uhdr.c` uses `int` arithmetic to compute the pixel buffer size. Prior to version 7.1.2-15, when image dimensions are large, the multiplication overflows 32-bit `int`, causing an undersized heap allocation followed by an out-of-bounds write. This can crash the process or potentially lead to an out of bounds heap write. Version 7.1.2-15 contains a patch.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-11"/>
	<updated date="2026-03-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://www.suse.com/security/cve/CVE-2026-25794/">CVE-2026-25794 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-25794">CVE-2026-25794 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258749">SUSE bug 1258749</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047932" comment="ImageMagick-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047933" comment="ImageMagick-config-7-SUSE-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047934" comment="ImageMagick-config-7-upstream-limited-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977490" comment="ImageMagick-config-7-upstream-limited is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047935" comment="ImageMagick-config-7-upstream-open-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977491" comment="ImageMagick-config-7-upstream-open is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047936" comment="ImageMagick-config-7-upstream-secure-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977492" comment="ImageMagick-config-7-upstream-secure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047937" comment="ImageMagick-config-7-upstream-websafe-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977493" comment="ImageMagick-config-7-upstream-websafe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047938" comment="ImageMagick-devel-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047939" comment="ImageMagick-doc-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047940" comment="ImageMagick-extra-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047941" comment="libMagick++-7_Q16HDRI5-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698047" comment="libMagick++-7_Q16HDRI5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047942" comment="libMagick++-devel-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047943" comment="libMagickCore-7_Q16HDRI10-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698048" comment="libMagickCore-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047944" comment="libMagickWand-7_Q16HDRI10-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698049" comment="libMagickWand-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047945" comment="perl-PerlMagick-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202625795" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-25795</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-25795" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25795" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-25795" ref_url="https://www.suse.com/security/cve/CVE-2026-25795" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024662.html" source="SUSE-SU"/>
    <description>
    ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, in `ReadSFWImage()` (`coders/sfw.c`), when temporary file creation fails, `read_info` is destroyed before its `filename` member is accessed, causing a NULL pointer dereference and crash. Versions 7.1.2-15 and 6.9.13-40 contain a patch.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-11"/>
	<updated date="2026-03-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25795/">CVE-2026-25795 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25795">CVE-2026-25795 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258792">SUSE bug 1258792</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047932" comment="ImageMagick-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047933" comment="ImageMagick-config-7-SUSE-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047934" comment="ImageMagick-config-7-upstream-limited-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977490" comment="ImageMagick-config-7-upstream-limited is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047935" comment="ImageMagick-config-7-upstream-open-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977491" comment="ImageMagick-config-7-upstream-open is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047936" comment="ImageMagick-config-7-upstream-secure-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977492" comment="ImageMagick-config-7-upstream-secure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047937" comment="ImageMagick-config-7-upstream-websafe-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977493" comment="ImageMagick-config-7-upstream-websafe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047938" comment="ImageMagick-devel-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047939" comment="ImageMagick-doc-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047940" comment="ImageMagick-extra-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047941" comment="libMagick++-7_Q16HDRI5-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698047" comment="libMagick++-7_Q16HDRI5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047942" comment="libMagick++-devel-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047943" comment="libMagickCore-7_Q16HDRI10-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698048" comment="libMagickCore-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047944" comment="libMagickWand-7_Q16HDRI10-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698049" comment="libMagickWand-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047945" comment="perl-PerlMagick-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202625796" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-25796</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-25796" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25796" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-25796" ref_url="https://www.suse.com/security/cve/CVE-2026-25796" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024662.html" source="SUSE-SU"/>
    <description>
    ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, in `ReadSTEGANOImage()` (`coders/stegano.c`), the `watermark` Image object is not freed on three early-return paths, resulting in a definite memory leak (~13.5KB+ per invocation) that can be exploited for denial of service. Versions 7.1.2-15 and 6.9.13-40 contain a patch.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-11"/>
	<updated date="2026-03-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2026-25796/">CVE-2026-25796 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25796">CVE-2026-25796 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258757">SUSE bug 1258757</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047932" comment="ImageMagick-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047933" comment="ImageMagick-config-7-SUSE-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047934" comment="ImageMagick-config-7-upstream-limited-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977490" comment="ImageMagick-config-7-upstream-limited is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047935" comment="ImageMagick-config-7-upstream-open-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977491" comment="ImageMagick-config-7-upstream-open is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047936" comment="ImageMagick-config-7-upstream-secure-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977492" comment="ImageMagick-config-7-upstream-secure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047937" comment="ImageMagick-config-7-upstream-websafe-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977493" comment="ImageMagick-config-7-upstream-websafe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047938" comment="ImageMagick-devel-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047939" comment="ImageMagick-doc-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047940" comment="ImageMagick-extra-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047941" comment="libMagick++-7_Q16HDRI5-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698047" comment="libMagick++-7_Q16HDRI5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047942" comment="libMagick++-devel-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047943" comment="libMagickCore-7_Q16HDRI10-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698048" comment="libMagickCore-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047944" comment="libMagickWand-7_Q16HDRI10-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698049" comment="libMagickWand-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047945" comment="perl-PerlMagick-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202625797" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-25797</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-25797" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25797" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-25797" ref_url="https://www.suse.com/security/cve/CVE-2026-25797" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024662.html" source="SUSE-SU"/>
    <description>
    ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, the ps coders, responsible for writing PostScript files, fails to sanitize the input before writing it into the PostScript header.  An attacker can provide a malicous file and inject arbitrary PostScript code. When the resulting file is processed by a printer or a viewer (like Ghostscript), the injected code is interpreted and executed. The html encoder does not properly escape strings that are written to in the html document. An attacker can provide a malicious file and injection arbitrary html code. Versions 7.1.2-15 and 6.9.13-40 contain a patch.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-11"/>
	<updated date="2026-03-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.7/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-25797/">CVE-2026-25797 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25797">CVE-2026-25797 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258770">SUSE bug 1258770</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047932" comment="ImageMagick-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047933" comment="ImageMagick-config-7-SUSE-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047934" comment="ImageMagick-config-7-upstream-limited-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977490" comment="ImageMagick-config-7-upstream-limited is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047935" comment="ImageMagick-config-7-upstream-open-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977491" comment="ImageMagick-config-7-upstream-open is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047936" comment="ImageMagick-config-7-upstream-secure-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977492" comment="ImageMagick-config-7-upstream-secure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047937" comment="ImageMagick-config-7-upstream-websafe-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977493" comment="ImageMagick-config-7-upstream-websafe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047938" comment="ImageMagick-devel-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047939" comment="ImageMagick-doc-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047940" comment="ImageMagick-extra-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047941" comment="libMagick++-7_Q16HDRI5-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698047" comment="libMagick++-7_Q16HDRI5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047942" comment="libMagick++-devel-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047943" comment="libMagickCore-7_Q16HDRI10-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698048" comment="libMagickCore-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047944" comment="libMagickWand-7_Q16HDRI10-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698049" comment="libMagickWand-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047945" comment="perl-PerlMagick-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202625798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-25798</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-25798" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25798" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-25798" ref_url="https://www.suse.com/security/cve/CVE-2026-25798" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024663.html" source="SUSE-SU"/>
    <description>
    ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, a NULL pointer dereference in ClonePixelCacheRepository allows a remote attacker to crash any application linked against ImageMagick by supplying a crafted image file, resulting in denial of service. Versions 7.1.2-15 and 6.9.13-40 contain a patch.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-11"/>
	<updated date="2026-03-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25798/">CVE-2026-25798 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25798">CVE-2026-25798 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258787">SUSE bug 1258787</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047932" comment="ImageMagick-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047933" comment="ImageMagick-config-7-SUSE-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047934" comment="ImageMagick-config-7-upstream-limited-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977490" comment="ImageMagick-config-7-upstream-limited is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047935" comment="ImageMagick-config-7-upstream-open-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977491" comment="ImageMagick-config-7-upstream-open is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047936" comment="ImageMagick-config-7-upstream-secure-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977492" comment="ImageMagick-config-7-upstream-secure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047937" comment="ImageMagick-config-7-upstream-websafe-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977493" comment="ImageMagick-config-7-upstream-websafe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047938" comment="ImageMagick-devel-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047939" comment="ImageMagick-doc-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047940" comment="ImageMagick-extra-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047941" comment="libMagick++-7_Q16HDRI5-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698047" comment="libMagick++-7_Q16HDRI5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047942" comment="libMagick++-devel-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047943" comment="libMagickCore-7_Q16HDRI10-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698048" comment="libMagickCore-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047944" comment="libMagickWand-7_Q16HDRI10-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698049" comment="libMagickWand-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047945" comment="perl-PerlMagick-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202625799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-25799</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-25799" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25799" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-25799" ref_url="https://www.suse.com/security/cve/CVE-2026-25799" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0874-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024675.html" source="SUSE-SU"/>
    <description>
    ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, a logic error in YUV sampling factor validation allows an invalid sampling factor to bypass checks and trigger a division-by-zero during image loading, resulting in a reliable denial-of-service. Versions 7.1.2-15 and 6.9.13-40 contain a patch.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-11"/>
	<updated date="2026-04-03"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25799/">CVE-2026-25799 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25799">CVE-2026-25799 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258786">SUSE bug 1258786</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052596" comment="GraphicsMagick-1.3.45-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152591" comment="GraphicsMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052597" comment="GraphicsMagick-devel-1.3.45-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151256" comment="GraphicsMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047932" comment="ImageMagick-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047933" comment="ImageMagick-config-7-SUSE-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047934" comment="ImageMagick-config-7-upstream-limited-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977490" comment="ImageMagick-config-7-upstream-limited is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047935" comment="ImageMagick-config-7-upstream-open-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977491" comment="ImageMagick-config-7-upstream-open is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047936" comment="ImageMagick-config-7-upstream-secure-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977492" comment="ImageMagick-config-7-upstream-secure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047937" comment="ImageMagick-config-7-upstream-websafe-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977493" comment="ImageMagick-config-7-upstream-websafe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047938" comment="ImageMagick-devel-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047939" comment="ImageMagick-doc-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047940" comment="ImageMagick-extra-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052598" comment="libGraphicsMagick++-Q16-12-1.3.45-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154127" comment="libGraphicsMagick++-Q16-12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052599" comment="libGraphicsMagick++-devel-1.3.45-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152594" comment="libGraphicsMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052600" comment="libGraphicsMagick-Q16-3-1.3.45-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151257" comment="libGraphicsMagick-Q16-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052601" comment="libGraphicsMagick3-config-1.3.45-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151258" comment="libGraphicsMagick3-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052602" comment="libGraphicsMagickWand-Q16-2-1.3.45-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151259" comment="libGraphicsMagickWand-Q16-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047941" comment="libMagick++-7_Q16HDRI5-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698047" comment="libMagick++-7_Q16HDRI5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047942" comment="libMagick++-devel-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047943" comment="libMagickCore-7_Q16HDRI10-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698048" comment="libMagickCore-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047944" comment="libMagickWand-7_Q16HDRI10-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698049" comment="libMagickWand-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052603" comment="perl-GraphicsMagick-1.3.45-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152600" comment="perl-GraphicsMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047945" comment="perl-PerlMagick-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202625884" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-25884</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-25884" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25884" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-25884" ref_url="https://www.suse.com/security/cve/CVE-2026-25884" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045229.html" source="SUSE-SU"/>
    <description>
    Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and ICC image metadata. Prior to version 0.28.8, an out-of-bounds read was found. The vulnerability is in the CRW image parser. This issue has been patched in version 0.28.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25884/">CVE-2026-25884 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25884">CVE-2026-25884 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259083">SUSE bug 1259083</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051765" comment="exiv2-0.28.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154125" comment="exiv2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051766" comment="exiv2-lang-0.28.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154126" comment="exiv2-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050764" comment="libexiv2-28-0.28.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010051915" comment="libexiv2-28 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050765" comment="libexiv2-28-x86-64-v3-0.28.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010051916" comment="libexiv2-28-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051767" comment="libexiv2-devel-0.28.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152552" comment="libexiv2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202625897" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-25897</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-25897" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25897" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-25897" ref_url="https://www.suse.com/security/cve/CVE-2026-25897" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024663.html" source="SUSE-SU"/>
    <description>
    ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, an Integer Overflow vulnerability exists in the sun decoder. On 32-bit systems/builds, a carefully crafted image can lead to an out of bounds heap write. Versions 7.1.2-15 and 6.9.13-40 contain a patch.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-11"/>
	<updated date="2026-03-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25897/">CVE-2026-25897 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25897">CVE-2026-25897 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258799">SUSE bug 1258799</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047932" comment="ImageMagick-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047933" comment="ImageMagick-config-7-SUSE-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047934" comment="ImageMagick-config-7-upstream-limited-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977490" comment="ImageMagick-config-7-upstream-limited is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047935" comment="ImageMagick-config-7-upstream-open-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977491" comment="ImageMagick-config-7-upstream-open is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047936" comment="ImageMagick-config-7-upstream-secure-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977492" comment="ImageMagick-config-7-upstream-secure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047937" comment="ImageMagick-config-7-upstream-websafe-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977493" comment="ImageMagick-config-7-upstream-websafe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047938" comment="ImageMagick-devel-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047939" comment="ImageMagick-doc-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047940" comment="ImageMagick-extra-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047941" comment="libMagick++-7_Q16HDRI5-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698047" comment="libMagick++-7_Q16HDRI5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047942" comment="libMagick++-devel-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047943" comment="libMagickCore-7_Q16HDRI10-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698048" comment="libMagickCore-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047944" comment="libMagickWand-7_Q16HDRI10-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698049" comment="libMagickWand-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047945" comment="perl-PerlMagick-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202625898" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-25898</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-25898" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25898" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-25898" ref_url="https://www.suse.com/security/cve/CVE-2026-25898" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024663.html" source="SUSE-SU"/>
    <description>
    ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, the UIL and XPM image encoder do not validate the pixel index value returned by `GetPixelIndex()` before using it as an array subscript. In HDRI builds, `Quantum` is a floating-point type, so pixel index values can be negative. An attacker can craft an image with negative pixel index values to trigger a global buffer overflow read during conversion, leading to information disclosure or a process crash. Versions 7.1.2-15 and 6.9.13-40 contain a patch.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-11"/>
	<updated date="2026-03-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25898/">CVE-2026-25898 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25898">CVE-2026-25898 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258807">SUSE bug 1258807</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047932" comment="ImageMagick-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047933" comment="ImageMagick-config-7-SUSE-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047934" comment="ImageMagick-config-7-upstream-limited-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977490" comment="ImageMagick-config-7-upstream-limited is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047935" comment="ImageMagick-config-7-upstream-open-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977491" comment="ImageMagick-config-7-upstream-open is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047936" comment="ImageMagick-config-7-upstream-secure-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977492" comment="ImageMagick-config-7-upstream-secure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047937" comment="ImageMagick-config-7-upstream-websafe-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977493" comment="ImageMagick-config-7-upstream-websafe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047938" comment="ImageMagick-devel-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047939" comment="ImageMagick-doc-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047940" comment="ImageMagick-extra-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047941" comment="libMagick++-7_Q16HDRI5-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698047" comment="libMagick++-7_Q16HDRI5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047942" comment="libMagick++-devel-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047943" comment="libMagickCore-7_Q16HDRI10-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698048" comment="libMagickCore-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047944" comment="libMagickWand-7_Q16HDRI10-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698049" comment="libMagickWand-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047945" comment="perl-PerlMagick-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202625916" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-25916</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-25916" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25916" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-25916" ref_url="https://www.suse.com/security/cve/CVE-2026-25916" source="SUSE CVE"/>
    <description>
    Roundcube Webmail before 1.5.13 and 1.6 before 1.6.13, when "Block remote images" is used, does not block SVG feImage.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-25916/">CVE-2026-25916 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-25916">CVE-2026-25916 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257909">SUSE bug 1257909</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047349" comment="roundcubemail-1.6.13-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152670" comment="roundcubemail is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202625965" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-25965</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-25965" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25965" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-25965" ref_url="https://www.suse.com/security/cve/CVE-2026-25965" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024663.html" source="SUSE-SU"/>
    <description>
    ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, ImageMagick's path security policy is enforced on the raw filename string before the filesystem resolves it. As a result, a policy rule such as /etc/* can be bypassed by a path traversal. The OS resolves the traversal and opens the sensitive file, but the policy matcher only sees the unnormalized path and therefore allows the read. This enables local file disclosure (LFI) even when policy-secure.xml is applied. Actions to prevent reading from files have been taken in versions .7.1.2-15 and 6.9.13-40 But it make sure writing is also not possible the following should be added to one's policy. This will also be included in ImageMagick's more secure policies by default.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-11"/>
	<updated date="2026-03-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N" cvss4="9.2/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25965/">CVE-2026-25965 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25965">CVE-2026-25965 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258785">SUSE bug 1258785</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047932" comment="ImageMagick-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047933" comment="ImageMagick-config-7-SUSE-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047934" comment="ImageMagick-config-7-upstream-limited-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977490" comment="ImageMagick-config-7-upstream-limited is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047935" comment="ImageMagick-config-7-upstream-open-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977491" comment="ImageMagick-config-7-upstream-open is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047936" comment="ImageMagick-config-7-upstream-secure-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977492" comment="ImageMagick-config-7-upstream-secure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047937" comment="ImageMagick-config-7-upstream-websafe-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977493" comment="ImageMagick-config-7-upstream-websafe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047938" comment="ImageMagick-devel-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047939" comment="ImageMagick-doc-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047940" comment="ImageMagick-extra-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047941" comment="libMagick++-7_Q16HDRI5-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698047" comment="libMagick++-7_Q16HDRI5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047942" comment="libMagick++-devel-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047943" comment="libMagickCore-7_Q16HDRI10-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698048" comment="libMagickCore-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047944" comment="libMagickWand-7_Q16HDRI10-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698049" comment="libMagickWand-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047945" comment="perl-PerlMagick-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202625966" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-25966</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-25966" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25966" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-25966" ref_url="https://www.suse.com/security/cve/CVE-2026-25966" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024662.html" source="SUSE-SU"/>
    <description>
    ImageMagick is free and open-source software used for editing and manipulating digital images. The shipped "secure" security policy includes a rule intended to prevent reading/writing from standard streams. However, ImageMagick also supports fd:&lt;n&gt; pseudo-filenames (e.g., fd:0, fd:1). Prior to versions 7.1.2-15 and 6.9.13-40, this path form is not blocked by the secure policy templates, and therefore bypasses the protection goal of "no stdin/stdout." Versions 7.1.2-15 and 6.9.13-40 contain a patch by including a change to the more secure policies by default. As a workaround, add the change to one's security policy manually.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-11"/>
	<updated date="2026-03-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="5.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25966/">CVE-2026-25966 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25966">CVE-2026-25966 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258780">SUSE bug 1258780</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047932" comment="ImageMagick-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047933" comment="ImageMagick-config-7-SUSE-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047934" comment="ImageMagick-config-7-upstream-limited-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977490" comment="ImageMagick-config-7-upstream-limited is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047935" comment="ImageMagick-config-7-upstream-open-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977491" comment="ImageMagick-config-7-upstream-open is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047936" comment="ImageMagick-config-7-upstream-secure-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977492" comment="ImageMagick-config-7-upstream-secure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047937" comment="ImageMagick-config-7-upstream-websafe-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977493" comment="ImageMagick-config-7-upstream-websafe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047938" comment="ImageMagick-devel-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047939" comment="ImageMagick-doc-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047940" comment="ImageMagick-extra-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047941" comment="libMagick++-7_Q16HDRI5-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698047" comment="libMagick++-7_Q16HDRI5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047942" comment="libMagick++-devel-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047943" comment="libMagickCore-7_Q16HDRI10-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698048" comment="libMagickCore-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047944" comment="libMagickWand-7_Q16HDRI10-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698049" comment="libMagickWand-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047945" comment="perl-PerlMagick-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202625967" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-25967</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-25967" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25967" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-25967" ref_url="https://www.suse.com/security/cve/CVE-2026-25967" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024664.html" source="SUSE-SU"/>
    <description>
    ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to version 7.1.2-15, a stack-based buffer overflow exists in the ImageMagick FTXT image reader. A crafted FTXT file can cause out-of-bounds writes on the stack, leading to a crash. Version 7.1.2-15 contains a patch.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-11"/>
	<updated date="2026-03-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25967/">CVE-2026-25967 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25967">CVE-2026-25967 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258779">SUSE bug 1258779</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047932" comment="ImageMagick-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047933" comment="ImageMagick-config-7-SUSE-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047934" comment="ImageMagick-config-7-upstream-limited-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977490" comment="ImageMagick-config-7-upstream-limited is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047935" comment="ImageMagick-config-7-upstream-open-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977491" comment="ImageMagick-config-7-upstream-open is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047936" comment="ImageMagick-config-7-upstream-secure-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977492" comment="ImageMagick-config-7-upstream-secure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047937" comment="ImageMagick-config-7-upstream-websafe-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977493" comment="ImageMagick-config-7-upstream-websafe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047938" comment="ImageMagick-devel-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047939" comment="ImageMagick-doc-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047940" comment="ImageMagick-extra-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047941" comment="libMagick++-7_Q16HDRI5-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698047" comment="libMagick++-7_Q16HDRI5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047942" comment="libMagick++-devel-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047943" comment="libMagickCore-7_Q16HDRI10-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698048" comment="libMagickCore-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047944" comment="libMagickWand-7_Q16HDRI10-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698049" comment="libMagickWand-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047945" comment="perl-PerlMagick-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202625968" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-25968</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-25968" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25968" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-25968" ref_url="https://www.suse.com/security/cve/CVE-2026-25968" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024664.html" source="SUSE-SU"/>
    <description>
    ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, a stack buffer overflow occurs when processing the an attribute in msl.c. A long value overflows a fixed-size stack buffer, leading to memory corruption. Versions 7.1.2-15 and 6.9.13-40 contain a patch.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-11"/>
	<updated date="2026-03-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25968/">CVE-2026-25968 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25968">CVE-2026-25968 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258776">SUSE bug 1258776</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047932" comment="ImageMagick-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047933" comment="ImageMagick-config-7-SUSE-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047934" comment="ImageMagick-config-7-upstream-limited-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977490" comment="ImageMagick-config-7-upstream-limited is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047935" comment="ImageMagick-config-7-upstream-open-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977491" comment="ImageMagick-config-7-upstream-open is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047936" comment="ImageMagick-config-7-upstream-secure-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977492" comment="ImageMagick-config-7-upstream-secure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047937" comment="ImageMagick-config-7-upstream-websafe-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977493" comment="ImageMagick-config-7-upstream-websafe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047938" comment="ImageMagick-devel-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047939" comment="ImageMagick-doc-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047940" comment="ImageMagick-extra-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047941" comment="libMagick++-7_Q16HDRI5-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698047" comment="libMagick++-7_Q16HDRI5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047942" comment="libMagick++-devel-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047943" comment="libMagickCore-7_Q16HDRI10-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698048" comment="libMagickCore-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047944" comment="libMagickWand-7_Q16HDRI10-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698049" comment="libMagickWand-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047945" comment="perl-PerlMagick-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202625969" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-25969</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-25969" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25969" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-25969" ref_url="https://www.suse.com/security/cve/CVE-2026-25969" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024664.html" source="SUSE-SU"/>
    <description>
    ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to version 7.1.2-15, a memory leak exists in `coders/ashlar.c`. The `WriteASHLARImage` allocates a structure.  However, when an exception is thrown, the allocated memory is not properly released, resulting in a potential memory leak. Version 7.1.2-15 contains a patch.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-11"/>
	<updated date="2026-03-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2026-25969/">CVE-2026-25969 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25969">CVE-2026-25969 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258775">SUSE bug 1258775</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047932" comment="ImageMagick-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047933" comment="ImageMagick-config-7-SUSE-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047934" comment="ImageMagick-config-7-upstream-limited-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977490" comment="ImageMagick-config-7-upstream-limited is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047935" comment="ImageMagick-config-7-upstream-open-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977491" comment="ImageMagick-config-7-upstream-open is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047936" comment="ImageMagick-config-7-upstream-secure-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977492" comment="ImageMagick-config-7-upstream-secure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047937" comment="ImageMagick-config-7-upstream-websafe-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977493" comment="ImageMagick-config-7-upstream-websafe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047938" comment="ImageMagick-devel-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047939" comment="ImageMagick-doc-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047940" comment="ImageMagick-extra-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047941" comment="libMagick++-7_Q16HDRI5-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698047" comment="libMagick++-7_Q16HDRI5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047942" comment="libMagick++-devel-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047943" comment="libMagickCore-7_Q16HDRI10-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698048" comment="libMagickCore-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047944" comment="libMagickWand-7_Q16HDRI10-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698049" comment="libMagickWand-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047945" comment="perl-PerlMagick-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202625970" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-25970</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-25970" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25970" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-25970" ref_url="https://www.suse.com/security/cve/CVE-2026-25970" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024663.html" source="SUSE-SU"/>
    <description>
    ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, a signed integer overflow vulnerability in ImageMagick's SIXEL decoder allows an attacker to trigger memory corruption and denial of service when processing a maliciously crafted SIXEL image file. The vulnerability occurs during buffer reallocation operations where pointer arithmetic using signed 32-bit integers overflows. Versions 7.1.2-15 and 6.9.13-40 contain a patch.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-11"/>
	<updated date="2026-03-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25970/">CVE-2026-25970 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25970">CVE-2026-25970 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258802">SUSE bug 1258802</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047932" comment="ImageMagick-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047933" comment="ImageMagick-config-7-SUSE-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047934" comment="ImageMagick-config-7-upstream-limited-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977490" comment="ImageMagick-config-7-upstream-limited is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047935" comment="ImageMagick-config-7-upstream-open-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977491" comment="ImageMagick-config-7-upstream-open is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047936" comment="ImageMagick-config-7-upstream-secure-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977492" comment="ImageMagick-config-7-upstream-secure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047937" comment="ImageMagick-config-7-upstream-websafe-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977493" comment="ImageMagick-config-7-upstream-websafe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047938" comment="ImageMagick-devel-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047939" comment="ImageMagick-doc-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047940" comment="ImageMagick-extra-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047941" comment="libMagick++-7_Q16HDRI5-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698047" comment="libMagick++-7_Q16HDRI5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047942" comment="libMagick++-devel-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047943" comment="libMagickCore-7_Q16HDRI10-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698048" comment="libMagickCore-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047944" comment="libMagickWand-7_Q16HDRI10-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698049" comment="libMagickWand-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047945" comment="perl-PerlMagick-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202625971" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-25971</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-25971" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25971" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-25971" ref_url="https://www.suse.com/security/cve/CVE-2026-25971" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1202-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045302.html" source="SUSE-SU"/>
    <description>
    ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, Magick fails to check for circular references between two MSLs, leading to a stack overflow. Versions 7.1.2-15 and 6.9.13-40 contain a patch.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-11"/>
	<updated date="2026-04-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="5.1/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25971/">CVE-2026-25971 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25971">CVE-2026-25971 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258774">SUSE bug 1258774</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047932" comment="ImageMagick-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047933" comment="ImageMagick-config-7-SUSE-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047934" comment="ImageMagick-config-7-upstream-limited-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977490" comment="ImageMagick-config-7-upstream-limited is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047935" comment="ImageMagick-config-7-upstream-open-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977491" comment="ImageMagick-config-7-upstream-open is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047936" comment="ImageMagick-config-7-upstream-secure-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977492" comment="ImageMagick-config-7-upstream-secure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047937" comment="ImageMagick-config-7-upstream-websafe-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977493" comment="ImageMagick-config-7-upstream-websafe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047938" comment="ImageMagick-devel-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047939" comment="ImageMagick-doc-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047940" comment="ImageMagick-extra-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047941" comment="libMagick++-7_Q16HDRI5-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698047" comment="libMagick++-7_Q16HDRI5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047942" comment="libMagick++-devel-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047943" comment="libMagickCore-7_Q16HDRI10-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698048" comment="libMagickCore-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047944" comment="libMagickWand-7_Q16HDRI10-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698049" comment="libMagickWand-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047945" comment="perl-PerlMagick-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202625982" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-25982</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-25982" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25982" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-25982" ref_url="https://www.suse.com/security/cve/CVE-2026-25982" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024665.html" source="SUSE-SU"/>
    <description>
    ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, a heap out-of-bounds read vulnerability exists in the `coders/dcm.c` module. When processing DICOM files with a specific configuration, the decoder loop incorrectly reads bytes per iteration. This causes the function to read past the end of the allocated buffer, potentially leading to a Denial of Service (crash) or Information Disclosure (leaking heap memory into the image). Versions 7.1.2-15 and 6.9.13-40 contain a patch.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-11"/>
	<updated date="2026-03-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25982/">CVE-2026-25982 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25982">CVE-2026-25982 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258772">SUSE bug 1258772</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047932" comment="ImageMagick-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047933" comment="ImageMagick-config-7-SUSE-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047934" comment="ImageMagick-config-7-upstream-limited-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977490" comment="ImageMagick-config-7-upstream-limited is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047935" comment="ImageMagick-config-7-upstream-open-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977491" comment="ImageMagick-config-7-upstream-open is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047936" comment="ImageMagick-config-7-upstream-secure-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977492" comment="ImageMagick-config-7-upstream-secure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047937" comment="ImageMagick-config-7-upstream-websafe-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977493" comment="ImageMagick-config-7-upstream-websafe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047938" comment="ImageMagick-devel-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047939" comment="ImageMagick-doc-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047940" comment="ImageMagick-extra-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047941" comment="libMagick++-7_Q16HDRI5-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698047" comment="libMagick++-7_Q16HDRI5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047942" comment="libMagick++-devel-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047943" comment="libMagickCore-7_Q16HDRI10-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698048" comment="libMagickCore-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047944" comment="libMagickWand-7_Q16HDRI10-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698049" comment="libMagickWand-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047945" comment="perl-PerlMagick-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202625983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-25983</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-25983" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25983" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-25983" ref_url="https://www.suse.com/security/cve/CVE-2026-25983" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024662.html" source="SUSE-SU"/>
    <description>
    ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, a crafted MSL script triggers a heap-use-after-free. The operation element handler replaces and frees the image while the parser continues reading from it, leading to a UAF in ReadBlobString during further parsing. Versions 7.1.2-15 and 6.9.13-40 contain a patch.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-11"/>
	<updated date="2026-03-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25983/">CVE-2026-25983 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25983">CVE-2026-25983 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258805">SUSE bug 1258805</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047932" comment="ImageMagick-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047933" comment="ImageMagick-config-7-SUSE-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047934" comment="ImageMagick-config-7-upstream-limited-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977490" comment="ImageMagick-config-7-upstream-limited is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047935" comment="ImageMagick-config-7-upstream-open-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977491" comment="ImageMagick-config-7-upstream-open is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047936" comment="ImageMagick-config-7-upstream-secure-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977492" comment="ImageMagick-config-7-upstream-secure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047937" comment="ImageMagick-config-7-upstream-websafe-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977493" comment="ImageMagick-config-7-upstream-websafe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047938" comment="ImageMagick-devel-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047939" comment="ImageMagick-doc-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047940" comment="ImageMagick-extra-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047941" comment="libMagick++-7_Q16HDRI5-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698047" comment="libMagick++-7_Q16HDRI5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047942" comment="libMagick++-devel-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047943" comment="libMagickCore-7_Q16HDRI10-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698048" comment="libMagickCore-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047944" comment="libMagickWand-7_Q16HDRI10-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698049" comment="libMagickWand-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047945" comment="perl-PerlMagick-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202625985" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-25985</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-25985" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25985" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-25985" ref_url="https://www.suse.com/security/cve/CVE-2026-25985" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024664.html" source="SUSE-SU"/>
    <description>
    ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, a crafted SVG file containing an malicious element causes ImageMagick to attempt to allocate ~674 GB of memory, leading to an out-of-memory abort. Versions 7.1.2-15 and 6.9.13-40 contain a patch.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-11"/>
	<updated date="2026-03-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25985/">CVE-2026-25985 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-25985">CVE-2026-25985 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258812">SUSE bug 1258812</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047932" comment="ImageMagick-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047933" comment="ImageMagick-config-7-SUSE-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047934" comment="ImageMagick-config-7-upstream-limited-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977490" comment="ImageMagick-config-7-upstream-limited is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047935" comment="ImageMagick-config-7-upstream-open-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977491" comment="ImageMagick-config-7-upstream-open is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047936" comment="ImageMagick-config-7-upstream-secure-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977492" comment="ImageMagick-config-7-upstream-secure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047937" comment="ImageMagick-config-7-upstream-websafe-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977493" comment="ImageMagick-config-7-upstream-websafe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047938" comment="ImageMagick-devel-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047939" comment="ImageMagick-doc-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047940" comment="ImageMagick-extra-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047941" comment="libMagick++-7_Q16HDRI5-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698047" comment="libMagick++-7_Q16HDRI5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047942" comment="libMagick++-devel-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047943" comment="libMagickCore-7_Q16HDRI10-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698048" comment="libMagickCore-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047944" comment="libMagickWand-7_Q16HDRI10-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698049" comment="libMagickWand-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047945" comment="perl-PerlMagick-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202625986" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-25986</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-25986" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25986" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-25986" ref_url="https://www.suse.com/security/cve/CVE-2026-25986" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024663.html" source="SUSE-SU"/>
    <description>
    ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, a heap buffer overflow write vulnerability exists in ReadYUVImage() (coders/yuv.c) when processing malicious YUV 4:2:2 (NoInterlace) images. The pixel-pair loop writes one pixel beyond the allocated row buffer. Versions 7.1.2-15 and 6.9.13-40 contain a patch.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-11"/>
	<updated date="2026-03-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25986/">CVE-2026-25986 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25986">CVE-2026-25986 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258818">SUSE bug 1258818</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047932" comment="ImageMagick-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047933" comment="ImageMagick-config-7-SUSE-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047934" comment="ImageMagick-config-7-upstream-limited-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977490" comment="ImageMagick-config-7-upstream-limited is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047935" comment="ImageMagick-config-7-upstream-open-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977491" comment="ImageMagick-config-7-upstream-open is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047936" comment="ImageMagick-config-7-upstream-secure-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977492" comment="ImageMagick-config-7-upstream-secure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047937" comment="ImageMagick-config-7-upstream-websafe-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977493" comment="ImageMagick-config-7-upstream-websafe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047938" comment="ImageMagick-devel-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047939" comment="ImageMagick-doc-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047940" comment="ImageMagick-extra-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047941" comment="libMagick++-7_Q16HDRI5-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698047" comment="libMagick++-7_Q16HDRI5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047942" comment="libMagick++-devel-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047943" comment="libMagickCore-7_Q16HDRI10-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698048" comment="libMagickCore-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047944" comment="libMagickWand-7_Q16HDRI10-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698049" comment="libMagickWand-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047945" comment="perl-PerlMagick-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202625987" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-25987</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-25987" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25987" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-25987" ref_url="https://www.suse.com/security/cve/CVE-2026-25987" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024662.html" source="SUSE-SU"/>
    <description>
    ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, a heap buffer over-read vulnerability exists in the MAP image decoder when processing crafted MAP files, potentially leading to crashes or unintended memory disclosure during image decoding. Versions 7.1.2-15 and 6.9.13-40 contain a patch.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-11"/>
	<updated date="2026-03-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25987/">CVE-2026-25987 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25987">CVE-2026-25987 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258821">SUSE bug 1258821</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047932" comment="ImageMagick-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047933" comment="ImageMagick-config-7-SUSE-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047934" comment="ImageMagick-config-7-upstream-limited-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977490" comment="ImageMagick-config-7-upstream-limited is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047935" comment="ImageMagick-config-7-upstream-open-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977491" comment="ImageMagick-config-7-upstream-open is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047936" comment="ImageMagick-config-7-upstream-secure-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977492" comment="ImageMagick-config-7-upstream-secure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047937" comment="ImageMagick-config-7-upstream-websafe-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977493" comment="ImageMagick-config-7-upstream-websafe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047938" comment="ImageMagick-devel-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047939" comment="ImageMagick-doc-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047940" comment="ImageMagick-extra-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047941" comment="libMagick++-7_Q16HDRI5-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698047" comment="libMagick++-7_Q16HDRI5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047942" comment="libMagick++-devel-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047943" comment="libMagickCore-7_Q16HDRI10-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698048" comment="libMagickCore-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047944" comment="libMagickWand-7_Q16HDRI10-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698049" comment="libMagickWand-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047945" comment="perl-PerlMagick-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202625988" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-25988</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-25988" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25988" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-25988" ref_url="https://www.suse.com/security/cve/CVE-2026-25988" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024662.html" source="SUSE-SU"/>
    <description>
    ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, sometimes msl.c fails to update the stack index, so an image is stored in the wrong slot and never freed on error, causing leaks. Versions 7.1.2-15 and 6.9.13-40 contain a patch.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-11"/>
	<updated date="2026-03-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25988/">CVE-2026-25988 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25988">CVE-2026-25988 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258810">SUSE bug 1258810</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047932" comment="ImageMagick-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047933" comment="ImageMagick-config-7-SUSE-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047934" comment="ImageMagick-config-7-upstream-limited-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977490" comment="ImageMagick-config-7-upstream-limited is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047935" comment="ImageMagick-config-7-upstream-open-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977491" comment="ImageMagick-config-7-upstream-open is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047936" comment="ImageMagick-config-7-upstream-secure-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977492" comment="ImageMagick-config-7-upstream-secure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047937" comment="ImageMagick-config-7-upstream-websafe-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977493" comment="ImageMagick-config-7-upstream-websafe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047938" comment="ImageMagick-devel-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047939" comment="ImageMagick-doc-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047940" comment="ImageMagick-extra-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047941" comment="libMagick++-7_Q16HDRI5-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698047" comment="libMagick++-7_Q16HDRI5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047942" comment="libMagick++-devel-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047943" comment="libMagickCore-7_Q16HDRI10-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698048" comment="libMagickCore-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047944" comment="libMagickWand-7_Q16HDRI10-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698049" comment="libMagickWand-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047945" comment="perl-PerlMagick-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202625989" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-25989</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-25989" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25989" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-25989" ref_url="https://www.suse.com/security/cve/CVE-2026-25989" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024663.html" source="SUSE-SU"/>
    <description>
    ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, a crafted SVG file can cause a denial of service. An off-by-one boundary check (`&gt;` instead of `&gt;=`) that allows bypass the guard and reach an undefined `(size_t)` cast. Versions 7.1.2-15 and 6.9.13-40 contain a patch.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-11"/>
	<updated date="2026-03-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25989/">CVE-2026-25989 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-25989">CVE-2026-25989 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258771">SUSE bug 1258771</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047932" comment="ImageMagick-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047933" comment="ImageMagick-config-7-SUSE-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047934" comment="ImageMagick-config-7-upstream-limited-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977490" comment="ImageMagick-config-7-upstream-limited is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047935" comment="ImageMagick-config-7-upstream-open-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977491" comment="ImageMagick-config-7-upstream-open is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047936" comment="ImageMagick-config-7-upstream-secure-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977492" comment="ImageMagick-config-7-upstream-secure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047937" comment="ImageMagick-config-7-upstream-websafe-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977493" comment="ImageMagick-config-7-upstream-websafe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047938" comment="ImageMagick-devel-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047939" comment="ImageMagick-doc-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047940" comment="ImageMagick-extra-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047941" comment="libMagick++-7_Q16HDRI5-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698047" comment="libMagick++-7_Q16HDRI5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047942" comment="libMagick++-devel-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047943" comment="libMagickCore-7_Q16HDRI10-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698048" comment="libMagickCore-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047944" comment="libMagickWand-7_Q16HDRI10-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698049" comment="libMagickWand-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047945" comment="perl-PerlMagick-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202625990" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-25990</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-25990" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-25990" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-25990" ref_url="https://www.suse.com/security/cve/CVE-2026-25990" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20992-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045339.html" source="SUSE-SU"/>
    <description>
    Pillow is a Python imaging library. From 10.3.0 to before 12.1.1, n out-of-bounds write may be triggered when loading a specially crafted PSD image. This vulnerability is fixed in 12.1.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-05"/>
	<updated date="2026-04-10"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-25990/">CVE-2026-25990 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-25990">CVE-2026-25990 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258125">SUSE bug 1258125</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052809" comment="python313-Pillow-11.3.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010052814" comment="python313-Pillow is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052810" comment="python313-Pillow-tk-11.3.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010052815" comment="python313-Pillow-tk is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202626066" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-26066</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-26066" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-26066" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-26066" ref_url="https://www.suse.com/security/cve/CVE-2026-26066" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024662.html" source="SUSE-SU"/>
    <description>
    ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, a crafted profile contain invalid IPTC data may cause an infinite loop when writing it with `IPTCTEXT`. Versions 7.1.2-15 and 6.9.13-40 contain a patch.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-11"/>
	<updated date="2026-03-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-26066/">CVE-2026-26066 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-26066">CVE-2026-26066 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258769">SUSE bug 1258769</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047932" comment="ImageMagick-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047933" comment="ImageMagick-config-7-SUSE-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047934" comment="ImageMagick-config-7-upstream-limited-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977490" comment="ImageMagick-config-7-upstream-limited is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047935" comment="ImageMagick-config-7-upstream-open-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977491" comment="ImageMagick-config-7-upstream-open is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047936" comment="ImageMagick-config-7-upstream-secure-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977492" comment="ImageMagick-config-7-upstream-secure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047937" comment="ImageMagick-config-7-upstream-websafe-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977493" comment="ImageMagick-config-7-upstream-websafe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047938" comment="ImageMagick-devel-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047939" comment="ImageMagick-doc-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047940" comment="ImageMagick-extra-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047941" comment="libMagick++-7_Q16HDRI5-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698047" comment="libMagick++-7_Q16HDRI5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047942" comment="libMagick++-devel-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047943" comment="libMagickCore-7_Q16HDRI10-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698048" comment="libMagickCore-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047944" comment="libMagickWand-7_Q16HDRI10-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698049" comment="libMagickWand-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047945" comment="perl-PerlMagick-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202626079" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-26079</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-26079" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-26079" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-26079" ref_url="https://www.suse.com/security/cve/CVE-2026-26079" source="SUSE CVE"/>
    <description>
    Roundcube Webmail before 1.5.13 and 1.6 before 1.6.13 allows Cascading Style Sheets (CSS) injection, e.g., because comments are mishandled.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-06"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-26079/">CVE-2026-26079 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-26079">CVE-2026-26079 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258052">SUSE bug 1258052</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047349" comment="roundcubemail-1.6.13-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152670" comment="roundcubemail is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202626080" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-26080</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-26080" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-26080" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-26080" ref_url="https://www.suse.com/security/cve/CVE-2026-26080" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024602.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-02"/>
	<updated date="2026-03-06"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-26080/">CVE-2026-26080 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-26080">CVE-2026-26080 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257976">SUSE bug 1257976</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010046321" comment="haproxy-3.2.12+git0.6011f448e-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238038" comment="haproxy is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202626081" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-26081</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-26081" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-26081" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-26081" ref_url="https://www.suse.com/security/cve/CVE-2026-26081" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20557-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024588.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20616-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024604.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20620-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024602.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-02"/>
	<updated date="2026-03-06"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-26081/">CVE-2026-26081 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-26081">CVE-2026-26081 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1257976">SUSE bug 1257976</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010046321" comment="haproxy-3.2.12+git0.6011f448e-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009238038" comment="haproxy is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202626157" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-26157</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-26157" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-26157" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-26157" ref_url="https://www.suse.com/security/cve/CVE-2026-26157" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0758-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025108.html" source="SUSE-SU"/>
    <description>
    A flaw was found in BusyBox. Incomplete path sanitization in its archive extraction utilities allows an attacker to craft malicious archives that when extracted, and under specific conditions, may write to files outside the intended directory. This can lead to arbitrary file overwrite, potentially enabling code execution through the modification of sensitive system files.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-25"/>
	<updated date="2026-04-02"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-26157/">CVE-2026-26157 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-26157">CVE-2026-26157 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258163">SUSE bug 1258163</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050187" comment="busybox-1.37.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152555" comment="busybox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050188" comment="busybox-static-1.37.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009653584" comment="busybox-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050189" comment="busybox-warewulf3-1.37.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009724864" comment="busybox-warewulf3 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202626158" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-26158</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-26158" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-26158" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-26158" ref_url="https://www.suse.com/security/cve/CVE-2026-26158" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0758-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024558.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024557.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0872-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024677.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0892-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024690.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20726-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024802.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20905-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025108.html" source="SUSE-SU"/>
    <description>
    A flaw was found in BusyBox. This vulnerability allows an attacker to modify files outside of the intended extraction directory by crafting a malicious tar archive containing unvalidated hardlink or symlink entries. If the tar archive is extracted with elevated privileges, this flaw can lead to privilege escalation, enabling an attacker to gain unauthorized access to critical system files.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-25"/>
	<updated date="2026-04-02"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="7.1/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-26158/">CVE-2026-26158 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-26158">CVE-2026-26158 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258167">SUSE bug 1258167</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050187" comment="busybox-1.37.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152555" comment="busybox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050188" comment="busybox-static-1.37.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009653584" comment="busybox-static is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050189" comment="busybox-warewulf3-1.37.0-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009724864" comment="busybox-warewulf3 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202626209" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-26209</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-26209" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-26209" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-26209" ref_url="https://www.suse.com/security/cve/CVE-2026-26209" source="SUSE CVE"/>
    <description>
    cbor2 provides encoding and decoding for the Concise Binary Object Representation (CBOR) serialization format. Versions prior to 5.9.0 are vulnerable to a Denial of Service (DoS) attack caused by uncontrolled recursion when decoding deeply nested CBOR structures. This vulnerability affects both the pure Python implementation and the C extension `_cbor2`. The C extension relies on Python's internal recursion limits `Py_EnterRecursiveCall` rather than a data-driven depth limit, meaning it still raises `RecursionError` and crashes the worker process when the limit is hit. While the library handles moderate nesting levels, it lacks a hard depth limit. An attacker can supply a crafted CBOR payload containing approximately 100,000 nested arrays `0x81`. When `cbor2.loads()` attempts to parse this, it hits the Python interpreter's maximum recursion depth or exhausts the stack, causing the process to crash with a `RecursionError`. Because the library does not enforce its own limits, it allows an external attacker to exhaust the host application's stack resource. In many web application servers (e.g., Gunicorn, Uvicorn) or task queues (Celery), an unhandled `RecursionError` terminates the worker process immediately. By sending a stream of these small (&lt;100KB) malicious packets, an attacker can repeatedly crash worker processes, resulting in a complete Denial of Service for the application. Version 5.9.0 patches the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-10"/>
	<updated date="2026-04-10"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-26209/">CVE-2026-26209 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-26209">CVE-2026-26209 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260367">SUSE bug 1260367</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010053367" comment="python313-cbor2-5.6.5-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032409" comment="python313-cbor2 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202626269" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-26269</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-26269" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-26269" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-26269" ref_url="https://www.suse.com/security/cve/CVE-2026-26269" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20712-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024772.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20717-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024768.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025100.html" source="SUSE-SU"/>
    <description>
    Vim is an open source, command line text editor. Prior to 9.1.2148, a stack buffer overflow vulnerability exists in Vim's NetBeans integration when processing the specialKeys command, affecting Vim builds that enable and use the NetBeans feature. The Stack buffer overflow exists in special_keys() (in src/netbeans.c). The while (*tok) loop writes two bytes per iteration into a 64-byte stack buffer (keybuf) with no bounds check. A malicious NetBeans server can overflow keybuf with a single specialKeys command. The issue has been fixed as of Vim patch v9.1.2148.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-26269/">CVE-2026-26269 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-26269">CVE-2026-26269 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258229">SUSE bug 1258229</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050725" comment="gvim-9.2.0110-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151192" comment="gvim is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050726" comment="vim-9.2.0110-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151193" comment="vim is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050727" comment="vim-data-9.2.0110-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151194" comment="vim-data is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050022" comment="vim-data-common-9.2.0110-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050023" comment="vim-small-9.2.0110-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050728" comment="xxd-9.2.0110-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009756472" comment="xxd is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202626283" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-26283</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-26283" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-26283" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-26283" ref_url="https://www.suse.com/security/cve/CVE-2026-26283" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024665.html" source="SUSE-SU"/>
    <description>
    ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, a `continue` statement in the JPEG extent binary search loop in the jpeg encoder causes an infinite loop when writing persistently fails. An attacker can trigger a 100% CPU consumption and process hang (Denial of Service) with a crafted image. Versions 7.1.2-15 and 6.9.13-40 contain a patch.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-11"/>
	<updated date="2026-03-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.2/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-26283/">CVE-2026-26283 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-26283">CVE-2026-26283 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258767">SUSE bug 1258767</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047932" comment="ImageMagick-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047933" comment="ImageMagick-config-7-SUSE-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047934" comment="ImageMagick-config-7-upstream-limited-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977490" comment="ImageMagick-config-7-upstream-limited is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047935" comment="ImageMagick-config-7-upstream-open-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977491" comment="ImageMagick-config-7-upstream-open is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047936" comment="ImageMagick-config-7-upstream-secure-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977492" comment="ImageMagick-config-7-upstream-secure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047937" comment="ImageMagick-config-7-upstream-websafe-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977493" comment="ImageMagick-config-7-upstream-websafe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047938" comment="ImageMagick-devel-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047939" comment="ImageMagick-doc-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047940" comment="ImageMagick-extra-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047941" comment="libMagick++-7_Q16HDRI5-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698047" comment="libMagick++-7_Q16HDRI5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047942" comment="libMagick++-devel-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047943" comment="libMagickCore-7_Q16HDRI10-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698048" comment="libMagickCore-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047944" comment="libMagickWand-7_Q16HDRI10-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698049" comment="libMagickWand-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047945" comment="perl-PerlMagick-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202626284" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-26284</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-26284" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-26284" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-26284" ref_url="https://www.suse.com/security/cve/CVE-2026-26284" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024662.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1300-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045502.html" source="SUSE-SU"/>
    <description>
    ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, ImageMagick lacks proper boundary checking when processing Huffman-coded data from PCD (Photo CD) files. The decoder contains an function that has an incorrect initialization that could cause an out of bounds read. Versions 7.1.2-15 and 6.9.13-40 contain a patch.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-11"/>
	<updated date="2026-04-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-26284/">CVE-2026-26284 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-26284">CVE-2026-26284 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258765">SUSE bug 1258765</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047932" comment="ImageMagick-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047933" comment="ImageMagick-config-7-SUSE-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047934" comment="ImageMagick-config-7-upstream-limited-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977490" comment="ImageMagick-config-7-upstream-limited is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047935" comment="ImageMagick-config-7-upstream-open-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977491" comment="ImageMagick-config-7-upstream-open is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047936" comment="ImageMagick-config-7-upstream-secure-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977492" comment="ImageMagick-config-7-upstream-secure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047937" comment="ImageMagick-config-7-upstream-websafe-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977493" comment="ImageMagick-config-7-upstream-websafe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047938" comment="ImageMagick-devel-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047939" comment="ImageMagick-doc-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047940" comment="ImageMagick-extra-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047941" comment="libMagick++-7_Q16HDRI5-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698047" comment="libMagick++-7_Q16HDRI5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047942" comment="libMagick++-devel-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047943" comment="libMagickCore-7_Q16HDRI10-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698048" comment="libMagickCore-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047944" comment="libMagickWand-7_Q16HDRI10-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698049" comment="libMagickWand-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047945" comment="perl-PerlMagick-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262648" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2648</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2648" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2648" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2648" ref_url="https://www.suse.com/security/cve/CVE-2026-2648" source="SUSE CVE"/>
    <description>
    Heap buffer overflow in PDFium in Google Chrome prior to 145.0.7632.109 allowed a remote attacker to perform an out of bounds memory write via a crafted PDF file. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-22"/>
	<updated date="2026-02-22"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-2648/">CVE-2026-2648 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2648">CVE-2026-2648 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258438">SUSE bug 1258438</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044610" comment="chromedriver-145.0.7632.109-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044611" comment="chromium-145.0.7632.109-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262649" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2649</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2649" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2649" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2649" ref_url="https://www.suse.com/security/cve/CVE-2026-2649" source="SUSE CVE"/>
    <description>
    Integer overflow in V8 in Google Chrome prior to 145.0.7632.109 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-22"/>
	<updated date="2026-02-22"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-2649/">CVE-2026-2649 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2649">CVE-2026-2649 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258438">SUSE bug 1258438</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044610" comment="chromedriver-145.0.7632.109-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044611" comment="chromium-145.0.7632.109-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262650" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2650</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2650" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2650" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2650" ref_url="https://www.suse.com/security/cve/CVE-2026-2650" source="SUSE CVE"/>
    <description>
    Heap buffer overflow in Media in Google Chrome prior to 145.0.7632.109 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-22"/>
	<updated date="2026-02-22"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-2650/">CVE-2026-2650 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2650">CVE-2026-2650 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258438">SUSE bug 1258438</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044610" comment="chromedriver-145.0.7632.109-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010044611" comment="chromium-145.0.7632.109-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202626958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-26958</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-26958" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-26958" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-26958" ref_url="https://www.suse.com/security/cve/CVE-2026-26958" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0757-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024527.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0777-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024541.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20904-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025109.html" source="SUSE-SU"/>
    <description>
    filippo.io/edwards25519 is a Go library implementing the edwards25519 elliptic curve with APIs for building cryptographic primitives. In versions 1.1.0 and earlier, MultiScalarMult produces invalid results or undefined behavior if the receiver is not the identity point. If (*Point).MultiScalarMult is called on an initialized point that is not the identity point, it returns an incorrect result. If the method is called on an uninitialized point, the behavior is undefined. In particular, if the receiver is the zero value, MultiScalarMult returns an invalid point that compares Equal to every other point. Note that MultiScalarMult is a rarely used, advanced API. For example, users who depend on filippo.io/edwards25519 only through github.com/go-sql-driver/mysql are not affected. This issue has been fixed in version 1.1.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-25"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L" cvss4="8.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-26958/">CVE-2026-26958 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-26958">CVE-2026-26958 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258570">SUSE bug 1258570</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050183" comment="cosign-3.0.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009707674" comment="cosign is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050184" comment="cosign-bash-completion-3.0.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010050218" comment="cosign-bash-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050185" comment="cosign-fish-completion-3.0.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010050219" comment="cosign-fish-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050186" comment="cosign-zsh-completion-3.0.5-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010050220" comment="cosign-zsh-completion is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202626983" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-26983</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-26983" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-26983" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-26983" ref_url="https://www.suse.com/security/cve/CVE-2026-26983" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024662.html" source="SUSE-SU"/>
    <description>
    ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, the MSL interpreter crashes when processing a invalid `&lt;map&gt;` element that causes it to use an image after it has been freed. Versions 7.1.2-15 and 6.9.13-40 contain a patch.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-11"/>
	<updated date="2026-03-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-26983/">CVE-2026-26983 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-26983">CVE-2026-26983 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258763">SUSE bug 1258763</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047932" comment="ImageMagick-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047933" comment="ImageMagick-config-7-SUSE-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047934" comment="ImageMagick-config-7-upstream-limited-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977490" comment="ImageMagick-config-7-upstream-limited is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047935" comment="ImageMagick-config-7-upstream-open-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977491" comment="ImageMagick-config-7-upstream-open is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047936" comment="ImageMagick-config-7-upstream-secure-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977492" comment="ImageMagick-config-7-upstream-secure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047937" comment="ImageMagick-config-7-upstream-websafe-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977493" comment="ImageMagick-config-7-upstream-websafe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047938" comment="ImageMagick-devel-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047939" comment="ImageMagick-doc-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047940" comment="ImageMagick-extra-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047941" comment="libMagick++-7_Q16HDRI5-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698047" comment="libMagick++-7_Q16HDRI5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047942" comment="libMagick++-devel-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047943" comment="libMagickCore-7_Q16HDRI10-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698048" comment="libMagickCore-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047944" comment="libMagickWand-7_Q16HDRI10-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698049" comment="libMagickWand-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047945" comment="perl-PerlMagick-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202626996" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-26996</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-26996" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-26996" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-26996" ref_url="https://www.suse.com/security/cve/CVE-2026-26996" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:7123" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002665.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:7302" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003291.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:7350" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003293.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1232-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045357.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1249-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045375.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1250-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045374.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1251-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045373.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20950-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045289.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20967-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045315.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20973-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045309.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20997-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045334.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21022-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045384.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21023-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045383.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21024-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045382.html" source="SUSE-SU"/>
    <description>
    minimatch is a minimal matching utility for converting glob expressions into JavaScript RegExp objects. Versions 10.2.0 and below are vulnerable to Regular Expression Denial of Service (ReDoS) when a glob pattern contains many consecutive * wildcards followed by a literal character that doesn't appear in the test string. Each * compiles to a separate [^/]*? regex group, and when the match fails, V8's regex engine backtracks exponentially across all possible splits. The time complexity is O(4^N) where N is the number of * characters. With N=15, a single minimatch() call takes ~2 seconds. With N=34, it hangs effectively forever. Any application that passes user-controlled strings to minimatch() as the pattern argument is vulnerable to DoS. This issue has been fixed in version 10.2.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-10"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X" href="https://www.suse.com/security/cve/CVE-2026-26996/">CVE-2026-26996 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-26996">CVE-2026-26996 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258621">SUSE bug 1258621</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010053368" comment="cockpit-packages-4-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010042636" comment="cockpit-packages is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010053188" comment="cockpit-repos-4.7-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010044612" comment="cockpit-repos is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202627024" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-27024</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-27024" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-27024" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-27024" ref_url="https://www.suse.com/security/cve/CVE-2026-27024" source="SUSE CVE"/>
    <description>
    pypdf is a free and open-source pure-python PDF library. Prior to 6.7.1, an attacker who uses this vulnerability can craft a PDF which leads to an infinite loop. This requires accessing the children of a TreeObject, for example as part of outlines. This vulnerability is fixed in 6.7.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-08"/>
	<updated date="2026-03-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-27024/">CVE-2026-27024 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-27024">CVE-2026-27024 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258691">SUSE bug 1258691</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047678" comment="python313-PyPDF2-2.11.1-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010047686" comment="python313-PyPDF2 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202627025" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-27025</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-27025" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-27025" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-27025" ref_url="https://www.suse.com/security/cve/CVE-2026-27025" source="SUSE CVE"/>
    <description>
    pypdf is a free and open-source pure-python PDF library. Prior to 6.7.1, an attacker who uses this vulnerability can craft a PDF which leads to long runtimes and large memory consumption. This requires parsing the /ToUnicode entry of a font with unusually large values, for example during text extraction. This vulnerability is fixed in 6.7.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-08"/>
	<updated date="2026-03-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-27025/">CVE-2026-27025 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-27025">CVE-2026-27025 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258692">SUSE bug 1258692</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047678" comment="python313-PyPDF2-2.11.1-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010047686" comment="python313-PyPDF2 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202627026" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-27026</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-27026" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-27026" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-27026" ref_url="https://www.suse.com/security/cve/CVE-2026-27026" source="SUSE CVE"/>
    <description>
    pypdf is a free and open-source pure-python PDF library. Prior to 6.7.1, an attacker who uses this vulnerability can craft a PDF which leads to long runtimes. This requires a malformed /FlateDecode stream, where the byte-by-byte decompression is used. This vulnerability is fixed in 6.7.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-08"/>
	<updated date="2026-03-08"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-27026/">CVE-2026-27026 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-27026">CVE-2026-27026 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258693">SUSE bug 1258693</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047678" comment="python313-PyPDF2-2.11.1-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010047686" comment="python313-PyPDF2 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262708" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2708</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2708" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2708" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2708" ref_url="https://www.suse.com/security/cve/CVE-2026-2708" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0657-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024453.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0658-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024452.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0689-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024505.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0690-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-February/024504.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0703-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024517.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0834-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024638.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20529-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024525.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20649-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/044819.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20752-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024832.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20902-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025111.html" source="SUSE-SU"/>
    <description>
    Unknown.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-14"/>
	<updated date="2026-04-02"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N" cvss4="8.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-2708/">CVE-2026-2708 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2708">CVE-2026-2708 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258508">SUSE bug 1258508</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048654" comment="libsoup-2_4-1-2.74.3-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151596" comment="libsoup-2_4-1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050015" comment="libsoup-3_0-0-3.6.6-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698059" comment="libsoup-3_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050176" comment="libsoup-devel-3.6.6-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151597" comment="libsoup-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050177" comment="libsoup-lang-3.6.6-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151598" comment="libsoup-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048655" comment="libsoup2-devel-2.74.3-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009957647" comment="libsoup2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048656" comment="libsoup2-lang-2.74.3-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698060" comment="libsoup2-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048657" comment="typelib-1_0-Soup-2_4-2.74.3-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151599" comment="typelib-1_0-Soup-2_4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050178" comment="typelib-1_0-Soup-3_0-3.6.6-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698061" comment="typelib-1_0-Soup-3_0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202627135" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-27135</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-27135" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-27135" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-27135" ref_url="https://www.suse.com/security/cve/CVE-2026-27135" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:7123" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002665.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:7302" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003291.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:7350" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003293.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:7667" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003295.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1056-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024951.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1074-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024959.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1247-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045376.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20833-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025004.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20870-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024971.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20925-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045227.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20950-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045289.html" source="SUSE-SU"/>
    <description>
    nghttp2 is an implementation of the Hypertext Transfer Protocol version 2 in C. Prior to version 1.68.1, the nghttp2 library stops reading the incoming data when user facing public API `nghttp2_session_terminate_session` or `nghttp2_session_terminate_session2` is called by the application. They might be called internally by the library when it detects the situation that is subject to connection error. Due to the missing internal state validation, the library keeps reading the rest of the data after one of those APIs is called. Then receiving a malformed frame that causes FRAME_SIZE_ERROR causes assertion failure. nghttp2 v1.68.1 adds missing state validation to avoid assertion failure. No known workarounds are available.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27135/">CVE-2026-27135 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-27135">CVE-2026-27135 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259835">SUSE bug 1259835</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051784" comment="libnghttp2-14-1.64.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153583" comment="libnghttp2-14 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051785" comment="libnghttp2-devel-1.64.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153584" comment="libnghttp2-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051786" comment="nghttp2-1.64.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153587" comment="nghttp2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202627137" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-27137</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-27137" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-27137" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-27137" ref_url="https://www.suse.com/security/cve/CVE-2026-27137" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0993-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024927.html" source="SUSE-SU"/>
    <description>
    When verifying a certificate chain which contains a certificate containing multiple email address constraints which share common local portions but different domain portions, these constraints will not be properly applied, and only the last constraint will be considered.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-13"/>
	<updated date="2026-03-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27137/">CVE-2026-27137 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-27137">CVE-2026-27137 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259266">SUSE bug 1259266</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048423" comment="go1.26-1.26.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048372" comment="go1.26 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048424" comment="go1.26-doc-1.26.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048373" comment="go1.26-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048425" comment="go1.26-libstd-1.26.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048467" comment="go1.26-libstd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048426" comment="go1.26-race-1.26.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048374" comment="go1.26-race is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202627138" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-27138</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-27138" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-27138" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-27138" ref_url="https://www.suse.com/security/cve/CVE-2026-27138" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0993-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024927.html" source="SUSE-SU"/>
    <description>
    Certificate verification can panic when a certificate in the chain has an empty DNS name and another certificate in the chain has excluded name constraints. This can crash programs that are either directly verifying X.509 certificate chains, or those that use TLS.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-13"/>
	<updated date="2026-03-26"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27138/">CVE-2026-27138 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-27138">CVE-2026-27138 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259267">SUSE bug 1259267</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048423" comment="go1.26-1.26.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048372" comment="go1.26 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048424" comment="go1.26-doc-1.26.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048373" comment="go1.26-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048425" comment="go1.26-libstd-1.26.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048467" comment="go1.26-libstd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048426" comment="go1.26-race-1.26.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048374" comment="go1.26-race is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202627139" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-27139</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-27139" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-27139" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-27139" ref_url="https://www.suse.com/security/cve/CVE-2026-27139" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0993-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024927.html" source="SUSE-SU"/>
    <description>
    On Unix platforms, when listing the contents of a directory using File.ReadDir or File.Readdir the returned FileInfo could reference a file outside of the Root in which the File was opened. The impact of this escape is limited to reading metadata provided by lstat from arbitrary locations on the filesystem without permitting reading or writing files outside the root.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-13"/>
	<updated date="2026-03-26"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.3/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27139/">CVE-2026-27139 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-27139">CVE-2026-27139 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259268">SUSE bug 1259268</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048423" comment="go1.26-1.26.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048372" comment="go1.26 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048424" comment="go1.26-doc-1.26.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048373" comment="go1.26-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048425" comment="go1.26-libstd-1.26.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048467" comment="go1.26-libstd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048426" comment="go1.26-race-1.26.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048374" comment="go1.26-race is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202627142" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-27142</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-27142" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-27142" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-27142" ref_url="https://www.suse.com/security/cve/CVE-2026-27142" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0875-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024674.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0876-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024673.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0947-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024783.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0976-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024821.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0977-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024820.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0993-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024870.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1042-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024927.html" source="SUSE-SU"/>
    <description>
    Actions which insert URLs into the content attribute of HTML meta tags are not escaped. This can allow XSS if the meta tag also has an http-equiv attribute with the value "refresh". A new GODEBUG setting has been added, htmlmetacontenturlescape, which can be used to disable escaping URLs in actions in the meta content attribute which follow "url=" by setting htmlmetacontenturlescape=0.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-13"/>
	<updated date="2026-03-26"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" cvss4="5.1/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27142/">CVE-2026-27142 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-27142">CVE-2026-27142 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259265">SUSE bug 1259265</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048423" comment="go1.26-1.26.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048372" comment="go1.26 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048424" comment="go1.26-doc-1.26.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048373" comment="go1.26-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048425" comment="go1.26-libstd-1.26.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048467" comment="go1.26-libstd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048426" comment="go1.26-race-1.26.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048374" comment="go1.26-race is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202627448" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-27448</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-27448" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-27448" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-27448" ref_url="https://www.suse.com/security/cve/CVE-2026-27448" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:1192-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20930-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20954-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20960-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045279.html" source="SUSE-SU"/>
    <description>
    pyOpenSSL is a Python wrapper around the OpenSSL library. Starting in version 0.14.0 and prior to version 26.0.0, if a user provided callback to `set_tlsext_servername_callback` raised an unhandled exception, this would result in a connection being accepted. If a user was relying on this callback for any security-sensitive behavior, this could allow bypassing it. Starting in version 26.0.0, unhandled exceptions now result in rejecting the connection.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-08"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="3.7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N" cvss4="6.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27448/">CVE-2026-27448 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-27448">CVE-2026-27448 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259804">SUSE bug 1259804</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051875" comment="python313-pyOpenSSL-25.0.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010051937" comment="python313-pyOpenSSL is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202627459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-27459</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-27459" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-27459" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-27459" ref_url="https://www.suse.com/security/cve/CVE-2026-27459" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:1192-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045297.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20930-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045222.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20954-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045285.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20960-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045279.html" source="SUSE-SU"/>
    <description>
    pyOpenSSL is a Python wrapper around the OpenSSL library. Starting in version 22.0.0 and prior to version 26.0.0, if a user provided callback to `set_cookie_generate_callback` returned a cookie value greater than 256 bytes, pyOpenSSL would overflow an OpenSSL provided buffer. Starting in version 26.0.0, cookie values that are too long are now rejected.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-08"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27459/">CVE-2026-27459 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-27459">CVE-2026-27459 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259808">SUSE bug 1259808</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051875" comment="python313-pyOpenSSL-25.0.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010051937" comment="python313-pyOpenSSL is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262757" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2757</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2757" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2757" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2757" ref_url="https://www.suse.com/security/cve/CVE-2026-2757" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3338" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002531.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3339" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003198.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3497" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002538.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3515" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002544.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3516" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003244.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3982" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024685.html" source="SUSE-SU"/>
    <description>
    Incorrect boundary conditions in the WebRTC: Audio/Video component. This vulnerability was fixed in Firefox 148, Firefox ESR 115.33, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2757/">CVE-2026-2757 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2757">CVE-2026-2757 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258568">SUSE bug 1258568</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049114" comment="MozillaFirefox-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049115" comment="MozillaFirefox-branding-upstream-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049116" comment="MozillaFirefox-devel-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049117" comment="MozillaFirefox-translations-common-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049118" comment="MozillaFirefox-translations-other-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050210" comment="MozillaThunderbird-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050211" comment="MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025480" comment="MozillaThunderbird-openpgp-librnp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050212" comment="MozillaThunderbird-translations-common-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050213" comment="MozillaThunderbird-translations-other-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262758" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2758</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2758" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2758" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2758" ref_url="https://www.suse.com/security/cve/CVE-2026-2758" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3338" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002531.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3339" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003198.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3497" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002538.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3515" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002544.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3516" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003244.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3982" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024685.html" source="SUSE-SU"/>
    <description>
    Use-after-free in the JavaScript: GC component. This vulnerability was fixed in Firefox 148, Firefox ESR 115.33, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2758/">CVE-2026-2758 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2758">CVE-2026-2758 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258568">SUSE bug 1258568</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049114" comment="MozillaFirefox-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049115" comment="MozillaFirefox-branding-upstream-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049116" comment="MozillaFirefox-devel-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049117" comment="MozillaFirefox-translations-common-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049118" comment="MozillaFirefox-translations-other-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050210" comment="MozillaThunderbird-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050211" comment="MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025480" comment="MozillaThunderbird-openpgp-librnp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050212" comment="MozillaThunderbird-translations-common-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050213" comment="MozillaThunderbird-translations-other-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262759" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2759</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2759" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2759" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2759" ref_url="https://www.suse.com/security/cve/CVE-2026-2759" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3338" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002531.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3339" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003198.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3497" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002538.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3515" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002544.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3516" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003244.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3982" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024685.html" source="SUSE-SU"/>
    <description>
    Incorrect boundary conditions in the Graphics: ImageLib component. This vulnerability was fixed in Firefox 148, Firefox ESR 115.33, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2759/">CVE-2026-2759 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2759">CVE-2026-2759 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258568">SUSE bug 1258568</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049114" comment="MozillaFirefox-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049115" comment="MozillaFirefox-branding-upstream-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049116" comment="MozillaFirefox-devel-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049117" comment="MozillaFirefox-translations-common-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049118" comment="MozillaFirefox-translations-other-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050210" comment="MozillaThunderbird-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050211" comment="MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025480" comment="MozillaThunderbird-openpgp-librnp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050212" comment="MozillaThunderbird-translations-common-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050213" comment="MozillaThunderbird-translations-other-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202627596" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-27596</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-27596" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-27596" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-27596" ref_url="https://www.suse.com/security/cve/CVE-2026-27596" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045229.html" source="SUSE-SU"/>
    <description>
    Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and ICC image metadata. Prior to version 0.28.8, an out-of-bounds read was found in Exiv2. The vulnerability is in the preview component, which is only triggered when running Exiv2 with an extra command line argument, like -pp. The out-of-bounds read is at a 4GB offset, which usually causes Exiv2 to crash. This issue has been patched in version 0.28.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27596/">CVE-2026-27596 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-27596">CVE-2026-27596 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259084">SUSE bug 1259084</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051765" comment="exiv2-0.28.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154125" comment="exiv2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051766" comment="exiv2-lang-0.28.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154126" comment="exiv2-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050764" comment="libexiv2-28-0.28.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010051915" comment="libexiv2-28 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050765" comment="libexiv2-28-x86-64-v3-0.28.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010051916" comment="libexiv2-28-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051767" comment="libexiv2-devel-0.28.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152552" comment="libexiv2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262760" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2760</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2760" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2760" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2760" ref_url="https://www.suse.com/security/cve/CVE-2026-2760" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3338" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002531.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3339" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003198.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3497" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002538.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3515" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002544.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3516" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003244.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3982" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024685.html" source="SUSE-SU"/>
    <description>
    Sandbox escape due to incorrect boundary conditions in the Graphics: WebRender component. This vulnerability was fixed in Firefox 148, Firefox ESR 115.33, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2760/">CVE-2026-2760 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2760">CVE-2026-2760 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258568">SUSE bug 1258568</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049114" comment="MozillaFirefox-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049115" comment="MozillaFirefox-branding-upstream-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049116" comment="MozillaFirefox-devel-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049117" comment="MozillaFirefox-translations-common-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049118" comment="MozillaFirefox-translations-other-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050210" comment="MozillaThunderbird-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050211" comment="MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025480" comment="MozillaThunderbird-openpgp-librnp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050212" comment="MozillaThunderbird-translations-common-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050213" comment="MozillaThunderbird-translations-other-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262761" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2761</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2761" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2761" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2761" ref_url="https://www.suse.com/security/cve/CVE-2026-2761" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3338" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002531.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3339" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003198.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3497" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002538.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3515" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002544.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3516" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003244.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3982" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024685.html" source="SUSE-SU"/>
    <description>
    Sandbox escape in the Graphics: WebRender component. This vulnerability was fixed in Firefox 148, Firefox ESR 115.33, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2761/">CVE-2026-2761 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2761">CVE-2026-2761 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258568">SUSE bug 1258568</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049114" comment="MozillaFirefox-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049115" comment="MozillaFirefox-branding-upstream-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049116" comment="MozillaFirefox-devel-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049117" comment="MozillaFirefox-translations-common-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049118" comment="MozillaFirefox-translations-other-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050210" comment="MozillaThunderbird-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050211" comment="MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025480" comment="MozillaThunderbird-openpgp-librnp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050212" comment="MozillaThunderbird-translations-common-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050213" comment="MozillaThunderbird-translations-other-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262762" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2762</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2762" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2762" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2762" ref_url="https://www.suse.com/security/cve/CVE-2026-2762" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3338" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002531.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3339" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003198.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3497" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002538.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3515" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002544.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3516" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003244.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3982" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024685.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the JavaScript: Standard Library component. This vulnerability was fixed in Firefox 148, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2762/">CVE-2026-2762 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2762">CVE-2026-2762 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258568">SUSE bug 1258568</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049114" comment="MozillaFirefox-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049115" comment="MozillaFirefox-branding-upstream-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049116" comment="MozillaFirefox-devel-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049117" comment="MozillaFirefox-translations-common-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049118" comment="MozillaFirefox-translations-other-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050210" comment="MozillaThunderbird-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050211" comment="MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025480" comment="MozillaThunderbird-openpgp-librnp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050212" comment="MozillaThunderbird-translations-common-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050213" comment="MozillaThunderbird-translations-other-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202627622" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-27622</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-27622" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-27622" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-27622" ref_url="https://www.suse.com/security/cve/CVE-2026-27622" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20936-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045216.html" source="SUSE-SU"/>
    <description>
    OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry. In CompositeDeepScanLine::readPixels, per-pixel totals are accumulated in vector&lt;unsigned int&gt; total_sizes for attacker-controlled large counts across many parts, total_sizes[ptr] wraps modulo 2^32.  overall_sample_count is then derived from wrapped totals and used in samples[channel].resize(overall_sample_count). Decode pointer setup/consumption proceeds with true sample counts, and write operations in core unpack (generic_unpack_deep_pointers) overrun the undersized composite sample buffer. This vulnerability is fixed in v3.2.6, v3.3.8, and v3.4.6.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-03"/>
	<updated date="2026-04-03"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27622/">CVE-2026-27622 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-27622">CVE-2026-27622 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259177">SUSE bug 1259177</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052265" comment="libIex-3_2-31-3.2.2-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010030593" comment="libIex-3_2-31 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052266" comment="libIex-3_2-31-x86-64-v3-3.2.2-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010030594" comment="libIex-3_2-31-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052267" comment="libIlmThread-3_2-31-3.2.2-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010030595" comment="libIlmThread-3_2-31 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052268" comment="libIlmThread-3_2-31-x86-64-v3-3.2.2-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010030596" comment="libIlmThread-3_2-31-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052269" comment="libOpenEXR-3_2-31-3.2.2-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010030597" comment="libOpenEXR-3_2-31 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052270" comment="libOpenEXR-3_2-31-x86-64-v3-3.2.2-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010030598" comment="libOpenEXR-3_2-31-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052271" comment="libOpenEXRCore-3_2-31-3.2.2-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010030599" comment="libOpenEXRCore-3_2-31 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052272" comment="libOpenEXRCore-3_2-31-x86-64-v3-3.2.2-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010030600" comment="libOpenEXRCore-3_2-31-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052273" comment="libOpenEXRUtil-3_2-31-3.2.2-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010030601" comment="libOpenEXRUtil-3_2-31 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052274" comment="libOpenEXRUtil-3_2-31-x86-64-v3-3.2.2-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010030602" comment="libOpenEXRUtil-3_2-31-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052275" comment="openexr-3.2.2-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172752" comment="openexr is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052588" comment="openexr-devel-3.2.2-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151255" comment="openexr-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052276" comment="openexr-doc-3.2.2-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009172753" comment="openexr-doc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202627628" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-27628</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-27628" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-27628" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-27628" ref_url="https://www.suse.com/security/cve/CVE-2026-27628" source="SUSE CVE"/>
    <description>
    pypdf is a free and open-source pure-python PDF library. Prior to 6.7.2, an attacker who uses this vulnerability can craft a PDF which leads to an infinite loop. This requires reading the file. This has been fixed in pypdf 6.7.2. As a workaround, one may apply the patch manually.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-08"/>
	<updated date="2026-03-08"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-27628/">CVE-2026-27628 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-27628">CVE-2026-27628 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258940">SUSE bug 1258940</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047678" comment="python313-PyPDF2-2.11.1-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010047686" comment="python313-PyPDF2 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262763" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2763</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2763" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2763" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2763" ref_url="https://www.suse.com/security/cve/CVE-2026-2763" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3338" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002531.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3339" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003198.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3497" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002538.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3515" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002544.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3516" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003244.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3982" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024685.html" source="SUSE-SU"/>
    <description>
    Use-after-free in the JavaScript Engine component. This vulnerability was fixed in Firefox 148, Firefox ESR 115.33, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2763/">CVE-2026-2763 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2763">CVE-2026-2763 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258568">SUSE bug 1258568</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049114" comment="MozillaFirefox-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049115" comment="MozillaFirefox-branding-upstream-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049116" comment="MozillaFirefox-devel-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049117" comment="MozillaFirefox-translations-common-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049118" comment="MozillaFirefox-translations-other-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050210" comment="MozillaThunderbird-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050211" comment="MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025480" comment="MozillaThunderbird-openpgp-librnp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050212" comment="MozillaThunderbird-translations-common-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050213" comment="MozillaThunderbird-translations-other-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202627631" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-27631</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-27631" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-27631" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-27631" ref_url="https://www.suse.com/security/cve/CVE-2026-27631" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20923-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045229.html" source="SUSE-SU"/>
    <description>
    Exiv2 is a C++ library and a command-line utility to read, write, delete and modify Exif, IPTC, XMP and ICC image metadata. Prior to version 0.28.8, an uncaught exception was found in Exiv2. The vulnerability is in the preview component, which is only triggered when running Exiv2 with an extra command line argument, like -pp. Due to an integer overflow, the code attempts to create a huge std::vector, which causes Exiv2 to crash with an uncaught exception. This issue has been patched in version 0.28.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27631/">CVE-2026-27631 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-27631">CVE-2026-27631 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259085">SUSE bug 1259085</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051765" comment="exiv2-0.28.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154125" comment="exiv2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051766" comment="exiv2-lang-0.28.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154126" comment="exiv2-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050764" comment="libexiv2-28-0.28.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010051915" comment="libexiv2-28 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050765" comment="libexiv2-28-x86-64-v3-0.28.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010051916" comment="libexiv2-28-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051767" comment="libexiv2-devel-0.28.8-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152552" comment="libexiv2-devel is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262764" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2764</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2764" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2764" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2764" ref_url="https://www.suse.com/security/cve/CVE-2026-2764" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3338" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002531.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3339" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003198.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3497" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002538.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3515" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002544.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3516" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003244.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3982" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024685.html" source="SUSE-SU"/>
    <description>
    JIT miscompilation, use-after-free in the JavaScript Engine: JIT component. This vulnerability was fixed in Firefox 148, Firefox ESR 115.33, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2764/">CVE-2026-2764 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2764">CVE-2026-2764 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258568">SUSE bug 1258568</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049114" comment="MozillaFirefox-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049115" comment="MozillaFirefox-branding-upstream-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049116" comment="MozillaFirefox-devel-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049117" comment="MozillaFirefox-translations-common-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049118" comment="MozillaFirefox-translations-other-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050210" comment="MozillaThunderbird-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050211" comment="MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025480" comment="MozillaThunderbird-openpgp-librnp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050212" comment="MozillaThunderbird-translations-common-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050213" comment="MozillaThunderbird-translations-other-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262765" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2765</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2765" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2765" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2765" ref_url="https://www.suse.com/security/cve/CVE-2026-2765" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3338" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002531.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3339" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003198.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3497" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002538.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3515" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002544.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3516" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003244.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3982" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024685.html" source="SUSE-SU"/>
    <description>
    Use-after-free in the JavaScript Engine component. This vulnerability was fixed in Firefox 148, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2765/">CVE-2026-2765 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2765">CVE-2026-2765 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258568">SUSE bug 1258568</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049114" comment="MozillaFirefox-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049115" comment="MozillaFirefox-branding-upstream-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049116" comment="MozillaFirefox-devel-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049117" comment="MozillaFirefox-translations-common-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049118" comment="MozillaFirefox-translations-other-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050210" comment="MozillaThunderbird-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050211" comment="MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025480" comment="MozillaThunderbird-openpgp-librnp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050212" comment="MozillaThunderbird-translations-common-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050213" comment="MozillaThunderbird-translations-other-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262766" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2766</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2766" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2766" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2766" ref_url="https://www.suse.com/security/cve/CVE-2026-2766" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3338" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002531.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3339" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003198.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3497" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002538.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3515" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002544.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3516" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003244.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3982" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024685.html" source="SUSE-SU"/>
    <description>
    Use-after-free in the JavaScript Engine: JIT component. This vulnerability was fixed in Firefox 148, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2766/">CVE-2026-2766 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2766">CVE-2026-2766 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258568">SUSE bug 1258568</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049114" comment="MozillaFirefox-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049115" comment="MozillaFirefox-branding-upstream-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049116" comment="MozillaFirefox-devel-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049117" comment="MozillaFirefox-translations-common-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049118" comment="MozillaFirefox-translations-other-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050210" comment="MozillaThunderbird-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050211" comment="MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025480" comment="MozillaThunderbird-openpgp-librnp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050212" comment="MozillaThunderbird-translations-common-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050213" comment="MozillaThunderbird-translations-other-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262767" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2767</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2767" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2767" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2767" ref_url="https://www.suse.com/security/cve/CVE-2026-2767" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3338" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002531.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3339" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003198.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3497" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002538.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3515" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002544.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3516" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003244.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3982" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024685.html" source="SUSE-SU"/>
    <description>
    Use-after-free in the JavaScript: WebAssembly component. This vulnerability was fixed in Firefox 148, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2767/">CVE-2026-2767 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2767">CVE-2026-2767 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258568">SUSE bug 1258568</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049114" comment="MozillaFirefox-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049115" comment="MozillaFirefox-branding-upstream-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049116" comment="MozillaFirefox-devel-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049117" comment="MozillaFirefox-translations-common-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049118" comment="MozillaFirefox-translations-other-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050210" comment="MozillaThunderbird-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050211" comment="MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025480" comment="MozillaThunderbird-openpgp-librnp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050212" comment="MozillaThunderbird-translations-common-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050213" comment="MozillaThunderbird-translations-other-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262768" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2768</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2768" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2768" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2768" ref_url="https://www.suse.com/security/cve/CVE-2026-2768" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3338" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002531.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3339" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003198.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3497" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002538.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3515" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002544.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3516" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003244.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3982" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024685.html" source="SUSE-SU"/>
    <description>
    Sandbox escape in the Storage: IndexedDB component. This vulnerability was fixed in Firefox 148, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2768/">CVE-2026-2768 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2768">CVE-2026-2768 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258568">SUSE bug 1258568</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049114" comment="MozillaFirefox-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049115" comment="MozillaFirefox-branding-upstream-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049116" comment="MozillaFirefox-devel-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049117" comment="MozillaFirefox-translations-common-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049118" comment="MozillaFirefox-translations-other-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050210" comment="MozillaThunderbird-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050211" comment="MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025480" comment="MozillaThunderbird-openpgp-librnp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050212" comment="MozillaThunderbird-translations-common-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050213" comment="MozillaThunderbird-translations-other-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262769" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2769</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2769" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2769" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2769" ref_url="https://www.suse.com/security/cve/CVE-2026-2769" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3338" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002531.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3339" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003198.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3497" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002538.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3515" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002544.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3516" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003244.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3982" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024685.html" source="SUSE-SU"/>
    <description>
    Use-after-free in the Storage: IndexedDB component. This vulnerability was fixed in Firefox 148, Firefox ESR 115.33, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2769/">CVE-2026-2769 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2769">CVE-2026-2769 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258568">SUSE bug 1258568</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049114" comment="MozillaFirefox-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049115" comment="MozillaFirefox-branding-upstream-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049116" comment="MozillaFirefox-devel-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049117" comment="MozillaFirefox-translations-common-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049118" comment="MozillaFirefox-translations-other-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050210" comment="MozillaThunderbird-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050211" comment="MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025480" comment="MozillaThunderbird-openpgp-librnp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050212" comment="MozillaThunderbird-translations-common-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050213" comment="MozillaThunderbird-translations-other-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262770" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2770</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2770" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2770" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2770" ref_url="https://www.suse.com/security/cve/CVE-2026-2770" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3338" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002531.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3339" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003198.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3497" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002538.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3515" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002544.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3516" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003244.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3982" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024685.html" source="SUSE-SU"/>
    <description>
    Use-after-free in the DOM: Bindings (WebIDL) component. This vulnerability was fixed in Firefox 148, Firefox ESR 115.33, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2770/">CVE-2026-2770 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2770">CVE-2026-2770 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258568">SUSE bug 1258568</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049114" comment="MozillaFirefox-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049115" comment="MozillaFirefox-branding-upstream-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049116" comment="MozillaFirefox-devel-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049117" comment="MozillaFirefox-translations-common-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049118" comment="MozillaFirefox-translations-other-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050210" comment="MozillaThunderbird-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050211" comment="MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025480" comment="MozillaThunderbird-openpgp-librnp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050212" comment="MozillaThunderbird-translations-common-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050213" comment="MozillaThunderbird-translations-other-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262771" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2771</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2771" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2771" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2771" ref_url="https://www.suse.com/security/cve/CVE-2026-2771" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3338" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002531.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3339" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003198.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3497" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002538.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3515" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002544.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3516" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003244.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3982" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024685.html" source="SUSE-SU"/>
    <description>
    Undefined behavior in the DOM: Core &amp; HTML component. This vulnerability was fixed in Firefox 148, Firefox ESR 115.33, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2771/">CVE-2026-2771 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2771">CVE-2026-2771 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258568">SUSE bug 1258568</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049114" comment="MozillaFirefox-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049115" comment="MozillaFirefox-branding-upstream-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049116" comment="MozillaFirefox-devel-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049117" comment="MozillaFirefox-translations-common-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049118" comment="MozillaFirefox-translations-other-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050210" comment="MozillaThunderbird-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050211" comment="MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025480" comment="MozillaThunderbird-openpgp-librnp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050212" comment="MozillaThunderbird-translations-common-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050213" comment="MozillaThunderbird-translations-other-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262772" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2772</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2772" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2772" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2772" ref_url="https://www.suse.com/security/cve/CVE-2026-2772" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3338" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002531.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3339" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003198.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3497" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002538.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3515" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002544.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3516" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003244.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3982" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024685.html" source="SUSE-SU"/>
    <description>
    Use-after-free in the Audio/Video: Playback component. This vulnerability was fixed in Firefox 148, Firefox ESR 115.33, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2772/">CVE-2026-2772 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2772">CVE-2026-2772 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258568">SUSE bug 1258568</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049114" comment="MozillaFirefox-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049115" comment="MozillaFirefox-branding-upstream-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049116" comment="MozillaFirefox-devel-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049117" comment="MozillaFirefox-translations-common-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049118" comment="MozillaFirefox-translations-other-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050210" comment="MozillaThunderbird-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050211" comment="MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025480" comment="MozillaThunderbird-openpgp-librnp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050212" comment="MozillaThunderbird-translations-common-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050213" comment="MozillaThunderbird-translations-other-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262773" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2773</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2773" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2773" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2773" ref_url="https://www.suse.com/security/cve/CVE-2026-2773" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3338" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002531.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3339" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003198.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3497" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002538.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3515" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002544.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3516" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003244.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3982" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024685.html" source="SUSE-SU"/>
    <description>
    Incorrect boundary conditions in the Web Audio component. This vulnerability was fixed in Firefox 148, Firefox ESR 115.33, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2773/">CVE-2026-2773 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2773">CVE-2026-2773 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258568">SUSE bug 1258568</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049114" comment="MozillaFirefox-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049115" comment="MozillaFirefox-branding-upstream-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049116" comment="MozillaFirefox-devel-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049117" comment="MozillaFirefox-translations-common-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049118" comment="MozillaFirefox-translations-other-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050210" comment="MozillaThunderbird-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050211" comment="MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025480" comment="MozillaThunderbird-openpgp-librnp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050212" comment="MozillaThunderbird-translations-common-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050213" comment="MozillaThunderbird-translations-other-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262774" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2774</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2774" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2774" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2774" ref_url="https://www.suse.com/security/cve/CVE-2026-2774" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3338" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002531.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3339" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003198.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3497" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002538.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3515" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002544.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3516" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003244.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3982" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024685.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the Audio/Video component. This vulnerability was fixed in Firefox 148, Firefox ESR 115.33, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2774/">CVE-2026-2774 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2774">CVE-2026-2774 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258568">SUSE bug 1258568</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049114" comment="MozillaFirefox-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049115" comment="MozillaFirefox-branding-upstream-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049116" comment="MozillaFirefox-devel-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049117" comment="MozillaFirefox-translations-common-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049118" comment="MozillaFirefox-translations-other-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050210" comment="MozillaThunderbird-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050211" comment="MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025480" comment="MozillaThunderbird-openpgp-librnp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050212" comment="MozillaThunderbird-translations-common-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050213" comment="MozillaThunderbird-translations-other-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262775" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2775</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2775" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2775" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2775" ref_url="https://www.suse.com/security/cve/CVE-2026-2775" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3338" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002531.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3339" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003198.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3497" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002538.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3515" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002544.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3516" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003244.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3982" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024685.html" source="SUSE-SU"/>
    <description>
    Mitigation bypass in the DOM: HTML Parser component. This vulnerability was fixed in Firefox 148, Firefox ESR 115.33, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://www.suse.com/security/cve/CVE-2026-2775/">CVE-2026-2775 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2775">CVE-2026-2775 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258568">SUSE bug 1258568</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049114" comment="MozillaFirefox-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049115" comment="MozillaFirefox-branding-upstream-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049116" comment="MozillaFirefox-devel-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049117" comment="MozillaFirefox-translations-common-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049118" comment="MozillaFirefox-translations-other-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050210" comment="MozillaThunderbird-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050211" comment="MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025480" comment="MozillaThunderbird-openpgp-librnp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050212" comment="MozillaThunderbird-translations-common-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050213" comment="MozillaThunderbird-translations-other-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2776</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2776" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2776" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2776" ref_url="https://www.suse.com/security/cve/CVE-2026-2776" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3338" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002531.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3339" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003198.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3497" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002538.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3515" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002544.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3516" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003244.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3982" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024685.html" source="SUSE-SU"/>
    <description>
    Sandbox escape due to incorrect boundary conditions in the Telemetry component in External Software. This vulnerability was fixed in Firefox 148, Firefox ESR 115.33, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2776/">CVE-2026-2776 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2776">CVE-2026-2776 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258568">SUSE bug 1258568</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049114" comment="MozillaFirefox-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049115" comment="MozillaFirefox-branding-upstream-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049116" comment="MozillaFirefox-devel-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049117" comment="MozillaFirefox-translations-common-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049118" comment="MozillaFirefox-translations-other-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050210" comment="MozillaThunderbird-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050211" comment="MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025480" comment="MozillaThunderbird-openpgp-librnp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050212" comment="MozillaThunderbird-translations-common-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050213" comment="MozillaThunderbird-translations-other-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2777</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2777" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2777" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2777" ref_url="https://www.suse.com/security/cve/CVE-2026-2777" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3338" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002531.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3339" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003198.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3497" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002538.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3515" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002544.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3516" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003244.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3982" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024685.html" source="SUSE-SU"/>
    <description>
    Privilege escalation in the Messaging System component. This vulnerability was fixed in Firefox 148, Firefox ESR 115.33, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2777/">CVE-2026-2777 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2777">CVE-2026-2777 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258568">SUSE bug 1258568</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049114" comment="MozillaFirefox-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049115" comment="MozillaFirefox-branding-upstream-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049116" comment="MozillaFirefox-devel-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049117" comment="MozillaFirefox-translations-common-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049118" comment="MozillaFirefox-translations-other-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050210" comment="MozillaThunderbird-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050211" comment="MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025480" comment="MozillaThunderbird-openpgp-librnp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050212" comment="MozillaThunderbird-translations-common-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050213" comment="MozillaThunderbird-translations-other-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2778</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2778" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2778" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2778" ref_url="https://www.suse.com/security/cve/CVE-2026-2778" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3338" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002531.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3339" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003198.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3497" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002538.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3515" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002544.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3516" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003244.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3982" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024685.html" source="SUSE-SU"/>
    <description>
    Sandbox escape due to incorrect boundary conditions in the DOM: Core &amp; HTML component. This vulnerability was fixed in Firefox 148, Firefox ESR 115.33, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2778/">CVE-2026-2778 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2778">CVE-2026-2778 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258568">SUSE bug 1258568</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049114" comment="MozillaFirefox-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049115" comment="MozillaFirefox-branding-upstream-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049116" comment="MozillaFirefox-devel-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049117" comment="MozillaFirefox-translations-common-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049118" comment="MozillaFirefox-translations-other-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050210" comment="MozillaThunderbird-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050211" comment="MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025480" comment="MozillaThunderbird-openpgp-librnp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050212" comment="MozillaThunderbird-translations-common-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050213" comment="MozillaThunderbird-translations-other-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262779" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2779</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2779" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2779" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2779" ref_url="https://www.suse.com/security/cve/CVE-2026-2779" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3338" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002531.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3339" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003198.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3497" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002538.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3515" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002544.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3516" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003244.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3982" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024685.html" source="SUSE-SU"/>
    <description>
    Incorrect boundary conditions in the Networking: JAR component. This vulnerability was fixed in Firefox 148, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2779/">CVE-2026-2779 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2779">CVE-2026-2779 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258568">SUSE bug 1258568</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049114" comment="MozillaFirefox-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049115" comment="MozillaFirefox-branding-upstream-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049116" comment="MozillaFirefox-devel-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049117" comment="MozillaFirefox-translations-common-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049118" comment="MozillaFirefox-translations-other-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050210" comment="MozillaThunderbird-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050211" comment="MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025480" comment="MozillaThunderbird-openpgp-librnp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050212" comment="MozillaThunderbird-translations-common-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050213" comment="MozillaThunderbird-translations-other-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202627798" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-27798</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-27798" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-27798" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-27798" ref_url="https://www.suse.com/security/cve/CVE-2026-27798" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024663.html" source="SUSE-SU"/>
    <description>
    ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, a heap buffer over-read vulnerability occurs when processing an image with small dimension using the `-wavelet-denoise` operator. Versions 7.1.2-15 and 6.9.13-40 contain a patch.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-11"/>
	<updated date="2026-03-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" cvss4="4.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27798/">CVE-2026-27798 at SUSE</cve>
	<cve impact="high" cvss3="7.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-27798">CVE-2026-27798 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259018">SUSE bug 1259018</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047932" comment="ImageMagick-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047933" comment="ImageMagick-config-7-SUSE-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047934" comment="ImageMagick-config-7-upstream-limited-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977490" comment="ImageMagick-config-7-upstream-limited is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047935" comment="ImageMagick-config-7-upstream-open-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977491" comment="ImageMagick-config-7-upstream-open is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047936" comment="ImageMagick-config-7-upstream-secure-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977492" comment="ImageMagick-config-7-upstream-secure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047937" comment="ImageMagick-config-7-upstream-websafe-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977493" comment="ImageMagick-config-7-upstream-websafe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047938" comment="ImageMagick-devel-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047939" comment="ImageMagick-doc-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047940" comment="ImageMagick-extra-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047941" comment="libMagick++-7_Q16HDRI5-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698047" comment="libMagick++-7_Q16HDRI5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047942" comment="libMagick++-devel-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047943" comment="libMagickCore-7_Q16HDRI10-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698048" comment="libMagickCore-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047944" comment="libMagickWand-7_Q16HDRI10-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698049" comment="libMagickWand-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047945" comment="perl-PerlMagick-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202627799" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-27799</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-27799" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-27799" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-27799" ref_url="https://www.suse.com/security/cve/CVE-2026-27799" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0851-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024665.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0852-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024664.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0853-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024663.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0854-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024662.html" source="SUSE-SU"/>
    <description>
    ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-15 and 6.9.13-40, a heap buffer over-read vulnerability exists in the DJVU image format handler. The vulnerability occurs due to integer truncation when calculating the stride (row size) for pixel buffer allocation. The stride calculation overflows a 32-bit signed integer, resulting in an out-of-bounds memory reads. Versions 7.1.2-15 and 6.9.13-40 contain a patch.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-11"/>
	<updated date="2026-03-11"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L" cvss4="2.1/CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27799/">CVE-2026-27799 at SUSE</cve>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2026-27799">CVE-2026-27799 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259017">SUSE bug 1259017</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047932" comment="ImageMagick-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047933" comment="ImageMagick-config-7-SUSE-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047934" comment="ImageMagick-config-7-upstream-limited-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977490" comment="ImageMagick-config-7-upstream-limited is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047935" comment="ImageMagick-config-7-upstream-open-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977491" comment="ImageMagick-config-7-upstream-open is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047936" comment="ImageMagick-config-7-upstream-secure-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977492" comment="ImageMagick-config-7-upstream-secure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047937" comment="ImageMagick-config-7-upstream-websafe-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977493" comment="ImageMagick-config-7-upstream-websafe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047938" comment="ImageMagick-devel-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047939" comment="ImageMagick-doc-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047940" comment="ImageMagick-extra-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047941" comment="libMagick++-7_Q16HDRI5-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698047" comment="libMagick++-7_Q16HDRI5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047942" comment="libMagick++-devel-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047943" comment="libMagickCore-7_Q16HDRI10-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698048" comment="libMagickCore-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047944" comment="libMagickWand-7_Q16HDRI10-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698049" comment="libMagickWand-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047945" comment="perl-PerlMagick-7.1.2.0-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262780" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2780</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2780" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2780" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2780" ref_url="https://www.suse.com/security/cve/CVE-2026-2780" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3338" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002531.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3339" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003198.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3497" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002538.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3515" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002544.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3516" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003244.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3982" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024685.html" source="SUSE-SU"/>
    <description>
    Privilege escalation in the Netmonitor component. This vulnerability was fixed in Firefox 148, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2780/">CVE-2026-2780 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2780">CVE-2026-2780 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258568">SUSE bug 1258568</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049114" comment="MozillaFirefox-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049115" comment="MozillaFirefox-branding-upstream-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049116" comment="MozillaFirefox-devel-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049117" comment="MozillaFirefox-translations-common-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049118" comment="MozillaFirefox-translations-other-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050210" comment="MozillaThunderbird-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050211" comment="MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025480" comment="MozillaThunderbird-openpgp-librnp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050212" comment="MozillaThunderbird-translations-common-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050213" comment="MozillaThunderbird-translations-other-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262781" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2781</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2781" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2781" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2781" ref_url="https://www.suse.com/security/cve/CVE-2026-2781" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3338" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002531.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3339" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003198.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3497" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002538.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3515" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002544.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3516" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003244.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3982" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024523.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0813-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024585.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0814-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024583.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024685.html" source="SUSE-SU"/>
    <description>
    Integer overflow in the Libraries component in NSS. This vulnerability was fixed in Firefox 148, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2781/">CVE-2026-2781 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2781">CVE-2026-2781 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258568">SUSE bug 1258568</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049114" comment="MozillaFirefox-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049115" comment="MozillaFirefox-branding-upstream-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049116" comment="MozillaFirefox-devel-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049117" comment="MozillaFirefox-translations-common-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049118" comment="MozillaFirefox-translations-other-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050210" comment="MozillaThunderbird-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050211" comment="MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025480" comment="MozillaThunderbird-openpgp-librnp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050212" comment="MozillaThunderbird-translations-common-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050213" comment="MozillaThunderbird-translations-other-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262782" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2782</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2782" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2782" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2782" ref_url="https://www.suse.com/security/cve/CVE-2026-2782" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3338" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002531.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3339" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003198.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3497" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002538.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3515" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002544.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3516" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003244.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3982" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024685.html" source="SUSE-SU"/>
    <description>
    Privilege escalation in the Netmonitor component. This vulnerability was fixed in Firefox 148, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2782/">CVE-2026-2782 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2782">CVE-2026-2782 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258568">SUSE bug 1258568</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049114" comment="MozillaFirefox-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049115" comment="MozillaFirefox-branding-upstream-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049116" comment="MozillaFirefox-devel-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049117" comment="MozillaFirefox-translations-common-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049118" comment="MozillaFirefox-translations-other-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050210" comment="MozillaThunderbird-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050211" comment="MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025480" comment="MozillaThunderbird-openpgp-librnp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050212" comment="MozillaThunderbird-translations-common-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050213" comment="MozillaThunderbird-translations-other-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262783" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2783</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2783" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2783" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2783" ref_url="https://www.suse.com/security/cve/CVE-2026-2783" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3338" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002531.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3339" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003198.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3497" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002538.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3515" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002544.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3516" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003244.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3982" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024685.html" source="SUSE-SU"/>
    <description>
    Information disclosure due to JIT miscompilation in the JavaScript Engine: JIT component. This vulnerability was fixed in Firefox 148, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2026-2783/">CVE-2026-2783 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2783">CVE-2026-2783 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258568">SUSE bug 1258568</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049114" comment="MozillaFirefox-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049115" comment="MozillaFirefox-branding-upstream-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049116" comment="MozillaFirefox-devel-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049117" comment="MozillaFirefox-translations-common-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049118" comment="MozillaFirefox-translations-other-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050210" comment="MozillaThunderbird-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050211" comment="MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025480" comment="MozillaThunderbird-openpgp-librnp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050212" comment="MozillaThunderbird-translations-common-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050213" comment="MozillaThunderbird-translations-other-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262784" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2784</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2784" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2784" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2784" ref_url="https://www.suse.com/security/cve/CVE-2026-2784" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3338" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002531.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3339" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003198.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3497" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002538.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3515" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002544.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3516" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003244.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3982" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024685.html" source="SUSE-SU"/>
    <description>
    Mitigation bypass in the DOM: Security component. This vulnerability was fixed in Firefox 148, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2784/">CVE-2026-2784 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2784">CVE-2026-2784 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258568">SUSE bug 1258568</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049114" comment="MozillaFirefox-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049115" comment="MozillaFirefox-branding-upstream-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049116" comment="MozillaFirefox-devel-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049117" comment="MozillaFirefox-translations-common-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049118" comment="MozillaFirefox-translations-other-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050210" comment="MozillaThunderbird-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050211" comment="MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025480" comment="MozillaThunderbird-openpgp-librnp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050212" comment="MozillaThunderbird-translations-common-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050213" comment="MozillaThunderbird-translations-other-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262785" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2785</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2785" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2785" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2785" ref_url="https://www.suse.com/security/cve/CVE-2026-2785" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3338" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002531.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3339" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003198.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3497" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002538.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3515" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002544.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3516" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003244.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3982" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024685.html" source="SUSE-SU"/>
    <description>
    Invalid pointer in the JavaScript Engine component. This vulnerability was fixed in Firefox 148, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2785/">CVE-2026-2785 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2785">CVE-2026-2785 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258568">SUSE bug 1258568</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049114" comment="MozillaFirefox-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049115" comment="MozillaFirefox-branding-upstream-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049116" comment="MozillaFirefox-devel-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049117" comment="MozillaFirefox-translations-common-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049118" comment="MozillaFirefox-translations-other-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050210" comment="MozillaThunderbird-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050211" comment="MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025480" comment="MozillaThunderbird-openpgp-librnp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050212" comment="MozillaThunderbird-translations-common-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050213" comment="MozillaThunderbird-translations-other-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262786" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2786</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2786" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2786" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2786" ref_url="https://www.suse.com/security/cve/CVE-2026-2786" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3338" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002531.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3339" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003198.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3497" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002538.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3515" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002544.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3516" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003244.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3982" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024685.html" source="SUSE-SU"/>
    <description>
    Use-after-free in the JavaScript Engine component. This vulnerability was fixed in Firefox 148, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2786/">CVE-2026-2786 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2786">CVE-2026-2786 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258568">SUSE bug 1258568</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049114" comment="MozillaFirefox-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049115" comment="MozillaFirefox-branding-upstream-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049116" comment="MozillaFirefox-devel-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049117" comment="MozillaFirefox-translations-common-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049118" comment="MozillaFirefox-translations-other-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050210" comment="MozillaThunderbird-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050211" comment="MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025480" comment="MozillaThunderbird-openpgp-librnp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050212" comment="MozillaThunderbird-translations-common-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050213" comment="MozillaThunderbird-translations-other-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262787" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2787</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2787" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2787" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2787" ref_url="https://www.suse.com/security/cve/CVE-2026-2787" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3338" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002531.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3339" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003198.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3497" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002538.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3515" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002544.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3516" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003244.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3982" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024685.html" source="SUSE-SU"/>
    <description>
    Use-after-free in the DOM: Window and Location component. This vulnerability was fixed in Firefox 148, Firefox ESR 115.33, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2787/">CVE-2026-2787 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2787">CVE-2026-2787 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258568">SUSE bug 1258568</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049114" comment="MozillaFirefox-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049115" comment="MozillaFirefox-branding-upstream-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049116" comment="MozillaFirefox-devel-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049117" comment="MozillaFirefox-translations-common-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049118" comment="MozillaFirefox-translations-other-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050210" comment="MozillaThunderbird-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050211" comment="MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025480" comment="MozillaThunderbird-openpgp-librnp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050212" comment="MozillaThunderbird-translations-common-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050213" comment="MozillaThunderbird-translations-other-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262788" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2788</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2788" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2788" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2788" ref_url="https://www.suse.com/security/cve/CVE-2026-2788" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3338" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002531.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3339" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003198.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3497" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002538.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3515" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002544.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3516" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003244.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3982" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024685.html" source="SUSE-SU"/>
    <description>
    Incorrect boundary conditions in the Audio/Video: GMP component. This vulnerability was fixed in Firefox 148, Firefox ESR 115.33, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2788/">CVE-2026-2788 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2788">CVE-2026-2788 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258568">SUSE bug 1258568</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049114" comment="MozillaFirefox-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049115" comment="MozillaFirefox-branding-upstream-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049116" comment="MozillaFirefox-devel-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049117" comment="MozillaFirefox-translations-common-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049118" comment="MozillaFirefox-translations-other-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050210" comment="MozillaThunderbird-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050211" comment="MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025480" comment="MozillaThunderbird-openpgp-librnp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050212" comment="MozillaThunderbird-translations-common-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050213" comment="MozillaThunderbird-translations-other-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202627888" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-27888</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-27888" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-27888" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-27888" ref_url="https://www.suse.com/security/cve/CVE-2026-27888" source="SUSE CVE"/>
    <description>
    pypdf is a free and open-source pure-python PDF library. Prior to 6.7.3, an attacker who uses this vulnerability can craft a PDF which leads to the RAM being exhausted. This requires accessing the `xfa` property of a reader or writer and the corresponding stream being compressed using `/FlateDecode`. This has been fixed in pypdf 6.7.3. As a workaround, apply the patch manually.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-08"/>
	<updated date="2026-03-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27888/">CVE-2026-27888 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-27888">CVE-2026-27888 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258934">SUSE bug 1258934</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047678" comment="python313-PyPDF2-2.11.1-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010047686" comment="python313-PyPDF2 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262789" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2789</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2789" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2789" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2789" ref_url="https://www.suse.com/security/cve/CVE-2026-2789" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3338" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002531.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3339" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003198.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3497" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002538.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3515" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002544.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3516" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003244.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3982" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024685.html" source="SUSE-SU"/>
    <description>
    Use-after-free in the Graphics: ImageLib component. This vulnerability was fixed in Firefox 148, Firefox ESR 115.33, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-2789/">CVE-2026-2789 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2789">CVE-2026-2789 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258568">SUSE bug 1258568</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049114" comment="MozillaFirefox-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049115" comment="MozillaFirefox-branding-upstream-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049116" comment="MozillaFirefox-devel-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049117" comment="MozillaFirefox-translations-common-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049118" comment="MozillaFirefox-translations-other-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050210" comment="MozillaThunderbird-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050211" comment="MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025480" comment="MozillaThunderbird-openpgp-librnp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050212" comment="MozillaThunderbird-translations-common-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050213" comment="MozillaThunderbird-translations-other-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262790" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2790</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2790" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2790" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2790" ref_url="https://www.suse.com/security/cve/CVE-2026-2790" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3338" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002531.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3339" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003198.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3497" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002538.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3515" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002544.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3516" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003244.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3982" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024685.html" source="SUSE-SU"/>
    <description>
    Same-origin policy bypass in the Networking: JAR component. This vulnerability was fixed in Firefox 148, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.2/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-2790/">CVE-2026-2790 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2790">CVE-2026-2790 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258568">SUSE bug 1258568</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049114" comment="MozillaFirefox-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049115" comment="MozillaFirefox-branding-upstream-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049116" comment="MozillaFirefox-devel-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049117" comment="MozillaFirefox-translations-common-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049118" comment="MozillaFirefox-translations-other-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050210" comment="MozillaThunderbird-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050211" comment="MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025480" comment="MozillaThunderbird-openpgp-librnp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050212" comment="MozillaThunderbird-translations-common-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050213" comment="MozillaThunderbird-translations-other-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262791" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2791</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2791" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2791" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2791" ref_url="https://www.suse.com/security/cve/CVE-2026-2791" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3338" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002531.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3339" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003198.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3497" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002538.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3515" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002544.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3516" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003244.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3982" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024685.html" source="SUSE-SU"/>
    <description>
    Mitigation bypass in the Networking: Cache component. This vulnerability was fixed in Firefox 148, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-2791/">CVE-2026-2791 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2791">CVE-2026-2791 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258568">SUSE bug 1258568</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049114" comment="MozillaFirefox-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049115" comment="MozillaFirefox-branding-upstream-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049116" comment="MozillaFirefox-devel-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049117" comment="MozillaFirefox-translations-common-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049118" comment="MozillaFirefox-translations-other-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050210" comment="MozillaThunderbird-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050211" comment="MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025480" comment="MozillaThunderbird-openpgp-librnp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050212" comment="MozillaThunderbird-translations-common-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050213" comment="MozillaThunderbird-translations-other-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262792" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2792</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2792" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2792" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2792" ref_url="https://www.suse.com/security/cve/CVE-2026-2792" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3338" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002531.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3339" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003198.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3497" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002538.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3515" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002544.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3516" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003244.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3982" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024685.html" source="SUSE-SU"/>
    <description>
    Memory safety bugs present in Firefox ESR 140.7, Thunderbird ESR 140.7, Firefox 147 and Thunderbird 147. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability was fixed in Firefox 148, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2792/">CVE-2026-2792 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2792">CVE-2026-2792 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258568">SUSE bug 1258568</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049114" comment="MozillaFirefox-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049115" comment="MozillaFirefox-branding-upstream-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049116" comment="MozillaFirefox-devel-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049117" comment="MozillaFirefox-translations-common-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049118" comment="MozillaFirefox-translations-other-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050210" comment="MozillaThunderbird-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050211" comment="MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025480" comment="MozillaThunderbird-openpgp-librnp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050212" comment="MozillaThunderbird-translations-common-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050213" comment="MozillaThunderbird-translations-other-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262793" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2793</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2793" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2793" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2793" ref_url="https://www.suse.com/security/cve/CVE-2026-2793" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:3338" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-February/002531.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3339" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003198.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3497" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002538.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3515" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002544.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3516" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003244.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:3982" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002562.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0812-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024584.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0871-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024678.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0880-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024685.html" source="SUSE-SU"/>
    <description>
    Memory safety bugs present in Firefox ESR 115.32, Firefox ESR 140.7, Thunderbird ESR 140.7, Firefox 147 and Thunderbird 147. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability was fixed in Firefox 148, Firefox ESR 115.33, Firefox ESR 140.8, Thunderbird 148, and Thunderbird 140.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2793/">CVE-2026-2793 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-2793">CVE-2026-2793 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258568">SUSE bug 1258568</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049114" comment="MozillaFirefox-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049115" comment="MozillaFirefox-branding-upstream-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049116" comment="MozillaFirefox-devel-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049117" comment="MozillaFirefox-translations-common-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049118" comment="MozillaFirefox-translations-other-140.8.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050210" comment="MozillaThunderbird-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151180" comment="MozillaThunderbird is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050211" comment="MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010025480" comment="MozillaThunderbird-openpgp-librnp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050212" comment="MozillaThunderbird-translations-common-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151181" comment="MozillaThunderbird-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050213" comment="MozillaThunderbird-translations-other-140.8.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152805" comment="MozillaThunderbird-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202627932" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-27932</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-27932" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-27932" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-27932" ref_url="https://www.suse.com/security/cve/CVE-2026-27932" source="SUSE CVE"/>
    <description>
    joserfc is a Python library that provides an implementation of several JSON Object Signing and Encryption (JOSE) standards. In 1.6.2 and earlier, a resource exhaustion vulnerability in joserfc allows an unauthenticated attacker to cause a Denial of Service (DoS) via CPU exhaustion. When the library decrypts a JSON Web Encryption (JWE) token using Password-Based Encryption (PBES2) algorithms, it reads the p2c (PBES2 Count) parameter directly from the token's protected header. This parameter defines the number of iterations for the PBKDF2 key derivation function. Because joserfc does not validate or bound this value, an attacker can specify an extremely large iteration count (e.g., 2^31 - 1), forcing the server to expend massive CPU resources processing a single token. This vulnerability exists at the JWA layer and impacts all high-level JWE and JWT decryption interfaces if PBES2 algorithms are allowed by the application's policy.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-06"/>
	<updated date="2026-03-06"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-27932/">CVE-2026-27932 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-27932">CVE-2026-27932 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259154">SUSE bug 1259154</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047348" comment="python313-joserfc-1.1.0-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010047356" comment="python313-joserfc is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202627962" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-27962</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-27962" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-27962" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-27962" ref_url="https://www.suse.com/security/cve/CVE-2026-27962" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024822.html" source="SUSE-SU"/>
    <description>
    Authlib is a Python library which builds OAuth and OpenID Connect servers. Prior to version 1.6.9, a JWK Header Injection vulnerability in authlib's JWS implementation allows an unauthenticated attacker to forge arbitrary JWT tokens that pass signature verification. When key=None is passed to any JWS deserialization function, the library extracts and uses the cryptographic key embedded in the attacker-controlled JWT jwk header field. An attacker can sign a token with their own private key, embed the matching public key in the header, and have the server accept the forged token as cryptographically valid - bypassing authentication and authorization entirely. This issue has been patched in version 1.6.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-25"/>
	<updated date="2026-03-25"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="9.1/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-27962/">CVE-2026-27962 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-27962">CVE-2026-27962 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259738">SUSE bug 1259738</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050214" comment="python313-Authlib-1.5.2-bp160.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010044613" comment="python313-Authlib is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202628295" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-28295</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-28295" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28295" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-28295" ref_url="https://www.suse.com/security/cve/CVE-2026-28295" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20988-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045343.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the FTP GVfs backend. A malicious FTP server can exploit this vulnerability by providing an arbitrary IP address and port in its passive mode (PASV) response. The client unconditionally trusts this information and attempts to connect to the specified endpoint, allowing the malicious server to probe for open ports accessible from the client's network.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-03"/>
	<updated date="2026-04-10"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" cvss4="5.3/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-28295/">CVE-2026-28295 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-28295">CVE-2026-28295 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258953">SUSE bug 1258953</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052648" comment="gnome-online-accounts-3.58.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151805" comment="gnome-online-accounts is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052649" comment="gnome-online-accounts-devel-3.58.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151806" comment="gnome-online-accounts-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052650" comment="gnome-online-accounts-lang-3.58.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151807" comment="gnome-online-accounts-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052651" comment="gvfs-1.59.90-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245313" comment="gvfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052652" comment="gvfs-backend-afc-1.59.90-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245315" comment="gvfs-backend-afc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052653" comment="gvfs-backend-goa-1.59.90-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010049957" comment="gvfs-backend-goa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052654" comment="gvfs-backend-gphoto-1.59.90-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010052707" comment="gvfs-backend-gphoto is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052655" comment="gvfs-backend-samba-1.59.90-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245316" comment="gvfs-backend-samba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052656" comment="gvfs-backends-1.59.90-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245317" comment="gvfs-backends is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052657" comment="gvfs-fuse-1.59.90-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245319" comment="gvfs-fuse is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052658" comment="gvfs-lang-1.59.90-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245320" comment="gvfs-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052659" comment="libgoa-1_0-0-3.58.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151808" comment="libgoa-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052660" comment="libgoa-backend-1_0-2-3.58.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010052708" comment="libgoa-backend-1_0-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052661" comment="typelib-1_0-Goa-1_0-3.58.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151810" comment="typelib-1_0-Goa-1_0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202628296" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-28296</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-28296" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28296" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-28296" ref_url="https://www.suse.com/security/cve/CVE-2026-28296" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024708.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0923-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024712.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0960-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024806.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20988-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045343.html" source="SUSE-SU"/>
    <description>
    A flaw was found in the FTP GVfs backend. A remote attacker could exploit this input validation vulnerability by supplying specially crafted file paths containing carriage return and line feed (CRLF) sequences. These unsanitized sequences allow the attacker to terminate intended FTP commands and inject arbitrary FTP commands, potentially leading to arbitrary code execution or other severe impacts.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-03"/>
	<updated date="2026-04-10"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-28296/">CVE-2026-28296 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-28296">CVE-2026-28296 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258954">SUSE bug 1258954</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052648" comment="gnome-online-accounts-3.58.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151805" comment="gnome-online-accounts is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052649" comment="gnome-online-accounts-devel-3.58.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151806" comment="gnome-online-accounts-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052650" comment="gnome-online-accounts-lang-3.58.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151807" comment="gnome-online-accounts-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052651" comment="gvfs-1.59.90-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245313" comment="gvfs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052652" comment="gvfs-backend-afc-1.59.90-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245315" comment="gvfs-backend-afc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052653" comment="gvfs-backend-goa-1.59.90-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010049957" comment="gvfs-backend-goa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052654" comment="gvfs-backend-gphoto-1.59.90-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010052707" comment="gvfs-backend-gphoto is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052655" comment="gvfs-backend-samba-1.59.90-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245316" comment="gvfs-backend-samba is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052656" comment="gvfs-backends-1.59.90-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245317" comment="gvfs-backends is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052657" comment="gvfs-fuse-1.59.90-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245319" comment="gvfs-fuse is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052658" comment="gvfs-lang-1.59.90-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009245320" comment="gvfs-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052659" comment="libgoa-1_0-0-3.58.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151808" comment="libgoa-1_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052660" comment="libgoa-backend-1_0-2-3.58.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010052708" comment="libgoa-backend-1_0-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052661" comment="typelib-1_0-Goa-1_0-3.58.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151810" comment="typelib-1_0-Goa-1_0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202628348" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-28348</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-28348" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28348" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-28348" ref_url="https://www.suse.com/security/cve/CVE-2026-28348" source="SUSE CVE"/>
    <description>
    lxml_html_clean is a project for HTML cleaning functionalities copied from `lxml.html.clean`. Prior to version 0.4.4, the _has_sneaky_javascript() method strips backslashes before checking for dangerous CSS keywords. This causes CSS Unicode escape sequences to bypass the @import and expression() filters, allowing external CSS loading or XSS in older browsers. This issue has been patched in version 0.4.4.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-13"/>
	<updated date="2026-03-13"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-28348/">CVE-2026-28348 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-28348">CVE-2026-28348 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259378">SUSE bug 1259378</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048427" comment="python313-lxml_html_clean-0.4.2-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048468" comment="python313-lxml_html_clean is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202628350" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-28350</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-28350" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28350" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-28350" ref_url="https://www.suse.com/security/cve/CVE-2026-28350" source="SUSE CVE"/>
    <description>
    lxml_html_clean is a project for HTML cleaning functionalities copied from `lxml.html.clean`. Prior to version 0.4.4, the &lt;base&gt; tag passes through the default Cleaner configuration. While page_structure=True removes html, head, and title tags, there is no specific handling for &lt;base&gt;, allowing an attacker to inject it and hijack relative links on the page. This issue has been patched in version 0.4.4.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-13"/>
	<updated date="2026-03-13"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-28350/">CVE-2026-28350 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-28350">CVE-2026-28350 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259379">SUSE bug 1259379</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048427" comment="python313-lxml_html_clean-0.4.2-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048468" comment="python313-lxml_html_clean is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202628364" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-28364</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-28364" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28364" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-28364" ref_url="https://www.suse.com/security/cve/CVE-2026-28364" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0800-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024571.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0830-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024629.html" source="SUSE-SU"/>
    <description>
    In OCaml before 4.14.3 and 5.x before 5.4.1, a buffer over-read in Marshal deserialization (runtime/intern.c) enables remote code execution through a multi-phase attack chain. The vulnerability stems from missing bounds validation in the readblock() function, which performs unbounded memcpy() operations using attacker-controlled lengths from crafted Marshal data.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-03-18"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.7/CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-28364/">CVE-2026-28364 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-28364">CVE-2026-28364 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258992">SUSE bug 1258992</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049125" comment="ocaml-4.14.2-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153244" comment="ocaml is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049126" comment="ocaml-compiler-libs-4.14.2-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153245" comment="ocaml-compiler-libs is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049127" comment="ocaml-compiler-libs-devel-4.14.2-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153246" comment="ocaml-compiler-libs-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049128" comment="ocaml-ocamldoc-4.14.2-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153249" comment="ocaml-ocamldoc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049129" comment="ocaml-runtime-4.14.2-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153251" comment="ocaml-runtime is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049130" comment="ocaml-source-4.14.2-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153252" comment="ocaml-source is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202628417" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-28417</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-28417" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28417" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-28417" ref_url="https://www.suse.com/security/cve/CVE-2026-28417" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:6539" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002658.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6915" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002653.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0910-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024705.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1051-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024935.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1095-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024962.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20732-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024799.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20735-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024796.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20738-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024797.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20740-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024795.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20741-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024794.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20759-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024827.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20765-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024823.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20916-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025100.html" source="SUSE-SU"/>
    <description>
    Vim is an open source, command line text editor. Prior to version 9.2.0073, an OS command injection vulnerability exists in the `netrw` standard plugin bundled with Vim. By inducing a user to open a crafted URL (e.g., using the `scp://` protocol handler), an attacker can execute arbitrary shell commands with the privileges of the Vim process. Version 9.2.0073 fixes the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-09"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" cvss4="4.6/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-28417/">CVE-2026-28417 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-28417">CVE-2026-28417 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259051">SUSE bug 1259051</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050725" comment="gvim-9.2.0110-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151192" comment="gvim is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050726" comment="vim-9.2.0110-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151193" comment="vim is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050727" comment="vim-data-9.2.0110-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151194" comment="vim-data is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050022" comment="vim-data-common-9.2.0110-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177135" comment="vim-data-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050023" comment="vim-small-9.2.0110-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009670993" comment="vim-small is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050728" comment="xxd-9.2.0110-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009756472" comment="xxd is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202628490" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-28490</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-28490" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28490" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-28490" ref_url="https://www.suse.com/security/cve/CVE-2026-28490" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024822.html" source="SUSE-SU"/>
    <description>
    Authlib is a Python library which builds OAuth and OpenID Connect servers. Prior to version 1.6.9, a cryptographic padding oracle vulnerability was identified in the Authlib Python library concerning the implementation of the JSON Web Encryption (JWE) RSA1_5 key management algorithm. Authlib registers RSA1_5 in its default algorithm registry without requiring explicit opt-in, and actively destroys the constant-time Bleichenbacher mitigation that the underlying cryptography library implements correctly. This issue has been patched in version 1.6.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-25"/>
	<updated date="2026-03-25"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N" cvss4="8.2/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-28490/">CVE-2026-28490 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-28490">CVE-2026-28490 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259736">SUSE bug 1259736</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050214" comment="python313-Authlib-1.5.2-bp160.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010044613" comment="python313-Authlib is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202628493" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-28493</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-28493" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28493" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-28493" ref_url="https://www.suse.com/security/cve/CVE-2026-28493" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:1202-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1203-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025099.html" source="SUSE-SU"/>
    <description>
    ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16, an integer overflow vulnerability exists in the SIXEL decoer. The vulnerability allows an attacker to perform an out of bounds via a specially crafted image. This vulnerability is fixed in 7.1.2-16.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-08"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-28493/">CVE-2026-28493 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-28493">CVE-2026-28493 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259446">SUSE bug 1259446</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050733" comment="ImageMagick-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050734" comment="ImageMagick-config-7-SUSE-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050735" comment="ImageMagick-config-7-upstream-limited-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977490" comment="ImageMagick-config-7-upstream-limited is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050736" comment="ImageMagick-config-7-upstream-open-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977491" comment="ImageMagick-config-7-upstream-open is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050737" comment="ImageMagick-config-7-upstream-secure-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977492" comment="ImageMagick-config-7-upstream-secure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050738" comment="ImageMagick-config-7-upstream-websafe-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977493" comment="ImageMagick-config-7-upstream-websafe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050739" comment="ImageMagick-devel-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050740" comment="ImageMagick-doc-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050741" comment="ImageMagick-extra-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050742" comment="libMagick++-7_Q16HDRI5-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698047" comment="libMagick++-7_Q16HDRI5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050743" comment="libMagick++-devel-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050744" comment="libMagickCore-7_Q16HDRI10-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698048" comment="libMagickCore-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050745" comment="libMagickWand-7_Q16HDRI10-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698049" comment="libMagickWand-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050746" comment="perl-PerlMagick-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202628494" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-28494</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-28494" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28494" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-28494" ref_url="https://www.suse.com/security/cve/CVE-2026-28494" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:1201-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1202-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1203-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025099.html" source="SUSE-SU"/>
    <description>
    ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, a stack buffer overflow exists in ImageMagick's morphology kernel parsing functions. User-controlled kernel strings exceeding a buffer are copied into fixed-size stack buffers via memcpy without bounds checking, resulting in stack corruption. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-08"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-28494/">CVE-2026-28494 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-28494">CVE-2026-28494 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259447">SUSE bug 1259447</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050733" comment="ImageMagick-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050734" comment="ImageMagick-config-7-SUSE-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050735" comment="ImageMagick-config-7-upstream-limited-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977490" comment="ImageMagick-config-7-upstream-limited is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050736" comment="ImageMagick-config-7-upstream-open-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977491" comment="ImageMagick-config-7-upstream-open is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050737" comment="ImageMagick-config-7-upstream-secure-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977492" comment="ImageMagick-config-7-upstream-secure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050738" comment="ImageMagick-config-7-upstream-websafe-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977493" comment="ImageMagick-config-7-upstream-websafe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050739" comment="ImageMagick-devel-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050740" comment="ImageMagick-doc-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050741" comment="ImageMagick-extra-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050742" comment="libMagick++-7_Q16HDRI5-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698047" comment="libMagick++-7_Q16HDRI5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050743" comment="libMagick++-devel-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050744" comment="libMagickCore-7_Q16HDRI10-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698048" comment="libMagickCore-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050745" comment="libMagickWand-7_Q16HDRI10-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698049" comment="libMagickWand-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050746" comment="perl-PerlMagick-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202628498" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-28498</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-28498" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28498" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-28498" ref_url="https://www.suse.com/security/cve/CVE-2026-28498" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0975-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024822.html" source="SUSE-SU"/>
    <description>
    Authlib is a Python library which builds OAuth and OpenID Connect servers. Prior to version 1.6.9, a library-level vulnerability was identified in the Authlib Python library concerning the validation of OpenID Connect (OIDC) ID Tokens. Specifically, the internal hash verification logic (_verify_hash) responsible for validating the at_hash (Access Token Hash) and c_hash (Authorization Code Hash) claims exhibits a fail-open behavior when encountering an unsupported or unknown cryptographic algorithm. This flaw allows an attacker to bypass mandatory integrity protections by supplying a forged ID Token with a deliberately unrecognized alg header parameter. The library intercepts the unsupported state and silently returns True (validation passed), inherently violating fundamental cryptographic design principles and direct OIDC specifications. This issue has been patched in version 1.6.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-25"/>
	<updated date="2026-03-25"/>
	<severity>Critical</severity>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N" cvss4="9.1/CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-28498/">CVE-2026-28498 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-28498">CVE-2026-28498 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259737">SUSE bug 1259737</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050214" comment="python313-Authlib-1.5.2-bp160.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010044613" comment="python313-Authlib is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202628686" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-28686</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-28686" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28686" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-28686" ref_url="https://www.suse.com/security/cve/CVE-2026-28686" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:1201-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1202-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1203-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025099.html" source="SUSE-SU"/>
    <description>
    ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, A heap-buffer-overflow vulnerability exists in the PCL encode due to an undersized output buffer allocation. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-08"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-28686/">CVE-2026-28686 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-28686">CVE-2026-28686 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259448">SUSE bug 1259448</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050733" comment="ImageMagick-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050734" comment="ImageMagick-config-7-SUSE-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050735" comment="ImageMagick-config-7-upstream-limited-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977490" comment="ImageMagick-config-7-upstream-limited is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050736" comment="ImageMagick-config-7-upstream-open-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977491" comment="ImageMagick-config-7-upstream-open is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050737" comment="ImageMagick-config-7-upstream-secure-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977492" comment="ImageMagick-config-7-upstream-secure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050738" comment="ImageMagick-config-7-upstream-websafe-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977493" comment="ImageMagick-config-7-upstream-websafe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050739" comment="ImageMagick-devel-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050740" comment="ImageMagick-doc-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050741" comment="ImageMagick-extra-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050742" comment="libMagick++-7_Q16HDRI5-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698047" comment="libMagick++-7_Q16HDRI5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050743" comment="libMagick++-devel-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050744" comment="libMagickCore-7_Q16HDRI10-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698048" comment="libMagickCore-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050745" comment="libMagickWand-7_Q16HDRI10-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698049" comment="libMagickWand-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050746" comment="perl-PerlMagick-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202628687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-28687</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-28687" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28687" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-28687" ref_url="https://www.suse.com/security/cve/CVE-2026-28687" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:1201-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1202-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1203-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025099.html" source="SUSE-SU"/>
    <description>
    ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, a heap use-after-free vulnerability in ImageMagick's MSL decoder allows an attacker to trigger access to freed memory by crafting an MSL file. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-08"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-28687/">CVE-2026-28687 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-28687">CVE-2026-28687 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259450">SUSE bug 1259450</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050733" comment="ImageMagick-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050734" comment="ImageMagick-config-7-SUSE-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050735" comment="ImageMagick-config-7-upstream-limited-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977490" comment="ImageMagick-config-7-upstream-limited is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050736" comment="ImageMagick-config-7-upstream-open-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977491" comment="ImageMagick-config-7-upstream-open is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050737" comment="ImageMagick-config-7-upstream-secure-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977492" comment="ImageMagick-config-7-upstream-secure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050738" comment="ImageMagick-config-7-upstream-websafe-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977493" comment="ImageMagick-config-7-upstream-websafe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050739" comment="ImageMagick-devel-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050740" comment="ImageMagick-doc-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050741" comment="ImageMagick-extra-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050742" comment="libMagick++-7_Q16HDRI5-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698047" comment="libMagick++-7_Q16HDRI5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050743" comment="libMagick++-devel-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050744" comment="libMagickCore-7_Q16HDRI10-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698048" comment="libMagickCore-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050745" comment="libMagickWand-7_Q16HDRI10-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698049" comment="libMagickWand-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050746" comment="perl-PerlMagick-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202628688" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-28688</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-28688" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28688" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-28688" ref_url="https://www.suse.com/security/cve/CVE-2026-28688" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:1201-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1202-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1203-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025099.html" source="SUSE-SU"/>
    <description>
    ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, a heap-use-after-free vulnerability exists in the MSL encoder, where a cloned image is destroyed twice. The MSL coder does not support writing MSL so the write capability has been removed. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.1/CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="5.9/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-28688/">CVE-2026-28688 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2026-28688">CVE-2026-28688 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259451">SUSE bug 1259451</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050733" comment="ImageMagick-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050734" comment="ImageMagick-config-7-SUSE-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050735" comment="ImageMagick-config-7-upstream-limited-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977490" comment="ImageMagick-config-7-upstream-limited is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050736" comment="ImageMagick-config-7-upstream-open-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977491" comment="ImageMagick-config-7-upstream-open is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050737" comment="ImageMagick-config-7-upstream-secure-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977492" comment="ImageMagick-config-7-upstream-secure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050738" comment="ImageMagick-config-7-upstream-websafe-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977493" comment="ImageMagick-config-7-upstream-websafe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050739" comment="ImageMagick-devel-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050740" comment="ImageMagick-doc-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050741" comment="ImageMagick-extra-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050742" comment="libMagick++-7_Q16HDRI5-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698047" comment="libMagick++-7_Q16HDRI5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050743" comment="libMagick++-devel-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050744" comment="libMagickCore-7_Q16HDRI10-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698048" comment="libMagickCore-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050745" comment="libMagickWand-7_Q16HDRI10-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698049" comment="libMagickWand-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050746" comment="perl-PerlMagick-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202628689" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-28689</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-28689" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28689" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-28689" ref_url="https://www.suse.com/security/cve/CVE-2026-28689" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:1201-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1202-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1203-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025099.html" source="SUSE-SU"/>
    <description>
    ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, domain="path" authorization is checked before final file open/use. A symlink swap between check-time and use-time bypasses policy-denied read/write. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N" cvss4="7.2/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-28689/">CVE-2026-28689 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-28689">CVE-2026-28689 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259452">SUSE bug 1259452</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050733" comment="ImageMagick-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050734" comment="ImageMagick-config-7-SUSE-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050735" comment="ImageMagick-config-7-upstream-limited-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977490" comment="ImageMagick-config-7-upstream-limited is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050736" comment="ImageMagick-config-7-upstream-open-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977491" comment="ImageMagick-config-7-upstream-open is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050737" comment="ImageMagick-config-7-upstream-secure-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977492" comment="ImageMagick-config-7-upstream-secure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050738" comment="ImageMagick-config-7-upstream-websafe-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977493" comment="ImageMagick-config-7-upstream-websafe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050739" comment="ImageMagick-devel-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050740" comment="ImageMagick-doc-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050741" comment="ImageMagick-extra-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050742" comment="libMagick++-7_Q16HDRI5-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698047" comment="libMagick++-7_Q16HDRI5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050743" comment="libMagick++-devel-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050744" comment="libMagickCore-7_Q16HDRI10-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698048" comment="libMagickCore-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050745" comment="libMagickWand-7_Q16HDRI10-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698049" comment="libMagickWand-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050746" comment="perl-PerlMagick-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202628690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-28690</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-28690" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28690" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-28690" ref_url="https://www.suse.com/security/cve/CVE-2026-28690" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:1201-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1202-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1203-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1300-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045502.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025099.html" source="SUSE-SU"/>
    <description>
    ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, a stack buffer overflow vulnerability exists in the MNG encoder. There is a bounds checks missing that could corrupting the stack with attacker-controlled data. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-28690/">CVE-2026-28690 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-28690">CVE-2026-28690 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259456">SUSE bug 1259456</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052596" comment="GraphicsMagick-1.3.45-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152591" comment="GraphicsMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052597" comment="GraphicsMagick-devel-1.3.45-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151256" comment="GraphicsMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050733" comment="ImageMagick-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050734" comment="ImageMagick-config-7-SUSE-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050735" comment="ImageMagick-config-7-upstream-limited-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977490" comment="ImageMagick-config-7-upstream-limited is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050736" comment="ImageMagick-config-7-upstream-open-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977491" comment="ImageMagick-config-7-upstream-open is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050737" comment="ImageMagick-config-7-upstream-secure-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977492" comment="ImageMagick-config-7-upstream-secure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050738" comment="ImageMagick-config-7-upstream-websafe-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977493" comment="ImageMagick-config-7-upstream-websafe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050739" comment="ImageMagick-devel-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050740" comment="ImageMagick-doc-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050741" comment="ImageMagick-extra-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052598" comment="libGraphicsMagick++-Q16-12-1.3.45-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154127" comment="libGraphicsMagick++-Q16-12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052599" comment="libGraphicsMagick++-devel-1.3.45-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152594" comment="libGraphicsMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052600" comment="libGraphicsMagick-Q16-3-1.3.45-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151257" comment="libGraphicsMagick-Q16-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052601" comment="libGraphicsMagick3-config-1.3.45-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151258" comment="libGraphicsMagick3-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052602" comment="libGraphicsMagickWand-Q16-2-1.3.45-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151259" comment="libGraphicsMagickWand-Q16-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050742" comment="libMagick++-7_Q16HDRI5-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698047" comment="libMagick++-7_Q16HDRI5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050743" comment="libMagick++-devel-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050744" comment="libMagickCore-7_Q16HDRI10-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698048" comment="libMagickCore-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050745" comment="libMagickWand-7_Q16HDRI10-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698049" comment="libMagickWand-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052603" comment="perl-GraphicsMagick-1.3.45-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152600" comment="perl-GraphicsMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050746" comment="perl-PerlMagick-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202628691" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-28691</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-28691" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28691" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-28691" ref_url="https://www.suse.com/security/cve/CVE-2026-28691" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1201-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1202-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1203-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025099.html" source="SUSE-SU"/>
    <description>
    ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, an uninitialized pointer dereference vulnerability exists in the JBIG decoder due to a missing check. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-08"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-28691/">CVE-2026-28691 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-28691">CVE-2026-28691 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259455">SUSE bug 1259455</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050733" comment="ImageMagick-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050734" comment="ImageMagick-config-7-SUSE-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050735" comment="ImageMagick-config-7-upstream-limited-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977490" comment="ImageMagick-config-7-upstream-limited is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050736" comment="ImageMagick-config-7-upstream-open-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977491" comment="ImageMagick-config-7-upstream-open is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050737" comment="ImageMagick-config-7-upstream-secure-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977492" comment="ImageMagick-config-7-upstream-secure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050738" comment="ImageMagick-config-7-upstream-websafe-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977493" comment="ImageMagick-config-7-upstream-websafe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050739" comment="ImageMagick-devel-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050740" comment="ImageMagick-doc-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050741" comment="ImageMagick-extra-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050742" comment="libMagick++-7_Q16HDRI5-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698047" comment="libMagick++-7_Q16HDRI5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050743" comment="libMagick++-devel-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050744" comment="libMagickCore-7_Q16HDRI10-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698048" comment="libMagickCore-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050745" comment="libMagickWand-7_Q16HDRI10-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698049" comment="libMagickWand-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050746" comment="perl-PerlMagick-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202628692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-28692</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-28692" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28692" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-28692" ref_url="https://www.suse.com/security/cve/CVE-2026-28692" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:1201-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1202-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1203-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025099.html" source="SUSE-SU"/>
    <description>
    ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, MAT decoder uses 32-bit arithmetic due to incorrect parenthesization resulting in a heap over-read. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-08"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-28692/">CVE-2026-28692 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-28692">CVE-2026-28692 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259457">SUSE bug 1259457</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050733" comment="ImageMagick-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050734" comment="ImageMagick-config-7-SUSE-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050735" comment="ImageMagick-config-7-upstream-limited-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977490" comment="ImageMagick-config-7-upstream-limited is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050736" comment="ImageMagick-config-7-upstream-open-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977491" comment="ImageMagick-config-7-upstream-open is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050737" comment="ImageMagick-config-7-upstream-secure-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977492" comment="ImageMagick-config-7-upstream-secure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050738" comment="ImageMagick-config-7-upstream-websafe-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977493" comment="ImageMagick-config-7-upstream-websafe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050739" comment="ImageMagick-devel-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050740" comment="ImageMagick-doc-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050741" comment="ImageMagick-extra-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050742" comment="libMagick++-7_Q16HDRI5-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698047" comment="libMagick++-7_Q16HDRI5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050743" comment="libMagick++-devel-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050744" comment="libMagickCore-7_Q16HDRI10-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698048" comment="libMagickCore-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050745" comment="libMagickWand-7_Q16HDRI10-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698049" comment="libMagickWand-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050746" comment="perl-PerlMagick-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202628693" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-28693</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-28693" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28693" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-28693" ref_url="https://www.suse.com/security/cve/CVE-2026-28693" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:1201-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1202-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1203-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025099.html" source="SUSE-SU"/>
    <description>
    ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, an integer overflow in DIB coder can result in out of bounds read or write. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-08"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-28693/">CVE-2026-28693 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-28693">CVE-2026-28693 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259466">SUSE bug 1259466</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050733" comment="ImageMagick-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050734" comment="ImageMagick-config-7-SUSE-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050735" comment="ImageMagick-config-7-upstream-limited-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977490" comment="ImageMagick-config-7-upstream-limited is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050736" comment="ImageMagick-config-7-upstream-open-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977491" comment="ImageMagick-config-7-upstream-open is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050737" comment="ImageMagick-config-7-upstream-secure-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977492" comment="ImageMagick-config-7-upstream-secure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050738" comment="ImageMagick-config-7-upstream-websafe-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977493" comment="ImageMagick-config-7-upstream-websafe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050739" comment="ImageMagick-devel-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050740" comment="ImageMagick-doc-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050741" comment="ImageMagick-extra-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050742" comment="libMagick++-7_Q16HDRI5-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698047" comment="libMagick++-7_Q16HDRI5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050743" comment="libMagick++-devel-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050744" comment="libMagickCore-7_Q16HDRI10-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698048" comment="libMagickCore-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050745" comment="libMagickWand-7_Q16HDRI10-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698049" comment="libMagickWand-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050746" comment="perl-PerlMagick-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202628804" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-28804</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-28804" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-28804" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-28804" ref_url="https://www.suse.com/security/cve/CVE-2026-28804" source="SUSE CVE"/>
    <description>
    pypdf is a free and open-source pure-python PDF library. Prior to version 6.7.5, an attacker who uses this vulnerability can craft a PDF which leads to long runtimes. This requires accessing a stream which uses the /ASCIIHexDecode filter. This issue has been patched in version 6.7.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-13"/>
	<updated date="2026-03-13"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.9/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-28804/">CVE-2026-28804 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L" href="https://nvd.nist.gov/vuln/detail/CVE-2026-28804">CVE-2026-28804 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259404">SUSE bug 1259404</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010048428" comment="python313-PyPDF2-2.11.1-bp160.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010047686" comment="python313-PyPDF2 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202629111" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-29111</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-29111" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-29111" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-29111" ref_url="https://www.suse.com/security/cve/CVE-2026-29111" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024932.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20998-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21003-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045403.html" source="SUSE-SU"/>
    <description>
    systemd, a system and service manager, (as PID 1) hits an assert and freezes execution when an unprivileged IPC API call is made with spurious data. On version v249 and older the effect is not an assert, but stack overwriting, with the attacker controlled content. From version v250 and newer this is not possible as the safety check causes an assert instead. This IPC call was added in v239, so versions older than that are not affected. Versions 260-rc1, 259.2, 258.5, and 257.11 contain patches. No known workarounds are available.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-10"/>
	<updated date="2026-04-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-29111/">CVE-2026-29111 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-29111">CVE-2026-29111 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259418">SUSE bug 1259418</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010053372" comment="libsystemd0-257.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154102" comment="libsystemd0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010053373" comment="libudev1-257.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151691" comment="libudev1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010053374" comment="systemd-257.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151693" comment="systemd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010053375" comment="systemd-boot-257.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009999290" comment="systemd-boot is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010053376" comment="systemd-container-257.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239132" comment="systemd-container is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010053377" comment="systemd-devel-257.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152582" comment="systemd-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010053378" comment="systemd-doc-257.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009625972" comment="systemd-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010053379" comment="systemd-experimental-257.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009725369" comment="systemd-experimental is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010053380" comment="systemd-homed-257.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009999291" comment="systemd-homed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010053381" comment="systemd-journal-remote-257.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009625973" comment="systemd-journal-remote is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010053382" comment="systemd-lang-257.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009625974" comment="systemd-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010053383" comment="systemd-networkd-257.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010050657" comment="systemd-networkd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010053384" comment="systemd-portable-257.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009725370" comment="systemd-portable is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010053385" comment="systemd-resolved-257.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010050658" comment="systemd-resolved is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010053386" comment="systemd-testsuite-257.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009725371" comment="systemd-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010053387" comment="udev-257.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151699" comment="udev is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262920" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2920</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2920" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2920" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2920" ref_url="https://www.suse.com/security/cve/CVE-2026-2920" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:6300" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003277.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6750" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002652.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024897.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025101.html" source="SUSE-SU"/>
    <description>
    GStreamer ASF Demuxer Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation.

The specific flaw exists within the processing of stream headers within ASF files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28843.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2920/">CVE-2026-2920 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2920">CVE-2026-2920 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259367">SUSE bug 1259367</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050723" comment="gstreamer-plugins-ugly-1.26.7-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177245" comment="gstreamer-plugins-ugly is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050724" comment="gstreamer-plugins-ugly-lang-1.26.7-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177246" comment="gstreamer-plugins-ugly-lang is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20262922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-2922</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-2922" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2922" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-2922" ref_url="https://www.suse.com/security/cve/CVE-2026-2922" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:6300" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003277.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0998-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024897.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20915-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025101.html" source="SUSE-SU"/>
    <description>
    GStreamer RealMedia Demuxer Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation.

The specific flaw exists within the processing of video packets. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28845.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-2922/">CVE-2026-2922 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-2922">CVE-2026-2922 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259370">SUSE bug 1259370</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050723" comment="gstreamer-plugins-ugly-1.26.7-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177245" comment="gstreamer-plugins-ugly is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050724" comment="gstreamer-plugins-ugly-lang-1.26.7-160000.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009177246" comment="gstreamer-plugins-ugly-lang is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20263061" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-3061</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-3061" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3061" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-3061" ref_url="https://www.suse.com/security/cve/CVE-2026-3061" source="SUSE CVE"/>
    <description>
    Out of bounds read in Media in Google Chrome prior to 145.0.7632.116 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-02-28"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-3061/">CVE-2026-3061 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-3061">CVE-2026-3061 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258733">SUSE bug 1258733</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045806" comment="chromedriver-145.0.7632.116-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045807" comment="chromium-145.0.7632.116-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20263062" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-3062</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-3062" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3062" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-3062" ref_url="https://www.suse.com/security/cve/CVE-2026-3062" source="SUSE CVE"/>
    <description>
    Out of bounds read and write in Tint in Google Chrome on Mac prior to 145.0.7632.116 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-02-28"/>
	<updated date="2026-02-28"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-3062/">CVE-2026-3062 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-3062">CVE-2026-3062 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1258733">SUSE bug 1258733</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045806" comment="chromedriver-145.0.7632.116-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010045807" comment="chromium-145.0.7632.116-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202630883" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-30883</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-30883" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-30883" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-30883" ref_url="https://www.suse.com/security/cve/CVE-2026-30883" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0938-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024784.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1201-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1202-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1203-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025099.html" source="SUSE-SU"/>
    <description>
    ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, an extremely large image profile could result in a heap overflow when encoding a PNG image. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-08"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-30883/">CVE-2026-30883 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-30883">CVE-2026-30883 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259467">SUSE bug 1259467</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052596" comment="GraphicsMagick-1.3.45-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152591" comment="GraphicsMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052597" comment="GraphicsMagick-devel-1.3.45-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151256" comment="GraphicsMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050733" comment="ImageMagick-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050734" comment="ImageMagick-config-7-SUSE-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050735" comment="ImageMagick-config-7-upstream-limited-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977490" comment="ImageMagick-config-7-upstream-limited is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050736" comment="ImageMagick-config-7-upstream-open-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977491" comment="ImageMagick-config-7-upstream-open is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050737" comment="ImageMagick-config-7-upstream-secure-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977492" comment="ImageMagick-config-7-upstream-secure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050738" comment="ImageMagick-config-7-upstream-websafe-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977493" comment="ImageMagick-config-7-upstream-websafe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050739" comment="ImageMagick-devel-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050740" comment="ImageMagick-doc-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050741" comment="ImageMagick-extra-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052598" comment="libGraphicsMagick++-Q16-12-1.3.45-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154127" comment="libGraphicsMagick++-Q16-12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052599" comment="libGraphicsMagick++-devel-1.3.45-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152594" comment="libGraphicsMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052600" comment="libGraphicsMagick-Q16-3-1.3.45-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151257" comment="libGraphicsMagick-Q16-3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052601" comment="libGraphicsMagick3-config-1.3.45-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151258" comment="libGraphicsMagick3-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052602" comment="libGraphicsMagickWand-Q16-2-1.3.45-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151259" comment="libGraphicsMagickWand-Q16-2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050742" comment="libMagick++-7_Q16HDRI5-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698047" comment="libMagick++-7_Q16HDRI5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050743" comment="libMagick++-devel-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050744" comment="libMagickCore-7_Q16HDRI10-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698048" comment="libMagickCore-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050745" comment="libMagickWand-7_Q16HDRI10-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698049" comment="libMagickWand-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052603" comment="perl-GraphicsMagick-1.3.45-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152600" comment="perl-GraphicsMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050746" comment="perl-PerlMagick-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202630922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-30922</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-30922" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-30922" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-30922" ref_url="https://www.suse.com/security/cve/CVE-2026-30922" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:1075-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024958.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1076-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024957.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1158-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045194.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20821-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024900.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20835-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025002.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20878-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025053.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20929-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045223.html" source="SUSE-SU"/>
    <description>
    pyasn1 is a generic ASN.1 library for Python. Prior to 0.6.3, the `pyasn1` library is vulnerable to a Denial of Service (DoS) attack caused by uncontrolled recursion when decoding ASN.1 data with deeply nested structures. An attacker can supply a crafted payload containing thousands of nested `SEQUENCE` (`0x30`) or `SET` (`0x31`) tags with "Indefinite Length" (`0x80`) markers. This forces the decoder to recursively call itself until the Python interpreter crashes with a `RecursionError` or consumes all available memory (OOM), crashing the host application. This is a distinct vulnerability from CVE-2026-23490 (which addressed integer overflows in OID decoding). The fix for CVE-2026-23490 (`MAX_OID_ARC_CONTINUATION_OCTETS`) does not mitigate this recursion issue. Version 0.6.3 fixes this specific issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-30922/">CVE-2026-30922 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-30922">CVE-2026-30922 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259803">SUSE bug 1259803</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051874" comment="python313-pyasn1-0.6.1-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010039779" comment="python313-pyasn1 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202630929" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-30929</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-30929" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-30929" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-30929" ref_url="https://www.suse.com/security/cve/CVE-2026-30929" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:1202-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1203-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025099.html" source="SUSE-SU"/>
    <description>
    ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, MagnifyImage uses a fixed-size stack buffer. When using a specific image it is possible to overflow this buffer and corrupt the stack. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-08"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-30929/">CVE-2026-30929 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-30929">CVE-2026-30929 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259468">SUSE bug 1259468</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050733" comment="ImageMagick-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050734" comment="ImageMagick-config-7-SUSE-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050735" comment="ImageMagick-config-7-upstream-limited-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977490" comment="ImageMagick-config-7-upstream-limited is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050736" comment="ImageMagick-config-7-upstream-open-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977491" comment="ImageMagick-config-7-upstream-open is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050737" comment="ImageMagick-config-7-upstream-secure-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977492" comment="ImageMagick-config-7-upstream-secure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050738" comment="ImageMagick-config-7-upstream-websafe-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977493" comment="ImageMagick-config-7-upstream-websafe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050739" comment="ImageMagick-devel-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050740" comment="ImageMagick-doc-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050741" comment="ImageMagick-extra-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050742" comment="libMagick++-7_Q16HDRI5-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698047" comment="libMagick++-7_Q16HDRI5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050743" comment="libMagick++-devel-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050744" comment="libMagickCore-7_Q16HDRI10-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698048" comment="libMagickCore-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050745" comment="libMagickWand-7_Q16HDRI10-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698049" comment="libMagickWand-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050746" comment="perl-PerlMagick-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202630931" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-30931</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-30931" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-30931" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-30931" ref_url="https://www.suse.com/security/cve/CVE-2026-30931" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:1202-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025099.html" source="SUSE-SU"/>
    <description>
    ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16, a heap-based buffer overflow in the UHDR encoder can happen due to truncation of a value and it would allow an out of bounds write. This vulnerability is fixed in 7.1.2-16.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-08"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="8.8/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-30931/">CVE-2026-30931 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-30931">CVE-2026-30931 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259469">SUSE bug 1259469</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050733" comment="ImageMagick-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050734" comment="ImageMagick-config-7-SUSE-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050735" comment="ImageMagick-config-7-upstream-limited-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977490" comment="ImageMagick-config-7-upstream-limited is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050736" comment="ImageMagick-config-7-upstream-open-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977491" comment="ImageMagick-config-7-upstream-open is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050737" comment="ImageMagick-config-7-upstream-secure-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977492" comment="ImageMagick-config-7-upstream-secure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050738" comment="ImageMagick-config-7-upstream-websafe-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977493" comment="ImageMagick-config-7-upstream-websafe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050739" comment="ImageMagick-devel-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050740" comment="ImageMagick-doc-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050741" comment="ImageMagick-extra-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050742" comment="libMagick++-7_Q16HDRI5-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698047" comment="libMagick++-7_Q16HDRI5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050743" comment="libMagick++-devel-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050744" comment="libMagickCore-7_Q16HDRI10-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698048" comment="libMagickCore-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050745" comment="libMagickWand-7_Q16HDRI10-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698049" comment="libMagickWand-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050746" comment="perl-PerlMagick-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202630935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-30935</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-30935" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-30935" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-30935" ref_url="https://www.suse.com/security/cve/CVE-2026-30935" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:1202-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1203-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025099.html" source="SUSE-SU"/>
    <description>
    ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16, BilateralBlurImage contains a heap buffer over-read caused by an incorrect conversion. When processing a crafted image with the -bilateral-blur operation an out of bounds read can occur. This vulnerability is fixed in 7.1.2-16.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.4/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L" cvss4="4.8/CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:A/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-30935/">CVE-2026-30935 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-30935">CVE-2026-30935 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259497">SUSE bug 1259497</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050733" comment="ImageMagick-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050734" comment="ImageMagick-config-7-SUSE-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050735" comment="ImageMagick-config-7-upstream-limited-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977490" comment="ImageMagick-config-7-upstream-limited is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050736" comment="ImageMagick-config-7-upstream-open-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977491" comment="ImageMagick-config-7-upstream-open is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050737" comment="ImageMagick-config-7-upstream-secure-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977492" comment="ImageMagick-config-7-upstream-secure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050738" comment="ImageMagick-config-7-upstream-websafe-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977493" comment="ImageMagick-config-7-upstream-websafe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050739" comment="ImageMagick-devel-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050740" comment="ImageMagick-doc-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050741" comment="ImageMagick-extra-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050742" comment="libMagick++-7_Q16HDRI5-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698047" comment="libMagick++-7_Q16HDRI5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050743" comment="libMagick++-devel-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050744" comment="libMagickCore-7_Q16HDRI10-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698048" comment="libMagickCore-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050745" comment="libMagickWand-7_Q16HDRI10-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698049" comment="libMagickWand-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050746" comment="perl-PerlMagick-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202630936" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-30936</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-30936" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-30936" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-30936" ref_url="https://www.suse.com/security/cve/CVE-2026-30936" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:1202-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1203-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025099.html" source="SUSE-SU"/>
    <description>
    ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, a crafted image could cause an out of bounds heap write inside the WaveletDenoiseImage method. When processing a crafted image with the -wavelet-denoise operation an out of bounds write can occur. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" cvss4="6.7/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-30936/">CVE-2026-30936 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-30936">CVE-2026-30936 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259464">SUSE bug 1259464</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050733" comment="ImageMagick-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050734" comment="ImageMagick-config-7-SUSE-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050735" comment="ImageMagick-config-7-upstream-limited-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977490" comment="ImageMagick-config-7-upstream-limited is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050736" comment="ImageMagick-config-7-upstream-open-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977491" comment="ImageMagick-config-7-upstream-open is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050737" comment="ImageMagick-config-7-upstream-secure-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977492" comment="ImageMagick-config-7-upstream-secure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050738" comment="ImageMagick-config-7-upstream-websafe-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977493" comment="ImageMagick-config-7-upstream-websafe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050739" comment="ImageMagick-devel-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050740" comment="ImageMagick-doc-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050741" comment="ImageMagick-extra-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050742" comment="libMagick++-7_Q16HDRI5-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698047" comment="libMagick++-7_Q16HDRI5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050743" comment="libMagick++-devel-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050744" comment="libMagickCore-7_Q16HDRI10-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698048" comment="libMagickCore-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050745" comment="libMagickWand-7_Q16HDRI10-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698049" comment="libMagickWand-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050746" comment="perl-PerlMagick-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202630937" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-30937</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-30937" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-30937" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-30937" ref_url="https://www.suse.com/security/cve/CVE-2026-30937" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:1201-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1202-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1203-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025099.html" source="SUSE-SU"/>
    <description>
    ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 7.1.2-16 and 6.9.13-41, a 32-bit unsigned integer overflow in the XWD (X Windows) encoder can cause an undersized heap buffer allocation. When writing a extremely large image an out of bounds heap write can occur. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-08"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="6.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H" cvss4="7/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-30937/">CVE-2026-30937 at SUSE</cve>
	<cve impact="medium" cvss3="6.1/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-30937">CVE-2026-30937 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259463">SUSE bug 1259463</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050733" comment="ImageMagick-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050734" comment="ImageMagick-config-7-SUSE-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050735" comment="ImageMagick-config-7-upstream-limited-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977490" comment="ImageMagick-config-7-upstream-limited is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050736" comment="ImageMagick-config-7-upstream-open-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977491" comment="ImageMagick-config-7-upstream-open is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050737" comment="ImageMagick-config-7-upstream-secure-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977492" comment="ImageMagick-config-7-upstream-secure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050738" comment="ImageMagick-config-7-upstream-websafe-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977493" comment="ImageMagick-config-7-upstream-websafe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050739" comment="ImageMagick-devel-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050740" comment="ImageMagick-doc-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050741" comment="ImageMagick-extra-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050742" comment="libMagick++-7_Q16HDRI5-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698047" comment="libMagick++-7_Q16HDRI5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050743" comment="libMagick++-devel-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050744" comment="libMagickCore-7_Q16HDRI10-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698048" comment="libMagickCore-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050745" comment="libMagickWand-7_Q16HDRI10-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698049" comment="libMagickWand-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050746" comment="perl-PerlMagick-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202631826" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-31826</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-31826" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31826" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-31826" ref_url="https://www.suse.com/security/cve/CVE-2026-31826" source="SUSE CVE"/>
    <description>
    pypdf is a free and open-source pure-python PDF library. Prior to 6.8.0, an attacker who uses this vulnerability can craft a PDF which leads to large memory usage. This requires parsing a content stream with a rather large /Length value, regardless of the actual data length inside the stream. This vulnerability is fixed in 6.8.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-03-19"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-31826/">CVE-2026-31826 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-31826">CVE-2026-31826 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259508">SUSE bug 1259508</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049136" comment="python313-PyPDF2-2.11.1-bp160.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010047686" comment="python313-PyPDF2 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202631853" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-31853</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-31853" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31853" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-31853" ref_url="https://www.suse.com/security/cve/CVE-2026-31853" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:1201-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045303.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1202-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1203-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045301.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20917-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025099.html" source="SUSE-SU"/>
    <description>
    ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to 7.1.2-16 and 6.9.13-41, an overflow on 32-bit systems can cause a crash in the SFW decoder when processing extremely large images. This vulnerability is fixed in 7.1.2-16 and 6.9.13-41.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-08"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-31853/">CVE-2026-31853 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-31853">CVE-2026-31853 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259528">SUSE bug 1259528</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050733" comment="ImageMagick-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151674" comment="ImageMagick is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050734" comment="ImageMagick-config-7-SUSE-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009252941" comment="ImageMagick-config-7-SUSE is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050735" comment="ImageMagick-config-7-upstream-limited-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977490" comment="ImageMagick-config-7-upstream-limited is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050736" comment="ImageMagick-config-7-upstream-open-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977491" comment="ImageMagick-config-7-upstream-open is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050737" comment="ImageMagick-config-7-upstream-secure-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977492" comment="ImageMagick-config-7-upstream-secure is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050738" comment="ImageMagick-config-7-upstream-websafe-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009977493" comment="ImageMagick-config-7-upstream-websafe is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050739" comment="ImageMagick-devel-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151675" comment="ImageMagick-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050740" comment="ImageMagick-doc-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151676" comment="ImageMagick-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050741" comment="ImageMagick-extra-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151677" comment="ImageMagick-extra is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050742" comment="libMagick++-7_Q16HDRI5-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698047" comment="libMagick++-7_Q16HDRI5 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050743" comment="libMagick++-devel-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152596" comment="libMagick++-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050744" comment="libMagickCore-7_Q16HDRI10-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698048" comment="libMagickCore-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050745" comment="libMagickWand-7_Q16HDRI10-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009698049" comment="libMagickWand-7_Q16HDRI10 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050746" comment="perl-PerlMagick-7.1.2.0-160000.7.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151681" comment="perl-PerlMagick is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202631900" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-31900</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-31900" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31900" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-31900" ref_url="https://www.suse.com/security/cve/CVE-2026-31900" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20928-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045224.html" source="SUSE-SU"/>
    <description>
    Black is the uncompromising Python code formatter. Black provides a GitHub action for formatting code. This action supports an option, use_pyproject: true, for reading the version of Black to use from the repository pyproject.toml. A malicious pull request could edit pyproject.toml to use a direct URL reference to a malicious repository. This could lead to arbitrary code execution in the context of the GitHub Action. Attackers could then gain access to secrets or permissions available in the context of the action. Version 26.3.0 fixes this vulnerability.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-31900/">CVE-2026-31900 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-31900">CVE-2026-31900 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259546">SUSE bug 1259546</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051873" comment="python313-black-25.1.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010051938" comment="python313-black is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202631958" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-31958</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-31958" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31958" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-31958" ref_url="https://www.suse.com/security/cve/CVE-2026-31958" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:1064-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024945.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1162-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025113.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1171-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045262.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20761-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024825.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20770-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024864.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20797-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024892.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20919-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025097.html" source="SUSE-SU"/>
    <description>
    Tornado is a Python web framework and asynchronous networking library. In versions of Tornado prior to 6.5.5, the only limit on the number of parts in multipart/form-data is the max_body_size setting (default 100MB). Since parsing occurs synchronously on the main thread, this creates the possibility of denial-of-service due to the cost of parsing very large multipart bodies with many parts. This vulnerability is fixed in 6.5.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-03"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-31958/">CVE-2026-31958 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-31958">CVE-2026-31958 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259552">SUSE bug 1259552</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050026" comment="python313-tornado6-6.5-160000.4.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037231" comment="python313-tornado6 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202631979" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-31979</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-31979" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-31979" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-31979" ref_url="https://www.suse.com/security/cve/CVE-2026-31979" source="SUSE CVE"/>
		<reference ref_id="SUSE-FU-2026:20990-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045341.html" source="SUSE-SU"/>
    <description>
    Himmelblau is an interoperability suite for Microsoft Azure Entra ID and Intune. Prior to 3.1.0 and 2.3.8, the himmelblaud-tasks daemon, running as root, writes Kerberos cache files under /tmp/krb5cc_&lt;uid&gt; without symlink protections. Since commit 87a51ee, PrivateTmp is explicitly removed from the tasks daemon's systemd hardening, exposing it to the host /tmp. A local user can exploit this via symlink attacks to chown or overwrite arbitrary files, achieving local privilege escalation. This vulnerability is fixed in 3.1.0 and 2.3.8.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-03"/>
	<updated date="2026-04-10"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-31979/">CVE-2026-31979 at SUSE</cve>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-31979">CVE-2026-31979 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259548">SUSE bug 1259548</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052692" comment="himmelblau-2.3.8+git0.dec3693-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032129" comment="himmelblau is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052693" comment="himmelblau-qr-greeter-2.3.8+git0.dec3693-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032130" comment="himmelblau-qr-greeter is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052694" comment="himmelblau-sshd-config-2.3.8+git0.dec3693-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032131" comment="himmelblau-sshd-config is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052695" comment="himmelblau-sso-2.3.8+git0.dec3693-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032132" comment="himmelblau-sso is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052696" comment="libnss_himmelblau2-2.3.8+git0.dec3693-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032133" comment="libnss_himmelblau2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052697" comment="pam-himmelblau-2.3.8+git0.dec3693-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010032134" comment="pam-himmelblau is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202632274" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-32274</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-32274" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-32274" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-32274" ref_url="https://www.suse.com/security/cve/CVE-2026-32274" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0900-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024698.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20928-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045224.html" source="SUSE-SU"/>
    <description>
    Black is the uncompromising Python code formatter. Prior to 26.3.1, Black writes a cache file, the name of which is computed from various formatting options. The value of the --python-cell-magics option was placed in the filename without sanitization, which allowed an attacker who controls the value of this argument to write cache files to arbitrary file system locations. Fixed in Black 26.3.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" cvss4="6.8/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-32274/">CVE-2026-32274 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-32274">CVE-2026-32274 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259608">SUSE bug 1259608</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051873" comment="python313-black-25.1.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010051938" comment="python313-black is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202632597" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-32597</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-32597" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-32597" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-32597" ref_url="https://www.suse.com/security/cve/CVE-2026-32597" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:1199-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045291.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20839-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024998.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20869-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024972.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025052.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20934-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045218.html" source="SUSE-SU"/>
    <description>
    PyJWT is a JSON Web Token implementation in Python. Prior to 2.12.0, PyJWT does not validate the crit (Critical) Header Parameter defined in RFC 7515 ?4.1.11. When a JWS token contains a crit array listing extensions that PyJWT does not understand, the library accepts the token instead of rejecting it. This violates the MUST requirement in the RFC. This vulnerability is fixed in 2.12.0.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-03"/>
	<updated date="2026-04-08"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-32597/">CVE-2026-32597 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-32597">CVE-2026-32597 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259616">SUSE bug 1259616</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051999" comment="python313-PyJWT-2.12.1-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010052709" comment="python313-PyJWT is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202632640" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-32640</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-32640" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-32640" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-32640" ref_url="https://www.suse.com/security/cve/CVE-2026-32640" source="SUSE CVE"/>
    <description>
    SimpleEval is a library for adding evaluatable expressions into python projects. Prior to 1.0.5, objects (including modules) can leak dangerous modules through to direct access inside the sandbox. If the objects you've passed in as names to SimpleEval have modules or other disallowed / dangerous objects available as attrs. Additionally, dangerous functions or modules could be accessed by passing them as callbacks to other safe functions to call. The latest version 1.0.5 has this issue fixed. This vulnerability is fixed in 1.0.5.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-25"/>
	<updated date="2026-03-25"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-32640/">CVE-2026-32640 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-32640">CVE-2026-32640 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259685">SUSE bug 1259685</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050215" comment="python313-simpleeval-0.9.13-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010050230" comment="python313-simpleeval is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202632746" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-32746</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-32746" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-32746" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-32746" ref_url="https://www.suse.com/security/cve/CVE-2026-32746" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0930-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024763.html" source="SUSE-SU"/>
    <description>
    telnetd in GNU inetutils through 2.7 allows an out-of-bounds write in the LINEMODE SLC (Set Local Characters) suboption handler because add_slc does not check whether the buffer is full.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-03-20"/>
	<severity>Important</severity>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-32746/">CVE-2026-32746 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-32746">CVE-2026-32746 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259691">SUSE bug 1259691</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049134" comment="krb5-appl-clients-1.0.3-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010049140" comment="krb5-appl-clients is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049135" comment="krb5-appl-servers-1.0.3-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010049141" comment="krb5-appl-servers is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202632776" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-32776</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-32776" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-32776" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-32776" ref_url="https://www.suse.com/security/cve/CVE-2026-32776" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:1137-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1159-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1166-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20963-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20985-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21062-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045462.html" source="SUSE-SU"/>
    <description>
    libexpat before 2.7.5 allows a NULL pointer dereference with empty external parameter entity content.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-03"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-32776/">CVE-2026-32776 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-32776">CVE-2026-32776 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259724">SUSE bug 1259724</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052633" comment="expat-2.7.1-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151330" comment="expat is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052634" comment="libexpat-devel-2.7.1-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151331" comment="libexpat-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052635" comment="libexpat1-2.7.1-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151332" comment="libexpat1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202632777" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-32777</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-32777" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-32777" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-32777" ref_url="https://www.suse.com/security/cve/CVE-2026-32777" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:1137-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1159-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1166-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20963-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20985-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21062-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045462.html" source="SUSE-SU"/>
    <description>
    libexpat before 2.7.5 allows an infinite loop while parsing DTD content.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-03"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-32777/">CVE-2026-32777 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-32777">CVE-2026-32777 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259710">SUSE bug 1259710</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052633" comment="expat-2.7.1-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151330" comment="expat is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052634" comment="libexpat-devel-2.7.1-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151331" comment="libexpat-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052635" comment="libexpat1-2.7.1-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151332" comment="libexpat1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202632778" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-32778</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-32778" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-32778" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-32778" ref_url="https://www.suse.com/security/cve/CVE-2026-32778" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:1137-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045149.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1159-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-March/045203.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1166-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045260.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20963-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045319.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20969-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045313.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20985-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045346.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21031-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025307.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21062-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045462.html" source="SUSE-SU"/>
    <description>
    libexpat before 2.7.5 allows a NULL pointer dereference in the function setContext on retry after an earlier ouf-of-memory condition.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-03"/>
	<updated date="2026-04-14"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="5.9/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.2/CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-32778/">CVE-2026-32778 at SUSE</cve>
	<cve impact="medium" cvss3="5.5/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-32778">CVE-2026-32778 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259725">SUSE bug 1259725</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052633" comment="expat-2.7.1-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151330" comment="expat is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052634" comment="libexpat-devel-2.7.1-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151331" comment="libexpat-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052635" comment="libexpat1-2.7.1-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151332" comment="libexpat1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202633123" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-33123</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-33123" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33123" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-33123" ref_url="https://www.suse.com/security/cve/CVE-2026-33123" source="SUSE CVE"/>
    <description>
    pypdf is a free and open-source pure-python PDF library. Versions prior to 6.9.1 allow an attacker to craft a malicious PDF which leads to long runtimes and/or large memory usage. Exploitation requires accessing an array-based stream with many entries. This issue has been fixed in version 6.9.1.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-03-28"/>
	<severity>Moderate</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-33123/">CVE-2026-33123 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-33123">CVE-2026-33123 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259992">SUSE bug 1259992</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051914" comment="python313-PyPDF2-2.11.1-bp160.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010047686" comment="python313-PyPDF2 is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202633154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-33154</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-33154" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33154" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-33154" ref_url="https://www.suse.com/security/cve/CVE-2026-33154" source="SUSE CVE"/>
    <description>
    dynaconf is a configuration management tool for Python. Prior to version 3.2.13, Dynaconf is vulnerable to Server-Side Template Injection (SSTI) due to unsafe template evaluation in the @Jinja resolver. When the jinja2 package is installed, Dynaconf evaluates template expressions embedded in configuration values without a sandboxed environment. This issue has been patched in version 3.2.13.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-03-28"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-33154/">CVE-2026-33154 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-33154">CVE-2026-33154 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260063">SUSE bug 1260063</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051913" comment="python313-dynaconf-3.2.5-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010051939" comment="python313-dynaconf is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202633250" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-33250</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-33250" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33250" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-33250" ref_url="https://www.suse.com/security/cve/CVE-2026-33250" source="SUSE CVE"/>
    <description>
    Freeciv21 is a free open source, turn-based, empire-building strategy game. Versions prior to 3.1.1 crash with a stack overflow when receiving specially-crafted packets. A remote attacker can use this to take down any public server. A malicious server can use this to crash the game on the player's machine. Authentication is not needed and, by default, logs do not contain any useful information. All users should upgrade to Freeciv21 version 3.1.1. Running the server behind a firewall can help mitigate the issue for non-public servers. For local games, Freeciv21 restricts connections to the current user and is therefore not affected.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-03-28"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-33250/">CVE-2026-33250 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-33250">CVE-2026-33250 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260036">SUSE bug 1260036</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051896" comment="freeciv-3.2.4-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009707661" comment="freeciv is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051897" comment="freeciv-gtk3-3.2.4-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009707662" comment="freeciv-gtk3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051898" comment="freeciv-gtk4-3.2.4-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010051940" comment="freeciv-gtk4 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051899" comment="freeciv-lang-3.2.4-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009707663" comment="freeciv-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051900" comment="freeciv-qt-3.2.4-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009707664" comment="freeciv-qt is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051901" comment="freeciv-sdl2-3.2.4-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010051941" comment="freeciv-sdl2 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202633416" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-33416</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-33416" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33416" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-33416" ref_url="https://www.suse.com/security/cve/CVE-2026-33416" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:21000-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21067-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045457.html" source="SUSE-SU"/>
    <description>
    LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. In versions 1.2.1 through 1.6.55, `png_set_tRNS` and `png_set_PLTE` each alias a heap-allocated buffer between `png_struct` and `png_info`, sharing a single allocation across two structs with independent lifetimes. The `trans_alpha` aliasing has been present since at least libpng 1.0, and the `palette` aliasing since at least 1.2.1. Both affect all prior release lines `png_set_tRNS` sets `png_ptr-&gt;trans_alpha = info_ptr-&gt;trans_alpha` (256-byte buffer) and `png_set_PLTE` sets `info_ptr-&gt;palette = png_ptr-&gt;palette` (768-byte buffer). In both cases, calling `png_free_data` (with `PNG_FREE_TRNS` or `PNG_FREE_PLTE`) frees the buffer through `info_ptr` while the corresponding `png_ptr` pointer remains dangling. Subsequent row-transform functions dereference and, in some code paths, write to the freed memory. A second call to `png_set_tRNS` or `png_set_PLTE` has the same effect, because both functions call `png_free_data` internally before reallocating the `info_ptr` buffer. Version 1.6.56 fixes the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-10"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H" cvss4="9.2/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-33416/">CVE-2026-33416 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-33416">CVE-2026-33416 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260754">SUSE bug 1260754</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010053360" comment="libpng16-16-1.6.44-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151414" comment="libpng16-16 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010053361" comment="libpng16-16-x86-64-v3-1.6.44-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037228" comment="libpng16-16-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010053362" comment="libpng16-compat-devel-1.6.44-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151416" comment="libpng16-compat-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010053363" comment="libpng16-compat-devel-x86-64-v3-1.6.44-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037229" comment="libpng16-compat-devel-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010053364" comment="libpng16-devel-1.6.44-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151417" comment="libpng16-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010053365" comment="libpng16-devel-x86-64-v3-1.6.44-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037230" comment="libpng16-devel-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010053366" comment="libpng16-tools-1.6.44-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153137" comment="libpng16-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202633636" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-33636</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-33636" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33636" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-33636" ref_url="https://www.suse.com/security/cve/CVE-2026-33636" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:21000-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045406.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21038-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025302.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21067-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045457.html" source="SUSE-SU"/>
    <description>
    LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. In versions 1.6.36 through 1.6.55, an out-of-bounds read and write exists in libpng's ARM/AArch64 Neon-optimized palette expansion path. When expanding 8-bit paletted rows to RGB or RGBA, the Neon loop processes a final partial chunk without verifying that enough input pixels remain. Because the implementation works backward from the end of the row, the final iteration dereferences pointers before the start of the row buffer (OOB read) and writes expanded pixel data to the same underflowed positions (OOB write). This is reachable via normal decoding of attacker-controlled PNG input if Neon is enabled. Version 1.6.56 fixes the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-10"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H" cvss4="8.3/CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-33636/">CVE-2026-33636 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-33636">CVE-2026-33636 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260755">SUSE bug 1260755</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010053360" comment="libpng16-16-1.6.44-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151414" comment="libpng16-16 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010053361" comment="libpng16-16-x86-64-v3-1.6.44-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037228" comment="libpng16-16-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010053362" comment="libpng16-compat-devel-1.6.44-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151416" comment="libpng16-compat-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010053363" comment="libpng16-compat-devel-x86-64-v3-1.6.44-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037229" comment="libpng16-compat-devel-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010053364" comment="libpng16-devel-1.6.44-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151417" comment="libpng16-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010053365" comment="libpng16-devel-x86-64-v3-1.6.44-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037230" comment="libpng16-devel-x86-64-v3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010053366" comment="libpng16-tools-1.6.44-160000.6.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153137" comment="libpng16-tools is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202633721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-33721</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-33721" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-33721" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-33721" ref_url="https://www.suse.com/security/cve/CVE-2026-33721" source="SUSE CVE"/>
    <description>
    MapServer is a system for developing web-based GIS applications. Starting in version 4.2 and prior to version 8.6.1, a heap-buffer-overflow write in MapServer's SLD (Styled Layer Descriptor) parser lets a remote, unauthenticated attacker crash the MapServer process by sending a crafted SLD with more than 100 Threshold elements inside a ColorMap/Categorize structure (commonly reachable via WMS GetMap with SLD_BODY). Version 8.6.1 patches the issue.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-10"/>
	<updated date="2026-04-10"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-33721/">CVE-2026-33721 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-33721">CVE-2026-33721 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260869">SUSE bug 1260869</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010053395" comment="libjavamapscript-8.6.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010053405" comment="libjavamapscript is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010053396" comment="libmapserver2-8.6.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010053406" comment="libmapserver2 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010053397" comment="mapserver-8.6.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010053407" comment="mapserver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010053398" comment="mapserver-devel-8.6.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010053408" comment="mapserver-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010053399" comment="perl-mapscript-8.6.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010053409" comment="perl-mapscript is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010053400" comment="php-mapscriptng-8.6.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010053410" comment="php-mapscriptng is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010053401" comment="python313-mapserver-8.6.1-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010053411" comment="python313-mapserver is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:202634352" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-34352</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-34352" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-34352" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-34352" ref_url="https://www.suse.com/security/cve/CVE-2026-34352" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:1252-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045368.html" source="SUSE-SU"/>
    <description>
    In TigerVNC before 1.16.2, Image.cxx in x0vncserver allows other users to observe or manipulate the screen contents, or cause an application crash, because of incorrect permissions.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-10"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-34352/">CVE-2026-34352 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-34352">CVE-2026-34352 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260871">SUSE bug 1260871</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010053351" comment="libXvnc-devel-1.15.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154213" comment="libXvnc-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010053352" comment="libXvnc1-1.15.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154118" comment="libXvnc1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010053353" comment="tigervnc-1.15.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152053" comment="tigervnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010053354" comment="tigervnc-selinux-1.15.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010053412" comment="tigervnc-selinux is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010053355" comment="tigervnc-x11vnc-1.15.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276534" comment="tigervnc-x11vnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010053356" comment="xorg-x11-Xvnc-1.15.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152054" comment="xorg-x11-Xvnc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010053357" comment="xorg-x11-Xvnc-java-1.15.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276535" comment="xorg-x11-Xvnc-java is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010053358" comment="xorg-x11-Xvnc-module-1.15.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276536" comment="xorg-x11-Xvnc-module is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010053359" comment="xorg-x11-Xvnc-novnc-1.15.0-160000.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009276537" comment="xorg-x11-Xvnc-novnc is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20263536" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-3536</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-3536" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3536" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-3536" ref_url="https://www.suse.com/security/cve/CVE-2026-3536" source="SUSE CVE"/>
    <description>
    Integer overflow in ANGLE in Google Chrome prior to 145.0.7632.159 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page. (Chromium security severity: Critical)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-08"/>
	<updated date="2026-03-08"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-3536/">CVE-2026-3536 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-3536">CVE-2026-3536 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259213">SUSE bug 1259213</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047676" comment="chromedriver-145.0.7632.159-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047677" comment="chromium-145.0.7632.159-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20263537" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-3537</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-3537" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3537" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-3537" ref_url="https://www.suse.com/security/cve/CVE-2026-3537" source="SUSE CVE"/>
    <description>
    Object lifecycle issue in PowerVR in Google Chrome on Android prior to 145.0.7632.159 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-08"/>
	<updated date="2026-03-08"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-3537/">CVE-2026-3537 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-3537">CVE-2026-3537 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259213">SUSE bug 1259213</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047676" comment="chromedriver-145.0.7632.159-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047677" comment="chromium-145.0.7632.159-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20263538" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-3538</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-3538" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3538" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-3538" ref_url="https://www.suse.com/security/cve/CVE-2026-3538" source="SUSE CVE"/>
    <description>
    Integer overflow in Skia in Google Chrome prior to 145.0.7632.159 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page. (Chromium security severity: Critical)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-08"/>
	<updated date="2026-03-08"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-3538/">CVE-2026-3538 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-3538">CVE-2026-3538 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259213">SUSE bug 1259213</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047676" comment="chromedriver-145.0.7632.159-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047677" comment="chromium-145.0.7632.159-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20263539" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-3539</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-3539" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3539" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-3539" ref_url="https://www.suse.com/security/cve/CVE-2026-3539" source="SUSE CVE"/>
    <description>
    Object lifecycle issue in DevTools in Google Chrome prior to 145.0.7632.159 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-08"/>
	<updated date="2026-03-08"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-3539/">CVE-2026-3539 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3539">CVE-2026-3539 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259213">SUSE bug 1259213</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047676" comment="chromedriver-145.0.7632.159-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047677" comment="chromium-145.0.7632.159-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20263540" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-3540</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-3540" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3540" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-3540" ref_url="https://www.suse.com/security/cve/CVE-2026-3540" source="SUSE CVE"/>
    <description>
    Inappropriate implementation in WebAudio in Google Chrome prior to 145.0.7632.159 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-08"/>
	<updated date="2026-03-08"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-3540/">CVE-2026-3540 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3540">CVE-2026-3540 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259213">SUSE bug 1259213</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047676" comment="chromedriver-145.0.7632.159-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047677" comment="chromium-145.0.7632.159-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20263541" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-3541</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-3541" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3541" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-3541" ref_url="https://www.suse.com/security/cve/CVE-2026-3541" source="SUSE CVE"/>
    <description>
    Inappropriate implementation in CSS in Google Chrome prior to 145.0.7632.159 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-08"/>
	<updated date="2026-03-08"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-3541/">CVE-2026-3541 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3541">CVE-2026-3541 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259213">SUSE bug 1259213</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047676" comment="chromedriver-145.0.7632.159-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047677" comment="chromium-145.0.7632.159-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20263542" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-3542</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-3542" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3542" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-3542" ref_url="https://www.suse.com/security/cve/CVE-2026-3542" source="SUSE CVE"/>
    <description>
    Inappropriate implementation in WebAssembly in Google Chrome prior to 145.0.7632.159 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-08"/>
	<updated date="2026-03-08"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-3542/">CVE-2026-3542 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3542">CVE-2026-3542 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259213">SUSE bug 1259213</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047676" comment="chromedriver-145.0.7632.159-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047677" comment="chromium-145.0.7632.159-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20263543" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-3543</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-3543" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3543" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-3543" ref_url="https://www.suse.com/security/cve/CVE-2026-3543" source="SUSE CVE"/>
    <description>
    Inappropriate implementation in V8 in Google Chrome prior to 145.0.7632.159 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-08"/>
	<updated date="2026-03-08"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-3543/">CVE-2026-3543 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3543">CVE-2026-3543 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259213">SUSE bug 1259213</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047676" comment="chromedriver-145.0.7632.159-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047677" comment="chromium-145.0.7632.159-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20263544" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-3544</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-3544" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3544" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-3544" ref_url="https://www.suse.com/security/cve/CVE-2026-3544" source="SUSE CVE"/>
    <description>
    Heap buffer overflow in WebCodecs in Google Chrome prior to 145.0.7632.159 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-08"/>
	<updated date="2026-03-08"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-3544/">CVE-2026-3544 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3544">CVE-2026-3544 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259213">SUSE bug 1259213</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047676" comment="chromedriver-145.0.7632.159-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047677" comment="chromium-145.0.7632.159-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20263545" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-3545</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-3545" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3545" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-3545" ref_url="https://www.suse.com/security/cve/CVE-2026-3545" source="SUSE CVE"/>
    <description>
    Insufficient data validation in Navigation in Google Chrome prior to 145.0.7632.159 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-08"/>
	<updated date="2026-03-08"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-3545/">CVE-2026-3545 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3545">CVE-2026-3545 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259213">SUSE bug 1259213</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047676" comment="chromedriver-145.0.7632.159-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010047677" comment="chromium-145.0.7632.159-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20263608" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-3608</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-3608" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3608" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-3608" ref_url="https://www.suse.com/security/cve/CVE-2026-3608" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:20989-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045342.html" source="SUSE-SU"/>
    <description>
    Sending a maliciously crafted message to the kea-ctrl-agent, kea-dhcp-ddns, kea-dhcp4, or kea-dhcp6 daemons over any configured API socket or HA listener can cause the receiving daemon to exit with a stack overflow error.
This issue affects Kea versions 2.6.0 through 2.6.4 and 3.0.0 through 3.0.2.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-03"/>
	<updated date="2026-04-10"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" cvss4="8.7/CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-3608/">CVE-2026-3608 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3608">CVE-2026-3608 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260380">SUSE bug 1260380</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052662" comment="kea-3.0.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048437" comment="kea is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052663" comment="kea-devel-3.0.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048438" comment="kea-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052664" comment="kea-doc-3.0.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048439" comment="kea-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052665" comment="kea-hooks-3.0.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048440" comment="kea-hooks is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052666" comment="libkea-asiodns62-3.0.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048441" comment="libkea-asiodns62 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052667" comment="libkea-asiolink88-3.0.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048442" comment="libkea-asiolink88 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052668" comment="libkea-cc83-3.0.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010052699" comment="libkea-cc83 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052669" comment="libkea-cfgrpt3-3.0.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048444" comment="libkea-cfgrpt3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052670" comment="libkea-config84-3.0.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010052700" comment="libkea-config84 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052671" comment="libkea-cryptolink64-3.0.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048446" comment="libkea-cryptolink64 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052672" comment="libkea-d2srv63-3.0.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048447" comment="libkea-d2srv63 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052673" comment="libkea-database76-3.0.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048448" comment="libkea-database76 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052674" comment="libkea-dhcp109-3.0.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048449" comment="libkea-dhcp109 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052675" comment="libkea-dhcp_ddns68-3.0.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048450" comment="libkea-dhcp_ddns68 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052676" comment="libkea-dhcpsrv131-3.0.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010052701" comment="libkea-dhcpsrv131 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052677" comment="libkea-dns71-3.0.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048452" comment="libkea-dns71 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052678" comment="libkea-eval84-3.0.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048453" comment="libkea-eval84 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052679" comment="libkea-exceptions45-3.0.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048454" comment="libkea-exceptions45 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052680" comment="libkea-hooks121-3.0.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010052702" comment="libkea-hooks121 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052681" comment="libkea-http87-3.0.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048456" comment="libkea-http87 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052682" comment="libkea-log-interprocess3-3.0.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048457" comment="libkea-log-interprocess3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052683" comment="libkea-log75-3.0.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048458" comment="libkea-log75 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052684" comment="libkea-mysql88-3.0.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048459" comment="libkea-mysql88 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052685" comment="libkea-pgsql88-3.0.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048460" comment="libkea-pgsql88 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052686" comment="libkea-process91-3.0.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010052703" comment="libkea-process91 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052687" comment="libkea-stats53-3.0.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048462" comment="libkea-stats53 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052688" comment="libkea-tcp33-3.0.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048463" comment="libkea-tcp33 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052689" comment="libkea-util-io12-3.0.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048464" comment="libkea-util-io12 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052690" comment="libkea-util102-3.0.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010052704" comment="libkea-util102 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052691" comment="python3-kea-3.0.3-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010048466" comment="python3-kea is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20263783" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-3783</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-3783" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3783" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-3783" ref_url="https://www.suse.com/security/cve/CVE-2026-3783" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20668-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20722-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025098.html" source="SUSE-SU"/>
    <description>
    When an OAuth2 bearer token is used for an HTTP(S) transfer, and that transfer
performs a redirect to a second URL, curl could leak that token to the second
hostname under some circumstances.

If the hostname that the first request is redirected to has information in the
used .netrc file, with either of the `machine` or `default` keywords, curl
would pass on the bearer token set for the first host also to the second one.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.7/CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N" cvss4="5.6/CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-3783/">CVE-2026-3783 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3783">CVE-2026-3783 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259363">SUSE bug 1259363</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050024" comment="curl-8.14.1-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051760" comment="curl-fish-completion-8.14.1-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010031781" comment="curl-fish-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050729" comment="curl-zsh-completion-8.14.1-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010031782" comment="curl-zsh-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050730" comment="libcurl-devel-8.14.1-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151178" comment="libcurl-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050731" comment="libcurl-devel-doc-8.14.1-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010031783" comment="libcurl-devel-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050025" comment="libcurl4-8.14.1-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20263784" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-3784</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-3784" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3784" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-3784" ref_url="https://www.suse.com/security/cve/CVE-2026-3784" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0921-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024714.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20668-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20722-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025098.html" source="SUSE-SU"/>
    <description>
    curl would wrongly reuse an existing HTTP proxy connection doing CONNECT to a
server, even if the new request uses different credentials for the HTTP proxy.
The proper behavior is to create or use a separate connection.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="medium" cvss3="4.6/CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N" cvss4="1/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N" href="https://www.suse.com/security/cve/CVE-2026-3784/">CVE-2026-3784 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3784">CVE-2026-3784 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259364">SUSE bug 1259364</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050024" comment="curl-8.14.1-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051760" comment="curl-fish-completion-8.14.1-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010031781" comment="curl-fish-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050729" comment="curl-zsh-completion-8.14.1-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010031782" comment="curl-zsh-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050730" comment="libcurl-devel-8.14.1-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151178" comment="libcurl-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050731" comment="libcurl-devel-doc-8.14.1-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010031783" comment="libcurl-devel-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050025" comment="libcurl4-8.14.1-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20263805" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-3805</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-3805" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3805" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-3805" ref_url="https://www.suse.com/security/cve/CVE-2026-3805" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0879-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024686.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0885-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024688.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0903-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024702.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0911-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024704.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20668-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024745.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20722-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024765.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20760-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024826.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20918-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-April/025098.html" source="SUSE-SU"/>
    <description>
    When doing a second SMB request to the same host again, curl would wrongly use
a data pointer pointing into already freed memory.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-02"/>
	<severity>Moderate</severity>
	<cve impact="low" cvss3="2.5/CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N" cvss4="2/CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-3805/">CVE-2026-3805 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3805">CVE-2026-3805 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259365">SUSE bug 1259365</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050024" comment="curl-8.14.1-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151177" comment="curl is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051760" comment="curl-fish-completion-8.14.1-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010031781" comment="curl-fish-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050729" comment="curl-zsh-completion-8.14.1-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010031782" comment="curl-zsh-completion is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050730" comment="libcurl-devel-8.14.1-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151178" comment="libcurl-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050731" comment="libcurl-devel-doc-8.14.1-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010031783" comment="libcurl-devel-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010050025" comment="libcurl4-8.14.1-160000.5.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151179" comment="libcurl4 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20263909" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-3909</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-3909" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3909" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-3909" ref_url="https://www.suse.com/security/cve/CVE-2026-3909" source="SUSE CVE"/>
    <description>
    Out of bounds write in Skia in Google Chrome prior to 146.0.7680.75 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-03-18"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-3909/">CVE-2026-3909 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-3909">CVE-2026-3909 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259648">SUSE bug 1259648</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049131" comment="chromedriver-146.0.7680.80-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049132" comment="chromium-146.0.7680.80-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20263910" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-3910</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-3910" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3910" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-3910" ref_url="https://www.suse.com/security/cve/CVE-2026-3910" source="SUSE CVE"/>
    <description>
    Inappropriate implementation in V8 in Google Chrome prior to 146.0.7680.75 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-03-18"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-3910/">CVE-2026-3910 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-3910">CVE-2026-3910 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259648">SUSE bug 1259648</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049131" comment="chromedriver-146.0.7680.80-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049132" comment="chromium-146.0.7680.80-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20263913" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-3913</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-3913" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3913" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-3913" ref_url="https://www.suse.com/security/cve/CVE-2026-3913" source="SUSE CVE"/>
    <description>
    Heap buffer overflow in WebML in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-03-18"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-3913/">CVE-2026-3913 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3913">CVE-2026-3913 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259530">SUSE bug 1259530</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049131" comment="chromedriver-146.0.7680.80-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049132" comment="chromium-146.0.7680.80-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20263914" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-3914</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-3914" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3914" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-3914" ref_url="https://www.suse.com/security/cve/CVE-2026-3914" source="SUSE CVE"/>
    <description>
    Integer overflow in WebML in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-03-18"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-3914/">CVE-2026-3914 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3914">CVE-2026-3914 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259530">SUSE bug 1259530</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049131" comment="chromedriver-146.0.7680.80-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049132" comment="chromium-146.0.7680.80-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20263915" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-3915</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-3915" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3915" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-3915" ref_url="https://www.suse.com/security/cve/CVE-2026-3915" source="SUSE CVE"/>
    <description>
    Heap buffer overflow in WebML in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-03-18"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-3915/">CVE-2026-3915 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3915">CVE-2026-3915 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259530">SUSE bug 1259530</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049131" comment="chromedriver-146.0.7680.80-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049132" comment="chromium-146.0.7680.80-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20263916" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-3916</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-3916" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3916" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-3916" ref_url="https://www.suse.com/security/cve/CVE-2026-3916" source="SUSE CVE"/>
    <description>
    Out of bounds read in Web Speech in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-03-18"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-3916/">CVE-2026-3916 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3916">CVE-2026-3916 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259530">SUSE bug 1259530</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049131" comment="chromedriver-146.0.7680.80-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049132" comment="chromium-146.0.7680.80-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20263917" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-3917</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-3917" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3917" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-3917" ref_url="https://www.suse.com/security/cve/CVE-2026-3917" source="SUSE CVE"/>
    <description>
    Use after free in Agents in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-03-18"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-3917/">CVE-2026-3917 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3917">CVE-2026-3917 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259530">SUSE bug 1259530</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049131" comment="chromedriver-146.0.7680.80-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049132" comment="chromium-146.0.7680.80-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20263918" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-3918</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-3918" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3918" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-3918" ref_url="https://www.suse.com/security/cve/CVE-2026-3918" source="SUSE CVE"/>
    <description>
    Use after free in WebMCP in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-03-18"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-3918/">CVE-2026-3918 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3918">CVE-2026-3918 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259530">SUSE bug 1259530</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049131" comment="chromedriver-146.0.7680.80-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049132" comment="chromium-146.0.7680.80-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20263919" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-3919</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-3919" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3919" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-3919" ref_url="https://www.suse.com/security/cve/CVE-2026-3919" source="SUSE CVE"/>
    <description>
    Use after free in Extensions in Google Chrome prior to 146.0.7680.71 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-03-18"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-3919/">CVE-2026-3919 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3919">CVE-2026-3919 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259530">SUSE bug 1259530</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049131" comment="chromedriver-146.0.7680.80-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049132" comment="chromium-146.0.7680.80-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20263920" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-3920</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-3920" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3920" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-3920" ref_url="https://www.suse.com/security/cve/CVE-2026-3920" source="SUSE CVE"/>
    <description>
    Out of bounds memory access in WebML in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-03-18"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-3920/">CVE-2026-3920 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3920">CVE-2026-3920 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259530">SUSE bug 1259530</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049131" comment="chromedriver-146.0.7680.80-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049132" comment="chromium-146.0.7680.80-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20263921" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-3921</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-3921" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3921" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-3921" ref_url="https://www.suse.com/security/cve/CVE-2026-3921" source="SUSE CVE"/>
    <description>
    Use after free in TextEncoding in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-03-18"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-3921/">CVE-2026-3921 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3921">CVE-2026-3921 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259530">SUSE bug 1259530</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049131" comment="chromedriver-146.0.7680.80-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049132" comment="chromium-146.0.7680.80-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20263922" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-3922</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-3922" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3922" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-3922" ref_url="https://www.suse.com/security/cve/CVE-2026-3922" source="SUSE CVE"/>
    <description>
    Use after free in MediaStream in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-03-18"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-3922/">CVE-2026-3922 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3922">CVE-2026-3922 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259530">SUSE bug 1259530</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049131" comment="chromedriver-146.0.7680.80-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049132" comment="chromium-146.0.7680.80-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20263923" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-3923</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-3923" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3923" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-3923" ref_url="https://www.suse.com/security/cve/CVE-2026-3923" source="SUSE CVE"/>
    <description>
    Use after free in WebMIDI in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-03-18"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-3923/">CVE-2026-3923 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3923">CVE-2026-3923 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259530">SUSE bug 1259530</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049131" comment="chromedriver-146.0.7680.80-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049132" comment="chromium-146.0.7680.80-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20263924" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-3924</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-3924" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3924" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-3924" ref_url="https://www.suse.com/security/cve/CVE-2026-3924" source="SUSE CVE"/>
    <description>
    use after free in WindowDialog in Google Chrome prior to 146.0.7680.71 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-03-18"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-3924/">CVE-2026-3924 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3924">CVE-2026-3924 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259530">SUSE bug 1259530</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049131" comment="chromedriver-146.0.7680.80-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049132" comment="chromium-146.0.7680.80-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20263925" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-3925</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-3925" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3925" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-3925" ref_url="https://www.suse.com/security/cve/CVE-2026-3925" source="SUSE CVE"/>
    <description>
    Incorrect security UI in LookalikeChecks in Google Chrome on Android prior to 146.0.7680.71 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-03-18"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-3925/">CVE-2026-3925 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3925">CVE-2026-3925 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259530">SUSE bug 1259530</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049131" comment="chromedriver-146.0.7680.80-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049132" comment="chromium-146.0.7680.80-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20263926" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-3926</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-3926" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3926" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-3926" ref_url="https://www.suse.com/security/cve/CVE-2026-3926" source="SUSE CVE"/>
    <description>
    Out of bounds read in V8 in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: Medium)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-03-18"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-3926/">CVE-2026-3926 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3926">CVE-2026-3926 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259530">SUSE bug 1259530</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049131" comment="chromedriver-146.0.7680.80-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049132" comment="chromium-146.0.7680.80-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20263927" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-3927</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-3927" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3927" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-3927" ref_url="https://www.suse.com/security/cve/CVE-2026-3927" source="SUSE CVE"/>
    <description>
    Incorrect security UI in PictureInPicture in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-03-18"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-3927/">CVE-2026-3927 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3927">CVE-2026-3927 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259530">SUSE bug 1259530</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049131" comment="chromedriver-146.0.7680.80-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049132" comment="chromium-146.0.7680.80-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20263928" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-3928</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-3928" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3928" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-3928" ref_url="https://www.suse.com/security/cve/CVE-2026-3928" source="SUSE CVE"/>
    <description>
    Insufficient policy enforcement in Extensions in Google Chrome prior to 146.0.7680.71 allowed an attacker who convinced a user to install a malicious extension to perform UI spoofing via a crafted Chrome Extension. (Chromium security severity: Medium)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-03-18"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-3928/">CVE-2026-3928 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3928">CVE-2026-3928 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259530">SUSE bug 1259530</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049131" comment="chromedriver-146.0.7680.80-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049132" comment="chromium-146.0.7680.80-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20263929" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-3929</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-3929" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3929" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-3929" ref_url="https://www.suse.com/security/cve/CVE-2026-3929" source="SUSE CVE"/>
    <description>
    Side-channel information leakage in ResourceTiming in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-03-18"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-3929/">CVE-2026-3929 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3929">CVE-2026-3929 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259530">SUSE bug 1259530</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049131" comment="chromedriver-146.0.7680.80-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049132" comment="chromium-146.0.7680.80-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20263930" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-3930</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-3930" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3930" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-3930" ref_url="https://www.suse.com/security/cve/CVE-2026-3930" source="SUSE CVE"/>
    <description>
    Unsafe navigation in Navigation in Google Chrome on iOS prior to 146.0.7680.71 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Medium)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-03-18"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-3930/">CVE-2026-3930 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-3930">CVE-2026-3930 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259530">SUSE bug 1259530</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049131" comment="chromedriver-146.0.7680.80-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049132" comment="chromium-146.0.7680.80-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20263931" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-3931</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-3931" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3931" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-3931" ref_url="https://www.suse.com/security/cve/CVE-2026-3931" source="SUSE CVE"/>
    <description>
    Heap buffer overflow in Skia in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: Medium)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-03-18"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-3931/">CVE-2026-3931 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3931">CVE-2026-3931 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259530">SUSE bug 1259530</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049131" comment="chromedriver-146.0.7680.80-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049132" comment="chromium-146.0.7680.80-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20263932" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-3932</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-3932" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3932" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-3932" ref_url="https://www.suse.com/security/cve/CVE-2026-3932" source="SUSE CVE"/>
    <description>
    Insufficient policy enforcement in PDF in Google Chrome on Android prior to 146.0.7680.71 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Medium)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-03-18"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-3932/">CVE-2026-3932 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-3932">CVE-2026-3932 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259530">SUSE bug 1259530</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049131" comment="chromedriver-146.0.7680.80-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049132" comment="chromium-146.0.7680.80-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20263934" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-3934</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-3934" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3934" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-3934" ref_url="https://www.suse.com/security/cve/CVE-2026-3934" source="SUSE CVE"/>
    <description>
    Insufficient policy enforcement in ChromeDriver in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to bypass same origin policy via a crafted HTML page. (Chromium security severity: Medium)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-03-18"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-3934/">CVE-2026-3934 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-3934">CVE-2026-3934 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259530">SUSE bug 1259530</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049131" comment="chromedriver-146.0.7680.80-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049132" comment="chromium-146.0.7680.80-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20263935" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-3935</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-3935" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3935" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-3935" ref_url="https://www.suse.com/security/cve/CVE-2026-3935" source="SUSE CVE"/>
    <description>
    Incorrect security UI in WebAppInstalls in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-03-18"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-3935/">CVE-2026-3935 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-3935">CVE-2026-3935 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259530">SUSE bug 1259530</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049131" comment="chromedriver-146.0.7680.80-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049132" comment="chromium-146.0.7680.80-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20263936" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-3936</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-3936" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3936" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-3936" ref_url="https://www.suse.com/security/cve/CVE-2026-3936" source="SUSE CVE"/>
    <description>
    Use after free in WebView in Google Chrome on Android prior to 146.0.7680.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-03-18"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-3936/">CVE-2026-3936 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3936">CVE-2026-3936 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259530">SUSE bug 1259530</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049131" comment="chromedriver-146.0.7680.80-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049132" comment="chromium-146.0.7680.80-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20263937" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-3937</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-3937" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3937" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-3937" ref_url="https://www.suse.com/security/cve/CVE-2026-3937" source="SUSE CVE"/>
    <description>
    Incorrect security UI in Downloads in Google Chrome on Android prior to 146.0.7680.71 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-03-18"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-3937/">CVE-2026-3937 at SUSE</cve>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-3937">CVE-2026-3937 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259530">SUSE bug 1259530</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049131" comment="chromedriver-146.0.7680.80-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049132" comment="chromium-146.0.7680.80-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20263938" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-3938</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-3938" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3938" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-3938" ref_url="https://www.suse.com/security/cve/CVE-2026-3938" source="SUSE CVE"/>
    <description>
    Insufficient policy enforcement in Clipboard in Google Chrome prior to 146.0.7680.71 allowed a remote attacker who had compromised the renderer process to leak cross-origin data via a crafted HTML page. (Chromium security severity: Low)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-03-18"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-3938/">CVE-2026-3938 at SUSE</cve>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-3938">CVE-2026-3938 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259530">SUSE bug 1259530</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049131" comment="chromedriver-146.0.7680.80-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049132" comment="chromium-146.0.7680.80-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20263939" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-3939</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-3939" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3939" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-3939" ref_url="https://www.suse.com/security/cve/CVE-2026-3939" source="SUSE CVE"/>
    <description>
    Insufficient policy enforcement in PDF in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to bypass navigation restrictions via a crafted PDF file. (Chromium security severity: Low)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-03-18"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-3939/">CVE-2026-3939 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-3939">CVE-2026-3939 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259530">SUSE bug 1259530</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049131" comment="chromedriver-146.0.7680.80-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049132" comment="chromium-146.0.7680.80-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20263940" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-3940</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-3940" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3940" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-3940" ref_url="https://www.suse.com/security/cve/CVE-2026-3940" source="SUSE CVE"/>
    <description>
    Insufficient policy enforcement in DevTools in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Low)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-03-18"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-3940/">CVE-2026-3940 at SUSE</cve>
	<cve impact="medium" cvss3="5.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-3940">CVE-2026-3940 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259530">SUSE bug 1259530</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049131" comment="chromedriver-146.0.7680.80-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049132" comment="chromium-146.0.7680.80-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20263941" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-3941</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-3941" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3941" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-3941" ref_url="https://www.suse.com/security/cve/CVE-2026-3941" source="SUSE CVE"/>
    <description>
    Insufficient policy enforcement in DevTools in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page. (Chromium security severity: Low)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-03-18"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-3941/">CVE-2026-3941 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3941">CVE-2026-3941 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259530">SUSE bug 1259530</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049131" comment="chromedriver-146.0.7680.80-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049132" comment="chromium-146.0.7680.80-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20263942" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-3942</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-3942" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3942" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-3942" ref_url="https://www.suse.com/security/cve/CVE-2026-3942" source="SUSE CVE"/>
    <description>
    Incorrect security UI in PictureInPicture in Google Chrome prior to 146.0.7680.71 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-18"/>
	<updated date="2026-03-18"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-3942/">CVE-2026-3942 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3942">CVE-2026-3942 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259530">SUSE bug 1259530</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049131" comment="chromedriver-146.0.7680.80-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010049132" comment="chromium-146.0.7680.80-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20263945" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-3945</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-3945" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-3945" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-3945" ref_url="https://www.suse.com/security/cve/CVE-2026-3945" source="SUSE CVE"/>
    <description>
    An integer overflow vulnerability in the HTTP chunked transfer encoding parser in tinyproxy up to and including version 1.11.3 allows an unauthenticated remote attacker to cause a denial of service (DoS). The issue occurs because chunk size values are parsed using strtol() without properly validating overflow conditions (e.g., errno == ERANGE). A crafted chunk size such as 0x7fffffffffffffff (LONG_MAX) bypasses the existing validation check (chunklen &lt; 0), leading to a signed integer overflow during arithmetic operations (chunklen + 2). This results in incorrect size calculations, causing the proxy to attempt reading an extremely large amount of request-body data and holding worker connections open indefinitely. An attacker can exploit this behavior to exhaust all available worker slots, preventing new connections from being accepted and causing complete service unavailability. Upstream addressed this issue in commit bb7edc4; however, the latest stable release (1.11.3) remains affected at the time of publication.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-03"/>
	<updated date="2026-04-03"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-3945/">CVE-2026-3945 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-3945">CVE-2026-3945 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1261024">SUSE bug 1261024</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052698" comment="tinyproxy-1.11.3-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009860261" comment="tinyproxy is signed with openSUSE key"/>
</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264105" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4105</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4105" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4105" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4105" ref_url="https://www.suse.com/security/cve/CVE-2026-4105" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:0990-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024839.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:0991-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024838.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1040-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024932.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1061-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024948.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20822-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024899.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20823-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024898.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20826-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024937.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20827-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/024936.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20998-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045408.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:21003-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045403.html" source="SUSE-SU"/>
    <description>
    A flaw was found in systemd. The systemd-machined service contains an Improper Access Control vulnerability due to insufficient validation of the class parameter in the RegisterMachine D-Bus (Desktop Bus) method. A local unprivileged user can exploit this by attempting to register a machine with a specific class value, which may leave behind a usable, attacker-controlled machine object. This allows the attacker to invoke methods on the privileged object, leading to the execution of arbitrary commands with root privileges on the host system.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-10"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" cvss4="7.3/CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-4105/">CVE-2026-4105 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4105">CVE-2026-4105 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259650">SUSE bug 1259650</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010053372" comment="libsystemd0-257.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009154102" comment="libsystemd0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010053373" comment="libudev1-257.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151691" comment="libudev1 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010053374" comment="systemd-257.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151693" comment="systemd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010053375" comment="systemd-boot-257.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009999290" comment="systemd-boot is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010053376" comment="systemd-container-257.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009239132" comment="systemd-container is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010053377" comment="systemd-devel-257.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152582" comment="systemd-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010053378" comment="systemd-doc-257.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009625972" comment="systemd-doc is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010053379" comment="systemd-experimental-257.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009725369" comment="systemd-experimental is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010053380" comment="systemd-homed-257.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009999291" comment="systemd-homed is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010053381" comment="systemd-journal-remote-257.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009625973" comment="systemd-journal-remote is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010053382" comment="systemd-lang-257.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009625974" comment="systemd-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010053383" comment="systemd-networkd-257.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010050657" comment="systemd-networkd is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010053384" comment="systemd-portable-257.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009725370" comment="systemd-portable is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010053385" comment="systemd-resolved-257.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010050658" comment="systemd-resolved is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010053386" comment="systemd-testsuite-257.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009725371" comment="systemd-testsuite is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010053387" comment="udev-257.13-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151699" comment="udev is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264150" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4150</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4150" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4150" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4150" ref_url="https://www.suse.com/security/cve/CVE-2026-4150" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:1193-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045296.html" source="SUSE-SU"/>
    <description>
    GIMP PSD File Parsing Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within the parsing of PSD files. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28807.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-4150/">CVE-2026-4150 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4150">CVE-2026-4150 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259979">SUSE bug 1259979</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051904" comment="gimp-3.0.8-bp160.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151540" comment="gimp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051905" comment="gimp-devel-3.0.8-bp160.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153688" comment="gimp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051906" comment="gimp-extension-goat-excercises-3.0.8-bp160.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037906" comment="gimp-extension-goat-excercises is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051907" comment="gimp-lang-3.0.8-bp160.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151542" comment="gimp-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051908" comment="gimp-plugin-aa-3.0.8-bp160.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151543" comment="gimp-plugin-aa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051909" comment="gimp-plugin-python3-3.0.8-bp160.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037907" comment="gimp-plugin-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051910" comment="gimp-vala-3.0.8-bp160.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037908" comment="gimp-vala is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051911" comment="libgimp-3_0-0-3.0.8-bp160.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037909" comment="libgimp-3_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051912" comment="libgimpui-3_0-0-3.0.8-bp160.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037910" comment="libgimpui-3_0-0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264151" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4151</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4151" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4151" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4151" ref_url="https://www.suse.com/security/cve/CVE-2026-4151" source="SUSE CVE"/>
    <description>
    GIMP ANI File Parsing Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within the parsing of ANI files. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28813.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-4151/">CVE-2026-4151 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4151">CVE-2026-4151 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259983">SUSE bug 1259983</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051904" comment="gimp-3.0.8-bp160.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151540" comment="gimp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051905" comment="gimp-devel-3.0.8-bp160.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153688" comment="gimp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051906" comment="gimp-extension-goat-excercises-3.0.8-bp160.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037906" comment="gimp-extension-goat-excercises is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051907" comment="gimp-lang-3.0.8-bp160.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151542" comment="gimp-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051908" comment="gimp-plugin-aa-3.0.8-bp160.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151543" comment="gimp-plugin-aa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051909" comment="gimp-plugin-python3-3.0.8-bp160.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037907" comment="gimp-plugin-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051910" comment="gimp-vala-3.0.8-bp160.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037908" comment="gimp-vala is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051911" comment="libgimp-3_0-0-3.0.8-bp160.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037909" comment="libgimp-3_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051912" comment="libgimpui-3_0-0-3.0.8-bp160.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037910" comment="libgimpui-3_0-0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264153" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4153</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4153" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4153" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4153" ref_url="https://www.suse.com/security/cve/CVE-2026-4153" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:1193-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045296.html" source="SUSE-SU"/>
    <description>
    GIMP PSP File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within the parsing of PSP files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28874.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-4153/">CVE-2026-4153 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4153">CVE-2026-4153 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259984">SUSE bug 1259984</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051904" comment="gimp-3.0.8-bp160.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151540" comment="gimp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051905" comment="gimp-devel-3.0.8-bp160.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153688" comment="gimp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051906" comment="gimp-extension-goat-excercises-3.0.8-bp160.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037906" comment="gimp-extension-goat-excercises is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051907" comment="gimp-lang-3.0.8-bp160.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151542" comment="gimp-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051908" comment="gimp-plugin-aa-3.0.8-bp160.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151543" comment="gimp-plugin-aa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051909" comment="gimp-plugin-python3-3.0.8-bp160.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037907" comment="gimp-plugin-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051910" comment="gimp-vala-3.0.8-bp160.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037908" comment="gimp-vala is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051911" comment="libgimp-3_0-0-3.0.8-bp160.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037909" comment="libgimp-3_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051912" comment="libgimpui-3_0-0-3.0.8-bp160.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037910" comment="libgimpui-3_0-0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264154" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4154</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4154" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4154" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4154" ref_url="https://www.suse.com/security/cve/CVE-2026-4154" source="SUSE CVE"/>
		<reference ref_id="SUSE-SU-2026:1193-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045296.html" source="SUSE-SU"/>
    <description>
    GIMP XPM File Parsing Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

The specific flaw exists within the parsing of XPM files. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-28901.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-04-11"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.8/CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" cvss4="8.4/CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N" href="https://www.suse.com/security/cve/CVE-2026-4154/">CVE-2026-4154 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4154">CVE-2026-4154 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259986">SUSE bug 1259986</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051904" comment="gimp-3.0.8-bp160.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151540" comment="gimp is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051905" comment="gimp-devel-3.0.8-bp160.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009153688" comment="gimp-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051906" comment="gimp-extension-goat-excercises-3.0.8-bp160.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037906" comment="gimp-extension-goat-excercises is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051907" comment="gimp-lang-3.0.8-bp160.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151542" comment="gimp-lang is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051908" comment="gimp-plugin-aa-3.0.8-bp160.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151543" comment="gimp-plugin-aa is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051909" comment="gimp-plugin-python3-3.0.8-bp160.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037907" comment="gimp-plugin-python3 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051910" comment="gimp-vala-3.0.8-bp160.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037908" comment="gimp-vala is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051911" comment="libgimp-3_0-0-3.0.8-bp160.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037909" comment="libgimp-3_0-0 is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051912" comment="libgimpui-3_0-0-3.0.8-bp160.3.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010037910" comment="libgimpui-3_0-0 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264439" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4439</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4439" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4439" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4439" ref_url="https://www.suse.com/security/cve/CVE-2026-4439" source="SUSE CVE"/>
    <description>
    Out of bounds memory access in WebGL in Google Chrome on Android prior to 146.0.7680.153 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: Critical)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-03-28"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-4439/">CVE-2026-4439 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4439">CVE-2026-4439 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259964">SUSE bug 1259964</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051894" comment="chromedriver-146.0.7680.153-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051895" comment="chromium-146.0.7680.153-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264440" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4440</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4440" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4440" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4440" ref_url="https://www.suse.com/security/cve/CVE-2026-4440" source="SUSE CVE"/>
    <description>
    Out of bounds read and write in WebGL in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: Critical)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-03-28"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-4440/">CVE-2026-4440 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4440">CVE-2026-4440 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259964">SUSE bug 1259964</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051894" comment="chromedriver-146.0.7680.153-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051895" comment="chromium-146.0.7680.153-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264441" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4441</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4441" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4441" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4441" ref_url="https://www.suse.com/security/cve/CVE-2026-4441" source="SUSE CVE"/>
    <description>
    Use after free in Base in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Critical)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-03-28"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-4441/">CVE-2026-4441 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4441">CVE-2026-4441 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259964">SUSE bug 1259964</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051894" comment="chromedriver-146.0.7680.153-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051895" comment="chromium-146.0.7680.153-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264442" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4442</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4442" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4442" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4442" ref_url="https://www.suse.com/security/cve/CVE-2026-4442" source="SUSE CVE"/>
    <description>
    Heap buffer overflow in CSS in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-03-28"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-4442/">CVE-2026-4442 at SUSE</cve>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4442">CVE-2026-4442 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259964">SUSE bug 1259964</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051894" comment="chromedriver-146.0.7680.153-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051895" comment="chromium-146.0.7680.153-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264443" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4443</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4443" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4443" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4443" ref_url="https://www.suse.com/security/cve/CVE-2026-4443" source="SUSE CVE"/>
    <description>
    Heap buffer overflow in WebAudio in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-03-28"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-4443/">CVE-2026-4443 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4443">CVE-2026-4443 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259964">SUSE bug 1259964</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051894" comment="chromedriver-146.0.7680.153-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051895" comment="chromium-146.0.7680.153-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264444" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4444</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4444" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4444" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4444" ref_url="https://www.suse.com/security/cve/CVE-2026-4444" source="SUSE CVE"/>
    <description>
    Stack buffer overflow in WebRTC in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit stack corruption via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-03-28"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-4444/">CVE-2026-4444 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4444">CVE-2026-4444 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259964">SUSE bug 1259964</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051894" comment="chromedriver-146.0.7680.153-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051895" comment="chromium-146.0.7680.153-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264445" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4445</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4445" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4445" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4445" ref_url="https://www.suse.com/security/cve/CVE-2026-4445" source="SUSE CVE"/>
    <description>
    Use after free in WebRTC in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-03-28"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-4445/">CVE-2026-4445 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4445">CVE-2026-4445 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259964">SUSE bug 1259964</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051894" comment="chromedriver-146.0.7680.153-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051895" comment="chromium-146.0.7680.153-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264446" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4446</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4446" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4446" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4446" ref_url="https://www.suse.com/security/cve/CVE-2026-4446" source="SUSE CVE"/>
    <description>
    Use after free in WebRTC in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-03-28"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-4446/">CVE-2026-4446 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4446">CVE-2026-4446 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259964">SUSE bug 1259964</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051894" comment="chromedriver-146.0.7680.153-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051895" comment="chromium-146.0.7680.153-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264447" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4447</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4447" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4447" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4447" ref_url="https://www.suse.com/security/cve/CVE-2026-4447" source="SUSE CVE"/>
    <description>
    Inappropriate implementation in V8 in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-03-28"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-4447/">CVE-2026-4447 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4447">CVE-2026-4447 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259964">SUSE bug 1259964</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051894" comment="chromedriver-146.0.7680.153-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051895" comment="chromium-146.0.7680.153-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264448" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4448</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4448" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4448" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4448" ref_url="https://www.suse.com/security/cve/CVE-2026-4448" source="SUSE CVE"/>
    <description>
    Heap buffer overflow in ANGLE in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-03-28"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-4448/">CVE-2026-4448 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4448">CVE-2026-4448 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259964">SUSE bug 1259964</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051894" comment="chromedriver-146.0.7680.153-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051895" comment="chromium-146.0.7680.153-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264449" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4449</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4449" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4449" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4449" ref_url="https://www.suse.com/security/cve/CVE-2026-4449" source="SUSE CVE"/>
    <description>
    Use after free in Blink in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-03-28"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-4449/">CVE-2026-4449 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4449">CVE-2026-4449 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259964">SUSE bug 1259964</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051894" comment="chromedriver-146.0.7680.153-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051895" comment="chromium-146.0.7680.153-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264450" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4450</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4450" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4450" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4450" ref_url="https://www.suse.com/security/cve/CVE-2026-4450" source="SUSE CVE"/>
    <description>
    Out of bounds write in V8 in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-03-28"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-4450/">CVE-2026-4450 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4450">CVE-2026-4450 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259964">SUSE bug 1259964</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051894" comment="chromedriver-146.0.7680.153-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051895" comment="chromium-146.0.7680.153-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264451" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4451</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4451" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4451" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4451" ref_url="https://www.suse.com/security/cve/CVE-2026-4451" source="SUSE CVE"/>
    <description>
    Insufficient validation of untrusted input in Navigation in Google Chrome prior to 146.0.7680.153 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-03-28"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-4451/">CVE-2026-4451 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4451">CVE-2026-4451 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259964">SUSE bug 1259964</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051894" comment="chromedriver-146.0.7680.153-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051895" comment="chromium-146.0.7680.153-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264452" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4452</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4452" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4452" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4452" ref_url="https://www.suse.com/security/cve/CVE-2026-4452" source="SUSE CVE"/>
    <description>
    Integer overflow in ANGLE in Google Chrome on Windows prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-03-28"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-4452/">CVE-2026-4452 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4452">CVE-2026-4452 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259964">SUSE bug 1259964</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051894" comment="chromedriver-146.0.7680.153-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051895" comment="chromium-146.0.7680.153-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264453" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4453</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4453" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4453" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4453" ref_url="https://www.suse.com/security/cve/CVE-2026-4453" source="SUSE CVE"/>
    <description>
    Integer overflow in Dawn in Google Chrome on Mac prior to 146.0.7680.153 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-03-28"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-4453/">CVE-2026-4453 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4453">CVE-2026-4453 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259964">SUSE bug 1259964</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051894" comment="chromedriver-146.0.7680.153-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051895" comment="chromium-146.0.7680.153-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264454" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4454</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4454" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4454" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4454" ref_url="https://www.suse.com/security/cve/CVE-2026-4454" source="SUSE CVE"/>
    <description>
    Use after free in Network in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-03-28"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-4454/">CVE-2026-4454 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4454">CVE-2026-4454 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259964">SUSE bug 1259964</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051894" comment="chromedriver-146.0.7680.153-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051895" comment="chromium-146.0.7680.153-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264455" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4455</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4455" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4455" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4455" ref_url="https://www.suse.com/security/cve/CVE-2026-4455" source="SUSE CVE"/>
    <description>
    Heap buffer overflow in PDFium in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-03-28"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-4455/">CVE-2026-4455 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4455">CVE-2026-4455 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259964">SUSE bug 1259964</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051894" comment="chromedriver-146.0.7680.153-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051895" comment="chromium-146.0.7680.153-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264456" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4456</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4456" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4456" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4456" ref_url="https://www.suse.com/security/cve/CVE-2026-4456" source="SUSE CVE"/>
    <description>
    Use after free in Digital Credentials API in Google Chrome prior to 146.0.7680.153 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-03-28"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-4456/">CVE-2026-4456 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4456">CVE-2026-4456 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259964">SUSE bug 1259964</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051894" comment="chromedriver-146.0.7680.153-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051895" comment="chromium-146.0.7680.153-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264457" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4457</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4457" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4457" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4457" ref_url="https://www.suse.com/security/cve/CVE-2026-4457" source="SUSE CVE"/>
    <description>
    Type Confusion in V8 in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-03-28"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-4457/">CVE-2026-4457 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4457">CVE-2026-4457 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259964">SUSE bug 1259964</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051894" comment="chromedriver-146.0.7680.153-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051895" comment="chromium-146.0.7680.153-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264458" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4458</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4458" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4458" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4458" ref_url="https://www.suse.com/security/cve/CVE-2026-4458" source="SUSE CVE"/>
    <description>
    Use after free in Extensions in Google Chrome prior to 146.0.7680.153 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-03-28"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-4458/">CVE-2026-4458 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4458">CVE-2026-4458 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259964">SUSE bug 1259964</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051894" comment="chromedriver-146.0.7680.153-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051895" comment="chromium-146.0.7680.153-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264459" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4459</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4459" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4459" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4459" ref_url="https://www.suse.com/security/cve/CVE-2026-4459" source="SUSE CVE"/>
    <description>
    Out of bounds read and write in WebAudio in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-03-28"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-4459/">CVE-2026-4459 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4459">CVE-2026-4459 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259964">SUSE bug 1259964</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051894" comment="chromedriver-146.0.7680.153-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051895" comment="chromium-146.0.7680.153-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264460" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4460</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4460" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4460" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4460" ref_url="https://www.suse.com/security/cve/CVE-2026-4460" source="SUSE CVE"/>
    <description>
    Out of bounds read in Skia in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-03-28"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-4460/">CVE-2026-4460 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4460">CVE-2026-4460 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259964">SUSE bug 1259964</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051894" comment="chromedriver-146.0.7680.153-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051895" comment="chromium-146.0.7680.153-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264461" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4461</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4461" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4461" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4461" ref_url="https://www.suse.com/security/cve/CVE-2026-4461" source="SUSE CVE"/>
    <description>
    Inappropriate implementation in V8 in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-03-28"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-4461/">CVE-2026-4461 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4461">CVE-2026-4461 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259964">SUSE bug 1259964</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051894" comment="chromedriver-146.0.7680.153-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051895" comment="chromium-146.0.7680.153-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264462" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4462</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4462" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4462" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4462" ref_url="https://www.suse.com/security/cve/CVE-2026-4462" source="SUSE CVE"/>
    <description>
    Out of bounds read in Blink in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-03-28"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-4462/">CVE-2026-4462 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4462">CVE-2026-4462 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259964">SUSE bug 1259964</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051894" comment="chromedriver-146.0.7680.153-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051895" comment="chromium-146.0.7680.153-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264463" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4463</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4463" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4463" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4463" ref_url="https://www.suse.com/security/cve/CVE-2026-4463" source="SUSE CVE"/>
    <description>
    Heap buffer overflow in WebRTC in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-03-28"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-4463/">CVE-2026-4463 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4463">CVE-2026-4463 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259964">SUSE bug 1259964</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051894" comment="chromedriver-146.0.7680.153-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051895" comment="chromium-146.0.7680.153-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264464" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4464</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4464" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4464" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4464" ref_url="https://www.suse.com/security/cve/CVE-2026-4464" source="SUSE CVE"/>
    <description>
    Integer overflow in ANGLE in Google Chrome prior to 146.0.7680.153 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-03-28"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-4464/">CVE-2026-4464 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4464">CVE-2026-4464 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1259964">SUSE bug 1259964</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051894" comment="chromedriver-146.0.7680.153-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051895" comment="chromium-146.0.7680.153-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264673" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4673</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4673" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4673" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4673" ref_url="https://www.suse.com/security/cve/CVE-2026-4673" source="SUSE CVE"/>
    <description>
    Heap buffer overflow in WebAudio in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-03-28"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-4673/">CVE-2026-4673 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4673">CVE-2026-4673 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260376">SUSE bug 1260376</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051902" comment="chromedriver-146.0.7680.164-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051903" comment="chromium-146.0.7680.164-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264674" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4674</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4674" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4674" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4674" ref_url="https://www.suse.com/security/cve/CVE-2026-4674" source="SUSE CVE"/>
    <description>
    Out of bounds read in CSS in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-03-28"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-4674/">CVE-2026-4674 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4674">CVE-2026-4674 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260376">SUSE bug 1260376</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051902" comment="chromedriver-146.0.7680.164-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051903" comment="chromium-146.0.7680.164-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264675" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4675</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4675" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4675" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4675" ref_url="https://www.suse.com/security/cve/CVE-2026-4675" source="SUSE CVE"/>
    <description>
    Heap buffer overflow in WebGL in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-03-28"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-4675/">CVE-2026-4675 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4675">CVE-2026-4675 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260376">SUSE bug 1260376</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051902" comment="chromedriver-146.0.7680.164-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051903" comment="chromium-146.0.7680.164-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264676" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4676</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4676" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4676" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4676" ref_url="https://www.suse.com/security/cve/CVE-2026-4676" source="SUSE CVE"/>
    <description>
    Use after free in Dawn in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-03-28"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-4676/">CVE-2026-4676 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4676">CVE-2026-4676 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260376">SUSE bug 1260376</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051902" comment="chromedriver-146.0.7680.164-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051903" comment="chromium-146.0.7680.164-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264677" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4677</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4677" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4677" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4677" ref_url="https://www.suse.com/security/cve/CVE-2026-4677" source="SUSE CVE"/>
    <description>
    Inappropriate implementation in WebAudio in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-03-28"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-4677/">CVE-2026-4677 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4677">CVE-2026-4677 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260376">SUSE bug 1260376</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051902" comment="chromedriver-146.0.7680.164-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051903" comment="chromium-146.0.7680.164-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264678" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4678</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4678" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4678" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4678" ref_url="https://www.suse.com/security/cve/CVE-2026-4678" source="SUSE CVE"/>
    <description>
    Use after free in WebGPU in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-03-28"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-4678/">CVE-2026-4678 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4678">CVE-2026-4678 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260376">SUSE bug 1260376</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051902" comment="chromedriver-146.0.7680.164-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051903" comment="chromium-146.0.7680.164-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264679" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4679</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4679" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4679" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4679" ref_url="https://www.suse.com/security/cve/CVE-2026-4679" source="SUSE CVE"/>
    <description>
    Integer overflow in Fonts in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-03-28"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-4679/">CVE-2026-4679 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4679">CVE-2026-4679 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260376">SUSE bug 1260376</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051902" comment="chromedriver-146.0.7680.164-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051903" comment="chromium-146.0.7680.164-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264680" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4680</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4680" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4680" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4680" ref_url="https://www.suse.com/security/cve/CVE-2026-4680" source="SUSE CVE"/>
    <description>
    Use after free in FedCM in Google Chrome prior to 146.0.7680.165 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-03-28"/>
	<updated date="2026-03-28"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-4680/">CVE-2026-4680 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4680">CVE-2026-4680 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260376">SUSE bug 1260376</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051902" comment="chromedriver-146.0.7680.164-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010051903" comment="chromium-146.0.7680.164-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264684" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4684</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4684" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4684" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4684" ref_url="https://www.suse.com/security/cve/CVE-2026-4684" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:5930" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003221.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5932" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002626.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6188" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003267.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6917" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045353.html" source="SUSE-SU"/>
    <description>
    Race condition, use-after-free in the Graphics: WebRender component. This vulnerability was fixed in Firefox 149, Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-03"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4684/">CVE-2026-4684 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4684">CVE-2026-4684 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260083">SUSE bug 1260083</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052591" comment="MozillaFirefox-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052592" comment="MozillaFirefox-branding-upstream-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052593" comment="MozillaFirefox-devel-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052594" comment="MozillaFirefox-translations-common-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052595" comment="MozillaFirefox-translations-other-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264685" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4685</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4685" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4685" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4685" ref_url="https://www.suse.com/security/cve/CVE-2026-4685" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:5930" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003221.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5932" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002626.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6188" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003267.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6917" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045353.html" source="SUSE-SU"/>
    <description>
    Incorrect boundary conditions in the Graphics: Canvas2D component. This vulnerability was fixed in Firefox 149, Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-03"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4685/">CVE-2026-4685 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4685">CVE-2026-4685 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260083">SUSE bug 1260083</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052591" comment="MozillaFirefox-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052592" comment="MozillaFirefox-branding-upstream-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052593" comment="MozillaFirefox-devel-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052594" comment="MozillaFirefox-translations-common-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052595" comment="MozillaFirefox-translations-other-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264686" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4686</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4686" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4686" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4686" ref_url="https://www.suse.com/security/cve/CVE-2026-4686" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:5930" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003221.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5932" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002626.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6188" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003267.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6917" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045353.html" source="SUSE-SU"/>
    <description>
    Incorrect boundary conditions in the Graphics: Canvas2D component. This vulnerability was fixed in Firefox 149, Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-03"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4686/">CVE-2026-4686 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4686">CVE-2026-4686 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260083">SUSE bug 1260083</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052591" comment="MozillaFirefox-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052592" comment="MozillaFirefox-branding-upstream-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052593" comment="MozillaFirefox-devel-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052594" comment="MozillaFirefox-translations-common-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052595" comment="MozillaFirefox-translations-other-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264687" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4687</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4687" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4687" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4687" ref_url="https://www.suse.com/security/cve/CVE-2026-4687" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:5930" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003221.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5932" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002626.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6188" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003267.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6917" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045353.html" source="SUSE-SU"/>
    <description>
    Sandbox escape due to incorrect boundary conditions in the Telemetry component. This vulnerability was fixed in Firefox 149, Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-03"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4687/">CVE-2026-4687 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4687">CVE-2026-4687 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260083">SUSE bug 1260083</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052591" comment="MozillaFirefox-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052592" comment="MozillaFirefox-branding-upstream-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052593" comment="MozillaFirefox-devel-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052594" comment="MozillaFirefox-translations-common-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052595" comment="MozillaFirefox-translations-other-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264688" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4688</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4688" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4688" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4688" ref_url="https://www.suse.com/security/cve/CVE-2026-4688" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:5930" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003221.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5932" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002626.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6188" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003267.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6917" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045353.html" source="SUSE-SU"/>
    <description>
    Sandbox escape due to use-after-free in the Disability Access APIs component. This vulnerability was fixed in Firefox 149, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-03"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4688/">CVE-2026-4688 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4688">CVE-2026-4688 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260083">SUSE bug 1260083</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052591" comment="MozillaFirefox-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052592" comment="MozillaFirefox-branding-upstream-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052593" comment="MozillaFirefox-devel-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052594" comment="MozillaFirefox-translations-common-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052595" comment="MozillaFirefox-translations-other-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264689" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4689</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4689" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4689" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4689" ref_url="https://www.suse.com/security/cve/CVE-2026-4689" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:5930" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003221.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5932" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002626.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6188" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003267.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6917" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045353.html" source="SUSE-SU"/>
    <description>
    Sandbox escape due to incorrect boundary conditions, integer overflow in the XPCOM component. This vulnerability was fixed in Firefox 149, Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-03"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4689/">CVE-2026-4689 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4689">CVE-2026-4689 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260083">SUSE bug 1260083</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052591" comment="MozillaFirefox-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052592" comment="MozillaFirefox-branding-upstream-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052593" comment="MozillaFirefox-devel-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052594" comment="MozillaFirefox-translations-common-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052595" comment="MozillaFirefox-translations-other-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264690" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4690</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4690" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4690" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4690" ref_url="https://www.suse.com/security/cve/CVE-2026-4690" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:5930" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003221.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5932" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002626.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6188" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003267.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6917" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045353.html" source="SUSE-SU"/>
    <description>
    Sandbox escape due to incorrect boundary conditions, integer overflow in the XPCOM component. This vulnerability was fixed in Firefox 149, Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-03"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4690/">CVE-2026-4690 at SUSE</cve>
	<cve impact="high" cvss3="8.6/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4690">CVE-2026-4690 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260083">SUSE bug 1260083</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052591" comment="MozillaFirefox-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052592" comment="MozillaFirefox-branding-upstream-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052593" comment="MozillaFirefox-devel-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052594" comment="MozillaFirefox-translations-common-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052595" comment="MozillaFirefox-translations-other-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264691" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4691</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4691" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4691" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4691" ref_url="https://www.suse.com/security/cve/CVE-2026-4691" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:5930" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003221.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5932" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002626.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6188" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003267.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6917" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045353.html" source="SUSE-SU"/>
    <description>
    Use-after-free in the CSS Parsing and Computation component. This vulnerability was fixed in Firefox 149, Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-03"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4691/">CVE-2026-4691 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4691">CVE-2026-4691 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260083">SUSE bug 1260083</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052591" comment="MozillaFirefox-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052592" comment="MozillaFirefox-branding-upstream-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052593" comment="MozillaFirefox-devel-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052594" comment="MozillaFirefox-translations-common-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052595" comment="MozillaFirefox-translations-other-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264692" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4692</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4692" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4692" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4692" ref_url="https://www.suse.com/security/cve/CVE-2026-4692" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:5930" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003221.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5932" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002626.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6188" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003267.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6917" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045353.html" source="SUSE-SU"/>
    <description>
    Sandbox escape in the Responsive Design Mode component. This vulnerability was fixed in Firefox 149, Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-03"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.3/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4692/">CVE-2026-4692 at SUSE</cve>
	<cve impact="critical" cvss3="10/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4692">CVE-2026-4692 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260083">SUSE bug 1260083</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052591" comment="MozillaFirefox-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052592" comment="MozillaFirefox-branding-upstream-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052593" comment="MozillaFirefox-devel-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052594" comment="MozillaFirefox-translations-common-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052595" comment="MozillaFirefox-translations-other-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264693" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4693</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4693" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4693" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4693" ref_url="https://www.suse.com/security/cve/CVE-2026-4693" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:5930" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003221.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5932" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002626.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6188" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003267.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6917" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045353.html" source="SUSE-SU"/>
    <description>
    Incorrect boundary conditions in the Audio/Video: Playback component. This vulnerability was fixed in Firefox 149, Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-03"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4693/">CVE-2026-4693 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4693">CVE-2026-4693 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260083">SUSE bug 1260083</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052591" comment="MozillaFirefox-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052592" comment="MozillaFirefox-branding-upstream-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052593" comment="MozillaFirefox-devel-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052594" comment="MozillaFirefox-translations-common-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052595" comment="MozillaFirefox-translations-other-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264694" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4694</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4694" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4694" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4694" ref_url="https://www.suse.com/security/cve/CVE-2026-4694" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:5930" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003221.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5932" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002626.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6188" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003267.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6917" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045353.html" source="SUSE-SU"/>
    <description>
    Incorrect boundary conditions, integer overflow in the Graphics component. This vulnerability was fixed in Firefox 149, Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-03"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4694/">CVE-2026-4694 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4694">CVE-2026-4694 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260083">SUSE bug 1260083</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052591" comment="MozillaFirefox-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052592" comment="MozillaFirefox-branding-upstream-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052593" comment="MozillaFirefox-devel-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052594" comment="MozillaFirefox-translations-common-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052595" comment="MozillaFirefox-translations-other-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264695" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4695</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4695" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4695" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4695" ref_url="https://www.suse.com/security/cve/CVE-2026-4695" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:5930" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003221.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5932" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002626.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6188" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003267.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6917" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045353.html" source="SUSE-SU"/>
    <description>
    Incorrect boundary conditions in the Audio/Video: Web Codecs component. This vulnerability was fixed in Firefox 149, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-03"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4695/">CVE-2026-4695 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4695">CVE-2026-4695 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260083">SUSE bug 1260083</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052591" comment="MozillaFirefox-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052592" comment="MozillaFirefox-branding-upstream-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052593" comment="MozillaFirefox-devel-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052594" comment="MozillaFirefox-translations-common-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052595" comment="MozillaFirefox-translations-other-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264696" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4696</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4696" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4696" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4696" ref_url="https://www.suse.com/security/cve/CVE-2026-4696" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:5930" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003221.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5932" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002626.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6188" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003267.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6917" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045353.html" source="SUSE-SU"/>
    <description>
    Use-after-free in the Layout: Text and Fonts component. This vulnerability was fixed in Firefox 149, Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-03"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4696/">CVE-2026-4696 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4696">CVE-2026-4696 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260083">SUSE bug 1260083</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052591" comment="MozillaFirefox-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052592" comment="MozillaFirefox-branding-upstream-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052593" comment="MozillaFirefox-devel-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052594" comment="MozillaFirefox-translations-common-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052595" comment="MozillaFirefox-translations-other-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264697" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4697</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4697" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4697" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4697" ref_url="https://www.suse.com/security/cve/CVE-2026-4697" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:5930" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003221.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5932" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002626.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6188" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003267.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6917" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045353.html" source="SUSE-SU"/>
    <description>
    Incorrect boundary conditions in the Audio/Video: Web Codecs component. This vulnerability was fixed in Firefox 149, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-03"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4697/">CVE-2026-4697 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4697">CVE-2026-4697 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260083">SUSE bug 1260083</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052591" comment="MozillaFirefox-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052592" comment="MozillaFirefox-branding-upstream-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052593" comment="MozillaFirefox-devel-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052594" comment="MozillaFirefox-translations-common-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052595" comment="MozillaFirefox-translations-other-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264698" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4698</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4698" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4698" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4698" ref_url="https://www.suse.com/security/cve/CVE-2026-4698" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:5930" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003221.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5932" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002626.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6188" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003267.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6917" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045353.html" source="SUSE-SU"/>
    <description>
    JIT miscompilation in the JavaScript Engine: JIT component. This vulnerability was fixed in Firefox 149, Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-03"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4698/">CVE-2026-4698 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4698">CVE-2026-4698 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260083">SUSE bug 1260083</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052591" comment="MozillaFirefox-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052592" comment="MozillaFirefox-branding-upstream-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052593" comment="MozillaFirefox-devel-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052594" comment="MozillaFirefox-translations-common-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052595" comment="MozillaFirefox-translations-other-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264699" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4699</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4699" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4699" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4699" ref_url="https://www.suse.com/security/cve/CVE-2026-4699" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:5930" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003221.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5932" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002626.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6188" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003267.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6917" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045353.html" source="SUSE-SU"/>
    <description>
    Incorrect boundary conditions in the Layout: Text and Fonts component. This vulnerability was fixed in Firefox 149, Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-03"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4699/">CVE-2026-4699 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4699">CVE-2026-4699 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260083">SUSE bug 1260083</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052591" comment="MozillaFirefox-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052592" comment="MozillaFirefox-branding-upstream-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052593" comment="MozillaFirefox-devel-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052594" comment="MozillaFirefox-translations-common-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052595" comment="MozillaFirefox-translations-other-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264700" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4700</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4700" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4700" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4700" ref_url="https://www.suse.com/security/cve/CVE-2026-4700" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:5930" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003221.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5932" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002626.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6188" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003267.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6917" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045353.html" source="SUSE-SU"/>
    <description>
    Mitigation bypass in the Networking: HTTP component. This vulnerability was fixed in Firefox 149, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-03"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://www.suse.com/security/cve/CVE-2026-4700/">CVE-2026-4700 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4700">CVE-2026-4700 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260083">SUSE bug 1260083</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052591" comment="MozillaFirefox-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052592" comment="MozillaFirefox-branding-upstream-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052593" comment="MozillaFirefox-devel-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052594" comment="MozillaFirefox-translations-common-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052595" comment="MozillaFirefox-translations-other-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264701" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4701</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4701" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4701" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4701" ref_url="https://www.suse.com/security/cve/CVE-2026-4701" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:5930" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003221.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5932" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002626.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6188" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003267.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6917" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045353.html" source="SUSE-SU"/>
    <description>
    Use-after-free in the JavaScript Engine component. This vulnerability was fixed in Firefox 149, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-03"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4701/">CVE-2026-4701 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4701">CVE-2026-4701 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260083">SUSE bug 1260083</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052591" comment="MozillaFirefox-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052592" comment="MozillaFirefox-branding-upstream-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052593" comment="MozillaFirefox-devel-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052594" comment="MozillaFirefox-translations-common-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052595" comment="MozillaFirefox-translations-other-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264702" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4702</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4702" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4702" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4702" ref_url="https://www.suse.com/security/cve/CVE-2026-4702" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:5930" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003221.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5932" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002626.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6188" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003267.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6917" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045353.html" source="SUSE-SU"/>
    <description>
    JIT miscompilation in the JavaScript Engine component. This vulnerability was fixed in Firefox 149, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-03"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4702/">CVE-2026-4702 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4702">CVE-2026-4702 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260083">SUSE bug 1260083</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052591" comment="MozillaFirefox-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052592" comment="MozillaFirefox-branding-upstream-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052593" comment="MozillaFirefox-devel-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052594" comment="MozillaFirefox-translations-common-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052595" comment="MozillaFirefox-translations-other-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264704" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4704</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4704" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4704" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4704" ref_url="https://www.suse.com/security/cve/CVE-2026-4704" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:5930" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003221.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5932" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002626.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6188" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003267.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6917" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045353.html" source="SUSE-SU"/>
    <description>
    Denial-of-service in the WebRTC: Signaling component. This vulnerability was fixed in Firefox 149, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-03"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="4.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L" href="https://www.suse.com/security/cve/CVE-2026-4704/">CVE-2026-4704 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4704">CVE-2026-4704 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260083">SUSE bug 1260083</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052591" comment="MozillaFirefox-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052592" comment="MozillaFirefox-branding-upstream-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052593" comment="MozillaFirefox-devel-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052594" comment="MozillaFirefox-translations-common-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052595" comment="MozillaFirefox-translations-other-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264705" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4705</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4705" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4705" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4705" ref_url="https://www.suse.com/security/cve/CVE-2026-4705" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:5930" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003221.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5932" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002626.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6188" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003267.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6917" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045353.html" source="SUSE-SU"/>
    <description>
    Undefined behavior in the WebRTC: Signaling component. This vulnerability was fixed in Firefox 149, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-03"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4705/">CVE-2026-4705 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4705">CVE-2026-4705 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260083">SUSE bug 1260083</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052591" comment="MozillaFirefox-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052592" comment="MozillaFirefox-branding-upstream-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052593" comment="MozillaFirefox-devel-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052594" comment="MozillaFirefox-translations-common-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052595" comment="MozillaFirefox-translations-other-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264706" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4706</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4706" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4706" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4706" ref_url="https://www.suse.com/security/cve/CVE-2026-4706" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:5930" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003221.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5932" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002626.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6188" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003267.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6917" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045353.html" source="SUSE-SU"/>
    <description>
    Incorrect boundary conditions in the Graphics: Canvas2D component. This vulnerability was fixed in Firefox 149, Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-03"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4706/">CVE-2026-4706 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4706">CVE-2026-4706 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260083">SUSE bug 1260083</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052591" comment="MozillaFirefox-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052592" comment="MozillaFirefox-branding-upstream-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052593" comment="MozillaFirefox-devel-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052594" comment="MozillaFirefox-translations-common-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052595" comment="MozillaFirefox-translations-other-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264707" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4707</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4707" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4707" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4707" ref_url="https://www.suse.com/security/cve/CVE-2026-4707" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:5930" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003221.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5932" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002626.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6188" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003267.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6917" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045353.html" source="SUSE-SU"/>
    <description>
    Incorrect boundary conditions in the Graphics: Canvas2D component. This vulnerability was fixed in Firefox 149, Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-03"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4707/">CVE-2026-4707 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4707">CVE-2026-4707 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260083">SUSE bug 1260083</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052591" comment="MozillaFirefox-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052592" comment="MozillaFirefox-branding-upstream-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052593" comment="MozillaFirefox-devel-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052594" comment="MozillaFirefox-translations-common-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052595" comment="MozillaFirefox-translations-other-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264708" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4708</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4708" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4708" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4708" ref_url="https://www.suse.com/security/cve/CVE-2026-4708" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:5930" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003221.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5932" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002626.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6188" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003267.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6917" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045353.html" source="SUSE-SU"/>
    <description>
    Incorrect boundary conditions in the Graphics component. This vulnerability was fixed in Firefox 149, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-03"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4708/">CVE-2026-4708 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4708">CVE-2026-4708 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260083">SUSE bug 1260083</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052591" comment="MozillaFirefox-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052592" comment="MozillaFirefox-branding-upstream-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052593" comment="MozillaFirefox-devel-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052594" comment="MozillaFirefox-translations-common-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052595" comment="MozillaFirefox-translations-other-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264709" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4709</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4709" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4709" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4709" ref_url="https://www.suse.com/security/cve/CVE-2026-4709" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:5930" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003221.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5932" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002626.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6188" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003267.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6917" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045353.html" source="SUSE-SU"/>
    <description>
    Incorrect boundary conditions in the Audio/Video: GMP component. This vulnerability was fixed in Firefox 149, Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-03"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4709/">CVE-2026-4709 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4709">CVE-2026-4709 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260083">SUSE bug 1260083</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052591" comment="MozillaFirefox-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052592" comment="MozillaFirefox-branding-upstream-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052593" comment="MozillaFirefox-devel-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052594" comment="MozillaFirefox-translations-common-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052595" comment="MozillaFirefox-translations-other-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264710" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4710</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4710" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4710" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4710" ref_url="https://www.suse.com/security/cve/CVE-2026-4710" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:5930" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003221.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5932" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002626.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6188" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003267.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6917" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045353.html" source="SUSE-SU"/>
    <description>
    Incorrect boundary conditions in the Audio/Video component. This vulnerability was fixed in Firefox 149, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-03"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4710/">CVE-2026-4710 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4710">CVE-2026-4710 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260083">SUSE bug 1260083</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052591" comment="MozillaFirefox-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052592" comment="MozillaFirefox-branding-upstream-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052593" comment="MozillaFirefox-devel-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052594" comment="MozillaFirefox-translations-common-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052595" comment="MozillaFirefox-translations-other-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264711" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4711</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4711" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4711" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4711" ref_url="https://www.suse.com/security/cve/CVE-2026-4711" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:5930" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003221.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5932" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002626.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6188" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003267.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6917" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045353.html" source="SUSE-SU"/>
    <description>
    Use-after-free in the Widget: Cocoa component. This vulnerability was fixed in Firefox 149, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-03"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4711/">CVE-2026-4711 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4711">CVE-2026-4711 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260083">SUSE bug 1260083</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052591" comment="MozillaFirefox-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052592" comment="MozillaFirefox-branding-upstream-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052593" comment="MozillaFirefox-devel-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052594" comment="MozillaFirefox-translations-common-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052595" comment="MozillaFirefox-translations-other-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264712" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4712</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4712" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4712" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4712" ref_url="https://www.suse.com/security/cve/CVE-2026-4712" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:5930" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003221.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5932" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002626.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6188" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003267.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6917" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045353.html" source="SUSE-SU"/>
    <description>
    Information disclosure in the Widget: Cocoa component. This vulnerability was fixed in Firefox 149, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-03"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://www.suse.com/security/cve/CVE-2026-4712/">CVE-2026-4712 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4712">CVE-2026-4712 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260083">SUSE bug 1260083</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052591" comment="MozillaFirefox-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052592" comment="MozillaFirefox-branding-upstream-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052593" comment="MozillaFirefox-devel-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052594" comment="MozillaFirefox-translations-common-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052595" comment="MozillaFirefox-translations-other-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264713" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4713</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4713" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4713" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4713" ref_url="https://www.suse.com/security/cve/CVE-2026-4713" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:5930" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003221.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5932" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002626.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6188" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003267.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6917" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045353.html" source="SUSE-SU"/>
    <description>
    Incorrect boundary conditions in the Graphics component. This vulnerability was fixed in Firefox 149, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-03"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4713/">CVE-2026-4713 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4713">CVE-2026-4713 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260083">SUSE bug 1260083</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052591" comment="MozillaFirefox-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052592" comment="MozillaFirefox-branding-upstream-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052593" comment="MozillaFirefox-devel-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052594" comment="MozillaFirefox-translations-common-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052595" comment="MozillaFirefox-translations-other-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264714" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4714</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4714" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4714" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4714" ref_url="https://www.suse.com/security/cve/CVE-2026-4714" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:5930" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003221.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5932" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002626.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6188" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003267.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6917" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045353.html" source="SUSE-SU"/>
    <description>
    Incorrect boundary conditions in the Audio/Video component. This vulnerability was fixed in Firefox 149, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-03"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4714/">CVE-2026-4714 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4714">CVE-2026-4714 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260083">SUSE bug 1260083</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052591" comment="MozillaFirefox-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052592" comment="MozillaFirefox-branding-upstream-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052593" comment="MozillaFirefox-devel-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052594" comment="MozillaFirefox-translations-common-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052595" comment="MozillaFirefox-translations-other-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264715" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4715</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4715" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4715" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4715" ref_url="https://www.suse.com/security/cve/CVE-2026-4715" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:5930" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003221.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5932" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002626.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6188" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003267.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6917" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045353.html" source="SUSE-SU"/>
    <description>
    Uninitialized memory in the Graphics: Canvas2D component. This vulnerability was fixed in Firefox 149, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-03"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4715/">CVE-2026-4715 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4715">CVE-2026-4715 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260083">SUSE bug 1260083</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052591" comment="MozillaFirefox-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052592" comment="MozillaFirefox-branding-upstream-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052593" comment="MozillaFirefox-devel-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052594" comment="MozillaFirefox-translations-common-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052595" comment="MozillaFirefox-translations-other-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264716" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4716</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4716" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4716" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4716" ref_url="https://www.suse.com/security/cve/CVE-2026-4716" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:5930" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003221.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5932" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002626.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6188" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003267.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6917" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045353.html" source="SUSE-SU"/>
    <description>
    Incorrect boundary conditions, uninitialized memory in the JavaScript Engine component. This vulnerability was fixed in Firefox 149, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-03"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4716/">CVE-2026-4716 at SUSE</cve>
	<cve impact="critical" cvss3="9.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4716">CVE-2026-4716 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260083">SUSE bug 1260083</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052591" comment="MozillaFirefox-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052592" comment="MozillaFirefox-branding-upstream-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052593" comment="MozillaFirefox-devel-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052594" comment="MozillaFirefox-translations-common-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052595" comment="MozillaFirefox-translations-other-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264717" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4717</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4717" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4717" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4717" ref_url="https://www.suse.com/security/cve/CVE-2026-4717" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:5930" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003221.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5932" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002626.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6188" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003267.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6917" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045353.html" source="SUSE-SU"/>
    <description>
    Privilege escalation in the Netmonitor component. This vulnerability was fixed in Firefox 149, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-03"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4717/">CVE-2026-4717 at SUSE</cve>
	<cve impact="critical" cvss3="9.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4717">CVE-2026-4717 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260083">SUSE bug 1260083</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052591" comment="MozillaFirefox-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052592" comment="MozillaFirefox-branding-upstream-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052593" comment="MozillaFirefox-devel-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052594" comment="MozillaFirefox-translations-common-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052595" comment="MozillaFirefox-translations-other-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264718" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4718</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4718" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4718" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4718" ref_url="https://www.suse.com/security/cve/CVE-2026-4718" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:5930" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003221.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5932" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002626.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6188" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003267.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6917" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045353.html" source="SUSE-SU"/>
    <description>
    Undefined behavior in the WebRTC: Signaling component. This vulnerability was fixed in Firefox 149, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-03"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4718/">CVE-2026-4718 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4718">CVE-2026-4718 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260083">SUSE bug 1260083</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052591" comment="MozillaFirefox-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052592" comment="MozillaFirefox-branding-upstream-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052593" comment="MozillaFirefox-devel-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052594" comment="MozillaFirefox-translations-common-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052595" comment="MozillaFirefox-translations-other-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264719" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4719</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4719" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4719" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4719" ref_url="https://www.suse.com/security/cve/CVE-2026-4719" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:5930" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003221.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5932" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002626.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6188" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003267.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6917" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045353.html" source="SUSE-SU"/>
    <description>
    Incorrect boundary conditions in the Graphics: Text component. This vulnerability was fixed in Firefox 149, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-03"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="medium" cvss3="6.3/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L" href="https://www.suse.com/security/cve/CVE-2026-4719/">CVE-2026-4719 at SUSE</cve>
	<cve impact="high" cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-4719">CVE-2026-4719 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260083">SUSE bug 1260083</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052591" comment="MozillaFirefox-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052592" comment="MozillaFirefox-branding-upstream-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052593" comment="MozillaFirefox-devel-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052594" comment="MozillaFirefox-translations-common-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052595" comment="MozillaFirefox-translations-other-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264720" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4720</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4720" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4720" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4720" ref_url="https://www.suse.com/security/cve/CVE-2026-4720" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:5930" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003221.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5932" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002626.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6188" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003267.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6917" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045353.html" source="SUSE-SU"/>
    <description>
    Memory safety bugs present in Firefox ESR 140.8, Thunderbird ESR 140.8, Firefox 148 and Thunderbird 148. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability was fixed in Firefox 149, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-03"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4720/">CVE-2026-4720 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4720">CVE-2026-4720 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260083">SUSE bug 1260083</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052591" comment="MozillaFirefox-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052592" comment="MozillaFirefox-branding-upstream-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052593" comment="MozillaFirefox-devel-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052594" comment="MozillaFirefox-translations-common-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052595" comment="MozillaFirefox-translations-other-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20264721" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-4721</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-4721" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-4721" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-4721" ref_url="https://www.suse.com/security/cve/CVE-2026-4721" source="SUSE CVE"/>
		<reference ref_id="RHSA-2026:5930" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003221.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:5932" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-March/002626.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6188" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/003267.html" source="SUSE-SU"/>
		<reference ref_id="RHSA-2026:6917" ref_url="https://lists.suse.com/pipermail/suse-liberty-linux-updates/2026-April/002659.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1126-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025023.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1127-1" ref_url="https://lists.suse.com/pipermail/sle-security-updates/2026-March/025022.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:1163-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045255.html" source="SUSE-SU"/>
		<reference ref_id="SUSE-SU-2026:20978-1" ref_url="https://lists.suse.com/pipermail/sle-updates/2026-April/045353.html" source="SUSE-SU"/>
    <description>
    Memory safety bugs present in Firefox ESR 115.33, Firefox ESR 140.8, Thunderbird ESR 140.8, Firefox 148 and Thunderbird 148. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability was fixed in Firefox 149, Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-03"/>
	<updated date="2026-04-14"/>
	<severity>Important</severity>
	<cve impact="high" cvss3="8.8/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://www.suse.com/security/cve/CVE-2026-4721/">CVE-2026-4721 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-4721">CVE-2026-4721 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1260083">SUSE bug 1260083</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052591" comment="MozillaFirefox-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151161" comment="MozillaFirefox is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052592" comment="MozillaFirefox-branding-upstream-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152806" comment="MozillaFirefox-branding-upstream is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052593" comment="MozillaFirefox-devel-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152808" comment="MozillaFirefox-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052594" comment="MozillaFirefox-translations-common-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009151162" comment="MozillaFirefox-translations-common is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052595" comment="MozillaFirefox-translations-other-140.9.0-160000.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152809" comment="MozillaFirefox-translations-other is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20265190" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-5190</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-5190" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5190" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-5190" ref_url="https://www.suse.com/security/cve/CVE-2026-5190" source="SUSE CVE"/>
    <description>
    Out-of-bounds write in the streaming decoder component in aws-c-event-stream before 0.6.0 might allow a third party operating a server to cause memory corruption leading to arbitrary code execution on a client application that processes crafted event-stream messages.

To remediate this issue, users should upgrade to version 0.6.0 or later.
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-10"/>
	<updated date="2026-04-10"/>
	<severity>Important</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5190/">CVE-2026-5190 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5190">CVE-2026-5190 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1261298">SUSE bug 1261298</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010053402" comment="aws-c-event-stream-devel-0.4.2-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010053413" comment="aws-c-event-stream-devel is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010053403" comment="libaws-c-event-stream1-0.4.2-bp160.2.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2010053414" comment="libaws-c-event-stream1 is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20265272" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-5272</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-5272" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5272" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-5272" ref_url="https://www.suse.com/security/cve/CVE-2026-5272" source="SUSE CVE"/>
    <description>
    Heap buffer overflow in GPU in Google Chrome prior to 146.0.7680.178 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-05"/>
	<updated date="2026-04-05"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5272/">CVE-2026-5272 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5272">CVE-2026-5272 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1261249">SUSE bug 1261249</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052812" comment="chromedriver-146.0.7680.177-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052813" comment="chromium-146.0.7680.177-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20265273" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-5273</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-5273" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5273" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-5273" ref_url="https://www.suse.com/security/cve/CVE-2026-5273" source="SUSE CVE"/>
    <description>
    Use after free in CSS in Google Chrome prior to 146.0.7680.178 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-05"/>
	<updated date="2026-04-05"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5273/">CVE-2026-5273 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5273">CVE-2026-5273 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1261249">SUSE bug 1261249</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052812" comment="chromedriver-146.0.7680.177-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052813" comment="chromium-146.0.7680.177-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20265274" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-5274</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-5274" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5274" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-5274" ref_url="https://www.suse.com/security/cve/CVE-2026-5274" source="SUSE CVE"/>
    <description>
    Integer overflow in Codecs in Google Chrome prior to 146.0.7680.178 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-05"/>
	<updated date="2026-04-05"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5274/">CVE-2026-5274 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5274">CVE-2026-5274 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1261249">SUSE bug 1261249</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052812" comment="chromedriver-146.0.7680.177-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052813" comment="chromium-146.0.7680.177-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20265275" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-5275</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-5275" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5275" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-5275" ref_url="https://www.suse.com/security/cve/CVE-2026-5275" source="SUSE CVE"/>
    <description>
    Heap buffer overflow in ANGLE in Google Chrome on Mac prior to 146.0.7680.178 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-05"/>
	<updated date="2026-04-05"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5275/">CVE-2026-5275 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5275">CVE-2026-5275 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1261249">SUSE bug 1261249</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052812" comment="chromedriver-146.0.7680.177-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052813" comment="chromium-146.0.7680.177-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20265276" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-5276</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-5276" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5276" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-5276" ref_url="https://www.suse.com/security/cve/CVE-2026-5276" source="SUSE CVE"/>
    <description>
    Insufficient policy enforcement in WebUSB in Google Chrome prior to 146.0.7680.178 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-05"/>
	<updated date="2026-04-05"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5276/">CVE-2026-5276 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5276">CVE-2026-5276 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1261249">SUSE bug 1261249</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052812" comment="chromedriver-146.0.7680.177-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052813" comment="chromium-146.0.7680.177-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20265277" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-5277</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-5277" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5277" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-5277" ref_url="https://www.suse.com/security/cve/CVE-2026-5277" source="SUSE CVE"/>
    <description>
    Integer overflow in ANGLE in Google Chrome on Windows prior to 146.0.7680.178 allowed a remote attacker who had compromised the renderer process to perform an out of bounds memory write via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-05"/>
	<updated date="2026-04-05"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5277/">CVE-2026-5277 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5277">CVE-2026-5277 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1261249">SUSE bug 1261249</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052812" comment="chromedriver-146.0.7680.177-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052813" comment="chromium-146.0.7680.177-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20265278" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-5278</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-5278" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5278" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-5278" ref_url="https://www.suse.com/security/cve/CVE-2026-5278" source="SUSE CVE"/>
    <description>
    Use after free in Web MIDI in Google Chrome on Android prior to 146.0.7680.178 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-05"/>
	<updated date="2026-04-05"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5278/">CVE-2026-5278 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5278">CVE-2026-5278 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1261249">SUSE bug 1261249</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052812" comment="chromedriver-146.0.7680.177-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052813" comment="chromium-146.0.7680.177-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20265279" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-5279</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-5279" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5279" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-5279" ref_url="https://www.suse.com/security/cve/CVE-2026-5279" source="SUSE CVE"/>
    <description>
    Object corruption in V8 in Google Chrome prior to 146.0.7680.178 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-05"/>
	<updated date="2026-04-05"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5279/">CVE-2026-5279 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5279">CVE-2026-5279 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1261249">SUSE bug 1261249</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052812" comment="chromedriver-146.0.7680.177-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052813" comment="chromium-146.0.7680.177-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20265280" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-5280</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-5280" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5280" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-5280" ref_url="https://www.suse.com/security/cve/CVE-2026-5280" source="SUSE CVE"/>
    <description>
    Use after free in WebCodecs in Google Chrome prior to 146.0.7680.178 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-05"/>
	<updated date="2026-04-05"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5280/">CVE-2026-5280 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5280">CVE-2026-5280 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1261249">SUSE bug 1261249</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052812" comment="chromedriver-146.0.7680.177-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052813" comment="chromium-146.0.7680.177-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20265281" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-5281</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-5281" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5281" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-5281" ref_url="https://www.suse.com/security/cve/CVE-2026-5281" source="SUSE CVE"/>
    <description>
    Use after free in Dawn in Google Chrome prior to 146.0.7680.178 allowed a remote attacker who had compromised the renderer process to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-05"/>
	<updated date="2026-04-05"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5281/">CVE-2026-5281 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5281">CVE-2026-5281 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1261249">SUSE bug 1261249</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052812" comment="chromedriver-146.0.7680.177-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052813" comment="chromium-146.0.7680.177-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20265282" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-5282</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-5282" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5282" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-5282" ref_url="https://www.suse.com/security/cve/CVE-2026-5282" source="SUSE CVE"/>
    <description>
    Out of bounds read in WebCodecs in Google Chrome prior to 146.0.7680.178 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-05"/>
	<updated date="2026-04-05"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5282/">CVE-2026-5282 at SUSE</cve>
	<cve impact="high" cvss3="8.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H" href="https://nvd.nist.gov/vuln/detail/CVE-2026-5282">CVE-2026-5282 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1261249">SUSE bug 1261249</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052812" comment="chromedriver-146.0.7680.177-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052813" comment="chromium-146.0.7680.177-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20265283" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-5283</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-5283" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5283" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-5283" ref_url="https://www.suse.com/security/cve/CVE-2026-5283" source="SUSE CVE"/>
    <description>
    Inappropriate implementation in ANGLE in Google Chrome prior to 146.0.7680.178 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-05"/>
	<updated date="2026-04-05"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5283/">CVE-2026-5283 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5283">CVE-2026-5283 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1261249">SUSE bug 1261249</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052812" comment="chromedriver-146.0.7680.177-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052813" comment="chromium-146.0.7680.177-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20265284" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-5284</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-5284" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5284" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-5284" ref_url="https://www.suse.com/security/cve/CVE-2026-5284" source="SUSE CVE"/>
    <description>
    Use after free in Dawn in Google Chrome prior to 146.0.7680.178 allowed a remote attacker who had compromised the renderer process to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-05"/>
	<updated date="2026-04-05"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5284/">CVE-2026-5284 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5284">CVE-2026-5284 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1261249">SUSE bug 1261249</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052812" comment="chromedriver-146.0.7680.177-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052813" comment="chromium-146.0.7680.177-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20265285" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-5285</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-5285" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5285" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-5285" ref_url="https://www.suse.com/security/cve/CVE-2026-5285" source="SUSE CVE"/>
    <description>
    Use after free in WebGL in Google Chrome prior to 146.0.7680.178 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-05"/>
	<updated date="2026-04-05"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5285/">CVE-2026-5285 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5285">CVE-2026-5285 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1261249">SUSE bug 1261249</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052812" comment="chromedriver-146.0.7680.177-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052813" comment="chromium-146.0.7680.177-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20265286" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-5286</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-5286" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5286" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-5286" ref_url="https://www.suse.com/security/cve/CVE-2026-5286" source="SUSE CVE"/>
    <description>
    Use after free in Dawn in Google Chrome prior to 146.0.7680.178 allowed a remote attacker to execute arbitrary code via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-05"/>
	<updated date="2026-04-05"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5286/">CVE-2026-5286 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5286">CVE-2026-5286 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1261249">SUSE bug 1261249</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052812" comment="chromedriver-146.0.7680.177-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052813" comment="chromium-146.0.7680.177-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20265287" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-5287</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-5287" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5287" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-5287" ref_url="https://www.suse.com/security/cve/CVE-2026-5287" source="SUSE CVE"/>
    <description>
    Use after free in PDF in Google Chrome prior to 146.0.7680.178 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted PDF file. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-05"/>
	<updated date="2026-04-05"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5287/">CVE-2026-5287 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5287">CVE-2026-5287 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1261249">SUSE bug 1261249</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052812" comment="chromedriver-146.0.7680.177-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052813" comment="chromium-146.0.7680.177-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20265288" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-5288</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-5288" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5288" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-5288" ref_url="https://www.suse.com/security/cve/CVE-2026-5288" source="SUSE CVE"/>
    <description>
    Use after free in WebView in Google Chrome on Android prior to 146.0.7680.178 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-05"/>
	<updated date="2026-04-05"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5288/">CVE-2026-5288 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5288">CVE-2026-5288 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1261249">SUSE bug 1261249</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052812" comment="chromedriver-146.0.7680.177-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052813" comment="chromium-146.0.7680.177-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20265289" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-5289</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-5289" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5289" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-5289" ref_url="https://www.suse.com/security/cve/CVE-2026-5289" source="SUSE CVE"/>
    <description>
    Use after free in Navigation in Google Chrome prior to 146.0.7680.178 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-05"/>
	<updated date="2026-04-05"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5289/">CVE-2026-5289 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5289">CVE-2026-5289 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1261249">SUSE bug 1261249</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052812" comment="chromedriver-146.0.7680.177-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052813" comment="chromium-146.0.7680.177-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20265290" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-5290</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-5290" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5290" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-5290" ref_url="https://www.suse.com/security/cve/CVE-2026-5290" source="SUSE CVE"/>
    <description>
    Use after free in Compositing in Google Chrome prior to 146.0.7680.178 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page. (Chromium security severity: High)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-05"/>
	<updated date="2026-04-05"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5290/">CVE-2026-5290 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5290">CVE-2026-5290 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1261249">SUSE bug 1261249</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052812" comment="chromedriver-146.0.7680.177-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052813" comment="chromium-146.0.7680.177-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20265291" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-5291</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-5291" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5291" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-5291" ref_url="https://www.suse.com/security/cve/CVE-2026-5291" source="SUSE CVE"/>
    <description>
    Inappropriate implementation in WebGL in Google Chrome prior to 146.0.7680.178 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page. (Chromium security severity: Medium)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-05"/>
	<updated date="2026-04-05"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5291/">CVE-2026-5291 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5291">CVE-2026-5291 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1261249">SUSE bug 1261249</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052812" comment="chromedriver-146.0.7680.177-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052813" comment="chromium-146.0.7680.177-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
<definition id="oval:org.opensuse.security:def:20265292" version="1" class="vulnerability">
 <metadata>
 <title>CVE-2026-5292</title>
    <affected family="unix">
            <platform>openSUSE Leap 16.0</platform>
    </affected>
    <reference ref_id="Mitre CVE-2026-5292" ref_url="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-5292" source="CVE"/>
    <reference ref_id="SUSE CVE-2026-5292" ref_url="https://www.suse.com/security/cve/CVE-2026-5292" source="SUSE CVE"/>
    <description>
    Out of bounds read in WebCodecs in Google Chrome prior to 146.0.7680.178 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page. (Chromium security severity: Medium)
    </description>
<advisory from="security@suse.de">
	<issued date="2026-04-05"/>
	<updated date="2026-04-05"/>
	<severity>Critical</severity>
	<cve href="https://www.suse.com/security/cve/CVE-2026-5292/">CVE-2026-5292 at SUSE</cve>
	<cve href="https://nvd.nist.gov/vuln/detail/CVE-2026-5292">CVE-2026-5292 at NVD</cve>
	<bugzilla href="https://bugzilla.suse.com/1261249">SUSE bug 1261249</bugzilla>
</advisory>
 </metadata>
		<criteria operator="AND">
			<criterion test_ref="oval:org.opensuse.security:tst:2010024374" comment="openSUSE Leap 16.0 is installed"/>
			<criteria operator="OR">
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052812" comment="chromedriver-146.0.7680.177-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152651" comment="chromedriver is signed with openSUSE key"/>
</criteria>
				<criteria operator="AND">
	<criterion test_ref="oval:org.opensuse.security:tst:2010052813" comment="chromium-146.0.7680.177-bp160.1.1 is installed"/>
	<criterion test_ref="oval:org.opensuse.security:tst:2009152652" comment="chromium is signed with openSUSE key"/>
</criteria>
			</criteria>
		</criteria>
</definition>
</definitions>
<tests>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052811" version="1" comment="perl-XML-Parser is &lt;2.470.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052337" version="1" comment="perl-XML-Parser is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024374" version="1" comment="openSUSE-release is ==16.0" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243663"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711319" version="1" comment="kernel-default is ==3.12.38-44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711320" version="1" comment="kgraft-patch-3_12_38-44-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711323" version="1" comment="kernel-default is ==3.12.39-47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711324" version="1" comment="kgraft-patch-3_12_39-47-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711326" version="1" comment="kernel-default is ==3.12.43-52.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711327" version="1" comment="kgraft-patch-3_12_43-52_6-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711329" version="1" comment="kernel-default is ==3.12.44-52.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711330" version="1" comment="kgraft-patch-3_12_44-52_10-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711332" version="1" comment="kernel-default is ==3.12.44-52.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711333" version="1" comment="kgraft-patch-3_12_44-52_18-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711335" version="1" comment="kernel-default is ==3.12.48-52.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711336" version="1" comment="kgraft-patch-3_12_48-52_27-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714891" version="1" comment="kernel-default is ==3.12.49-11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711338" version="1" comment="kgraft-patch-3_12_49-11-default is &gt;=5-14.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711340" version="1" comment="kernel-default is ==3.12.51-52.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711341" version="1" comment="kgraft-patch-3_12_51-52_31-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711343" version="1" comment="kernel-default is ==3.12.51-52.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711344" version="1" comment="kgraft-patch-3_12_51-52_34-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711346" version="1" comment="kernel-default is ==3.12.51-52.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711347" version="1" comment="kgraft-patch-3_12_51-52_39-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711349" version="1" comment="kernel-default is ==3.12.51-60.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711350" version="1" comment="kgraft-patch-3_12_51-60_20-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711352" version="1" comment="kernel-default is ==3.12.51-60.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711353" version="1" comment="kgraft-patch-3_12_51-60_25-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711355" version="1" comment="kernel-default is ==3.12.53-60.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711356" version="1" comment="kgraft-patch-3_12_53-60_30-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711358" version="1" comment="kernel-default is ==3.12.57-60.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711359" version="1" comment="kgraft-patch-3_12_57-60_35-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711361" version="1" comment="kernel-default is ==3.12.59-60.41.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711362" version="1" comment="kgraft-patch-3_12_59-60_41-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711364" version="1" comment="kernel-default is ==3.12.59-60.45.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711365" version="1" comment="kgraft-patch-3_12_59-60_45-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129402" version="1" comment="kernel-default is &lt;3.12.59-60.45.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711368" version="1" comment="kernel-default is ==3.12.32-33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711369" version="1" comment="kgraft-patch-3_12_32-33-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105317" version="1" comment="kernel-default is &lt;3.12.32-33.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711371" version="1" comment="kernel-default is ==3.12.36-38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711372" version="1" comment="kgraft-patch-3_12_36-38-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009105748" version="1" comment="kernel-default is &lt;3.12.36-38.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711374" version="1" comment="kgraft-patch-3_12_38-44-default is &gt;=2-7.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711376" version="1" comment="kgraft-patch-3_12_39-47-default is &gt;=2-10.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009108369" version="1" comment="kernel-default is &lt;3.12.39-47.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009044800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711378" version="1" comment="kgraft-patch-3_12_32-33-default is &gt;=2-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711380" version="1" comment="kgraft-patch-3_12_36-38-default is &gt;=2-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711382" version="1" comment="kgraft-patch-3_12_43-52_6-default is &gt;=2-6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009110507" version="1" comment="kernel-default is &lt;3.12.43-52.6.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711384" version="1" comment="kgraft-patch-3_12_32-33-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711386" version="1" comment="kgraft-patch-3_12_36-38-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711388" version="1" comment="kgraft-patch-3_12_38-44-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711390" version="1" comment="kgraft-patch-3_12_39-47-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711392" version="1" comment="kgraft-patch-3_12_43-52_6-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711394" version="1" comment="kgraft-patch-3_12_44-52_10-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711396" version="1" comment="kgraft-patch-3_12_44-52_18-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711398" version="1" comment="kgraft-patch-3_12_48-52_27-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711400" version="1" comment="kgraft-patch-3_12_49-11-default is &gt;=2-5.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009141891" version="1" comment="kernel-default is &lt;3.12.49-11.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711402" version="1" comment="kgraft-patch-3_12_32-33-default is &gt;=4-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711404" version="1" comment="kgraft-patch-3_12_36-38-default is &gt;=4-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711406" version="1" comment="kgraft-patch-3_12_38-44-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711408" version="1" comment="kgraft-patch-3_12_39-47-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711410" version="1" comment="kgraft-patch-3_12_43-52_6-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711412" version="1" comment="kgraft-patch-3_12_44-52_10-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711414" version="1" comment="kgraft-patch-3_12_44-52_18-default is &gt;=2-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009114432" version="1" comment="kernel-default is &lt;3.12.44-52.18.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009045676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009121536" version="1" comment="kernel-default is &lt;3.12.51-60.25.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711416" version="1" comment="kgraft-patch-3_12_51-52_31-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711418" version="1" comment="kgraft-patch-3_12_51-60_20-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009118983" version="1" comment="kernel-default is &lt;3.12.51-60.20.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009046552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711420" version="1" comment="kgraft-patch-3_12_49-11-default is &gt;=3-8.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711422" version="1" comment="kgraft-patch-3_12_51-60_20-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711424" version="1" comment="kgraft-patch-3_12_51-60_25-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711426" version="1" comment="kgraft-patch-3_12_39-47-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711428" version="1" comment="kgraft-patch-3_12_43-52_6-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038757"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711430" version="1" comment="kgraft-patch-3_12_44-52_10-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711432" version="1" comment="kgraft-patch-3_12_44-52_18-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711434" version="1" comment="kgraft-patch-3_12_48-52_27-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711436" version="1" comment="kgraft-patch-3_12_49-11-default is &gt;=4-11.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711438" version="1" comment="kgraft-patch-3_12_51-52_31-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711440" version="1" comment="kgraft-patch-3_12_51-52_34-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711442" version="1" comment="kgraft-patch-3_12_51-52_39-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039793"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711444" version="1" comment="kgraft-patch-3_12_51-60_20-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711446" version="1" comment="kgraft-patch-3_12_51-60_25-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711448" version="1" comment="kgraft-patch-3_12_53-60_30-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009123221" version="1" comment="kernel-default is &lt;3.12.53-60.30.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711450" version="1" comment="kgraft-patch-3_12_51-52_34-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711452" version="1" comment="kernel-default is ==4.4.21-69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711453" version="1" comment="kgraft-patch-4_4_21-69-default is &gt;=3-8.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711454" version="1" comment="kernel-default is ==4.4.21-81.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711455" version="1" comment="kgraft-patch-4_4_21-81-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711456" version="1" comment="kernel-default is ==4.4.21-84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169775"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711457" version="1" comment="kgraft-patch-4_4_21-84-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711458" version="1" comment="kernel-default is ==4.4.21-90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711459" version="1" comment="kgraft-patch-4_4_21-90-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711460" version="1" comment="kernel-default is ==4.4.38-93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711461" version="1" comment="kgraft-patch-4_4_38-93-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009147227" version="1" comment="kernel-default is &lt;4.4.38-93.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009050993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009125799" version="1" comment="kernel-default is &lt;3.12.57-60.35.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711462" version="1" comment="kgraft-patch-3_12_49-11-default is &gt;=6-17.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711464" version="1" comment="kgraft-patch-3_12_51-60_20-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711466" version="1" comment="kgraft-patch-3_12_51-60_25-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711468" version="1" comment="kgraft-patch-3_12_53-60_30-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711470" version="1" comment="kgraft-patch-3_12_57-60_35-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711472" version="1" comment="kgraft-patch-3_12_59-60_41-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009129344" version="1" comment="kernel-default is &lt;3.12.59-60.41.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711474" version="1" comment="kgraft-patch-3_12_49-11-default is &gt;=7-20.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169779"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711476" version="1" comment="kgraft-patch-3_12_51-60_20-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711478" version="1" comment="kgraft-patch-3_12_51-60_25-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711480" version="1" comment="kgraft-patch-3_12_53-60_30-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711482" version="1" comment="kgraft-patch-3_12_57-60_35-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711484" version="1" comment="kgraft-patch-3_12_59-60_41-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711486" version="1" comment="kgraft-patch-3_12_59-60_45-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711488" version="1" comment="kernel-default is ==3.12.62-60.62.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711489" version="1" comment="kgraft-patch-3_12_62-60_62-default is &gt;=3-5.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131004" version="1" comment="kernel-default is &lt;3.12.62-60.62.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711491" version="1" comment="kgraft-patch-3_12_59-60_45-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711493" version="1" comment="kgraft-patch-3_12_62-60_62-default is &gt;=2-9.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711495" version="1" comment="kernel-default is ==3.12.62-60.64.8.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711496" version="1" comment="kgraft-patch-3_12_62-60_64_8-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009131270" version="1" comment="kernel-default is &lt;3.12.62-60.64.8.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009047945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711498" version="1" comment="kgraft-patch-3_12_49-11-default is &gt;=8-23.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711500" version="1" comment="kgraft-patch-3_12_51-60_20-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711502" version="1" comment="kgraft-patch-3_12_51-60_25-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711504" version="1" comment="kgraft-patch-3_12_53-60_30-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711506" version="1" comment="kgraft-patch-3_12_57-60_35-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711508" version="1" comment="kgraft-patch-3_12_51-60_25-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711510" version="1" comment="kgraft-patch-3_12_53-60_30-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711512" version="1" comment="kgraft-patch-3_12_57-60_35-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711514" version="1" comment="kgraft-patch-3_12_59-60_41-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711516" version="1" comment="kgraft-patch-3_12_59-60_45-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711518" version="1" comment="kgraft-patch-3_12_62-60_62-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711520" version="1" comment="kgraft-patch-3_12_62-60_64_8-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711522" version="1" comment="kernel-default is ==3.12.67-60.64.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169786"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711523" version="1" comment="kgraft-patch-3_12_67-60_64_18-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715596" version="1" comment="kernel-default is &lt;4.4.21-81.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711525" version="1" comment="kgraft-patch-3_12_59-60_41-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711527" version="1" comment="kgraft-patch-3_12_59-60_45-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711529" version="1" comment="kgraft-patch-3_12_62-60_62-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711531" version="1" comment="kgraft-patch-3_12_62-60_64_8-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711533" version="1" comment="kgraft-patch-3_12_67-60_64_18-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711535" version="1" comment="kgraft-patch-4_4_21-69-default is &gt;=2-5.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711536" version="1" comment="kgraft-patch-4_4_21-81-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711537" version="1" comment="kernel-default is ==3.12.67-60.64.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169787"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711538" version="1" comment="kgraft-patch-3_12_67-60_64_21-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009136647" version="1" comment="kernel-default is &lt;4.4.21-84.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009048707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711540" version="1" comment="kernel-default is ==4.4.103-6.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169788"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711541" version="1" comment="kgraft-patch-4_4_103-6_33-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711542" version="1" comment="kernel-default is ==4.4.103-6.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169790"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711543" version="1" comment="kgraft-patch-4_4_103-6_38-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711544" version="1" comment="kernel-default is ==4.4.82-6.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169791"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711545" version="1" comment="kgraft-patch-4_4_82-6_3-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711546" version="1" comment="kernel-default is ==4.4.82-6.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169793"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711547" version="1" comment="kgraft-patch-4_4_82-6_6-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711548" version="1" comment="kernel-default is ==4.4.82-6.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169795"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711549" version="1" comment="kgraft-patch-4_4_82-6_9-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711550" version="1" comment="kernel-default is ==4.4.92-6.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169796"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711551" version="1" comment="kgraft-patch-4_4_92-6_18-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711552" version="1" comment="kernel-default is ==4.4.92-6.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711553" version="1" comment="kgraft-patch-4_4_92-6_30-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167761" version="1" comment="kernel-default is &lt;4.4.92-6.30.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711554" version="1" comment="kgraft-patch-4_4_21-69-default is &gt;=9-18.10.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711555" version="1" comment="kgraft-patch-4_4_21-81-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711556" version="1" comment="kgraft-patch-4_4_21-84-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711557" version="1" comment="kgraft-patch-4_4_21-90-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711558" version="1" comment="kgraft-patch-4_4_38-93-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711559" version="1" comment="kernel-default is ==4.4.49-92.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169801"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711560" version="1" comment="kgraft-patch-4_4_49-92_11-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711561" version="1" comment="kernel-default is ==4.4.49-92.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169802"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711562" version="1" comment="kgraft-patch-4_4_49-92_14-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711563" version="1" comment="kernel-default is ==4.4.59-92.17.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169803"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711564" version="1" comment="kgraft-patch-4_4_59-92_17-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711565" version="1" comment="kernel-default is ==4.4.59-92.20.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169804"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711566" version="1" comment="kgraft-patch-4_4_59-92_20-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711567" version="1" comment="kernel-default is ==4.4.59-92.24.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169805"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711568" version="1" comment="kgraft-patch-4_4_59-92_24-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711569" version="1" comment="kernel-default is ==4.4.74-92.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711570" version="1" comment="kgraft-patch-4_4_74-92_29-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711571" version="1" comment="kernel-default is ==4.4.74-92.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711572" version="1" comment="kgraft-patch-4_4_74-92_32-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711573" version="1" comment="kernel-default is ==4.4.74-92.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711574" version="1" comment="kgraft-patch-4_4_74-92_35-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711575" version="1" comment="kernel-default is ==4.4.74-92.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711576" version="1" comment="kgraft-patch-4_4_74-92_38-default is &gt;=2-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009164286" version="1" comment="kernel-default is &lt;4.4.74-92.38.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711577" version="1" comment="kgraft-patch-4_4_21-69-default is &gt;=10-18.13.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711578" version="1" comment="kgraft-patch-4_4_21-81-default is &gt;=10-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711579" version="1" comment="kgraft-patch-4_4_21-84-default is &gt;=9-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711580" version="1" comment="kgraft-patch-4_4_21-90-default is &gt;=9-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711581" version="1" comment="kgraft-patch-4_4_38-93-default is &gt;=9-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711582" version="1" comment="kgraft-patch-4_4_49-92_11-default is &gt;=7-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711583" version="1" comment="kgraft-patch-4_4_49-92_14-default is &gt;=6-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711584" version="1" comment="kgraft-patch-4_4_59-92_17-default is &gt;=5-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711585" version="1" comment="kgraft-patch-4_4_59-92_20-default is &gt;=5-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711586" version="1" comment="kgraft-patch-4_4_59-92_24-default is &gt;=4-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711587" version="1" comment="kgraft-patch-4_4_74-92_29-default is &gt;=4-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711588" version="1" comment="kgraft-patch-4_4_74-92_32-default is &gt;=3-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711589" version="1" comment="kgraft-patch-4_4_74-92_35-default is &gt;=3-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161762" version="1" comment="kernel-default is &lt;4.4.74-92.35.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711590" version="1" comment="kgraft-patch-4_4_82-6_3-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162427" version="1" comment="kernel-default is &lt;4.4.82-6.3.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711591" version="1" comment="kgraft-patch-4_4_21-69-default is &gt;=7-21.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711592" version="1" comment="kgraft-patch-4_4_21-81-default is &gt;=7-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711593" version="1" comment="kgraft-patch-4_4_21-84-default is &gt;=6-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711594" version="1" comment="kgraft-patch-4_4_21-90-default is &gt;=6-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711595" version="1" comment="kgraft-patch-4_4_38-93-default is &gt;=6-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169820"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711596" version="1" comment="kgraft-patch-4_4_49-92_11-default is &gt;=4-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711597" version="1" comment="kgraft-patch-4_4_49-92_14-default is &gt;=3-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711598" version="1" comment="kgraft-patch-4_4_59-92_17-default is &gt;=2-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711599" version="1" comment="kgraft-patch-4_4_59-92_20-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009156965" version="1" comment="kernel-default is &lt;4.4.59-92.20.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711600" version="1" comment="kgraft-patch-4_4_59-92_17-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711601" version="1" comment="kgraft-patch-4_4_59-92_20-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711602" version="1" comment="kgraft-patch-4_4_59-92_24-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711603" version="1" comment="kgraft-patch-4_4_74-92_29-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711604" version="1" comment="kgraft-patch-4_4_74-92_32-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711605" version="1" comment="kgraft-patch-4_4_74-92_35-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711606" version="1" comment="kgraft-patch-4_4_74-92_38-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711607" version="1" comment="kernel-default is ==4.4.90-92.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711608" version="1" comment="kgraft-patch-4_4_90-92_45-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166113" version="1" comment="kernel-default is &lt;4.4.90-92.45.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711609" version="1" comment="kgraft-patch-4_4_82-6_3-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711610" version="1" comment="kgraft-patch-4_4_82-6_6-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711611" version="1" comment="kgraft-patch-4_4_82-6_9-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711612" version="1" comment="kgraft-patch-4_4_92-6_18-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166003" version="1" comment="kernel-default is &lt;4.4.92-6.18.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711613" version="1" comment="kernel-default is ==4.12.14-95.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711614" version="1" comment="kgraft-patch-4_12_14-95_40-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711615" version="1" comment="kernel-default is &lt;4.12.14-95.40.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711616" version="1" comment="kernel-default is ==4.12.14-120.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711617" version="1" comment="kgraft-patch-4_12_14-120-default is &gt;=8-21.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711618" version="1" comment="kernel-default is ==4.12.14-122.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711619" version="1" comment="kgraft-patch-4_12_14-122_7-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711620" version="1" comment="kernel-default is &lt;4.12.14-122.7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711621" version="1" comment="kernel-default is ==4.12.14-150.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711622" version="1" comment="kernel-livepatch-4_12_14-150_41-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711623" version="1" comment="kernel-default is &lt;4.12.14-150.41.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711624" version="1" comment="kernel-default is ==4.12.14-197.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711625" version="1" comment="kernel-livepatch-4_12_14-197_26-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711626" version="1" comment="kernel-default is &lt;4.12.14-197.26.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711627" version="1" comment="kgraft-patch-4_4_21-84-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711628" version="1" comment="kgraft-patch-4_4_21-90-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711629" version="1" comment="kgraft-patch-4_4_38-93-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711630" version="1" comment="kgraft-patch-4_4_49-92_11-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711631" version="1" comment="kgraft-patch-4_4_49-92_14-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157580" version="1" comment="kernel-default is &lt;4.4.59-92.24.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711632" version="1" comment="kgraft-patch-4_4_82-6_3-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711633" version="1" comment="kgraft-patch-4_4_82-6_6-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711634" version="1" comment="kgraft-patch-4_4_82-6_9-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711635" version="1" comment="kernel-default is &lt;4.4.82-6.9.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711636" version="1" comment="kgraft-patch-4_4_21-84-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711637" version="1" comment="kgraft-patch-4_4_21-90-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711638" version="1" comment="kgraft-patch-4_4_38-93-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711639" version="1" comment="kgraft-patch-4_4_49-92_11-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711640" version="1" comment="kgraft-patch-4_4_49-92_14-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711641" version="1" comment="kgraft-patch-4_4_59-92_17-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711642" version="1" comment="kgraft-patch-4_4_59-92_20-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711643" version="1" comment="kgraft-patch-4_4_59-92_24-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711644" version="1" comment="kgraft-patch-4_4_74-92_29-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711645" version="1" comment="kgraft-patch-4_4_74-92_32-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711646" version="1" comment="kgraft-patch-4_4_74-92_35-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711647" version="1" comment="kgraft-patch-4_4_74-92_38-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711648" version="1" comment="kgraft-patch-4_4_82-6_3-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711649" version="1" comment="kgraft-patch-4_4_82-6_6-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711650" version="1" comment="kgraft-patch-4_4_82-6_9-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711651" version="1" comment="kgraft-patch-4_4_103-6_33-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711652" version="1" comment="kgraft-patch-4_4_103-6_38-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711653" version="1" comment="kernel-default is ==4.4.114-94.11.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711654" version="1" comment="kgraft-patch-4_4_114-94_11-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711655" version="1" comment="kernel-default is ==4.4.114-94.14.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711656" version="1" comment="kgraft-patch-4_4_114-94_14-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711657" version="1" comment="kgraft-patch-4_4_82-6_3-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711658" version="1" comment="kgraft-patch-4_4_82-6_6-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711659" version="1" comment="kgraft-patch-4_4_82-6_9-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711660" version="1" comment="kgraft-patch-4_4_92-6_18-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711661" version="1" comment="kgraft-patch-4_4_92-6_30-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009140695" version="1" comment="kernel-default is &lt;4.4.21-69.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009049850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711662" version="1" comment="kgraft-patch-4_4_49-92_11-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711663" version="1" comment="kgraft-patch-4_4_49-92_14-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711664" version="1" comment="kgraft-patch-4_4_59-92_17-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711665" version="1" comment="kgraft-patch-4_4_59-92_20-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711666" version="1" comment="kgraft-patch-4_4_59-92_24-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711667" version="1" comment="kgraft-patch-4_4_74-92_29-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711668" version="1" comment="kgraft-patch-4_4_74-92_32-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711669" version="1" comment="kgraft-patch-4_4_74-92_35-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711670" version="1" comment="kgraft-patch-4_4_74-92_38-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711671" version="1" comment="kgraft-patch-4_4_90-92_45-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711672" version="1" comment="kgraft-patch-4_4_82-6_3-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711673" version="1" comment="kgraft-patch-4_4_82-6_6-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711674" version="1" comment="kgraft-patch-4_4_82-6_9-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711675" version="1" comment="kgraft-patch-4_4_92-6_18-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711676" version="1" comment="kernel-default is ==4.4.103-92.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711677" version="1" comment="kgraft-patch-4_4_103-92_53-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711678" version="1" comment="kernel-default is ==4.4.103-92.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711679" version="1" comment="kgraft-patch-4_4_103-92_56-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711680" version="1" comment="kernel-default is ==4.4.90-92.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711681" version="1" comment="kgraft-patch-4_4_90-92_50-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167754" version="1" comment="kernel-default is &lt;4.4.90-92.50.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009053337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711682" version="1" comment="kgraft-patch-4_4_103-6_33-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711683" version="1" comment="kgraft-patch-4_4_103-6_38-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711684" version="1" comment="kgraft-patch-4_4_92-6_30-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711685" version="1" comment="kgraft-patch-4_4_103-92_53-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711686" version="1" comment="kgraft-patch-4_4_103-92_56-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042105"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711687" version="1" comment="kgraft-patch-4_4_49-92_11-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711688" version="1" comment="kgraft-patch-4_4_49-92_14-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711689" version="1" comment="kgraft-patch-4_4_59-92_17-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711690" version="1" comment="kgraft-patch-4_4_59-92_20-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711691" version="1" comment="kgraft-patch-4_4_59-92_24-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711692" version="1" comment="kgraft-patch-4_4_74-92_29-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711693" version="1" comment="kgraft-patch-4_4_74-92_32-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711694" version="1" comment="kgraft-patch-4_4_74-92_35-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711695" version="1" comment="kgraft-patch-4_4_74-92_38-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711696" version="1" comment="kgraft-patch-4_4_90-92_45-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711697" version="1" comment="kgraft-patch-4_4_90-92_50-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711698" version="1" comment="kgraft-patch-4_4_103-6_33-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711699" version="1" comment="kgraft-patch-4_4_103-6_38-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711700" version="1" comment="kgraft-patch-4_4_82-6_3-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711701" version="1" comment="kgraft-patch-4_4_82-6_6-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711702" version="1" comment="kgraft-patch-4_4_82-6_9-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711703" version="1" comment="kgraft-patch-4_4_92-6_18-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711704" version="1" comment="kgraft-patch-4_4_92-6_30-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711705" version="1" comment="kgraft-patch-4_4_103-6_33-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711706" version="1" comment="kgraft-patch-4_4_103-6_38-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711707" version="1" comment="kgraft-patch-4_4_114-94_11-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711708" version="1" comment="kgraft-patch-4_4_114-94_14-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711709" version="1" comment="kgraft-patch-4_4_92-6_18-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711710" version="1" comment="kgraft-patch-4_4_92-6_30-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714892" version="1" comment="kernel-default is ==4.12.14-23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711711" version="1" comment="kernel-livepatch-4_12_14-23-default is &gt;=2-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711712" version="1" comment="kernel-default is ==4.12.14-25.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711713" version="1" comment="kernel-livepatch-4_12_14-25_3-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714893" version="1" comment="kernel-default is &lt;4.12.14-25.3.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711714" version="1" comment="kgraft-patch-4_4_21-69-default is &gt;=8-18.7.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711715" version="1" comment="kgraft-patch-4_4_21-81-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711716" version="1" comment="kgraft-patch-4_4_21-84-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711717" version="1" comment="kgraft-patch-4_4_21-90-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711718" version="1" comment="kgraft-patch-4_4_38-93-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711719" version="1" comment="kgraft-patch-4_4_49-92_11-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009149009" version="1" comment="kernel-default is &lt;4.4.49-92.11.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711720" version="1" comment="kgraft-patch-3_12_57-60_35-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711722" version="1" comment="kgraft-patch-3_12_59-60_41-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711724" version="1" comment="kgraft-patch-3_12_59-60_45-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711726" version="1" comment="kgraft-patch-3_12_62-60_62-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711728" version="1" comment="kgraft-patch-3_12_62-60_64_8-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711730" version="1" comment="kgraft-patch-3_12_67-60_64_18-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711732" version="1" comment="kgraft-patch-3_12_67-60_64_21-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711734" version="1" comment="kernel-default is ==3.12.67-60.64.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711735" version="1" comment="kgraft-patch-3_12_67-60_64_24-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711737" version="1" comment="kernel-default is ==3.12.69-60.64.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169844"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711738" version="1" comment="kgraft-patch-3_12_69-60_64_29-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711740" version="1" comment="kgraft-patch-4_4_21-69-default is &gt;=4-11.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169845"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711741" version="1" comment="kgraft-patch-4_4_21-81-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711742" version="1" comment="kgraft-patch-4_4_21-84-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711743" version="1" comment="kgraft-patch-4_4_21-90-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711744" version="1" comment="kgraft-patch-4_4_38-93-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711745" version="1" comment="kgraft-patch-3_12_57-60_35-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711747" version="1" comment="kgraft-patch-3_12_59-60_41-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711749" version="1" comment="kgraft-patch-3_12_59-60_45-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711751" version="1" comment="kgraft-patch-3_12_62-60_62-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711753" version="1" comment="kgraft-patch-3_12_62-60_64_8-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711755" version="1" comment="kgraft-patch-3_12_67-60_64_18-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711757" version="1" comment="kgraft-patch-3_12_67-60_64_21-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711759" version="1" comment="kgraft-patch-3_12_67-60_64_24-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711761" version="1" comment="kgraft-patch-3_12_69-60_64_29-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711763" version="1" comment="kernel-default is ==3.12.69-60.64.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711764" version="1" comment="kgraft-patch-3_12_69-60_64_32-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711766" version="1" comment="kgraft-patch-4_4_21-69-default is &gt;=5-14.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711767" version="1" comment="kgraft-patch-4_4_21-81-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711768" version="1" comment="kgraft-patch-4_4_21-84-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711769" version="1" comment="kgraft-patch-4_4_21-90-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711770" version="1" comment="kgraft-patch-4_4_38-93-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711771" version="1" comment="kgraft-patch-4_4_49-92_11-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711772" version="1" comment="kgraft-patch-3_12_59-60_41-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711774" version="1" comment="kgraft-patch-3_12_59-60_45-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711776" version="1" comment="kgraft-patch-3_12_62-60_62-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711778" version="1" comment="kgraft-patch-3_12_62-60_64_8-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711780" version="1" comment="kgraft-patch-3_12_67-60_64_18-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711782" version="1" comment="kgraft-patch-3_12_67-60_64_21-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711784" version="1" comment="kgraft-patch-3_12_67-60_64_24-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711786" version="1" comment="kgraft-patch-3_12_69-60_64_29-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711788" version="1" comment="kgraft-patch-3_12_69-60_64_32-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711790" version="1" comment="kernel-default is ==3.12.69-60.64.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169847"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711791" version="1" comment="kgraft-patch-3_12_69-60_64_35-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711793" version="1" comment="kgraft-patch-4_4_21-69-default is &gt;=6-17.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711794" version="1" comment="kgraft-patch-4_4_21-81-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711795" version="1" comment="kgraft-patch-4_4_21-84-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040921"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711796" version="1" comment="kgraft-patch-4_4_21-90-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711797" version="1" comment="kgraft-patch-4_4_38-93-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711798" version="1" comment="kgraft-patch-4_4_49-92_11-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041484"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711799" version="1" comment="kgraft-patch-4_4_49-92_14-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009150055" version="1" comment="kernel-default is &lt;4.4.49-92.14.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711800" version="1" comment="kgraft-patch-4_4_49-92_14-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041522"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711801" version="1" comment="kgraft-patch-4_4_59-92_17-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711802" version="1" comment="kgraft-patch-4_4_59-92_20-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711803" version="1" comment="kgraft-patch-4_4_59-92_24-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711804" version="1" comment="kgraft-patch-4_4_74-92_29-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009158776" version="1" comment="kernel-default is &lt;4.4.74-92.29.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711805" version="1" comment="kernel-default is ==4.4.73-5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169848"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711806" version="1" comment="kgraft-patch-4_4_73-5-default is &gt;=2-2.3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169849"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009159035" version="1" comment="kernel-default is &lt;4.4.73-5.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009052125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711807" version="1" comment="kgraft-patch-4_4_103-6_33-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711808" version="1" comment="kgraft-patch-4_4_103-6_38-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711809" version="1" comment="kgraft-patch-4_4_82-6_3-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711810" version="1" comment="kgraft-patch-4_4_82-6_6-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711811" version="1" comment="kgraft-patch-4_4_82-6_9-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711812" version="1" comment="kgraft-patch-4_4_92-6_18-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711813" version="1" comment="kgraft-patch-4_4_92-6_30-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711814" version="1" comment="kgraft-patch-4_4_103-6_33-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711815" version="1" comment="kgraft-patch-4_4_103-6_38-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711816" version="1" comment="kgraft-patch-4_4_114-94_11-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711817" version="1" comment="kgraft-patch-4_4_114-94_14-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711818" version="1" comment="kgraft-patch-4_4_82-6_6-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711819" version="1" comment="kgraft-patch-4_4_82-6_9-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711820" version="1" comment="kgraft-patch-4_4_92-6_18-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711821" version="1" comment="kgraft-patch-4_4_92-6_30-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711822" version="1" comment="kgraft-patch-4_4_114-94_11-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711823" version="1" comment="kgraft-patch-4_4_114-94_14-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711824" version="1" comment="kernel-default is ==4.4.120-94.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169851"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711825" version="1" comment="kgraft-patch-4_4_120-94_17-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711826" version="1" comment="kernel-default is ==4.4.126-94.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711827" version="1" comment="kgraft-patch-4_4_126-94_22-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711828" version="1" comment="kernel-default is ==4.12.14-95.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711829" version="1" comment="kgraft-patch-4_12_14-95_19-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711830" version="1" comment="kernel-default is ==4.12.14-95.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711831" version="1" comment="kgraft-patch-4_12_14-95_24-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711832" version="1" comment="kernel-default is ==4.12.14-95.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711833" version="1" comment="kgraft-patch-4_12_14-95_29-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711834" version="1" comment="kernel-default is ==4.12.14-95.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711835" version="1" comment="kgraft-patch-4_12_14-95_32-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711836" version="1" comment="kernel-default is ==4.12.14-95.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711837" version="1" comment="kgraft-patch-4_12_14-95_37-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711838" version="1" comment="kgraft-patch-4_12_14-95_40-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711839" version="1" comment="kernel-default is ==4.12.14-95.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711840" version="1" comment="kgraft-patch-4_12_14-95_45-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711841" version="1" comment="kernel-default is ==4.12.14-95.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711842" version="1" comment="kgraft-patch-4_12_14-95_48-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711843" version="1" comment="kernel-default is ==4.12.14-95.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711844" version="1" comment="kgraft-patch-4_12_14-95_51-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711845" version="1" comment="kernel-default is &lt;4.12.14-95.51.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711846" version="1" comment="kgraft-patch-4_12_14-120-default is &gt;=5-12.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711847" version="1" comment="kernel-default is ==4.12.14-122.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711848" version="1" comment="kgraft-patch-4_12_14-122_12-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711849" version="1" comment="kernel-default is ==4.12.14-122.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711850" version="1" comment="kgraft-patch-4_12_14-122_17-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711851" version="1" comment="kernel-default is ==4.12.14-122.20.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711852" version="1" comment="kgraft-patch-4_12_14-122_20-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711853" version="1" comment="kgraft-patch-4_12_14-122_7-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711854" version="1" comment="kernel-default is ==4.12.14-150.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711855" version="1" comment="kernel-livepatch-4_12_14-150_22-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711856" version="1" comment="kernel-default is ==4.12.14-150.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169867"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711857" version="1" comment="kernel-livepatch-4_12_14-150_27-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711858" version="1" comment="kernel-default is ==4.12.14-150.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711859" version="1" comment="kernel-livepatch-4_12_14-150_32-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711860" version="1" comment="kernel-default is ==4.12.14-150.35.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711861" version="1" comment="kernel-livepatch-4_12_14-150_35-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711862" version="1" comment="kernel-default is ==4.12.14-150.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711863" version="1" comment="kernel-livepatch-4_12_14-150_38-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711864" version="1" comment="kernel-livepatch-4_12_14-150_41-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711865" version="1" comment="kernel-default is ==4.12.14-150.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169871"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711866" version="1" comment="kernel-livepatch-4_12_14-150_47-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711867" version="1" comment="kernel-default is &lt;4.12.14-150.47.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169872"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714895" version="1" comment="kernel-default is ==4.12.14-195.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711868" version="1" comment="kernel-livepatch-4_12_14-195-default is &gt;=12-34.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169873"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711869" version="1" comment="kernel-default is ==4.12.14-197.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169874"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711870" version="1" comment="kernel-livepatch-4_12_14-197_10-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711871" version="1" comment="kernel-default is ==4.12.14-197.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169875"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711872" version="1" comment="kernel-livepatch-4_12_14-197_15-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711873" version="1" comment="kernel-default is ==4.12.14-197.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169876"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711874" version="1" comment="kernel-livepatch-4_12_14-197_18-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711875" version="1" comment="kernel-default is ==4.12.14-197.21.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169877"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711876" version="1" comment="kernel-livepatch-4_12_14-197_21-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711877" version="1" comment="kernel-livepatch-4_12_14-197_26-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711878" version="1" comment="kernel-default is ==4.12.14-197.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711879" version="1" comment="kernel-livepatch-4_12_14-197_29-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711880" version="1" comment="kernel-default is ==4.12.14-197.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169879"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711881" version="1" comment="kernel-livepatch-4_12_14-197_34-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711882" version="1" comment="kernel-default is ==4.12.14-197.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169880"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711883" version="1" comment="kernel-livepatch-4_12_14-197_37-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711884" version="1" comment="kernel-default is ==4.12.14-197.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711885" version="1" comment="kernel-livepatch-4_12_14-197_4-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711886" version="1" comment="kernel-default is ==4.12.14-197.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711887" version="1" comment="kernel-livepatch-4_12_14-197_40-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711888" version="1" comment="kernel-default is ==4.12.14-197.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711889" version="1" comment="kernel-livepatch-4_12_14-197_7-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712211" version="1" comment="kernel-default is &lt;4.12.14-197.7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711890" version="1" comment="kgraft-patch-4_4_114-94_11-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711891" version="1" comment="kgraft-patch-4_4_114-94_14-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711892" version="1" comment="kgraft-patch-4_4_120-94_17-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711893" version="1" comment="kgraft-patch-4_4_126-94_22-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711894" version="1" comment="kernel-default is ==4.4.131-94.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711895" version="1" comment="kgraft-patch-4_4_131-94_29-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711896" version="1" comment="kernel-default is ==4.4.132-94.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169885"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711897" version="1" comment="kgraft-patch-4_4_132-94_33-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711898" version="1" comment="kernel-default is ==4.12.14-25.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169886"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711899" version="1" comment="kernel-livepatch-4_12_14-25_13-default is &gt;=3-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711900" version="1" comment="kernel-default is ==4.12.14-25.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169887"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711901" version="1" comment="kernel-livepatch-4_12_14-25_6-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712098" version="1" comment="kernel-default is &lt;4.12.14-25.6.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711902" version="1" comment="kgraft-patch-4_4_120-94_17-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711903" version="1" comment="kgraft-patch-4_4_120-94_17-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711904" version="1" comment="kgraft-patch-4_4_126-94_22-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711905" version="1" comment="kgraft-patch-4_4_131-94_29-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711906" version="1" comment="kgraft-patch-4_4_132-94_33-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711907" version="1" comment="kernel-default is ==4.4.138-94.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169888"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711908" version="1" comment="kgraft-patch-4_4_138-94_39-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711909" version="1" comment="kernel-default is ==4.4.140-94.42.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711910" version="1" comment="kgraft-patch-4_4_140-94_42-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711911" version="1" comment="kernel-default is ==4.4.143-94.47.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711912" version="1" comment="kgraft-patch-4_4_143-94_47-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711913" version="1" comment="kernel-livepatch-4_12_14-23-default is &gt;=4-10.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711914" version="1" comment="kernel-livepatch-4_12_14-25_3-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711915" version="1" comment="kernel-default is ==4.12.14-25.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711916" version="1" comment="kernel-livepatch-4_12_14-25_16-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711917" version="1" comment="kernel-livepatch-4_12_14-25_6-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711918" version="1" comment="kernel-livepatch-4_12_14-23-default is &gt;=9-25.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711919" version="1" comment="kernel-livepatch-4_12_14-25_3-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009480339" version="1" comment="kernel-default is &lt;4.12.14-23.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711920" version="1" comment="kgraft-patch-4_4_103-6_33-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711921" version="1" comment="kgraft-patch-4_4_103-6_38-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711922" version="1" comment="kgraft-patch-4_4_114-94_11-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711923" version="1" comment="kgraft-patch-4_4_114-94_14-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711924" version="1" comment="kgraft-patch-4_4_120-94_17-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711925" version="1" comment="kgraft-patch-4_4_126-94_22-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711926" version="1" comment="kgraft-patch-4_4_131-94_29-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711927" version="1" comment="kgraft-patch-4_4_132-94_33-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711928" version="1" comment="kgraft-patch-4_4_138-94_39-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711929" version="1" comment="kgraft-patch-4_4_140-94_42-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711930" version="1" comment="kgraft-patch-4_4_143-94_47-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711931" version="1" comment="kernel-default is ==4.4.155-94.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711932" version="1" comment="kgraft-patch-4_4_155-94_50-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711933" version="1" comment="kernel-default is ==4.4.156-94.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711934" version="1" comment="kgraft-patch-4_4_156-94_57-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711935" version="1" comment="kernel-default is ==4.4.156-94.61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711936" version="1" comment="kgraft-patch-4_4_156-94_61-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711937" version="1" comment="kernel-default is ==4.4.156-94.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711938" version="1" comment="kgraft-patch-4_4_156-94_64-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711939" version="1" comment="kgraft-patch-4_4_92-6_18-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711940" version="1" comment="kgraft-patch-4_4_92-6_30-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711941" version="1" comment="kernel-livepatch-4_12_14-23-default is &gt;=5-13.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711942" version="1" comment="kernel-livepatch-4_12_14-25_13-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711943" version="1" comment="kernel-livepatch-4_12_14-25_16-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711944" version="1" comment="kernel-default is ==4.12.14-25.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711945" version="1" comment="kernel-livepatch-4_12_14-25_19-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711946" version="1" comment="kernel-livepatch-4_12_14-25_3-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711947" version="1" comment="kernel-livepatch-4_12_14-25_6-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711948" version="1" comment="kgraft-patch-4_4_132-94_33-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711949" version="1" comment="kgraft-patch-4_4_138-94_39-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711950" version="1" comment="kgraft-patch-4_4_140-94_42-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711951" version="1" comment="kernel-default is &lt;4.4.140-94.42.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711952" version="1" comment="kernel-livepatch-4_12_14-23-default is &gt;=10-28.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711953" version="1" comment="kernel-livepatch-4_12_14-25_3-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711954" version="1" comment="kernel-livepatch-4_12_14-23-default is &gt;=3-7.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711955" version="1" comment="kernel-livepatch-4_12_14-25_3-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041340" version="1" comment="xkbcomp is &lt;1.4.7-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034109" version="1" comment="xkbcomp is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041341" version="1" comment="xkbcomp-devel is &lt;1.4.7-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034110" version="1" comment="xkbcomp-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711956" version="1" comment="kernel-default is ==4.12.14-94.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711957" version="1" comment="kgraft-patch-4_12_14-94_41-default is &gt;=9-2.25.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711958" version="1" comment="kernel-default is ==4.12.14-95.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711959" version="1" comment="kgraft-patch-4_12_14-95_3-default is &gt;=8-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711960" version="1" comment="kernel-default is ==4.12.14-95.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711961" version="1" comment="kgraft-patch-4_12_14-95_6-default is &gt;=7-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711962" version="1" comment="kernel-default is &lt;4.12.14-95.6.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711963" version="1" comment="kernel-default is ==4.12.14-25.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711964" version="1" comment="kernel-livepatch-4_12_14-25_28-default is &gt;=7-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711965" version="1" comment="kernel-default is &lt;4.12.14-25.28.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711966" version="1" comment="kgraft-patch-4_4_114-94_11-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711967" version="1" comment="kgraft-patch-4_4_114-94_14-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711968" version="1" comment="kgraft-patch-4_4_120-94_17-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711969" version="1" comment="kgraft-patch-4_4_126-94_22-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711970" version="1" comment="kgraft-patch-4_4_131-94_29-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711971" version="1" comment="kgraft-patch-4_4_132-94_33-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711972" version="1" comment="kgraft-patch-4_4_138-94_39-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711973" version="1" comment="kgraft-patch-4_4_140-94_42-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711974" version="1" comment="kgraft-patch-4_4_143-94_47-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711975" version="1" comment="kgraft-patch-4_4_155-94_50-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711976" version="1" comment="kgraft-patch-4_4_156-94_57-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711977" version="1" comment="kgraft-patch-4_4_156-94_61-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711978" version="1" comment="kgraft-patch-4_4_156-94_64-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711979" version="1" comment="kernel-default is ==4.4.162-94.69.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711980" version="1" comment="kgraft-patch-4_4_162-94_69-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711981" version="1" comment="kernel-default is ==4.4.162-94.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711982" version="1" comment="kgraft-patch-4_4_162-94_72-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711983" version="1" comment="kernel-default is &lt;4.4.162-94.72.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711984" version="1" comment="kgraft-patch-4_12_14-94_41-default is &gt;=3-2.7.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711985" version="1" comment="kgraft-patch-4_12_14-95_3-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711986" version="1" comment="kernel-default is &lt;4.12.14-95.3.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711987" version="1" comment="kernel-livepatch-4_12_14-23-default is &gt;=8-22.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711988" version="1" comment="kernel-livepatch-4_12_14-25_13-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711989" version="1" comment="kernel-livepatch-4_12_14-25_16-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711990" version="1" comment="kernel-livepatch-4_12_14-25_19-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711991" version="1" comment="kernel-default is ==4.12.14-25.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711992" version="1" comment="kernel-livepatch-4_12_14-25_22-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711993" version="1" comment="kernel-default is ==4.12.14-25.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711994" version="1" comment="kernel-livepatch-4_12_14-25_25-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711995" version="1" comment="kernel-livepatch-4_12_14-25_3-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711996" version="1" comment="kernel-livepatch-4_12_14-25_6-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711997" version="1" comment="kgraft-patch-4_4_103-6_33-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711998" version="1" comment="kgraft-patch-4_4_103-6_38-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009711999" version="1" comment="kgraft-patch-4_4_92-6_30-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712000" version="1" comment="kernel-livepatch-4_12_14-23-default is &gt;=6-16.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712001" version="1" comment="kernel-default is ==4.12.14-95.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712002" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712003" version="1" comment="kernel-default is ==4.12.14-95.71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712004" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698690" version="1" comment="kernel-default is ==4.12.14-95.74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166484"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712005" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698692" version="1" comment="kernel-default is ==4.12.14-95.77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166486"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712006" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698694" version="1" comment="kernel-default is ==4.12.14-95.80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166488"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712007" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698696" version="1" comment="kernel-default is ==4.12.14-95.83.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712008" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698698" version="1" comment="kernel-default is &lt;4.12.14-95.83.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166492"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712009" version="1" comment="kernel-default is ==4.12.14-150.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712010" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712011" version="1" comment="kernel-default is ==4.12.14-150.69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712012" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698720" version="1" comment="kernel-default is ==4.12.14-150.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166508"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712013" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698722" version="1" comment="kernel-default is ==4.12.14-150.75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166510"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712014" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698724" version="1" comment="kernel-default is ==4.12.14-150.78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712015" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698726" version="1" comment="kernel-default is &lt;4.12.14-150.78.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712016" version="1" comment="kernel-livepatch-4_12_14-25_6-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712017" version="1" comment="kgraft-patch-4_4_103-6_33-default is &gt;=7-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712018" version="1" comment="kgraft-patch-4_4_103-6_38-default is &gt;=7-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712019" version="1" comment="kgraft-patch-4_4_114-94_11-default is &gt;=5-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712020" version="1" comment="kgraft-patch-4_4_114-94_14-default is &gt;=5-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712021" version="1" comment="kgraft-patch-4_4_120-94_17-default is &gt;=4-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712022" version="1" comment="kgraft-patch-4_4_126-94_22-default is &gt;=4-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712023" version="1" comment="kgraft-patch-4_4_131-94_29-default is &gt;=2-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712024" version="1" comment="kgraft-patch-4_4_132-94_33-default is &gt;=2-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169931"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712025" version="1" comment="kgraft-patch-4_4_82-6_3-default is &gt;=10-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169932"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712026" version="1" comment="kgraft-patch-4_4_82-6_6-default is &gt;=9-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712027" version="1" comment="kgraft-patch-4_4_82-6_9-default is &gt;=9-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169933"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712028" version="1" comment="kgraft-patch-4_4_92-6_18-default is &gt;=8-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712029" version="1" comment="kgraft-patch-4_4_92-6_30-default is &gt;=7-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712030" version="1" comment="kgraft-patch-4_4_114-94_11-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712031" version="1" comment="kgraft-patch-4_4_114-94_14-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712032" version="1" comment="kgraft-patch-4_4_120-94_17-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712033" version="1" comment="kgraft-patch-4_4_126-94_22-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712034" version="1" comment="kgraft-patch-4_4_131-94_29-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712035" version="1" comment="kgraft-patch-4_4_132-94_33-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712036" version="1" comment="kgraft-patch-4_4_138-94_39-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712037" version="1" comment="kgraft-patch-4_4_140-94_42-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712038" version="1" comment="kernel-livepatch-4_12_14-25_3-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712039" version="1" comment="kernel-livepatch-4_12_14-25_6-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712040" version="1" comment="kgraft-patch-4_4_103-6_33-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712041" version="1" comment="kgraft-patch-4_4_103-6_38-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042107"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712042" version="1" comment="kgraft-patch-4_4_114-94_11-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042186"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712043" version="1" comment="kgraft-patch-4_4_114-94_14-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712044" version="1" comment="kgraft-patch-4_4_120-94_17-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712045" version="1" comment="kgraft-patch-4_4_126-94_22-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712046" version="1" comment="kgraft-patch-4_4_131-94_29-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712047" version="1" comment="kgraft-patch-4_4_132-94_33-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712048" version="1" comment="kernel-default is &lt;4.4.132-94.33.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169934"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712049" version="1" comment="kernel-livepatch-4_12_14-23-default is &gt;=7-19.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046680"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169935"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712050" version="1" comment="kgraft-patch-4_12_14-95_32-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712051" version="1" comment="kgraft-patch-4_12_14-95_37-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712052" version="1" comment="kgraft-patch-4_12_14-95_40-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712053" version="1" comment="kgraft-patch-4_12_14-120-default is &gt;=6-15.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169936"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009512974" version="1" comment="kernel-default is &lt;4.12.14-120.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009121033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712054" version="1" comment="kernel-livepatch-4_12_14-150_35-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712055" version="1" comment="kernel-livepatch-4_12_14-150_38-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712056" version="1" comment="kernel-livepatch-4_12_14-150_41-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712057" version="1" comment="kernel-livepatch-4_12_14-197_18-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712058" version="1" comment="kernel-livepatch-4_12_14-197_21-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712059" version="1" comment="kernel-livepatch-4_12_14-197_26-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712060" version="1" comment="kernel-default is ==4.12.14-95.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169937"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712061" version="1" comment="kgraft-patch-4_12_14-95_13-default is &gt;=6-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712062" version="1" comment="kernel-default is ==4.12.14-95.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169939"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712063" version="1" comment="kgraft-patch-4_12_14-95_16-default is &gt;=6-2.5" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169938"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712064" version="1" comment="kgraft-patch-4_12_14-95_19-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712065" version="1" comment="kgraft-patch-4_12_14-95_24-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712066" version="1" comment="kgraft-patch-4_12_14-95_29-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712067" version="1" comment="kgraft-patch-4_12_14-95_32-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712068" version="1" comment="kgraft-patch-4_12_14-95_37-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712069" version="1" comment="kgraft-patch-4_12_14-120-default is &gt;=2-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712070" version="1" comment="kernel-default is ==4.12.14-150.14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712071" version="1" comment="kernel-livepatch-4_12_14-150_14-default is &gt;=6-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712072" version="1" comment="kernel-default is ==4.12.14-150.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712073" version="1" comment="kernel-livepatch-4_12_14-150_17-default is &gt;=6-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712074" version="1" comment="kernel-livepatch-4_12_14-150_22-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712075" version="1" comment="kernel-livepatch-4_12_14-150_27-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712076" version="1" comment="kernel-livepatch-4_12_14-150_32-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712077" version="1" comment="kernel-livepatch-4_12_14-150_35-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712078" version="1" comment="kernel-livepatch-4_12_14-150_38-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712079" version="1" comment="kernel-livepatch-4_12_14-25_25-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712080" version="1" comment="kernel-livepatch-4_12_14-195-default is &gt;=8-22.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712081" version="1" comment="kernel-livepatch-4_12_14-197_10-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712082" version="1" comment="kernel-livepatch-4_12_14-197_15-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712083" version="1" comment="kernel-livepatch-4_12_14-197_18-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712084" version="1" comment="kernel-livepatch-4_12_14-197_21-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712085" version="1" comment="kernel-livepatch-4_12_14-197_4-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712086" version="1" comment="kernel-livepatch-4_12_14-197_7-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712087" version="1" comment="kgraft-patch-4_12_14-94_41-default is &gt;=5-2.13.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712088" version="1" comment="kgraft-patch-4_12_14-95_3-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712089" version="1" comment="kgraft-patch-4_12_14-95_6-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712090" version="1" comment="kernel-livepatch-4_12_14-25_13-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712091" version="1" comment="kernel-livepatch-4_12_14-25_16-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712092" version="1" comment="kernel-livepatch-4_12_14-25_19-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712093" version="1" comment="kernel-livepatch-4_12_14-25_22-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712094" version="1" comment="kernel-livepatch-4_12_14-25_25-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712095" version="1" comment="kernel-livepatch-4_12_14-25_28-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712096" version="1" comment="kernel-livepatch-4_12_14-25_3-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712097" version="1" comment="kernel-livepatch-4_12_14-25_6-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712099" version="1" comment="kgraft-patch-4_4_138-94_39-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712100" version="1" comment="kgraft-patch-4_4_140-94_42-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712101" version="1" comment="kgraft-patch-4_4_143-94_47-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712102" version="1" comment="kgraft-patch-4_4_155-94_50-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712103" version="1" comment="kgraft-patch-4_4_156-94_57-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712104" version="1" comment="kgraft-patch-4_4_156-94_61-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712105" version="1" comment="kgraft-patch-4_4_156-94_64-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712106" version="1" comment="kgraft-patch-4_4_162-94_69-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712107" version="1" comment="kgraft-patch-4_4_162-94_72-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712108" version="1" comment="kernel-default is ==4.4.175-94.79.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712109" version="1" comment="kgraft-patch-4_4_175-94_79-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712110" version="1" comment="kernel-default is ==4.4.176-94.88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712111" version="1" comment="kgraft-patch-4_4_176-94_88-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712112" version="1" comment="kernel-default is ==4.4.178-94.91.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712113" version="1" comment="kgraft-patch-4_4_178-94_91-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712114" version="1" comment="kernel-default is &lt;4.4.178-94.91.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712115" version="1" comment="kgraft-patch-4_12_14-94_41-default is &gt;=6-2.16.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712116" version="1" comment="kgraft-patch-4_12_14-95_13-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712117" version="1" comment="kgraft-patch-4_12_14-95_16-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712118" version="1" comment="kgraft-patch-4_12_14-95_3-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712119" version="1" comment="kgraft-patch-4_12_14-95_6-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712120" version="1" comment="kernel-livepatch-4_12_14-150_14-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712121" version="1" comment="kernel-livepatch-4_12_14-150_17-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712122" version="1" comment="kernel-livepatch-4_12_14-25_13-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712123" version="1" comment="kernel-livepatch-4_12_14-25_16-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712124" version="1" comment="kernel-livepatch-4_12_14-25_19-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712125" version="1" comment="kernel-livepatch-4_12_14-25_22-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712126" version="1" comment="kernel-livepatch-4_12_14-25_25-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712127" version="1" comment="kernel-livepatch-4_12_14-25_28-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712128" version="1" comment="kernel-livepatch-4_12_14-25_3-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712129" version="1" comment="kernel-livepatch-4_12_14-25_6-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712130" version="1" comment="kernel-livepatch-4_12_14-195-default is &gt;=4-10.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009481199" version="1" comment="kernel-default is &lt;4.12.14-195.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111410"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712131" version="1" comment="kgraft-patch-4_12_14-95_19-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712132" version="1" comment="kernel-livepatch-4_12_14-150_22-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712133" version="1" comment="kernel-livepatch-4_12_14-197_4-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712134" version="1" comment="kernel-livepatch-4_12_14-197_7-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712135" version="1" comment="kernel-default is ==4.4.180-94.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712136" version="1" comment="kgraft-patch-4_4_180-94_97-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712137" version="1" comment="kernel-default is &lt;4.4.180-94.97.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712138" version="1" comment="kgraft-patch-4_12_14-95_13-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712139" version="1" comment="kgraft-patch-4_12_14-95_16-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712140" version="1" comment="kernel-livepatch-4_12_14-150_14-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712141" version="1" comment="kernel-livepatch-4_12_14-150_17-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712142" version="1" comment="kernel-livepatch-4_12_14-195-default is &gt;=2-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712143" version="1" comment="kernel-livepatch-4_12_14-195-default is &gt;=3-7.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712144" version="1" comment="kernel-livepatch-4_12_14-197_4-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714896" version="1" comment="kernel-default is &lt;4.12.14-197.4.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712145" version="1" comment="kernel-livepatch-4_12_14-195-default is &gt;=5-13.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712146" version="1" comment="kernel-livepatch-4_12_14-197_4-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712147" version="1" comment="kernel-livepatch-4_12_14-197_7-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712148" version="1" comment="kgraft-patch-4_12_14-94_41-default is &gt;=7-2.19.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712149" version="1" comment="kgraft-patch-4_12_14-95_13-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712150" version="1" comment="kgraft-patch-4_12_14-95_16-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712151" version="1" comment="kgraft-patch-4_12_14-95_19-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712152" version="1" comment="kgraft-patch-4_12_14-95_24-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712153" version="1" comment="kgraft-patch-4_12_14-95_29-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712154" version="1" comment="kgraft-patch-4_12_14-95_3-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712155" version="1" comment="kgraft-patch-4_12_14-95_6-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712156" version="1" comment="kernel-livepatch-4_12_14-150_14-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712157" version="1" comment="kernel-livepatch-4_12_14-150_17-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712158" version="1" comment="kernel-livepatch-4_12_14-150_22-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712159" version="1" comment="kernel-livepatch-4_12_14-150_27-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712160" version="1" comment="kernel-livepatch-4_12_14-150_32-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712161" version="1" comment="kernel-livepatch-4_12_14-25_19-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712162" version="1" comment="kernel-livepatch-4_12_14-25_22-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712163" version="1" comment="kernel-livepatch-4_12_14-25_25-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712164" version="1" comment="kernel-livepatch-4_12_14-25_28-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712165" version="1" comment="kernel-livepatch-4_12_14-195-default is &gt;=6-16.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712166" version="1" comment="kernel-livepatch-4_12_14-197_10-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712167" version="1" comment="kernel-livepatch-4_12_14-197_15-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712168" version="1" comment="kernel-livepatch-4_12_14-197_4-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712169" version="1" comment="kernel-livepatch-4_12_14-197_7-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712170" version="1" comment="kgraft-patch-4_12_14-95_45-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712171" version="1" comment="kernel-default is &lt;4.12.14-95.45.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712172" version="1" comment="kgraft-patch-4_12_14-122_12-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712173" version="1" comment="kgraft-patch-4_12_14-122_7-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712174" version="1" comment="kernel-livepatch-4_12_14-150_47-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712175" version="1" comment="kernel-livepatch-4_12_14-197_29-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712176" version="1" comment="kernel-default is &lt;4.12.14-197.29.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169956"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712177" version="1" comment="kgraft-patch-4_12_14-95_13-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712178" version="1" comment="kgraft-patch-4_12_14-95_16-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712179" version="1" comment="kgraft-patch-4_12_14-95_19-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712180" version="1" comment="kgraft-patch-4_12_14-95_24-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712181" version="1" comment="kgraft-patch-4_12_14-95_29-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712182" version="1" comment="kgraft-patch-4_12_14-95_32-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712183" version="1" comment="kgraft-patch-4_12_14-95_37-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712184" version="1" comment="kgraft-patch-4_12_14-95_40-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712185" version="1" comment="kgraft-patch-4_12_14-95_45-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712186" version="1" comment="kgraft-patch-4_12_14-95_6-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712187" version="1" comment="kgraft-patch-4_12_14-122_12-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712188" version="1" comment="kgraft-patch-4_12_14-122_7-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712189" version="1" comment="kernel-livepatch-4_12_14-150_14-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712190" version="1" comment="kernel-livepatch-4_12_14-150_17-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712191" version="1" comment="kernel-livepatch-4_12_14-150_22-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712192" version="1" comment="kernel-livepatch-4_12_14-150_27-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712193" version="1" comment="kernel-livepatch-4_12_14-150_32-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712194" version="1" comment="kernel-livepatch-4_12_14-150_35-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712195" version="1" comment="kernel-livepatch-4_12_14-150_38-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712196" version="1" comment="kernel-livepatch-4_12_14-150_41-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712197" version="1" comment="kernel-livepatch-4_12_14-150_47-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712198" version="1" comment="kernel-livepatch-4_12_14-25_28-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712199" version="1" comment="kernel-livepatch-4_12_14-195-default is &gt;=9-25.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712200" version="1" comment="kernel-livepatch-4_12_14-197_10-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712201" version="1" comment="kernel-livepatch-4_12_14-197_15-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712202" version="1" comment="kernel-livepatch-4_12_14-197_18-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712203" version="1" comment="kernel-livepatch-4_12_14-197_21-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712204" version="1" comment="kernel-livepatch-4_12_14-197_26-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712205" version="1" comment="kernel-livepatch-4_12_14-197_29-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712206" version="1" comment="kernel-livepatch-4_12_14-197_4-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712207" version="1" comment="kernel-livepatch-4_12_14-197_7-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712208" version="1" comment="kernel-default is &lt;4.12.14-197.18.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712209" version="1" comment="kernel-default is &lt;4.12.14-95.29.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169958"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712210" version="1" comment="kernel-default is &lt;4.12.14-150.32.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712212" version="1" comment="kgraft-patch-4_12_14-95_48-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712213" version="1" comment="kgraft-patch-4_12_14-95_51-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712214" version="1" comment="kernel-default is ==4.12.14-95.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712215" version="1" comment="kgraft-patch-4_12_14-95_54-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712216" version="1" comment="kernel-default is &lt;4.12.14-95.54.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712217" version="1" comment="kernel-default is ==4.12.14-150.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712218" version="1" comment="kernel-livepatch-4_12_14-150_52-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712219" version="1" comment="kernel-default is &lt;4.12.14-150.52.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712220" version="1" comment="kgraft-patch-4_12_14-94_41-default is &gt;=8-2.22.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169966"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712221" version="1" comment="kgraft-patch-4_12_14-95_13-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712222" version="1" comment="kgraft-patch-4_12_14-95_16-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712223" version="1" comment="kgraft-patch-4_12_14-95_19-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712224" version="1" comment="kgraft-patch-4_12_14-95_24-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712225" version="1" comment="kgraft-patch-4_12_14-95_29-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712226" version="1" comment="kgraft-patch-4_12_14-95_3-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712227" version="1" comment="kgraft-patch-4_12_14-95_32-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712228" version="1" comment="kgraft-patch-4_12_14-95_6-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712229" version="1" comment="kernel-livepatch-4_12_14-150_14-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712230" version="1" comment="kernel-livepatch-4_12_14-150_17-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712231" version="1" comment="kernel-livepatch-4_12_14-150_22-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712232" version="1" comment="kernel-livepatch-4_12_14-150_27-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712233" version="1" comment="kernel-livepatch-4_12_14-150_32-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712234" version="1" comment="kernel-livepatch-4_12_14-150_35-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712235" version="1" comment="kernel-livepatch-4_12_14-150_38-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712236" version="1" comment="kernel-livepatch-4_12_14-25_28-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712237" version="1" comment="kernel-livepatch-4_12_14-195-default is &gt;=7-19.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712238" version="1" comment="kernel-livepatch-4_12_14-197_10-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712239" version="1" comment="kernel-livepatch-4_12_14-197_18-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712240" version="1" comment="kernel-livepatch-4_12_14-197_21-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712241" version="1" comment="kernel-livepatch-4_12_14-197_4-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712242" version="1" comment="kernel-livepatch-4_12_14-197_7-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712243" version="1" comment="kgraft-patch-4_12_14-95_16-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712244" version="1" comment="kgraft-patch-4_12_14-95_19-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712245" version="1" comment="kgraft-patch-4_12_14-95_24-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712246" version="1" comment="kgraft-patch-4_12_14-95_29-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712247" version="1" comment="kgraft-patch-4_12_14-95_32-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712248" version="1" comment="kgraft-patch-4_12_14-95_37-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712249" version="1" comment="kgraft-patch-4_12_14-95_40-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712250" version="1" comment="kgraft-patch-4_12_14-95_45-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712251" version="1" comment="kgraft-patch-4_12_14-120-default is &gt;=3-6.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712252" version="1" comment="kgraft-patch-4_12_14-122_12-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712253" version="1" comment="kgraft-patch-4_12_14-122_7-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712254" version="1" comment="kernel-livepatch-4_12_14-150_14-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712255" version="1" comment="kernel-livepatch-4_12_14-150_17-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712256" version="1" comment="kernel-livepatch-4_12_14-150_22-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712257" version="1" comment="kernel-livepatch-4_12_14-150_27-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712258" version="1" comment="kernel-livepatch-4_12_14-150_32-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712259" version="1" comment="kernel-livepatch-4_12_14-150_35-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712260" version="1" comment="kernel-livepatch-4_12_14-150_38-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712261" version="1" comment="kernel-livepatch-4_12_14-150_41-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712262" version="1" comment="kernel-livepatch-4_12_14-150_47-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712263" version="1" comment="kernel-livepatch-4_12_14-195-default is &gt;=10-28.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712264" version="1" comment="kernel-livepatch-4_12_14-197_10-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712265" version="1" comment="kernel-livepatch-4_12_14-197_15-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712266" version="1" comment="kernel-livepatch-4_12_14-197_18-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712267" version="1" comment="kernel-livepatch-4_12_14-197_21-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712268" version="1" comment="kernel-livepatch-4_12_14-197_26-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712269" version="1" comment="kernel-livepatch-4_12_14-197_29-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712270" version="1" comment="kernel-livepatch-4_12_14-197_4-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712271" version="1" comment="kernel-livepatch-4_12_14-197_7-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712272" version="1" comment="kgraft-patch-4_4_120-94_17-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712273" version="1" comment="kgraft-patch-4_4_126-94_22-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042385"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712274" version="1" comment="kgraft-patch-4_4_131-94_29-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712275" version="1" comment="kgraft-patch-4_4_132-94_33-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712276" version="1" comment="kgraft-patch-4_4_138-94_39-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712277" version="1" comment="kgraft-patch-4_4_140-94_42-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712278" version="1" comment="kgraft-patch-4_4_143-94_47-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712279" version="1" comment="kgraft-patch-4_4_155-94_50-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712280" version="1" comment="kgraft-patch-4_4_156-94_57-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046853"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712281" version="1" comment="kgraft-patch-4_4_156-94_61-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712282" version="1" comment="kgraft-patch-4_4_156-94_64-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712283" version="1" comment="kgraft-patch-4_4_162-94_69-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712284" version="1" comment="kgraft-patch-4_4_162-94_72-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712285" version="1" comment="kgraft-patch-4_12_14-94_41-default is &gt;=4-2.10.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047099"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712286" version="1" comment="kgraft-patch-4_12_14-95_3-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047020"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712287" version="1" comment="kgraft-patch-4_12_14-95_6-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712288" version="1" comment="kernel-livepatch-4_12_14-25_13-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046840"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712289" version="1" comment="kernel-livepatch-4_12_14-25_16-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712290" version="1" comment="kernel-livepatch-4_12_14-25_19-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712291" version="1" comment="kernel-livepatch-4_12_14-25_22-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712292" version="1" comment="kernel-livepatch-4_12_14-25_25-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712293" version="1" comment="kernel-livepatch-4_12_14-25_28-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712294" version="1" comment="kernel-livepatch-4_12_14-25_6-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712295" version="1" comment="kgraft-patch-4_4_175-94_79-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047163"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712296" version="1" comment="kernel-default is &lt;4.4.175-94.79.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712297" version="1" comment="kernel-default is &lt;4.12.14-95.48.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712298" version="1" comment="kgraft-patch-4_12_14-122_17-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712299" version="1" comment="kernel-livepatch-4_12_14-197_34-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712300" version="1" comment="kernel-livepatch-4_12_14-197_37-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712301" version="1" comment="kernel-default is &lt;4.12.14-197.37.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712302" version="1" comment="kgraft-patch-4_12_14-95_45-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712303" version="1" comment="kgraft-patch-4_12_14-95_48-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712304" version="1" comment="kgraft-patch-4_12_14-95_51-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712305" version="1" comment="kgraft-patch-4_12_14-95_54-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712306" version="1" comment="kernel-default is ==4.12.14-95.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712307" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712308" version="1" comment="kernel-default is ==4.12.14-95.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712309" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712310" version="1" comment="kernel-default is &lt;4.12.14-95.60.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712311" version="1" comment="kernel-livepatch-4_12_14-150_47-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712312" version="1" comment="kernel-livepatch-4_12_14-150_52-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712313" version="1" comment="kernel-default is ==4.12.14-150.55.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712314" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712315" version="1" comment="kernel-default is ==4.12.14-150.58.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712316" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712317" version="1" comment="kernel-default is &lt;4.12.14-150.58.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712318" version="1" comment="kgraft-patch-4_12_14-95_37-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712319" version="1" comment="kgraft-patch-4_12_14-95_40-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712320" version="1" comment="kgraft-patch-4_12_14-95_45-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712321" version="1" comment="kgraft-patch-4_12_14-95_48-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712322" version="1" comment="kgraft-patch-4_12_14-95_51-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712323" version="1" comment="kgraft-patch-4_12_14-120-default is &gt;=7-18.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712324" version="1" comment="kgraft-patch-4_12_14-122_12-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712325" version="1" comment="kgraft-patch-4_12_14-122_17-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712326" version="1" comment="kgraft-patch-4_12_14-122_20-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712327" version="1" comment="kgraft-patch-4_12_14-122_7-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712328" version="1" comment="kernel-livepatch-4_12_14-150_41-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712329" version="1" comment="kernel-livepatch-4_12_14-150_47-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712330" version="1" comment="kernel-livepatch-4_12_14-150_52-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712331" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712332" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712333" version="1" comment="kernel-livepatch-4_12_14-197_26-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712334" version="1" comment="kernel-livepatch-4_12_14-197_29-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712335" version="1" comment="kernel-livepatch-4_12_14-197_34-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712336" version="1" comment="kernel-livepatch-4_12_14-197_37-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712337" version="1" comment="kernel-livepatch-4_12_14-197_40-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712338" version="1" comment="kernel-default is &lt;4.12.14-197.40.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712339" version="1" comment="kernel-livepatch-4_12_14-150_52-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712340" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712341" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712342" version="1" comment="kernel-default is ==4.12.14-150.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712343" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712344" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712345" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712346" version="1" comment="kernel-default is &lt;4.12.14-150.69.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712347" version="1" comment="kgraft-patch-4_12_14-95_48-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712348" version="1" comment="kgraft-patch-4_12_14-95_51-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712349" version="1" comment="kgraft-patch-4_12_14-95_54-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712350" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712351" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712352" version="1" comment="kernel-default is ==4.12.14-95.65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712353" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712354" version="1" comment="kernel-default is &lt;4.12.14-95.65.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712355" version="1" comment="kgraft-patch-4_12_14-122_17-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712356" version="1" comment="kgraft-patch-4_12_14-122_20-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712357" version="1" comment="kernel-default is ==4.12.14-122.23.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712358" version="1" comment="kgraft-patch-4_12_14-122_23-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712359" version="1" comment="kernel-default is ==4.12.14-122.26.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712360" version="1" comment="kgraft-patch-4_12_14-122_26-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712361" version="1" comment="kernel-default is ==4.12.14-122.29.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712362" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712363" version="1" comment="kernel-default is ==4.12.14-122.32.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712364" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712365" version="1" comment="kernel-default is ==4.12.14-122.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712366" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712367" version="1" comment="kernel-default is ==4.12.14-122.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712368" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712369" version="1" comment="kernel-default is ==4.12.14-122.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712370" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712371" version="1" comment="kernel-default is ==4.12.14-122.51.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712372" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712373" version="1" comment="kernel-default is ==4.12.14-122.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712374" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712375" version="1" comment="kernel-default is &lt;4.12.14-122.54.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712376" version="1" comment="kernel-livepatch-4_12_14-150_52-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712377" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712378" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712379" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712380" version="1" comment="kernel-default is &lt;4.12.14-150.63.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712381" version="1" comment="kernel-livepatch-4_12_14-197_34-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712382" version="1" comment="kernel-livepatch-4_12_14-197_37-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712383" version="1" comment="kernel-livepatch-4_12_14-197_40-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712384" version="1" comment="kernel-default is ==4.12.14-197.45.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712385" version="1" comment="kernel-livepatch-4_12_14-197_45-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712386" version="1" comment="kernel-default is ==4.12.14-197.48.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712387" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712388" version="1" comment="kernel-default is ==4.12.14-197.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712389" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712390" version="1" comment="kernel-default is ==4.12.14-197.56.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712391" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712392" version="1" comment="kernel-default is ==4.12.14-197.61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712393" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712394" version="1" comment="kernel-default is ==4.12.14-197.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712395" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712396" version="1" comment="kernel-default is ==4.12.14-197.67.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712397" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712398" version="1" comment="kernel-default is ==4.12.14-197.72.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712399" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712400" version="1" comment="kernel-default is ==4.12.14-197.75.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712401" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712402" version="1" comment="kernel-default is &lt;4.12.14-197.75.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170005"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714897" version="1" comment="kernel-default is ==5.3.18-22.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712403" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=7-5.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170006"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712404" version="1" comment="kernel-default is ==5.3.18-24.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170007"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712405" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712406" version="1" comment="kernel-default is ==5.3.18-24.15.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170008"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712407" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712408" version="1" comment="kernel-default is ==5.3.18-24.9.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170009"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712409" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714898" version="1" comment="kernel-default is &lt;5.3.18-24.9.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712410" version="1" comment="kernel-default is ==5.3.18-24.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170010"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712411" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712412" version="1" comment="kernel-default is ==5.3.18-24.29.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170011"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712413" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712414" version="1" comment="kernel-default is ==5.3.18-24.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170012"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712415" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712416" version="1" comment="kernel-default is ==5.3.18-24.37.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170013"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712417" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712418" version="1" comment="kernel-default is ==5.3.18-24.43.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712419" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712420" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712421" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712422" version="1" comment="kgraft-patch-4_12_14-122_12-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712423" version="1" comment="kgraft-patch-4_12_14-122_17-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712424" version="1" comment="kgraft-patch-4_12_14-122_20-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712425" version="1" comment="kgraft-patch-4_12_14-122_23-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712426" version="1" comment="kgraft-patch-4_12_14-122_26-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712427" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712428" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712429" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712430" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712431" version="1" comment="kernel-livepatch-4_12_14-197_29-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712432" version="1" comment="kernel-livepatch-4_12_14-197_34-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712433" version="1" comment="kernel-livepatch-4_12_14-197_37-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712434" version="1" comment="kernel-livepatch-4_12_14-197_40-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712435" version="1" comment="kernel-livepatch-4_12_14-197_45-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712436" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712437" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712438" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712439" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712440" version="1" comment="kernel-default is &lt;4.12.14-197.61.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712441" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=4-11.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712442" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712443" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712444" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712445" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712446" version="1" comment="kgraft-patch-4_12_14-95_16-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047380"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712447" version="1" comment="kgraft-patch-4_12_14-95_19-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712448" version="1" comment="kgraft-patch-4_12_14-95_24-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047614"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712449" version="1" comment="kgraft-patch-4_12_14-95_29-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712450" version="1" comment="kgraft-patch-4_12_14-95_32-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712451" version="1" comment="kgraft-patch-4_12_14-95_37-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712452" version="1" comment="kgraft-patch-4_12_14-95_40-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712453" version="1" comment="kgraft-patch-4_12_14-95_45-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712454" version="1" comment="kgraft-patch-4_12_14-95_48-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712455" version="1" comment="kgraft-patch-4_12_14-95_51-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712456" version="1" comment="kgraft-patch-4_12_14-120-default is &gt;=4-9.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712457" version="1" comment="kgraft-patch-4_12_14-122_12-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712458" version="1" comment="kgraft-patch-4_12_14-122_17-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712459" version="1" comment="kgraft-patch-4_12_14-122_20-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712460" version="1" comment="kgraft-patch-4_12_14-122_7-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712461" version="1" comment="kernel-livepatch-4_12_14-150_17-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712462" version="1" comment="kernel-livepatch-4_12_14-150_22-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712463" version="1" comment="kernel-livepatch-4_12_14-150_27-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712464" version="1" comment="kernel-livepatch-4_12_14-150_32-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712465" version="1" comment="kernel-livepatch-4_12_14-150_35-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712466" version="1" comment="kernel-livepatch-4_12_14-150_38-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712467" version="1" comment="kernel-livepatch-4_12_14-150_41-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712468" version="1" comment="kernel-livepatch-4_12_14-150_47-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712469" version="1" comment="kernel-livepatch-4_12_14-195-default is &gt;=11-31.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712470" version="1" comment="kernel-livepatch-4_12_14-197_10-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712471" version="1" comment="kernel-livepatch-4_12_14-197_15-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712472" version="1" comment="kernel-livepatch-4_12_14-197_18-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712473" version="1" comment="kernel-livepatch-4_12_14-197_21-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048156"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712474" version="1" comment="kernel-livepatch-4_12_14-197_26-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712475" version="1" comment="kernel-livepatch-4_12_14-197_29-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712476" version="1" comment="kernel-livepatch-4_12_14-197_34-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712477" version="1" comment="kernel-livepatch-4_12_14-197_37-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712478" version="1" comment="kernel-livepatch-4_12_14-197_4-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712479" version="1" comment="kernel-livepatch-4_12_14-197_40-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712480" version="1" comment="kernel-livepatch-4_12_14-197_7-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712481" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712482" version="1" comment="kernel-default is &lt;4.12.14-95.57.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712483" version="1" comment="kgraft-patch-4_12_14-122_20-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712484" version="1" comment="kgraft-patch-4_12_14-122_23-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712485" version="1" comment="kgraft-patch-4_12_14-122_26-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712486" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712487" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712488" version="1" comment="kernel-default is &lt;4.12.14-150.55.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712489" version="1" comment="kernel-livepatch-4_12_14-197_40-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712490" version="1" comment="kernel-livepatch-4_12_14-197_45-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712491" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712492" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712493" version="1" comment="kernel-default is &lt;4.12.14-197.51.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712494" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=2-5.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712495" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=2-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712496" version="1" comment="kgraft-patch-4_12_14-95_54-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712497" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712498" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712499" version="1" comment="kgraft-patch-4_12_14-122_23-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712500" version="1" comment="kgraft-patch-4_12_14-122_26-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712501" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712502" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712503" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712504" version="1" comment="kernel-livepatch-4_12_14-197_45-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712505" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712506" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712507" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712508" version="1" comment="kernel-default is &lt;4.12.14-197.56.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712509" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=3-8.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712510" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712511" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712512" version="1" comment="kernel-default is &lt;4.12.14-197.45.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009482053" version="1" comment="kernel-default is &lt;5.3.18-22.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009111923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712513" version="1" comment="kgraft-patch-4_12_14-95_48-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712514" version="1" comment="kgraft-patch-4_12_14-122_17-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712515" version="1" comment="kernel-livepatch-4_12_14-197_34-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712516" version="1" comment="kernel-livepatch-4_12_14-197_37-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712517" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712518" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712519" version="1" comment="kgraft-patch-4_12_14-95_45-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712520" version="1" comment="kgraft-patch-4_12_14-95_48-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712521" version="1" comment="kgraft-patch-4_12_14-95_51-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712522" version="1" comment="kgraft-patch-4_12_14-95_54-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712523" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712524" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712525" version="1" comment="kgraft-patch-4_12_14-120-default is &gt;=9-3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712526" version="1" comment="kgraft-patch-4_12_14-122_12-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712527" version="1" comment="kgraft-patch-4_12_14-122_17-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712528" version="1" comment="kgraft-patch-4_12_14-122_20-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712529" version="1" comment="kgraft-patch-4_12_14-122_23-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712530" version="1" comment="kgraft-patch-4_12_14-122_26-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712531" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712532" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712533" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712534" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712535" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712536" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712537" version="1" comment="kgraft-patch-4_12_14-122_7-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712538" version="1" comment="kernel-livepatch-4_12_14-150_47-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712539" version="1" comment="kernel-livepatch-4_12_14-150_52-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712540" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712541" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712542" version="1" comment="kernel-livepatch-4_12_14-197_29-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712543" version="1" comment="kernel-livepatch-4_12_14-197_34-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712544" version="1" comment="kernel-livepatch-4_12_14-197_37-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712545" version="1" comment="kernel-livepatch-4_12_14-197_40-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712546" version="1" comment="kernel-livepatch-4_12_14-197_45-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712547" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712548" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712549" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712550" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712551" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712552" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712553" version="1" comment="kernel-default is &lt;4.12.14-197.67.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712554" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=5-5.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712555" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712556" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712557" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712558" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712559" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712560" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712561" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712562" version="1" comment="kernel-default is &lt;4.12.14-95.71.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712563" version="1" comment="kernel-default is ==4.12.14-122.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712564" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712565" version="1" comment="kernel-default is ==4.12.14-122.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712566" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712567" version="1" comment="kernel-default is &lt;4.12.14-122.63.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712568" version="1" comment="kernel-default is ==4.12.14-197.83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712569" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712570" version="1" comment="kernel-default is ==4.12.14-197.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712571" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712572" version="1" comment="kernel-default is &lt;4.12.14-197.86.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170034"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712573" version="1" comment="kernel-default is ==5.3.18-24.49.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712574" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712575" version="1" comment="kernel-default is ==5.3.18-24.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170036"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712576" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712577" version="1" comment="kernel-default is &lt;5.3.18-24.52.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170037"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698763" version="1" comment="kernel-default is ==5.3.18-57.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712578" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=10-3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009628531" version="1" comment="kernel-default is &lt;5.3.18-57.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009148129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712579" version="1" comment="kgraft-patch-4_12_14-95_48-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048683"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712580" version="1" comment="kgraft-patch-4_12_14-95_51-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712581" version="1" comment="kgraft-patch-4_12_14-95_54-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712582" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712583" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712584" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712585" version="1" comment="kgraft-patch-4_12_14-122_17-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712586" version="1" comment="kgraft-patch-4_12_14-122_20-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712587" version="1" comment="kgraft-patch-4_12_14-122_23-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712588" version="1" comment="kgraft-patch-4_12_14-122_26-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712589" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712590" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712591" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712592" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712593" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712594" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712595" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712596" version="1" comment="kernel-default is ==4.12.14-122.57.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712597" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712598" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712599" version="1" comment="kernel-default is &lt;4.12.14-122.60.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712600" version="1" comment="kernel-livepatch-4_12_14-150_52-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712601" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712602" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712603" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712604" version="1" comment="kernel-livepatch-4_12_14-197_34-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048662"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712605" version="1" comment="kernel-livepatch-4_12_14-197_37-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712606" version="1" comment="kernel-livepatch-4_12_14-197_40-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712607" version="1" comment="kernel-livepatch-4_12_14-197_45-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712608" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712609" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712610" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712611" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712612" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712613" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712614" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712615" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712616" version="1" comment="kernel-default is ==4.12.14-197.78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712617" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712618" version="1" comment="kernel-default is &lt;4.12.14-197.78.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712619" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=8-5.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170044"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712620" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712621" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712622" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712623" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712624" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712625" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712626" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712627" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712628" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712629" version="1" comment="kernel-default is &lt;4.12.14-95.68.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170045"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712630" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712631" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712632" version="1" comment="kernel-default is &lt;4.12.14-150.66.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712633" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712634" version="1" comment="kernel-default is &lt;4.12.14-197.83.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712635" version="1" comment="kernel-default is ==5.3.18-24.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712636" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712637" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712638" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=6-5.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170049"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712639" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712640" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712641" version="1" comment="kernel-default is &lt;4.12.14-122.57.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170050"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712642" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712643" version="1" comment="kgraft-patch-4_12_14-95_54-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712644" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712645" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712646" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712647" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712648" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712649" version="1" comment="kgraft-patch-4_12_14-122_23-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712650" version="1" comment="kgraft-patch-4_12_14-122_26-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712651" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712652" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712653" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712654" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712655" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712656" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712657" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712658" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712659" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712660" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712661" version="1" comment="kernel-default is ==4.12.14-122.66.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712662" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712663" version="1" comment="kernel-default is &lt;4.12.14-122.66.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712664" version="1" comment="kernel-livepatch-4_12_14-197_45-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712665" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712666" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712667" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712668" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712669" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712670" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712671" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712672" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712673" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712674" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712675" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712676" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=11-5.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712677" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712678" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712679" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712680" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712681" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712682" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712683" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712684" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712685" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712686" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698736" version="1" comment="kernel-default is ==5.3.18-24.53.4.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166524"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712687" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712688" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712689" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=2-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712690" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712691" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712692" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712693" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712694" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712695" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712696" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712697" version="1" comment="kernel-default is &lt;4.12.14-95.77.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712698" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712699" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712700" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712701" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712702" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712703" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712704" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712705" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712706" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712707" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712708" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698703" version="1" comment="kernel-default is ==4.12.14-122.71.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712709" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698705" version="1" comment="kernel-default is ==4.12.14-122.74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712710" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698707" version="1" comment="kernel-default is ==4.12.14-122.77.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166499"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712711" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712712" version="1" comment="kernel-default is &lt;4.12.14-122.77.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712713" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712714" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712715" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712716" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712717" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712718" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712719" version="1" comment="kernel-default is &lt;4.12.14-150.72.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712720" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712721" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712722" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712723" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712724" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712725" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712726" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712727" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712728" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712729" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712730" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698729" version="1" comment="kernel-default is ==4.12.14-197.89.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712731" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698731" version="1" comment="kernel-default is ==4.12.14-197.92.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712732" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712733" version="1" comment="kernel-default is &lt;4.12.14-197.92.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712734" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=14-5.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712735" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712736" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712737" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712738" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712739" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712740" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712741" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712742" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712743" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712744" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698791" version="1" comment="kernel-default is ==5.3.18-24.61.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712745" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698738" version="1" comment="kernel-default is ==5.3.18-24.64.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712746" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698740" version="1" comment="kernel-default is ==5.3.18-24.67.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712747" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712748" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712749" version="1" comment="kernel-default is ==4.12.14-95.102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712750" version="1" comment="kgraft-patch-4_12_14-95_102-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712751" version="1" comment="kernel-default is ==4.12.14-95.105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712752" version="1" comment="kgraft-patch-4_12_14-95_105-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712753" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=13-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701405" version="1" comment="kernel-default is ==4.12.14-95.88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167184"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712754" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=9-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701143" version="1" comment="kernel-default is ==4.12.14-95.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712755" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=8-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701407" version="1" comment="kernel-default is ==4.12.14-95.96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167186"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712756" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=7-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701145" version="1" comment="kernel-default is ==4.12.14-95.99.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712757" version="1" comment="kgraft-patch-4_12_14-95_99-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701147" version="1" comment="kernel-default is &lt;4.12.14-95.99.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698699" version="1" comment="kernel-default is ==4.12.14-122.103.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712758" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=14-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698701" version="1" comment="kernel-default is ==4.12.14-122.106.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712759" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=12-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701411" version="1" comment="kernel-default is ==4.12.14-122.110.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167188"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712760" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=10-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701413" version="1" comment="kernel-default is ==4.12.14-122.113.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167190"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712761" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=9-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701148" version="1" comment="kernel-default is ==4.12.14-122.116.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712762" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=7-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701415" version="1" comment="kernel-default is ==4.12.14-122.121.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167191"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712763" version="1" comment="kgraft-patch-4_12_14-122_121-default is &gt;=5-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701150" version="1" comment="kernel-default is ==4.12.14-122.124.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712764" version="1" comment="kgraft-patch-4_12_14-122_124-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712765" version="1" comment="kernel-default is ==4.12.14-122.127.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712766" version="1" comment="kgraft-patch-4_12_14-122_127-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712767" version="1" comment="kernel-default is ==4.12.14-122.130.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712768" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698713" version="1" comment="kernel-default is ==4.12.14-122.88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166503"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712769" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=16-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698715" version="1" comment="kernel-default is ==4.12.14-122.91.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166505"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712770" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=16-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698717" version="1" comment="kernel-default is ==4.12.14-122.98.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712771" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=14-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698719" version="1" comment="kernel-default is &lt;4.12.14-122.98.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166507"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701421" version="1" comment="kernel-default is ==4.12.14-150000.150.89.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712772" version="1" comment="kernel-livepatch-4_12_14-150000_150_89-default is &gt;=7-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701260" version="1" comment="kernel-default is ==4.12.14-150000.150.92.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712773" version="1" comment="kernel-livepatch-4_12_14-150000_150_92-default is &gt;=4-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712774" version="1" comment="kernel-default is ==4.12.14-150000.150.95.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712775" version="1" comment="kernel-livepatch-4_12_14-150000_150_95-default is &gt;=2-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712776" version="1" comment="kernel-default is ==4.12.14-150000.150.98.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712777" version="1" comment="kernel-livepatch-4_12_14-150000_150_98-default is &gt;=2-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712778" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=13-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701262" version="1" comment="kernel-default is ==4.12.14-150.83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712779" version="1" comment="kernel-livepatch-4_12_14-150_83-default is &gt;=9-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701425" version="1" comment="kernel-default is ==4.12.14-150.86.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712780" version="1" comment="kernel-livepatch-4_12_14-150_86-default is &gt;=8-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701427" version="1" comment="kernel-default is &lt;4.12.14-150.86.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701265" version="1" comment="kernel-default is ==4.12.14-150100.197.111.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712781" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=7-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701154" version="1" comment="kernel-default is ==4.12.14-150100.197.114.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712782" version="1" comment="kernel-livepatch-4_12_14-150100_197_114-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712783" version="1" comment="kernel-default is ==4.12.14-150100.197.117.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712784" version="1" comment="kernel-livepatch-4_12_14-150100_197_117-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712785" version="1" comment="kernel-default is ==4.12.14-150100.197.120.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170077"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712786" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698727" version="1" comment="kernel-default is ==4.12.14-197.102.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712787" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=13-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701428" version="1" comment="kernel-default is ==4.12.14-197.105.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712788" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=9-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701268" version="1" comment="kernel-default is ==4.12.14-197.108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712789" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=8-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701270" version="1" comment="kernel-default is &lt;4.12.14-197.108.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698822" version="1" comment="kernel-default is ==5.3.18-150200.24.112.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712790" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=7-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698824" version="1" comment="kernel-default is ==5.3.18-150200.24.115.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712791" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709908" version="1" comment="kernel-default is ==5.3.18-150200.24.126.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709909" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698786" version="1" comment="kernel-default is ==5.3.18-24.102.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166566"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712792" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698788" version="1" comment="kernel-default is ==5.3.18-24.107.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166568"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712793" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=11-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698748" version="1" comment="kernel-default is ==5.3.18-24.83.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712794" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=16-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698750" version="1" comment="kernel-default is ==5.3.18-24.86.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166536"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712795" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=16-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698752" version="1" comment="kernel-default is ==5.3.18-24.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712796" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=15-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698754" version="1" comment="kernel-default is ==5.3.18-24.96.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712797" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=14-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698756" version="1" comment="kernel-default is ==5.3.18-24.99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712798" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=13-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698758" version="1" comment="kernel-default is &lt;5.3.18-24.99.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698759" version="1" comment="kernel-default is ==5.3.18-150300.59.43.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712799" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698761" version="1" comment="kernel-default is ==5.3.18-150300.59.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712800" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698805" version="1" comment="kernel-default is ==5.3.18-150300.59.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712801" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698807" version="1" comment="kernel-default is ==5.3.18-150300.59.54.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712802" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698809" version="1" comment="kernel-default is ==5.3.18-150300.59.60.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712803" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698842" version="1" comment="kernel-default is ==5.3.18-150300.59.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712804" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698844" version="1" comment="kernel-default is ==5.3.18-150300.59.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712805" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=6-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698846" version="1" comment="kernel-default is ==5.3.18-150300.59.71.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712806" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701403" version="1" comment="kernel-default is ==5.3.18-150300.59.76.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712807" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706111" version="1" comment="kernel-default is ==5.3.18-150300.59.87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168229"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712808" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698773" version="1" comment="kernel-default is ==5.3.18-59.24.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166556"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712809" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698775" version="1" comment="kernel-default is ==5.3.18-59.27.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166558"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712810" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698777" version="1" comment="kernel-default is ==5.3.18-59.34.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166559"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712811" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698779" version="1" comment="kernel-default is ==5.3.18-59.37.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166561"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712812" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698781" version="1" comment="kernel-default is ==5.3.18-59.40.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166563"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712813" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701452" version="1" comment="kernel-default is &lt;5.3.18-59.40.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167221"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698874" version="1" comment="kernel-default is ==5.14.21-150400.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712814" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=5-150400.4.12.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712815" version="1" comment="kernel-default is ==5.14.21-150400.24.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712816" version="1" comment="kernel-livepatch-5_14_21-150400_24_11-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712817" version="1" comment="kernel-default is ==5.14.21-150400.24.18.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712818" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712819" version="1" comment="kernel-default is &lt;5.14.21-150400.24.18.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725853" version="1" comment="kernel-livepatch-4_12_14-150000_150_89-default is &gt;=9-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725854" version="1" comment="kernel-livepatch-4_12_14-150000_150_92-default is &gt;=6-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725497" version="1" comment="kernel-livepatch-4_12_14-150000_150_95-default is &gt;=4-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725855" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=15-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725856" version="1" comment="kernel-livepatch-4_12_14-150_83-default is &gt;=11-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725857" version="1" comment="kernel-livepatch-4_12_14-150_86-default is &gt;=10-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712820" version="1" comment="kernel-default is &lt;4.12.14-95.80.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712821" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712822" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712823" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712824" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698709" version="1" comment="kernel-default is ==4.12.14-122.80.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166500"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712825" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698711" version="1" comment="kernel-default is ==4.12.14-122.83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166501"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712826" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712827" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712828" version="1" comment="kernel-default is &lt;4.12.14-122.88.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712829" version="1" comment="kernel-default is &lt;4.12.14-150.75.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712830" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712831" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698733" version="1" comment="kernel-default is ==4.12.14-197.99.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166521"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712832" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698735" version="1" comment="kernel-default is &lt;4.12.14-197.99.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166523"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712833" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712834" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712835" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712836" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698742" version="1" comment="kernel-default is ==5.3.18-24.70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166529"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712837" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698744" version="1" comment="kernel-default is ==5.3.18-24.75.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712838" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698746" version="1" comment="kernel-default is ==5.3.18-24.78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712839" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712840" version="1" comment="kernel-default is &lt;5.3.18-24.78.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698765" version="1" comment="kernel-default is ==5.3.18-59.10.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712841" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698767" version="1" comment="kernel-default is ==5.3.18-59.13.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712842" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698769" version="1" comment="kernel-default is ==5.3.18-59.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166552"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712843" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698771" version="1" comment="kernel-default is ==5.3.18-59.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166554"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712844" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=6-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698783" version="1" comment="kernel-default is ==5.3.18-59.5.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712845" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698785" version="1" comment="kernel-default is &lt;5.3.18-59.5.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166565"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712846" version="1" comment="kernel-default is &lt;4.12.14-197.64.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712847" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712848" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712849" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712850" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712851" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712852" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712853" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712854" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712855" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712856" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712857" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712858" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712859" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712860" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712861" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712862" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712863" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712864" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712865" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712866" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712867" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712868" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712869" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712870" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712871" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712872" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712873" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712874" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712875" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712876" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712877" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712878" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=8-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712879" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712880" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712881" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712882" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712883" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=13-5.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712884" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712885" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712886" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712887" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712888" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712889" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712890" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712891" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712892" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712893" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712894" version="1" comment="kernel-default is &lt;4.12.14-122.32.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712895" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712896" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712897" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712898" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712899" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712900" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712901" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712902" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712903" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712904" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712905" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712906" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712907" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712908" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712909" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712910" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712911" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712912" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712913" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712914" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712915" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712916" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712917" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712918" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712919" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712920" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712921" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712922" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712923" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712924" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712925" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712926" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712927" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712928" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712929" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712930" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712931" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712932" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712933" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712934" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712935" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712936" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712937" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712938" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712939" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=12-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712940" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712941" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712942" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712943" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712944" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712945" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712946" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712947" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712948" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712949" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712950" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712951" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712952" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712953" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712954" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712955" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712956" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712957" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712958" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712959" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712960" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712961" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712962" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712963" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712964" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712965" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712966" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712967" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712968" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712969" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712970" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712971" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712972" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712973" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712974" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712975" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712976" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712977" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712978" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712979" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712980" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712981" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712982" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712983" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712984" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712985" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712986" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712987" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712988" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712989" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712990" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712991" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712992" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712993" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712994" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712995" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712996" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712997" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712998" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009712999" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713000" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713001" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713002" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713003" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713004" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713005" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713006" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713007" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713008" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713009" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713010" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713011" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713012" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713013" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713014" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713015" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713016" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713017" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713018" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713019" version="1" comment="kernel-default is &lt;5.3.18-24.53.4.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713020" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=9-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032100" version="1" comment="pnpm is &lt;10.22.0-bp160.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032113" version="1" comment="pnpm is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032101" version="1" comment="pnpm-bash-completion is &lt;10.22.0-bp160.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032114" version="1" comment="pnpm-bash-completion is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032102" version="1" comment="pnpm-fish-completion is &lt;10.22.0-bp160.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032115" version="1" comment="pnpm-fish-completion is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032103" version="1" comment="pnpm-zsh-completion is &lt;10.22.0-bp160.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245277"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032116" version="1" comment="pnpm-zsh-completion is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713021" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713022" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713023" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713024" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713025" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713026" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713027" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713028" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713029" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713030" version="1" comment="kernel-default is &lt;5.3.18-24.93.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713031" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713032" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713033" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713034" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713035" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713036" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713037" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713038" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713041" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713042" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713043" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713044" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713045" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713046" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713047" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713048" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=16-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713049" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713050" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713051" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713052" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713053" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713054" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713055" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713056" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713057" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713058" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713059" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713060" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713061" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713062" version="1" comment="kernel-default is &lt;4.12.14-122.80.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713063" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713064" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713065" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713066" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713067" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713068" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713069" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713070" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713071" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713072" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713073" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713074" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713075" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713076" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713077" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713078" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713079" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713080" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713081" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713082" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713083" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713084" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713085" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713086" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713087" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713088" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713089" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713090" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713091" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713092" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713093" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713094" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713095" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713096" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713097" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713098" version="1" comment="kernel-default is &lt;5.3.18-24.75.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713099" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=5-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713100" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713101" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713102" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713103" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713104" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713105" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=4-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169821"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713106" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713107" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713108" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713109" version="1" comment="kernel-default is &lt;4.12.14-95.74.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713110" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713111" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713112" version="1" comment="kernel-default is &lt;4.12.14-122.71.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713113" version="1" comment="kernel-default is &lt;4.12.14-197.89.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713114" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713115" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713116" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713117" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=3-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713118" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713119" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713120" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713121" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713122" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713123" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713124" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713125" version="1" comment="kernel-default is &lt;5.3.18-24.64.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713126" version="1" comment="kgraft-patch-4_12_14-95_51-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713127" version="1" comment="kgraft-patch-4_12_14-95_54-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713128" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713129" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713130" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713131" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713132" version="1" comment="kgraft-patch-4_12_14-122_20-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713133" version="1" comment="kgraft-patch-4_12_14-122_23-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713134" version="1" comment="kgraft-patch-4_12_14-122_26-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713135" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713136" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713137" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713138" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713139" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713140" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713141" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713142" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713143" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713144" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713145" version="1" comment="kernel-livepatch-4_12_14-150_52-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713146" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713147" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713148" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713149" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713150" version="1" comment="kernel-livepatch-4_12_14-197_40-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713151" version="1" comment="kernel-livepatch-4_12_14-197_45-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713152" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713153" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713154" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713155" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713156" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713157" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713158" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713159" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713160" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713161" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713162" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=10-5.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713163" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713164" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713165" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713166" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713167" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713168" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713169" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713170" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713171" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713172" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713173" version="1" comment="kgraft-patch-4_12_14-95_51-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713174" version="1" comment="kgraft-patch-4_12_14-95_54-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048888"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713175" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713176" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713177" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713178" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713179" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713180" version="1" comment="kgraft-patch-4_12_14-122_20-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048798"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713181" version="1" comment="kgraft-patch-4_12_14-122_23-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713182" version="1" comment="kgraft-patch-4_12_14-122_26-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713183" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713184" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713185" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713186" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713187" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713188" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713189" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713190" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713191" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713192" version="1" comment="kernel-livepatch-4_12_14-150_52-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713193" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713194" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713195" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713196" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713197" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713198" version="1" comment="kernel-livepatch-4_12_14-197_37-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713199" version="1" comment="kernel-livepatch-4_12_14-197_40-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048794"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713200" version="1" comment="kernel-livepatch-4_12_14-197_45-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713201" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713202" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713203" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713204" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713205" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713206" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=5-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713207" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713208" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713209" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713210" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713211" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713212" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=9-5.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713213" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713214" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713215" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713216" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713217" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713218" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713219" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713220" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713221" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713222" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713223" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713224" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713225" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713226" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713227" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713228" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=7-3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713229" version="1" comment="kgraft-patch-4_12_14-95_57-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713230" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713231" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713232" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713233" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713234" version="1" comment="kgraft-patch-4_12_14-122_26-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713235" version="1" comment="kgraft-patch-4_12_14-122_29-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713236" version="1" comment="kgraft-patch-4_12_14-122_32-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713237" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713238" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713239" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713240" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713241" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713242" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713243" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713244" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713245" version="1" comment="kernel-livepatch-4_12_14-150_52-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048927"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713246" version="1" comment="kernel-livepatch-4_12_14-150_55-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713247" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713248" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713249" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713250" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713251" version="1" comment="kernel-livepatch-4_12_14-197_48-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713252" version="1" comment="kernel-livepatch-4_12_14-197_51-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713253" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713254" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713255" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713256" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713257" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713258" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713259" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713260" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713261" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713262" version="1" comment="kernel-livepatch-5_3_18-22-default is &gt;=12-5.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713263" version="1" comment="kernel-livepatch-5_3_18-24_12-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713264" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713265" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713266" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713267" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713268" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713269" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713270" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713271" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713272" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713273" version="1" comment="kernel-livepatch-5_3_18-24_9-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049033"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725499" version="1" comment="kgraft-patch-4_12_14-95_102-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725858" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725859" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725860" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725861" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725862" version="1" comment="kgraft-patch-4_12_14-95_99-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725863" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=16-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725864" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725865" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725866" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725867" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725868" version="1" comment="kgraft-patch-4_12_14-122_121-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725869" version="1" comment="kgraft-patch-4_12_14-122_124-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725501" version="1" comment="kgraft-patch-4_12_14-122_127-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725870" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=16-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725871" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=9-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725872" version="1" comment="kernel-livepatch-4_12_14-150100_197_114-default is &gt;=6-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725503" version="1" comment="kernel-livepatch-4_12_14-150100_197_117-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725873" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=15-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725874" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=11-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725875" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=10-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725876" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=10-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725877" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725878" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=15-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725879" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=14-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725880" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=18-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725881" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=17-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725882" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=16-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725883" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725884" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725885" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725886" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725887" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725888" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725889" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725890" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725891" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725505" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725892" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=18-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725893" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725894" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725895" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=8-150400.4.21.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725506" version="1" comment="kernel-livepatch-5_14_21-150400_24_11-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713798" version="1" comment="kernel-default is &lt;5.14.21-150400.24.11.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713274" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=8-3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713275" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713276" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713277" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713278" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713279" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713280" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713281" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713282" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713283" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713284" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713285" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713286" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713287" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=16-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713288" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713289" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713290" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713291" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713292" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713293" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713294" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713295" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713296" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713297" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713298" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713299" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713300" version="1" comment="kernel-default is &lt;4.12.14-122.83.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713301" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713302" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713303" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713304" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713305" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713306" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713307" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713308" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713309" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713310" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713311" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713312" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713313" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713314" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713315" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713316" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713317" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713318" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713319" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713320" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713321" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713322" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713323" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713324" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713325" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713326" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713327" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713328" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713329" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713330" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713331" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713332" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713333" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713334" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713335" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713336" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713337" version="1" comment="kernel-default is &lt;5.3.18-24.70.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713338" version="1" comment="kgraft-patch-4_12_14-95_60-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713339" version="1" comment="kgraft-patch-4_12_14-95_65-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713340" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713341" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713342" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713343" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713344" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713345" version="1" comment="kgraft-patch-4_12_14-122_37-default is &gt;=16-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713346" version="1" comment="kgraft-patch-4_12_14-122_41-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713347" version="1" comment="kgraft-patch-4_12_14-122_46-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713348" version="1" comment="kgraft-patch-4_12_14-122_51-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713349" version="1" comment="kgraft-patch-4_12_14-122_54-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713350" version="1" comment="kgraft-patch-4_12_14-122_57-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713351" version="1" comment="kgraft-patch-4_12_14-122_60-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713352" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713353" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713354" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713355" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713356" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713357" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713358" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713359" version="1" comment="kernel-livepatch-4_12_14-150_58-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713360" version="1" comment="kernel-livepatch-4_12_14-150_63-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713361" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=10-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713362" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713363" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713364" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713365" version="1" comment="kernel-livepatch-4_12_14-197_56-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713366" version="1" comment="kernel-livepatch-4_12_14-197_61-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049269"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713367" version="1" comment="kernel-livepatch-4_12_14-197_64-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713368" version="1" comment="kernel-livepatch-4_12_14-197_67-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713369" version="1" comment="kernel-livepatch-4_12_14-197_72-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713370" version="1" comment="kernel-livepatch-4_12_14-197_75-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713371" version="1" comment="kernel-livepatch-4_12_14-197_78-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713372" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713373" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713374" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713375" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713376" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713377" version="1" comment="kernel-livepatch-5_3_18-24_15-default is &gt;=14-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713378" version="1" comment="kernel-livepatch-5_3_18-24_24-default is &gt;=14-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713379" version="1" comment="kernel-livepatch-5_3_18-24_29-default is &gt;=12-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713380" version="1" comment="kernel-livepatch-5_3_18-24_34-default is &gt;=12-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713381" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=12-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713382" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=11-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713383" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=11-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713384" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=10-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713385" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=9-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713386" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=4-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713387" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=6-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713388" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=6-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713389" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=4-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713390" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=4-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713391" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=3-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713392" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=2-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713393" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=6-3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713394" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=4-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713395" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=4-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713396" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=3-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713397" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=2-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713398" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=4-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713399" version="1" comment="kernel-livepatch-5_3_18-24_37-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713400" version="1" comment="kernel-livepatch-5_3_18-24_43-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713401" version="1" comment="kernel-livepatch-5_3_18-24_46-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713402" version="1" comment="kernel-livepatch-5_3_18-24_49-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713403" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713404" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713405" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713406" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713407" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698825" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=2-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716156" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=3-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718697" version="1" comment="kernel-default is ==5.3.18-150200.24.129.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718698" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725507" version="1" comment="kernel-default is ==5.3.18-150200.24.134.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172960"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725508" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713408" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713409" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713410" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713411" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713412" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713413" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713414" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713415" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713416" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713417" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713418" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713419" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713420" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713421" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713422" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713423" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713424" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713425" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713426" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713427" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713428" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=2-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701443" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=3-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701404" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=2-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706112" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709695" version="1" comment="kernel-default is ==5.3.18-150300.59.90.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169303"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715597" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=3-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715598" version="1" comment="kernel-default is ==5.3.18-150300.59.93.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715599" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=2-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725509" version="1" comment="kernel-default is ==5.3.18-150300.59.98.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725510" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713429" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=14-150200.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713430" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713431" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713432" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713433" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713434" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713435" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713436" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713437" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713438" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713439" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698875" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=2-150400.4.3.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715600" version="1" comment="kernel-default is ==5.14.21-150400.24.21.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715601" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=2-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725511" version="1" comment="kernel-default is ==5.14.21-150400.24.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172962"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725512" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729488" version="1" comment="kernel-default is ==5.14.21-150400.24.33.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729489" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729490" version="1" comment="kernel-default is &lt;5.14.21-150400.24.33.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713440" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713441" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713442" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713443" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713444" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713445" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713446" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713447" version="1" comment="kernel-default is &lt;4.12.14-95.96.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713448" version="1" comment="kernel-livepatch-4_12_14-150000_150_89-default is &gt;=2-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713449" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=15-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713450" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=12-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713451" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=7-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713452" version="1" comment="kernel-livepatch-4_12_14-150_83-default is &gt;=4-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713453" version="1" comment="kernel-livepatch-4_12_14-150_86-default is &gt;=3-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713454" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=13-150200.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713455" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713456" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713457" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713458" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713459" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713460" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713461" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713462" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713463" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713464" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=4-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713465" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=4-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713466" version="1" comment="kgraft-patch-4_12_14-95_68-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713467" version="1" comment="kgraft-patch-4_12_14-95_71-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713468" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713469" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713470" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713471" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713472" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713473" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713474" version="1" comment="kgraft-patch-4_12_14-122_63-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713475" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713476" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713477" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713478" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713479" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713480" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713481" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713482" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713483" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713484" version="1" comment="kernel-livepatch-4_12_14-150_66-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713485" version="1" comment="kernel-livepatch-4_12_14-150_69-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713486" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713487" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713488" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713489" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713490" version="1" comment="kernel-livepatch-4_12_14-197_83-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713491" version="1" comment="kernel-livepatch-4_12_14-197_86-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713492" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713493" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713494" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713495" version="1" comment="kernel-livepatch-5_3_18-24_52-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713496" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713497" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713498" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713499" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713500" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713501" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713502" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713503" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713504" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713505" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713506" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713507" version="1" comment="kernel-default is &lt;5.3.18-24.96.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713508" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=11-3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713509" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713510" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713511" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713512" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713513" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=5-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713514" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=5-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713515" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=4-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713516" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=3-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713517" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=3-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713518" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713519" version="1" comment="kernel-default is &lt;4.12.14-122.91.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713520" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713521" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713522" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713523" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713524" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713525" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=2-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713526" version="1" comment="kernel-default is &lt;5.3.18-24.86.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713527" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713528" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713529" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713530" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=4-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044012" version="1" comment="patch is &lt;2.7.6-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247654"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151547" version="1" comment="patch is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776021" version="1" comment="kernel-default is ==4.12.14-122.162.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868478" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794744" version="1" comment="kernel-default is ==4.12.14-122.165.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868479" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798684" version="1" comment="kernel-default is ==4.12.14-122.173.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868480" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807350" version="1" comment="kernel-default is ==4.12.14-122.176.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190537"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868481" version="1" comment="kgraft-patch-4_12_14-122_176-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807695" version="1" comment="kernel-default is ==4.12.14-122.179.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868482" version="1" comment="kgraft-patch-4_12_14-122_179-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816437" version="1" comment="kernel-default is ==4.12.14-122.183.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868483" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845680" version="1" comment="kernel-default is ==4.12.14-122.186.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868926" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845682" version="1" comment="kernel-default is ==4.12.14-122.189.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868484" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849119" version="1" comment="kernel-default is ==4.12.14-122.194.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868485" version="1" comment="kgraft-patch-4_12_14-122_194-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854320" version="1" comment="kernel-default is ==4.12.14-122.201.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201675"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960101" version="1" comment="kgraft-patch-4_12_14-122_201-default is &gt;=11-8.10.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868487" version="1" comment="kernel-default is ==4.12.14-122.216.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960102" version="1" comment="kgraft-patch-4_12_14-122_216-default is &gt;=9-8.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868489" version="1" comment="kernel-default is &lt;4.12.14-122.216.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776028" version="1" comment="kernel-default is ==5.3.18-150200.24.154.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868490" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=13-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795754" version="1" comment="kernel-default is ==5.3.18-150200.24.157.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868491" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799561" version="1" comment="kernel-default is ==5.3.18-150200.24.160.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868492" version="1" comment="kernel-livepatch-5_3_18-150200_24_160-default is &gt;=11-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804085" version="1" comment="kernel-default is ==5.3.18-150200.24.163.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189889"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868493" version="1" comment="kernel-livepatch-5_3_18-150200_24_163-default is &gt;=10-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804087" version="1" comment="kernel-default is ==5.3.18-150200.24.166.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189890"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868494" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=10-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816090" version="1" comment="kernel-default is ==5.3.18-150200.24.169.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868495" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=10-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845690" version="1" comment="kernel-default is ==5.3.18-150200.24.172.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868496" version="1" comment="kernel-livepatch-5_3_18-150200_24_172-default is &gt;=8-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845859" version="1" comment="kernel-default is ==5.3.18-150200.24.175.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868497" version="1" comment="kernel-livepatch-5_3_18-150200_24_175-default is &gt;=9-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849454" version="1" comment="kernel-default is ==5.3.18-150200.24.178.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868498" version="1" comment="kernel-livepatch-5_3_18-150200_24_178-default is &gt;=6-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854323" version="1" comment="kernel-default is ==5.3.18-150200.24.183.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201678"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956848" version="1" comment="kernel-livepatch-5_3_18-150200_24_183-default is &gt;=10-150200.5.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228903"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861753" version="1" comment="kernel-default is ==5.3.18-150200.24.188.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957141" version="1" comment="kernel-livepatch-5_3_18-150200_24_188-default is &gt;=9-150200.5.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861755" version="1" comment="kernel-default is &lt;5.3.18-150200.24.188.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775813" version="1" comment="kernel-default is ==5.3.18-150300.59.124.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868501" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796008" version="1" comment="kernel-default is ==5.3.18-150300.59.127.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868502" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799638" version="1" comment="kernel-default is ==5.3.18-150300.59.130.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868503" version="1" comment="kernel-livepatch-5_3_18-150300_59_130-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804090" version="1" comment="kernel-default is ==5.3.18-150300.59.133.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189892"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868504" version="1" comment="kernel-livepatch-5_3_18-150300_59_133-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804092" version="1" comment="kernel-default is ==5.3.18-150300.59.138.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868505" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816440" version="1" comment="kernel-default is ==5.3.18-150300.59.141.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868506" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845693" version="1" comment="kernel-default is ==5.3.18-150300.59.144.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199830"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868507" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845695" version="1" comment="kernel-default is ==5.3.18-150300.59.147.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868508" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849457" version="1" comment="kernel-default is ==5.3.18-150300.59.150.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868509" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854326" version="1" comment="kernel-default is ==5.3.18-150300.59.153.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201681"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961304" version="1" comment="kernel-livepatch-5_3_18-150300_59_153-default is &gt;=12-150300.7.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861761" version="1" comment="kernel-default is ==5.3.18-150300.59.158.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961280" version="1" comment="kernel-livepatch-5_3_18-150300_59_158-default is &gt;=11-150300.7.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861763" version="1" comment="kernel-default is &lt;5.3.18-150300.59.158.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968248" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=18-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968249" version="1" comment="kernel-livepatch-5_3_18-150300_59_153-default is &gt;=15-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968250" version="1" comment="kernel-livepatch-5_3_18-150300_59_158-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868517" version="1" comment="kernel-default is ==5.3.18-150300.59.161.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968251" version="1" comment="kernel-livepatch-5_3_18-150300_59_161-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871852" version="1" comment="kernel-default is &lt;5.3.18-150300.59.161.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947485" version="1" comment="kernel-livepatch-5_3_18-150200_24_163-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947486" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947487" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947488" version="1" comment="kernel-livepatch-5_3_18-150200_24_172-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947489" version="1" comment="kernel-livepatch-5_3_18-150200_24_175-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947408" version="1" comment="kernel-livepatch-5_3_18-150200_24_178-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868514" version="1" comment="kernel-default is ==5.3.18-150200.24.191.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956850" version="1" comment="kernel-livepatch-5_3_18-150200_24_191-default is &gt;=8-150200.5.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066881"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878063" version="1" comment="kernel-default is ==5.3.18-150200.24.194.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206781"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956851" version="1" comment="kernel-livepatch-5_3_18-150200_24_194-default is &gt;=5-150200.5.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947492" version="1" comment="kernel-default is ==5.3.18-150200.24.197.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956852" version="1" comment="kernel-livepatch-5_3_18-150200_24_197-default is &gt;=4-150200.5.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947494" version="1" comment="kernel-default is &lt;5.3.18-150200.24.197.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947495" version="1" comment="kernel-livepatch-5_3_18-150300_59_133-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947496" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947497" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947498" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947499" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947500" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961281" version="1" comment="kernel-livepatch-5_3_18-150300_59_161-default is &gt;=10-150300.7.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228904"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878066" version="1" comment="kernel-default is ==5.3.18-150300.59.164.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206783"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961282" version="1" comment="kernel-livepatch-5_3_18-150300_59_164-default is &gt;=7-150300.7.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947503" version="1" comment="kernel-default is ==5.3.18-150300.59.167.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961305" version="1" comment="kernel-livepatch-5_3_18-150300_59_167-default is &gt;=6-150300.7.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947505" version="1" comment="kernel-default is &lt;5.3.18-150300.59.167.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881211" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881212" version="1" comment="kgraft-patch-4_12_14-122_176-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881075" version="1" comment="kgraft-patch-4_12_14-122_179-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881213" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881214" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881215" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881216" version="1" comment="kgraft-patch-4_12_14-122_194-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881217" version="1" comment="kernel-livepatch-5_3_18-150200_24_160-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881218" version="1" comment="kernel-livepatch-5_3_18-150200_24_163-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881219" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881220" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881221" version="1" comment="kernel-livepatch-5_3_18-150200_24_172-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881222" version="1" comment="kernel-livepatch-5_3_18-150200_24_175-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881223" version="1" comment="kernel-livepatch-5_3_18-150200_24_178-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868516" version="1" comment="kernel-default is &lt;5.3.18-150200.24.191.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881225" version="1" comment="kernel-livepatch-5_3_18-150300_59_130-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881226" version="1" comment="kernel-livepatch-5_3_18-150300_59_133-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881227" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881228" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881229" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881230" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881231" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874159" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874160" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874161" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874162" version="1" comment="kgraft-patch-4_12_14-122_176-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874163" version="1" comment="kgraft-patch-4_12_14-122_179-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874164" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874165" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874166" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874167" version="1" comment="kgraft-patch-4_12_14-122_194-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871835" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871836" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871837" version="1" comment="kernel-livepatch-5_3_18-150200_24_160-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871838" version="1" comment="kernel-livepatch-5_3_18-150200_24_163-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871839" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871840" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871841" version="1" comment="kernel-livepatch-5_3_18-150200_24_172-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871842" version="1" comment="kernel-livepatch-5_3_18-150200_24_175-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871843" version="1" comment="kernel-livepatch-5_3_18-150200_24_178-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871845" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871846" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871847" version="1" comment="kernel-livepatch-5_3_18-150300_59_130-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872165" version="1" comment="kernel-livepatch-5_3_18-150300_59_133-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871848" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871849" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872415" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871850" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872166" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968252" version="1" comment="kgraft-patch-4_12_14-122_201-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968253" version="1" comment="kgraft-patch-4_12_14-122_216-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966031" version="1" comment="kgraft-patch-4_12_14-122_194-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965285" version="1" comment="kgraft-patch-4_12_14-122_201-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965820" version="1" comment="kgraft-patch-4_12_14-122_216-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845879" version="1" comment="kernel-default is ==5.14.21-150500.55.36.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199854"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956546" version="1" comment="kernel-livepatch-5_14_21-150500_55_36-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845884" version="1" comment="kernel-default is ==5.14.21-150500.55.39.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956854" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849163" version="1" comment="kernel-default is ==5.14.21-150500.55.44.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956547" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854334" version="1" comment="kernel-default is ==5.14.21-150500.55.49.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961306" version="1" comment="kernel-livepatch-5_14_21-150500_55_49-default is &gt;=13-150500.11.8.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861773" version="1" comment="kernel-default is ==5.14.21-150500.55.52.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961307" version="1" comment="kernel-livepatch-5_14_21-150500_55_52-default is &gt;=11-150500.11.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229948"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861864" version="1" comment="kernel-default is ==5.14.21-150500.55.59.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203284"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961308" version="1" comment="kernel-livepatch-5_14_21-150500_55_59-default is &gt;=11-150500.11.10.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229949"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872677" version="1" comment="kernel-default is ==5.14.21-150500.55.62.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961309" version="1" comment="kernel-livepatch-5_14_21-150500_55_62-default is &gt;=9-150500.11.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873488" version="1" comment="kernel-default is ==5.14.21-150500.55.65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961310" version="1" comment="kernel-livepatch-5_14_21-150500_55_65-default is &gt;=9-150500.11.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228852"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878545" version="1" comment="kernel-default is ==5.14.21-150500.55.68.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961311" version="1" comment="kernel-livepatch-5_14_21-150500_55_68-default is &gt;=8-150500.11.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956857" version="1" comment="kernel-default is ==5.14.21-150500.55.73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960514" version="1" comment="kernel-livepatch-5_14_21-150500_55_73-default is &gt;=3-150500.11.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204841"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956859" version="1" comment="kernel-default is &lt;5.14.21-150500.55.73.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228906"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948640" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=15-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948641" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=15-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948642" version="1" comment="kernel-livepatch-5_3_18-150200_24_172-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948620" version="1" comment="kernel-livepatch-5_3_18-150200_24_175-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950329" version="1" comment="kernel-livepatch-5_3_18-150200_24_178-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948643" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=15-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948644" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948645" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950330" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948646" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846011" version="1" comment="kernel-default is ==5.14.21-150400.24.100.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948621" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849156" version="1" comment="kernel-default is ==5.14.21-150400.24.103.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948647" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854329" version="1" comment="kernel-default is ==5.14.21-150400.24.108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201683"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961312" version="1" comment="kernel-livepatch-5_14_21-150400_24_108-default is &gt;=13-150400.9.8.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861848" version="1" comment="kernel-default is ==5.14.21-150400.24.111.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203280"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961313" version="1" comment="kernel-livepatch-5_14_21-150400_24_111-default is &gt;=11-150400.9.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861850" version="1" comment="kernel-default is ==5.14.21-150400.24.116.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961314" version="1" comment="kernel-livepatch-5_14_21-150400_24_116-default is &gt;=11-150400.9.8.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868526" version="1" comment="kernel-default is ==5.14.21-150400.24.119.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961315" version="1" comment="kernel-livepatch-5_14_21-150400_24_119-default is &gt;=10-150400.9.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878543" version="1" comment="kernel-default is ==5.14.21-150400.24.122.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961316" version="1" comment="kernel-livepatch-5_14_21-150400_24_122-default is &gt;=8-150400.9.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226739"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947538" version="1" comment="kernel-default is ==5.14.21-150400.24.125.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960109" version="1" comment="kernel-livepatch-5_14_21-150400_24_125-default is &gt;=5-150400.9.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807720" version="1" comment="kernel-default is ==5.14.21-150400.24.88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948652" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=15-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816464" version="1" comment="kernel-default is ==5.14.21-150400.24.92.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948653" version="1" comment="kernel-livepatch-5_14_21-150400_24_92-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846009" version="1" comment="kernel-default is ==5.14.21-150400.24.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948654" version="1" comment="kernel-livepatch-5_14_21-150400_24_97-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849160" version="1" comment="kernel-default is &lt;5.14.21-150400.24.97.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200519"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807722" version="1" comment="kernel-default is ==5.14.21-150500.55.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948655" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=15-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816469" version="1" comment="kernel-default is ==5.14.21-150500.55.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948656" version="1" comment="kernel-livepatch-5_14_21-150500_55_31-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950373" version="1" comment="kernel-livepatch-5_14_21-150500_55_36-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950374" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950292" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943401" version="1" comment="kernel-default is &lt;5.14.21-150500.55.68.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713531" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713532" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713533" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=3-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713534" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=2-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713535" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=2-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698691" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=16-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698693" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698695" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698697" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698700" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698702" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698704" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=16-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698706" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698708" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698710" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698712" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698714" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698716" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698718" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698721" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=16-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166509"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698723" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=13-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698725" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=8-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698728" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=8-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698730" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=16-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698732" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=15-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698734" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=13-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698737" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698739" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=16-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698741" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698743" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698745" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698747" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698749" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698751" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698753" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698755" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698757" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698760" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698762" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698764" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=16-150200.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698766" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698768" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698770" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698772" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698774" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698776" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698778" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698780" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698782" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698784" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713536" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713537" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=2-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713538" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=2-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713539" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713540" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713541" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713542" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713543" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713544" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713545" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713546" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713547" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713548" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713549" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713550" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713551" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713552" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713553" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713554" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=13-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713555" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=10-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713556" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=5-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713557" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=5-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713558" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=13-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713559" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=12-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713560" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=10-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713561" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713562" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713563" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713564" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713565" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713566" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713567" version="1" comment="kernel-default is &lt;4.12.14-95.88.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713568" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713569" version="1" comment="kernel-livepatch-4_12_14-150_83-default is &gt;=2-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701264" version="1" comment="kernel-default is &lt;4.12.14-150.83.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713570" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713571" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713572" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713573" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713574" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713575" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713576" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713577" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713578" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713579" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713580" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713581" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713582" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713583" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713584" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713585" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713586" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713587" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713588" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=16-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713589" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713590" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713591" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713592" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713593" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713594" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713595" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713596" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713597" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713598" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=7-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713599" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713600" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713601" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=15-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166520"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713602" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=14-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713603" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=12-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698787" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698789" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698790" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698792" version="1" comment="kernel-livepatch-5_3_18-24_61-default is &gt;=15-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698793" version="1" comment="kernel-livepatch-5_3_18-24_64-default is &gt;=15-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698794" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698795" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698796" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698797" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698798" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698799" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698800" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698801" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698802" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698803" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698804" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698806" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698808" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698810" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698811" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=15-150200.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698812" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698813" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698814" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698815" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698816" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698817" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698818" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698819" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698820" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698821" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713604" version="1" comment="kernel-default is &lt;4.12.14-95.93.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009685665" version="1" comment="kernel-default is &lt;5.14.21-150400.22.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009161423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713605" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=16-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713606" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713607" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713608" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713609" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713610" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713611" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713612" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713613" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713614" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=16-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713615" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=16-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713616" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713617" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713618" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713619" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713620" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713621" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=14-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713622" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=9-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713623" version="1" comment="kernel-livepatch-4_12_14-150_83-default is &gt;=5-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713624" version="1" comment="kernel-livepatch-4_12_14-150_86-default is &gt;=4-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713625" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=9-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713626" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=5-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713627" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=4-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713628" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=16-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713629" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=14-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713630" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=8-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713631" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=7-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713632" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=16-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713633" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=16-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713634" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=16-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713635" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=15-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713636" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=14-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713637" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713638" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713639" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=11-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713640" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=10-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713641" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=9-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713642" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713643" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713644" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713645" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713646" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=6-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713647" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=18-150200.3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713648" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713649" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713650" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713651" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713652" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713653" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713654" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713655" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713656" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713657" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698823" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=4-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698826" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=9-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698827" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=8-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698828" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=17-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698829" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=17-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698830" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=16-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698831" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=15-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698832" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=13-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698833" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=13-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698834" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698835" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=11-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698836" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=10-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698837" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698838" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698839" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698840" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698841" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698843" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=4-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698845" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=3-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698847" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=2-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009709696" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698848" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=19-150200.3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698849" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698850" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698851" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698852" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698853" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698854" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698855" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698856" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698857" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698858" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713658" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713659" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713660" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713661" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713662" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713663" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713664" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713665" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713666" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713667" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713668" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713669" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713670" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713671" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713672" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713673" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713674" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713675" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713676" version="1" comment="kernel-livepatch-5_3_18-24_53_4-default is &gt;=15-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052214"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713677" version="1" comment="kernel-livepatch-5_3_18-24_67-default is &gt;=15-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051675"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713678" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=15-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713679" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713680" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713681" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713682" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713683" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713684" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713685" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713686" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713687" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713688" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713689" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713690" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713691" version="1" comment="kernel-livepatch-5_3_18-57-default is &gt;=17-150200.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051701"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713692" version="1" comment="kernel-livepatch-5_3_18-59_10-default is &gt;=15-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713693" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=15-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713694" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713695" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713696" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713697" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713698" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713699" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713700" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713701" version="1" comment="kernel-livepatch-5_3_18-59_5-default is &gt;=15-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713702" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713703" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713704" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713705" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713706" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713707" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713708" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713709" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713710" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713711" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=17-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713712" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713713" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713714" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713715" version="1" comment="kernel-livepatch-4_12_14-150000_150_89-default is &gt;=6-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713716" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=12-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713717" version="1" comment="kernel-livepatch-4_12_14-150_83-default is &gt;=8-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713718" version="1" comment="kernel-livepatch-4_12_14-150_86-default is &gt;=7-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713719" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=6-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713720" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=12-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713721" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=8-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713722" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=7-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714500" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714501" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714502" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715338" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715339" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715340" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715603" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714503" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715341" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714504" version="1" comment="kgraft-patch-4_12_14-122_121-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715342" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=17-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714505" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=17-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714506" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715811" version="1" comment="kernel-livepatch-4_12_14-150000_150_89-default is &gt;=8-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715604" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=14-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715605" version="1" comment="kernel-livepatch-4_12_14-150_83-default is &gt;=10-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714507" version="1" comment="kernel-livepatch-4_12_14-150_86-default is &gt;=9-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714508" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=8-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715606" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=14-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714509" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=10-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715607" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=9-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716236" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=8-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716237" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=13-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715812" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715813" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=17-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715814" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=17-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716238" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=16-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716239" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=15-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716240" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=14-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716157" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715815" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714900" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716158" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715608" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715609" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716159" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715610" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715611" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715612" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715816" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715817" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714902" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=6-150400.4.15.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713723" version="1" comment="kgraft-patch-4_12_14-95_99-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713724" version="1" comment="kgraft-patch-4_12_14-122_121-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713725" version="1" comment="kgraft-patch-4_12_14-122_124-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713726" version="1" comment="kernel-livepatch-4_12_14-150000_150_92-default is &gt;=3-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713727" version="1" comment="kernel-livepatch-4_12_14-150100_197_114-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713728" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=6-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713729" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713730" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=11-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713731" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=10-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713732" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=17-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713733" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=15-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713734" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=15-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713735" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=14-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713736" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=13-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713737" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713738" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713739" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713740" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713741" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713742" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713743" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=6-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713744" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=5-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713745" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713746" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713747" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713748" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713749" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713750" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713751" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713752" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713753" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=4-150400.4.9.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701141" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=16-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701142" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=11-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701406" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=7-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701144" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=6-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701408" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=5-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701146" version="1" comment="kgraft-patch-4_12_14-95_99-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701409" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=12-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701410" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=10-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701412" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=8-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701414" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=7-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701149" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=5-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701416" version="1" comment="kgraft-patch-4_12_14-122_121-default is &gt;=3-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701417" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=18-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701418" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=17-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701419" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=16-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701420" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=14-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701152" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=14-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701153" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=12-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701422" version="1" comment="kernel-livepatch-4_12_14-150000_150_89-default is &gt;=5-150000.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701423" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=16-150000.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701424" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=11-150000.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701263" version="1" comment="kernel-livepatch-4_12_14-150_83-default is &gt;=7-150000.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701426" version="1" comment="kernel-livepatch-4_12_14-150_86-default is &gt;=6-150000.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701266" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=5-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701267" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=11-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701429" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=7-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701269" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=6-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701430" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=16-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167204"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701271" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=5-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701431" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=10-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701272" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=9-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701432" version="1" comment="kernel-livepatch-5_3_18-24_70-default is &gt;=18-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052139"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701273" version="1" comment="kernel-livepatch-5_3_18-24_75-default is &gt;=17-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701433" version="1" comment="kernel-livepatch-5_3_18-24_78-default is &gt;=16-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052225"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701274" version="1" comment="kernel-livepatch-5_3_18-24_83-default is &gt;=14-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701434" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=14-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701435" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=13-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701275" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=12-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701276" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=11-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701436" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=11-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701437" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=11-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701438" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=10-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701439" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=9-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701440" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=8-150300.3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167212"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701441" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=5-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701442" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=4-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701444" version="1" comment="kernel-livepatch-5_3_18-59_13-default is &gt;=18-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701445" version="1" comment="kernel-livepatch-5_3_18-59_16-default is &gt;=17-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052203"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701446" version="1" comment="kernel-livepatch-5_3_18-59_19-default is &gt;=16-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701447" version="1" comment="kernel-livepatch-5_3_18-59_24-default is &gt;=14-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701448" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=14-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701449" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=13-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701450" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=12-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701451" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=12-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701453" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=3-150400.4.6.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167222"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713754" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713755" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713756" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713757" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713758" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713759" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713760" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713761" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713762" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713763" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713764" version="1" comment="kgraft-patch-4_12_14-122_121-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713765" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=17-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713766" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=16-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713767" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713768" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713769" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713770" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713771" version="1" comment="kernel-livepatch-4_12_14-150000_150_89-default is &gt;=4-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713772" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=15-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170157"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713773" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=10-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713774" version="1" comment="kernel-livepatch-4_12_14-150_83-default is &gt;=6-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713775" version="1" comment="kernel-livepatch-4_12_14-150_86-default is &gt;=5-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713776" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=4-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713777" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=10-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713778" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=6-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713779" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=5-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713780" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=15-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170160"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725514" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701151" version="1" comment="kgraft-patch-4_12_14-122_124-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701261" version="1" comment="kernel-livepatch-4_12_14-150000_150_92-default is &gt;=2-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701155" version="1" comment="kernel-livepatch-4_12_14-150100_197_114-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701157" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713781" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713782" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713783" version="1" comment="kgraft-patch-4_12_14-122_66-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713784" version="1" comment="kgraft-patch-4_12_14-122_71-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713785" version="1" comment="kgraft-patch-4_12_14-122_74-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051677"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713786" version="1" comment="kgraft-patch-4_12_14-122_77-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052174"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713787" version="1" comment="kgraft-patch-4_12_14-122_80-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052205"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713788" version="1" comment="kgraft-patch-4_12_14-122_83-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052227"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713789" version="1" comment="kgraft-patch-4_12_14-122_88-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713790" version="1" comment="kgraft-patch-4_12_14-122_91-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713791" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713792" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=6-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713793" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713794" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713795" version="1" comment="kernel-livepatch-4_12_14-197_89-default is &gt;=14-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713796" version="1" comment="kernel-livepatch-4_12_14-197_92-default is &gt;=13-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051674"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166522"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713797" version="1" comment="kernel-livepatch-4_12_14-197_99-default is &gt;=11-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725516" version="1" comment="kgraft-patch-4_12_14-95_105-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725518" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725520" version="1" comment="kernel-livepatch-4_12_14-150000_150_98-default is &gt;=4-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725522" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725524" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725526" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737234" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737179" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737180" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737181" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737182" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737235" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=17-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737236" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=16-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737318" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=18-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729590" version="1" comment="kernel-default is ==5.3.18-150300.59.101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009738271" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737319" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=18-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737320" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=18-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737321" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737610" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737611" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737612" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737322" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737323" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737324" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737364" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737238" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737239" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737365" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729113" version="1" comment="kernel-default is &lt;5.3.18-150300.59.98.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737366" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=10-150400.4.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174881"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737613" version="1" comment="kernel-livepatch-5_14_21-150400_24_11-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737367" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009738272" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737368" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737614" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713799" version="1" comment="kgraft-patch-4_12_14-95_74-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713800" version="1" comment="kgraft-patch-4_12_14-95_77-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713801" version="1" comment="kgraft-patch-4_12_14-95_80-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713802" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713803" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713804" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713805" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713806" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713807" version="1" comment="kernel-livepatch-4_12_14-150_72-default is &gt;=14-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713808" version="1" comment="kernel-livepatch-4_12_14-150_75-default is &gt;=11-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052200"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713809" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=6-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713810" version="1" comment="kernel-livepatch-4_12_14-150_83-default is &gt;=3-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713811" version="1" comment="kernel-livepatch-4_12_14-150_86-default is &gt;=2-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715614" version="1" comment="kgraft-patch-4_12_14-122_124-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715615" version="1" comment="kgraft-patch-4_12_14-122_127-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715343" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714903" version="1" comment="kernel-livepatch-4_12_14-150100_197_114-default is &gt;=5-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714904" version="1" comment="kernel-livepatch-4_12_14-150100_197_117-default is &gt;=3-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714905" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=3-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009716160" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=6-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715818" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=6-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714906" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=5-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715344" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=4-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715616" version="1" comment="kernel-livepatch-5_14_21-150400_24_11-default is &gt;=3-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729566" version="1" comment="kgraft-patch-4_12_14-95_83-default is &gt;=16-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729567" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729771" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729491" version="1" comment="kgraft-patch-4_12_14-122_103-default is &gt;=17-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729492" version="1" comment="kgraft-patch-4_12_14-122_106-default is &gt;=15-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729493" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729494" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729568" version="1" comment="kgraft-patch-4_12_14-122_98-default is &gt;=17-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729569" version="1" comment="kernel-livepatch-4_12_14-150_78-default is &gt;=16-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729570" version="1" comment="kernel-livepatch-4_12_14-150_83-default is &gt;=12-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729571" version="1" comment="kernel-livepatch-4_12_14-150_86-default is &gt;=11-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173046"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729496" version="1" comment="kernel-livepatch-4_12_14-197_102-default is &gt;=16-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729497" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=12-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729498" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=11-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729772" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=16-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729773" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=15-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729774" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=17-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729572" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729573" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729499" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729574" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729500" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729575" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=19-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729576" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=18-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729577" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=18-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755119" version="1" comment="kgraft-patch-4_12_14-95_102-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755215" version="1" comment="kgraft-patch-4_12_14-95_105-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755384" version="1" comment="kgraft-patch-4_12_14-95_99-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755120" version="1" comment="kgraft-patch-4_12_14-122_121-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755216" version="1" comment="kgraft-patch-4_12_14-122_124-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755217" version="1" comment="kgraft-patch-4_12_14-122_127-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755121" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725519" version="1" comment="kernel-default is &lt;4.12.14-122.130.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755218" version="1" comment="kernel-livepatch-4_12_14-150100_197_114-default is &gt;=11-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755219" version="1" comment="kernel-livepatch-4_12_14-150100_197_117-default is &gt;=9-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755220" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=9-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725523" version="1" comment="kernel-default is &lt;4.12.14-150100.197.120.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755221" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=13-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755222" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=10-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725525" version="1" comment="kernel-default is &lt;5.3.18-150200.24.126.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713812" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713813" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713814" version="1" comment="kernel-livepatch-4_12_14-150000_150_89-default is &gt;=3-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713815" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=3-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713816" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=3-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009713817" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=3-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737240" version="1" comment="kgraft-patch-4_12_14-95_102-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737009" version="1" comment="kgraft-patch-4_12_14-95_105-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714512" version="1" comment="kernel-default is ==4.12.14-95.108.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737241" version="1" comment="kgraft-patch-4_12_14-95_108-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729505" version="1" comment="kernel-default is ==4.12.14-95.111.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737242" version="1" comment="kgraft-patch-4_12_14-95_111-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737325" version="1" comment="kgraft-patch-4_12_14-95_88-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737326" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737369" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737327" version="1" comment="kgraft-patch-4_12_14-95_99-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737328" version="1" comment="kgraft-patch-4_12_14-122_110-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737329" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737370" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737330" version="1" comment="kgraft-patch-4_12_14-122_121-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737331" version="1" comment="kgraft-patch-4_12_14-122_124-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737371" version="1" comment="kgraft-patch-4_12_14-122_127-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737332" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715347" version="1" comment="kernel-default is ==4.12.14-122.133.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737372" version="1" comment="kgraft-patch-4_12_14-122_133-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729511" version="1" comment="kernel-default is ==4.12.14-122.136.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737333" version="1" comment="kgraft-patch-4_12_14-122_136-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729513" version="1" comment="kernel-default is &lt;4.12.14-122.136.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737244" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=11-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737183" version="1" comment="kernel-livepatch-4_12_14-150100_197_114-default is &gt;=8-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737184" version="1" comment="kernel-livepatch-4_12_14-150100_197_117-default is &gt;=6-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737185" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=6-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729104" version="1" comment="kernel-default is ==4.12.14-150100.197.123.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173640"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737010" version="1" comment="kernel-livepatch-4_12_14-150100_197_123-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729519" version="1" comment="kernel-default is ==4.12.14-150100.197.126.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173727"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737186" version="1" comment="kernel-livepatch-4_12_14-150100_197_126-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737187" version="1" comment="kernel-livepatch-4_12_14-197_105-default is &gt;=13-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737188" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=12-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725513" version="1" comment="kernel-default is &lt;5.14.21-150400.24.28.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172963"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729502" version="1" comment="kgraft-patch-4_12_14-95_102-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729503" version="1" comment="kgraft-patch-4_12_14-95_105-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729504" version="1" comment="kgraft-patch-4_12_14-95_108-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729506" version="1" comment="kgraft-patch-4_12_14-95_111-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729578" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729097" version="1" comment="kgraft-patch-4_12_14-95_99-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729579" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729507" version="1" comment="kgraft-patch-4_12_14-122_121-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729508" version="1" comment="kgraft-patch-4_12_14-122_124-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729509" version="1" comment="kgraft-patch-4_12_14-122_127-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729098" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729510" version="1" comment="kgraft-patch-4_12_14-122_133-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729512" version="1" comment="kgraft-patch-4_12_14-122_136-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729099" version="1" comment="kernel-default is ==4.12.14-150000.150.101.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729100" version="1" comment="kernel-livepatch-4_12_14-150000_150_101-default is &gt;=2-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729514" version="1" comment="kernel-default is ==4.12.14-150000.150.104.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729515" version="1" comment="kernel-livepatch-4_12_14-150000_150_104-default is &gt;=2-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729580" version="1" comment="kernel-livepatch-4_12_14-150000_150_89-default is &gt;=10-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170158"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729581" version="1" comment="kernel-livepatch-4_12_14-150000_150_92-default is &gt;=7-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729582" version="1" comment="kernel-livepatch-4_12_14-150000_150_95-default is &gt;=5-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729583" version="1" comment="kernel-livepatch-4_12_14-150000_150_98-default is &gt;=5-150000.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729517" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=10-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729102" version="1" comment="kernel-livepatch-4_12_14-150100_197_114-default is &gt;=7-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729103" version="1" comment="kernel-livepatch-4_12_14-150100_197_117-default is &gt;=5-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729518" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=5-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729105" version="1" comment="kernel-livepatch-4_12_14-150100_197_123-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729520" version="1" comment="kernel-livepatch-4_12_14-150100_197_126-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729775" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=11-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729107" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729108" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729521" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729109" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729584" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729585" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729522" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729586" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729523" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729524" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729111" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729112" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729587" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=9-150400.4.24.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729114" version="1" comment="kernel-livepatch-5_14_21-150400_24_11-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729115" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729588" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729589" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742686" version="1" comment="kgraft-patch-4_12_14-95_102-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742526" version="1" comment="kgraft-patch-4_12_14-95_105-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742527" version="1" comment="kgraft-patch-4_12_14-95_108-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742528" version="1" comment="kgraft-patch-4_12_14-95_111-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742251" version="1" comment="kernel-default is ==4.12.14-95.114.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742252" version="1" comment="kgraft-patch-4_12_14-95_114-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742529" version="1" comment="kgraft-patch-4_12_14-95_93-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742687" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742530" version="1" comment="kgraft-patch-4_12_14-95_99-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742531" version="1" comment="kgraft-patch-4_12_14-122_113-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742688" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742689" version="1" comment="kgraft-patch-4_12_14-122_121-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742532" version="1" comment="kgraft-patch-4_12_14-122_124-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742533" version="1" comment="kgraft-patch-4_12_14-122_127-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742534" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742690" version="1" comment="kgraft-patch-4_12_14-122_133-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742535" version="1" comment="kgraft-patch-4_12_14-122_136-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729116" version="1" comment="kernel-default is ==4.12.14-122.139.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742254" version="1" comment="kgraft-patch-4_12_14-122_139-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742255" version="1" comment="kernel-default is ==4.12.14-122.144.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175690"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742256" version="1" comment="kgraft-patch-4_12_14-122_144-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742257" version="1" comment="kernel-default is &lt;4.12.14-122.144.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175691"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742536" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=12-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742537" version="1" comment="kernel-livepatch-4_12_14-150100_197_114-default is &gt;=9-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742538" version="1" comment="kernel-livepatch-4_12_14-150100_197_117-default is &gt;=7-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742539" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=7-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742540" version="1" comment="kernel-livepatch-4_12_14-150100_197_123-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742541" version="1" comment="kernel-livepatch-4_12_14-150100_197_126-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742258" version="1" comment="kernel-default is ==4.12.14-150100.197.131.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742259" version="1" comment="kernel-livepatch-4_12_14-150100_197_131-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742542" version="1" comment="kernel-livepatch-4_12_14-197_108-default is &gt;=13-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742691" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=13-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742543" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742544" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742545" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742546" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742261" version="1" comment="kernel-default is ==5.3.18-150200.24.139.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742262" version="1" comment="kernel-livepatch-5_3_18-150200_24_139-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742547" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=17-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737237" version="1" comment="kernel-default is &lt;5.3.18-24.107.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742264" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742548" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742549" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742692" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742693" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742550" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742694" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742695" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742696" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742697" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742698" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743615" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=11-150400.7.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743616" version="1" comment="kernel-livepatch-5_14_21-150400_24_11-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743617" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743618" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743619" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715346" version="1" comment="kgraft-patch-4_12_14-95_102-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714511" version="1" comment="kgraft-patch-4_12_14-95_105-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714513" version="1" comment="kgraft-patch-4_12_14-95_108-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714514" version="1" comment="kgraft-patch-4_12_14-95_99-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715348" version="1" comment="kgraft-patch-4_12_14-122_133-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714515" version="1" comment="kernel-livepatch-4_12_14-150000_150_92-default is &gt;=5-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715618" version="1" comment="kernel-livepatch-4_12_14-150000_150_95-default is &gt;=3-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714516" version="1" comment="kernel-livepatch-4_12_14-150000_150_98-default is &gt;=3-150000.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715619" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=3-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718699" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=9-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718700" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718701" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718702" version="1" comment="kernel-livepatch-5_3_18-24_102-default is &gt;=14-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059335"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718703" version="1" comment="kernel-livepatch-5_3_18-24_107-default is &gt;=13-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718704" version="1" comment="kernel-livepatch-5_3_18-24_86-default is &gt;=18-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718705" version="1" comment="kernel-livepatch-5_3_18-24_93-default is &gt;=17-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718706" version="1" comment="kernel-livepatch-5_3_18-24_96-default is &gt;=16-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718707" version="1" comment="kernel-livepatch-5_3_18-24_99-default is &gt;=15-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718708" version="1" comment="kernel-livepatch-5_3_18-150300_59_43-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718709" version="1" comment="kernel-livepatch-5_3_18-150300_59_46-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718710" version="1" comment="kernel-livepatch-5_3_18-150300_59_49-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059336"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718860" version="1" comment="kernel-livepatch-5_3_18-150300_59_54-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718711" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718712" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718713" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718714" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718715" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718716" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718717" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718368" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718718" version="1" comment="kernel-livepatch-5_3_18-59_27-default is &gt;=18-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718719" version="1" comment="kernel-livepatch-5_3_18-59_34-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718720" version="1" comment="kernel-livepatch-5_3_18-59_37-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058693"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718721" version="1" comment="kernel-livepatch-5_3_18-59_40-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718722" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=7-150400.4.18.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718723" version="1" comment="kernel-livepatch-5_14_21-150400_24_11-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718370" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718371" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009715602" version="1" comment="kernel-default is &lt;5.14.21-150400.24.21.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729591" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725528" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725256" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009729117" version="1" comment="kgraft-patch-4_12_14-122_139-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737373" version="1" comment="kernel-default is ==5.14.21-150400.24.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174883"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737374" version="1" comment="kernel-livepatch-5_14_21-150400_24_38-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009737375" version="1" comment="kernel-default is &lt;5.14.21-150400.24.38.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174884"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769980" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769981" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=9-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769982" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=9-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770206" version="1" comment="kernel-livepatch-5_3_18-150200_24_139-default is &gt;=6-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751206" version="1" comment="kernel-default is ==5.3.18-150200.24.142.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769983" version="1" comment="kernel-livepatch-5_3_18-150200_24_142-default is &gt;=5-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751208" version="1" comment="kernel-default is ==5.3.18-150200.24.145.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769984" version="1" comment="kernel-livepatch-5_3_18-150200_24_145-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751210" version="1" comment="kernel-default is &lt;5.3.18-150200.24.145.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770207" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742266" version="1" comment="kernel-default is ==5.3.18-150300.59.106.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770208" version="1" comment="kernel-livepatch-5_3_18-150300_59_106-default is &gt;=6-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742711" version="1" comment="kernel-default is ==5.3.18-150300.59.109.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770209" version="1" comment="kernel-livepatch-5_3_18-150300_59_109-default is &gt;=6-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751212" version="1" comment="kernel-default is ==5.3.18-150300.59.112.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770210" version="1" comment="kernel-livepatch-5_3_18-150300_59_112-default is &gt;=5-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751214" version="1" comment="kernel-default is ==5.3.18-150300.59.115.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769985" version="1" comment="kernel-livepatch-5_3_18-150300_59_115-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770211" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770251" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770212" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770213" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770214" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770252" version="1" comment="kernel-livepatch-5_14_21-150400_24_11-default is &gt;=12-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770215" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=12-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770229" version="1" comment="kernel-default is ==4.12.14-122.159.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861619" version="1" comment="kgraft-patch-4_12_14-122_159-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861620" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861621" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861741" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861622" version="1" comment="kgraft-patch-4_12_14-122_176-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861623" version="1" comment="kgraft-patch-4_12_14-122_179-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861624" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861625" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861626" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861742" version="1" comment="kgraft-patch-4_12_14-122_194-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854322" version="1" comment="kernel-default is &lt;4.12.14-122.201.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764737" version="1" comment="kernel-default is ==5.3.18-150200.24.151.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861743" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861744" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861745" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861746" version="1" comment="kernel-livepatch-5_3_18-150200_24_160-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861747" version="1" comment="kernel-livepatch-5_3_18-150200_24_163-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861844" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861748" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861749" version="1" comment="kernel-livepatch-5_3_18-150200_24_172-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861750" version="1" comment="kernel-livepatch-5_3_18-150200_24_175-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861751" version="1" comment="kernel-livepatch-5_3_18-150200_24_178-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764740" version="1" comment="kernel-default is ==5.3.18-150300.59.121.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861756" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861757" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861758" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861759" version="1" comment="kernel-livepatch-5_3_18-150300_59_130-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861760" version="1" comment="kernel-livepatch-5_3_18-150300_59_133-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861628" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861629" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861845" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861846" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861630" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861764" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861765" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764673" version="1" comment="kernel-default is ==5.14.21-150400.24.60.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861766" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764743" version="1" comment="kernel-default is ==5.14.21-150400.24.63.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861852" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776036" version="1" comment="kernel-default is ==5.14.21-150400.24.66.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861853" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796010" version="1" comment="kernel-default is ==5.14.21-150400.24.69.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188238"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861767" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796012" version="1" comment="kernel-default is ==5.14.21-150400.24.74.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188239"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861854" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799692" version="1" comment="kernel-default is ==5.14.21-150400.24.81.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861855" version="1" comment="kernel-livepatch-5_14_21-150400_24_81-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861768" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861856" version="1" comment="kernel-livepatch-5_14_21-150400_24_92-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861769" version="1" comment="kernel-livepatch-5_14_21-150400_24_97-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877783" version="1" comment="kernel-rt is ==5.14.21-150500.11.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206736"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861770" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=13-150500.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776034" version="1" comment="kernel-default is ==5.14.21-150500.53.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861857" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=12-150500.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203283"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796015" version="1" comment="kernel-default is ==5.14.21-150500.55.12.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188241"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861858" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799694" version="1" comment="kernel-default is ==5.14.21-150500.55.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861859" version="1" comment="kernel-livepatch-5_14_21-150500_55_19-default is &gt;=10-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861860" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861861" version="1" comment="kernel-livepatch-5_14_21-150500_55_31-default is &gt;=8-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861862" version="1" comment="kernel-livepatch-5_14_21-150500_55_36-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861634" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861863" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796017" version="1" comment="kernel-default is ==5.14.21-150500.55.7.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009861775" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796019" version="1" comment="kernel-default is &lt;5.14.21-150500.55.7.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188244"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944105" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=11-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944106" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=9-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944081" version="1" comment="kernel-livepatch-5_14_21-150400_24_81-default is &gt;=14-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944429" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=13-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944082" version="1" comment="kernel-livepatch-5_14_21-150400_24_92-default is &gt;=12-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944107" version="1" comment="kernel-livepatch-5_14_21-150400_24_97-default is &gt;=11-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944108" version="1" comment="kernel-livepatch-5_14_21-150500_55_19-default is &gt;=14-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225893"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944109" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=13-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944110" version="1" comment="kernel-livepatch-5_14_21-150500_55_31-default is &gt;=12-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944111" version="1" comment="kernel-livepatch-5_14_21-150500_55_36-default is &gt;=11-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944112" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=11-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944113" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=10-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943397" version="1" comment="kernel-default is &lt;5.14.21-150500.55.59.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960110" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960111" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960112" version="1" comment="kgraft-patch-4_12_14-122_194-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868197" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=14-150500.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204842"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868931" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=13-150500.9.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205035"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765681" version="1" comment="kernel-default is &lt;5.14.21-150500.53.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182304"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970722" version="1" comment="kgraft-patch-4_12_14-122_201-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970723" version="1" comment="kgraft-patch-4_12_14-122_216-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878540" version="1" comment="kernel-default is ==4.12.14-122.219.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970724" version="1" comment="kgraft-patch-4_12_14-122_219-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947540" version="1" comment="kernel-default is ==4.12.14-122.222.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970725" version="1" comment="kgraft-patch-4_12_14-122_222-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956559" version="1" comment="kernel-default is ==4.12.14-122.225.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228856"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970726" version="1" comment="kgraft-patch-4_12_14-122_225-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960515" version="1" comment="kernel-default is ==4.12.14-122.228.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970727" version="1" comment="kgraft-patch-4_12_14-122_228-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968261" version="1" comment="kernel-default is &lt;4.12.14-122.228.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231613"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974048" version="1" comment="kernel-livepatch-5_3_18-150300_59_153-default is &gt;=16-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974049" version="1" comment="kernel-livepatch-5_3_18-150300_59_158-default is &gt;=15-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974166" version="1" comment="kernel-livepatch-5_3_18-150300_59_161-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974167" version="1" comment="kernel-livepatch-5_3_18-150300_59_164-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974050" version="1" comment="kernel-livepatch-5_3_18-150300_59_167-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956871" version="1" comment="kernel-default is ==5.3.18-150300.59.170.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974168" version="1" comment="kernel-livepatch-5_3_18-150300_59_170-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956873" version="1" comment="kernel-default is &lt;5.3.18-150300.59.170.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228911"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968254" version="1" comment="kgraft-patch-4_12_14-122_194-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968255" version="1" comment="kgraft-patch-4_12_14-122_219-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968256" version="1" comment="kgraft-patch-4_12_14-122_222-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947542" version="1" comment="kernel-default is &lt;4.12.14-122.222.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968257" version="1" comment="kernel-livepatch-5_3_18-150300_59_164-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968258" version="1" comment="kernel-livepatch-5_3_18-150300_59_167-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968259" version="1" comment="kgraft-patch-4_12_14-122_225-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968260" version="1" comment="kgraft-patch-4_12_14-122_228-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968262" version="1" comment="kernel-livepatch-5_3_18-150300_59_170-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960520" version="1" comment="kernel-default is ==5.3.18-150300.59.174.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968263" version="1" comment="kernel-livepatch-5_3_18-150300_59_174-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961325" version="1" comment="kernel-default is &lt;5.3.18-150300.59.174.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229955"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968264" version="1" comment="kernel-livepatch-5_14_21-150400_24_108-default is &gt;=16-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968265" version="1" comment="kernel-livepatch-5_14_21-150400_24_111-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968266" version="1" comment="kernel-livepatch-5_14_21-150400_24_116-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968267" version="1" comment="kernel-livepatch-5_14_21-150400_24_119-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968268" version="1" comment="kernel-livepatch-5_14_21-150400_24_122-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968269" version="1" comment="kernel-livepatch-5_14_21-150400_24_125-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957147" version="1" comment="kernel-default is ==5.14.21-150400.24.128.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968270" version="1" comment="kernel-livepatch-5_14_21-150400_24_128-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960526" version="1" comment="kernel-default is ==5.14.21-150400.24.133.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968271" version="1" comment="kernel-livepatch-5_14_21-150400_24_133-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963660" version="1" comment="kernel-default is &lt;5.14.21-150400.24.133.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968272" version="1" comment="kernel-livepatch-5_14_21-150500_55_49-default is &gt;=16-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968273" version="1" comment="kernel-livepatch-5_14_21-150500_55_52-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968274" version="1" comment="kernel-livepatch-5_14_21-150500_55_59-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968275" version="1" comment="kernel-livepatch-5_14_21-150500_55_62-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968276" version="1" comment="kernel-livepatch-5_14_21-150500_55_65-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968277" version="1" comment="kernel-livepatch-5_14_21-150500_55_68-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968278" version="1" comment="kernel-livepatch-5_14_21-150500_55_73-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960532" version="1" comment="kernel-default is ==5.14.21-150500.55.80.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968279" version="1" comment="kernel-livepatch-5_14_21-150500_55_80-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968280" version="1" comment="kernel-default is &lt;5.14.21-150500.55.80.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231615"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963652" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=17-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963347" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=16-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963348" version="1" comment="kernel-livepatch-5_3_18-150300_59_153-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963349" version="1" comment="kernel-livepatch-5_3_18-150300_59_158-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963350" version="1" comment="kernel-livepatch-5_3_18-150300_59_161-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963653" version="1" comment="kernel-livepatch-5_3_18-150300_59_164-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963351" version="1" comment="kernel-livepatch-5_3_18-150300_59_167-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963352" version="1" comment="kernel-livepatch-5_3_18-150300_59_170-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963353" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=15-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963354" version="1" comment="kernel-livepatch-5_14_21-150400_24_108-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963355" version="1" comment="kernel-livepatch-5_14_21-150400_24_111-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963356" version="1" comment="kernel-livepatch-5_14_21-150400_24_116-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963357" version="1" comment="kernel-livepatch-5_14_21-150400_24_119-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963654" version="1" comment="kernel-livepatch-5_14_21-150400_24_122-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963655" version="1" comment="kernel-livepatch-5_14_21-150400_24_125-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963358" version="1" comment="kernel-livepatch-5_14_21-150400_24_128-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957149" version="1" comment="kernel-default is &lt;5.14.21-150400.24.128.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963656" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=16-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963657" version="1" comment="kernel-livepatch-5_14_21-150500_55_49-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963359" version="1" comment="kernel-livepatch-5_14_21-150500_55_52-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963360" version="1" comment="kernel-livepatch-5_14_21-150500_55_59-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963361" version="1" comment="kernel-livepatch-5_14_21-150500_55_62-default is &gt;=10-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963362" version="1" comment="kernel-livepatch-5_14_21-150500_55_65-default is &gt;=10-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963363" version="1" comment="kernel-livepatch-5_14_21-150500_55_68-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963658" version="1" comment="kernel-livepatch-5_14_21-150500_55_73-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963659" version="1" comment="kernel-livepatch-5_14_21-150400_24_133-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947529" version="1" comment="kernel-default is &lt;5.14.21-150500.55.65.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960113" version="1" comment="kgraft-patch-4_12_14-122_219-default is &gt;=6-8.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960114" version="1" comment="kgraft-patch-4_12_14-122_222-default is &gt;=4-8.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960115" version="1" comment="kgraft-patch-4_12_14-122_225-default is &gt;=3-8.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205846"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960516" version="1" comment="kgraft-patch-4_12_14-122_228-default is &gt;=2-8.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960517" version="1" comment="kernel-default is ==4.12.14-122.231.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229700"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029759" version="1" comment="kgraft-patch-4_12_14-122_231-default is &gt;=18-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068424"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960519" version="1" comment="kernel-default is &lt;4.12.14-122.231.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960408" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=15-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960116" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=15-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960117" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961317" version="1" comment="kernel-livepatch-5_3_18-150300_59_170-default is &gt;=4-150300.7.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961318" version="1" comment="kernel-livepatch-5_3_18-150300_59_174-default is &gt;=3-150300.7.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960522" version="1" comment="kernel-default is ==5.3.18-150300.59.179.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960523" version="1" comment="kernel-livepatch-5_3_18-150300_59_179-default is &gt;=2-150300.7.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960524" version="1" comment="kernel-default is &lt;5.3.18-150300.59.179.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960339" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=15-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960118" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960525" version="1" comment="kernel-livepatch-5_14_21-150400_24_128-default is &gt;=3-150400.9.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960527" version="1" comment="kernel-livepatch-5_14_21-150400_24_133-default is &gt;=2-150400.9.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960528" version="1" comment="kernel-default is ==5.14.21-150400.24.136.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960529" version="1" comment="kernel-livepatch-5_14_21-150400_24_136-default is &gt;=2-150400.9.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203281"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960530" version="1" comment="kernel-default is &lt;5.14.21-150400.24.136.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960531" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=15-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960120" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960533" version="1" comment="kernel-livepatch-5_14_21-150500_55_80-default is &gt;=2-150500.11.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960534" version="1" comment="kernel-default is ==5.14.21-150500.55.83.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960535" version="1" comment="kernel-livepatch-5_14_21-150500_55_83-default is &gt;=2-150500.11.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203215"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960536" version="1" comment="kernel-default is &lt;5.14.21-150500.55.83.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975029" version="1" comment="kgraft-patch-4_12_14-122_201-default is &gt;=16-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975043" version="1" comment="kgraft-patch-4_12_14-122_216-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975044" version="1" comment="kgraft-patch-4_12_14-122_219-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975030" version="1" comment="kgraft-patch-4_12_14-122_222-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975045" version="1" comment="kgraft-patch-4_12_14-122_225-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975046" version="1" comment="kgraft-patch-4_12_14-122_228-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975047" version="1" comment="kernel-livepatch-5_3_18-150300_59_153-default is &gt;=17-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975048" version="1" comment="kernel-livepatch-5_3_18-150300_59_158-default is &gt;=16-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975049" version="1" comment="kernel-livepatch-5_3_18-150300_59_161-default is &gt;=15-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975401" version="1" comment="kernel-livepatch-5_3_18-150300_59_164-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975050" version="1" comment="kernel-livepatch-5_3_18-150300_59_167-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975051" version="1" comment="kernel-livepatch-5_3_18-150300_59_170-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975052" version="1" comment="kernel-livepatch-5_3_18-150300_59_174-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975053" version="1" comment="kernel-livepatch-5_3_18-150300_59_179-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974051" version="1" comment="kernel-livepatch-5_3_18-150300_59_174-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974052" version="1" comment="kernel-livepatch-5_3_18-150300_59_179-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017397" version="1" comment="kgraft-patch-4_12_14-122_225-default is &gt;=16-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017398" version="1" comment="kgraft-patch-4_12_14-122_228-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960541" version="1" comment="kernel-default is ==4.12.14-122.234.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017400" version="1" comment="kgraft-patch-4_12_14-122_234-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975403" version="1" comment="kernel-default is ==4.12.14-122.237.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017401" version="1" comment="kgraft-patch-4_12_14-122_237-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975405" version="1" comment="kernel-default is ==4.12.14-122.244.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017402" version="1" comment="kgraft-patch-4_12_14-122_244-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986269" version="1" comment="kernel-default is ==4.12.14-122.247.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235346"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017403" version="1" comment="kgraft-patch-4_12_14-122_247-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986280" version="1" comment="kernel-default is ==4.12.14-122.250.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017404" version="1" comment="kgraft-patch-4_12_14-122_250-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986282" version="1" comment="kernel-default is &lt;4.12.14-122.250.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017405" version="1" comment="kernel-livepatch-5_3_18-150300_59_170-default is &gt;=17-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017406" version="1" comment="kernel-livepatch-5_3_18-150300_59_174-default is &gt;=16-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017329" version="1" comment="kernel-livepatch-5_3_18-150300_59_179-default is &gt;=15-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960544" version="1" comment="kernel-default is ==5.3.18-150300.59.182.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229714"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017407" version="1" comment="kernel-livepatch-5_3_18-150300_59_182-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966288" version="1" comment="kernel-default is ==5.3.18-150300.59.185.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017330" version="1" comment="kernel-livepatch-5_3_18-150300_59_185-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966290" version="1" comment="kernel-default is ==5.3.18-150300.59.188.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017331" version="1" comment="kernel-livepatch-5_3_18-150300_59_188-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986726" version="1" comment="kernel-default is ==5.3.18-150300.59.195.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017408" version="1" comment="kernel-livepatch-5_3_18-150300_59_195-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986730" version="1" comment="kernel-default is ==5.3.18-150300.59.198.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017409" version="1" comment="kernel-livepatch-5_3_18-150300_59_198-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986732" version="1" comment="kernel-default is &lt;5.3.18-150300.59.198.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017667" version="1" comment="kernel-livepatch-5_14_21-150400_24_128-default is &gt;=16-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017410" version="1" comment="kernel-livepatch-5_14_21-150400_24_133-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017668" version="1" comment="kernel-livepatch-5_14_21-150400_24_136-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960752" version="1" comment="kernel-default is ==5.14.21-150400.24.141.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017669" version="1" comment="kernel-livepatch-5_14_21-150400_24_141-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966293" version="1" comment="kernel-default is ==5.14.21-150400.24.144.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017670" version="1" comment="kernel-livepatch-5_14_21-150400_24_144-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966295" version="1" comment="kernel-default is ==5.14.21-150400.24.147.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017671" version="1" comment="kernel-livepatch-5_14_21-150400_24_147-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986625" version="1" comment="kernel-default is ==5.14.21-150400.24.150.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017672" version="1" comment="kernel-livepatch-5_14_21-150400_24_150-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986633" version="1" comment="kernel-default is ==5.14.21-150400.24.153.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017673" version="1" comment="kernel-livepatch-5_14_21-150400_24_153-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008960" version="1" comment="kernel-default is ==5.14.21-150400.24.158.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017411" version="1" comment="kernel-livepatch-5_14_21-150400_24_158-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008962" version="1" comment="kernel-default is &lt;5.14.21-150400.24.158.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017859" version="1" comment="kernel-livepatch-5_14_21-150500_55_73-default is &gt;=16-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017674" version="1" comment="kernel-livepatch-5_14_21-150500_55_80-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017860" version="1" comment="kernel-livepatch-5_14_21-150500_55_83-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968297" version="1" comment="kernel-default is ==5.14.21-150500.55.88.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017675" version="1" comment="kernel-livepatch-5_14_21-150500_55_88-default is &gt;=10-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968299" version="1" comment="kernel-default is ==5.14.21-150500.55.91.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017861" version="1" comment="kernel-livepatch-5_14_21-150500_55_91-default is &gt;=10-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986277" version="1" comment="kernel-default is ==5.14.21-150500.55.94.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235348"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017862" version="1" comment="kernel-livepatch-5_14_21-150500_55_94-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986283" version="1" comment="kernel-default is ==5.14.21-150500.55.97.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017863" version="1" comment="kernel-livepatch-5_14_21-150500_55_97-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986285" version="1" comment="kernel-default is &lt;5.14.21-150500.55.97.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986262" version="1" comment="kgraft-patch-4_12_14-122_216-default is &gt;=17-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986105" version="1" comment="kgraft-patch-4_12_14-122_219-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986263" version="1" comment="kgraft-patch-4_12_14-122_222-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986264" version="1" comment="kgraft-patch-4_12_14-122_225-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986106" version="1" comment="kgraft-patch-4_12_14-122_228-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986266" version="1" comment="kgraft-patch-4_12_14-122_234-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986267" version="1" comment="kgraft-patch-4_12_14-122_237-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986268" version="1" comment="kgraft-patch-4_12_14-122_244-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986270" version="1" comment="kgraft-patch-4_12_14-122_247-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986271" version="1" comment="kernel-default is &lt;4.12.14-122.247.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235347"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986272" version="1" comment="kernel-livepatch-5_3_18-150300_59_161-default is &gt;=18-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986273" version="1" comment="kernel-livepatch-5_3_18-150300_59_164-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986614" version="1" comment="kernel-livepatch-5_3_18-150300_59_167-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986615" version="1" comment="kernel-livepatch-5_3_18-150300_59_170-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986616" version="1" comment="kernel-livepatch-5_3_18-150300_59_174-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986148" version="1" comment="kernel-livepatch-5_3_18-150300_59_179-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986274" version="1" comment="kernel-livepatch-5_3_18-150300_59_182-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986275" version="1" comment="kernel-livepatch-5_3_18-150300_59_185-default is &gt;=6-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986276" version="1" comment="kernel-livepatch-5_3_18-150300_59_188-default is &gt;=5-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986727" version="1" comment="kernel-livepatch-5_3_18-150300_59_195-default is &gt;=2-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986728" version="1" comment="kernel-default is &lt;5.3.18-150300.59.195.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986617" version="1" comment="kernel-livepatch-5_14_21-150400_24_119-default is &gt;=18-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986618" version="1" comment="kernel-livepatch-5_14_21-150400_24_122-default is &gt;=16-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986619" version="1" comment="kernel-livepatch-5_14_21-150400_24_125-default is &gt;=13-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986729" version="1" comment="kernel-livepatch-5_14_21-150400_24_128-default is &gt;=11-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986620" version="1" comment="kernel-livepatch-5_14_21-150400_24_133-default is &gt;=9-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986621" version="1" comment="kernel-livepatch-5_14_21-150400_24_136-default is &gt;=9-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986622" version="1" comment="kernel-livepatch-5_14_21-150400_24_141-default is &gt;=8-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986623" version="1" comment="kernel-livepatch-5_14_21-150400_24_144-default is &gt;=7-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986624" version="1" comment="kernel-livepatch-5_14_21-150400_24_147-default is &gt;=6-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986626" version="1" comment="kernel-livepatch-5_14_21-150400_24_150-default is &gt;=2-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986627" version="1" comment="kernel-default is &lt;5.14.21-150400.24.150.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986149" version="1" comment="kernel-livepatch-5_14_21-150500_55_62-default is &gt;=17-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986150" version="1" comment="kernel-livepatch-5_14_21-150500_55_65-default is &gt;=17-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986151" version="1" comment="kernel-livepatch-5_14_21-150500_55_68-default is &gt;=16-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986152" version="1" comment="kernel-livepatch-5_14_21-150500_55_73-default is &gt;=11-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986153" version="1" comment="kernel-livepatch-5_14_21-150500_55_80-default is &gt;=9-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986154" version="1" comment="kernel-livepatch-5_14_21-150500_55_83-default is &gt;=9-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986155" version="1" comment="kernel-livepatch-5_14_21-150500_55_88-default is &gt;=5-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986156" version="1" comment="kernel-livepatch-5_14_21-150500_55_91-default is &gt;=5-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986278" version="1" comment="kernel-livepatch-5_14_21-150500_55_94-default is &gt;=2-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986279" version="1" comment="kernel-default is &lt;5.14.21-150500.55.94.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987582" version="1" comment="kgraft-patch-4_12_14-122_216-default is &gt;=18-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987583" version="1" comment="kgraft-patch-4_12_14-122_219-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996805" version="1" comment="kgraft-patch-4_12_14-122_222-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987584" version="1" comment="kgraft-patch-4_12_14-122_225-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987585" version="1" comment="kgraft-patch-4_12_14-122_228-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987643" version="1" comment="kgraft-patch-4_12_14-122_234-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996806" version="1" comment="kgraft-patch-4_12_14-122_237-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987586" version="1" comment="kgraft-patch-4_12_14-122_244-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987587" version="1" comment="kgraft-patch-4_12_14-122_247-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996807" version="1" comment="kgraft-patch-4_12_14-122_250-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996808" version="1" comment="kernel-default is ==4.12.14-122.255.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996809" version="1" comment="kgraft-patch-4_12_14-122_255-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996810" version="1" comment="kernel-default is &lt;4.12.14-122.255.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008768" version="1" comment="kgraft-patch-4_12_14-122_219-default is &gt;=16-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008700" version="1" comment="kgraft-patch-4_12_14-122_222-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008701" version="1" comment="kgraft-patch-4_12_14-122_225-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010059" version="1" comment="kgraft-patch-4_12_14-122_228-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008770" version="1" comment="kgraft-patch-4_12_14-122_234-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008771" version="1" comment="kgraft-patch-4_12_14-122_237-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008772" version="1" comment="kgraft-patch-4_12_14-122_244-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008702" version="1" comment="kgraft-patch-4_12_14-122_247-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008773" version="1" comment="kgraft-patch-4_12_14-122_250-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008774" version="1" comment="kgraft-patch-4_12_14-122_255-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008775" version="1" comment="kernel-livepatch-5_3_18-150300_59_164-default is &gt;=17-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008776" version="1" comment="kernel-livepatch-5_3_18-150300_59_167-default is &gt;=16-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008777" version="1" comment="kernel-livepatch-5_3_18-150300_59_170-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008778" version="1" comment="kernel-livepatch-5_3_18-150300_59_174-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008779" version="1" comment="kernel-livepatch-5_3_18-150300_59_179-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008780" version="1" comment="kernel-livepatch-5_3_18-150300_59_182-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008781" version="1" comment="kernel-livepatch-5_3_18-150300_59_185-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008782" version="1" comment="kernel-livepatch-5_3_18-150300_59_188-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008783" version="1" comment="kernel-livepatch-5_3_18-150300_59_195-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008784" version="1" comment="kernel-livepatch-5_3_18-150300_59_198-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008785" version="1" comment="kernel-livepatch-5_14_21-150400_24_122-default is &gt;=18-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008786" version="1" comment="kernel-livepatch-5_14_21-150400_24_125-default is &gt;=15-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008787" version="1" comment="kernel-livepatch-5_14_21-150400_24_128-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008788" version="1" comment="kernel-livepatch-5_14_21-150400_24_133-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008789" version="1" comment="kernel-livepatch-5_14_21-150400_24_136-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008790" version="1" comment="kernel-livepatch-5_14_21-150400_24_141-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008791" version="1" comment="kernel-livepatch-5_14_21-150400_24_144-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008792" version="1" comment="kernel-livepatch-5_14_21-150400_24_147-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008793" version="1" comment="kernel-livepatch-5_14_21-150400_24_150-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008794" version="1" comment="kernel-livepatch-5_14_21-150400_24_153-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008961" version="1" comment="kernel-livepatch-5_14_21-150400_24_158-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996811" version="1" comment="kernel-livepatch-5_3_18-150300_59_161-default is &gt;=19-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996812" version="1" comment="kernel-livepatch-5_3_18-150300_59_164-default is &gt;=16-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166608"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996813" version="1" comment="kernel-livepatch-5_3_18-150300_59_167-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996814" version="1" comment="kernel-livepatch-5_3_18-150300_59_170-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996815" version="1" comment="kernel-livepatch-5_3_18-150300_59_174-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996816" version="1" comment="kernel-livepatch-5_3_18-150300_59_179-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996817" version="1" comment="kernel-livepatch-5_3_18-150300_59_182-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997085" version="1" comment="kernel-livepatch-5_3_18-150300_59_185-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996818" version="1" comment="kernel-livepatch-5_3_18-150300_59_188-default is &gt;=6-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997086" version="1" comment="kernel-livepatch-5_3_18-150300_59_195-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987644" version="1" comment="kernel-livepatch-5_3_18-150300_59_198-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975402" version="1" comment="kgraft-patch-4_12_14-122_234-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975404" version="1" comment="kgraft-patch-4_12_14-122_237-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975406" version="1" comment="kgraft-patch-4_12_14-122_244-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986281" version="1" comment="kgraft-patch-4_12_14-122_250-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975408" version="1" comment="kernel-livepatch-5_3_18-150300_59_182-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975409" version="1" comment="kernel-livepatch-5_3_18-150300_59_185-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975410" version="1" comment="kernel-livepatch-5_3_18-150300_59_188-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986731" version="1" comment="kernel-livepatch-5_3_18-150300_59_198-default is &gt;=2-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037981" version="1" comment="kgraft-patch-4_12_14-122_237-default is &gt;=16-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037982" version="1" comment="kgraft-patch-4_12_14-122_244-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037983" version="1" comment="kgraft-patch-4_12_14-122_247-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037984" version="1" comment="kgraft-patch-4_12_14-122_250-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037985" version="1" comment="kgraft-patch-4_12_14-122_255-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011973" version="1" comment="kernel-default is ==4.12.14-122.258.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240942"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037986" version="1" comment="kgraft-patch-4_12_14-122_258-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014519" version="1" comment="kernel-default is ==4.12.14-122.261.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241400"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037987" version="1" comment="kgraft-patch-4_12_14-122_261-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014521" version="1" comment="kernel-default is ==4.12.14-122.266.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241401"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037988" version="1" comment="kgraft-patch-4_12_14-122_266-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019465" version="1" comment="kernel-default is ==4.12.14-122.269.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037989" version="1" comment="kgraft-patch-4_12_14-122_269-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022330" version="1" comment="kernel-default is ==4.12.14-122.272.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243206"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037990" version="1" comment="kgraft-patch-4_12_14-122_272-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022332" version="1" comment="kernel-default is &lt;4.12.14-122.272.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243207"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037991" version="1" comment="kernel-livepatch-5_14_21-150400_24_144-default is &gt;=19-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037992" version="1" comment="kernel-livepatch-5_14_21-150400_24_147-default is &gt;=18-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037993" version="1" comment="kernel-livepatch-5_14_21-150400_24_150-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037994" version="1" comment="kernel-livepatch-5_14_21-150400_24_153-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037995" version="1" comment="kernel-livepatch-5_14_21-150400_24_158-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008967" version="1" comment="kernel-default is ==5.14.21-150400.24.161.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037996" version="1" comment="kernel-livepatch-5_14_21-150400_24_161-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008969" version="1" comment="kernel-default is ==5.14.21-150400.24.164.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037997" version="1" comment="kernel-livepatch-5_14_21-150400_24_164-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012372" version="1" comment="kernel-default is ==5.14.21-150400.24.167.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241038"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037998" version="1" comment="kernel-livepatch-5_14_21-150400_24_167-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014752" version="1" comment="kernel-default is ==5.14.21-150400.24.170.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241464"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037999" version="1" comment="kernel-livepatch-5_14_21-150400_24_170-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019721" version="1" comment="kernel-default is ==5.14.21-150400.24.173.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038211" version="1" comment="kernel-livepatch-5_14_21-150400_24_173-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023345" version="1" comment="kernel-default is ==5.14.21-150400.24.176.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038000" version="1" comment="kernel-livepatch-5_14_21-150400_24_176-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023347" version="1" comment="kernel-default is &lt;5.14.21-150400.24.176.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025285" version="1" comment="kernel-livepatch-5_3_18-150300_59_179-default is &gt;=19-150300.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243912"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025286" version="1" comment="kernel-livepatch-5_3_18-150300_59_182-default is &gt;=17-150300.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243913"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025287" version="1" comment="kernel-livepatch-5_3_18-150300_59_185-default is &gt;=15-150300.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243914"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025288" version="1" comment="kernel-livepatch-5_3_18-150300_59_188-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025289" version="1" comment="kernel-livepatch-5_3_18-150300_59_195-default is &gt;=11-150300.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243915"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025290" version="1" comment="kernel-livepatch-5_3_18-150300_59_198-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008807" version="1" comment="kernel-default is ==5.3.18-150300.59.201.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240311"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025291" version="1" comment="kernel-livepatch-5_3_18-150300_59_201-default is &gt;=9-150300.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008964" version="1" comment="kernel-default is ==5.3.18-150300.59.204.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025292" version="1" comment="kernel-livepatch-5_3_18-150300_59_204-default is &gt;=9-150300.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243916"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012375" version="1" comment="kernel-default is ==5.3.18-150300.59.207.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025293" version="1" comment="kernel-livepatch-5_3_18-150300_59_207-default is &gt;=8-150300.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012379" version="1" comment="kernel-default is ==5.3.18-150300.59.211.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241042"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025294" version="1" comment="kernel-livepatch-5_3_18-150300_59_211-default is &gt;=8-150300.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243917"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019755" version="1" comment="kernel-default is ==5.3.18-150300.59.215.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025525" version="1" comment="kernel-livepatch-5_3_18-150300_59_215-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025254" version="1" comment="kernel-default is ==5.3.18-150300.59.218.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025255" version="1" comment="kernel-livepatch-5_3_18-150300_59_218-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025256" version="1" comment="kernel-default is &lt;5.3.18-150300.59.218.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243900"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025295" version="1" comment="kgraft-patch-4_12_14-122_234-default is &gt;=18-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243918"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025296" version="1" comment="kgraft-patch-4_12_14-122_237-default is &gt;=14-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243919"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025297" version="1" comment="kgraft-patch-4_12_14-122_244-default is &gt;=13-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243920"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025298" version="1" comment="kgraft-patch-4_12_14-122_247-default is &gt;=11-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243921"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025299" version="1" comment="kgraft-patch-4_12_14-122_250-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025300" version="1" comment="kgraft-patch-4_12_14-122_255-default is &gt;=10-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025301" version="1" comment="kgraft-patch-4_12_14-122_258-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025302" version="1" comment="kgraft-patch-4_12_14-122_261-default is &gt;=7-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025303" version="1" comment="kgraft-patch-4_12_14-122_266-default is &gt;=7-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025526" version="1" comment="kgraft-patch-4_12_14-122_269-default is &gt;=4-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024667" version="1" comment="kgraft-patch-4_12_14-122_272-default is &gt;=3-4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025304" version="1" comment="kernel-livepatch-5_14_21-150400_24_136-default is &gt;=18-150400.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025305" version="1" comment="kernel-livepatch-5_14_21-150400_24_141-default is &gt;=17-150400.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243923"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025306" version="1" comment="kernel-livepatch-5_14_21-150400_24_144-default is &gt;=16-150400.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025307" version="1" comment="kernel-livepatch-5_14_21-150400_24_147-default is &gt;=15-150400.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025527" version="1" comment="kernel-livepatch-5_14_21-150400_24_150-default is &gt;=10-150400.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025308" version="1" comment="kernel-livepatch-5_14_21-150400_24_153-default is &gt;=10-150400.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025309" version="1" comment="kernel-livepatch-5_14_21-150400_24_158-default is &gt;=9-150400.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025310" version="1" comment="kernel-livepatch-5_14_21-150400_24_161-default is &gt;=9-150400.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025311" version="1" comment="kernel-livepatch-5_14_21-150400_24_164-default is &gt;=9-150400.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243927"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025312" version="1" comment="kernel-livepatch-5_14_21-150400_24_167-default is &gt;=8-150400.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243928"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025313" version="1" comment="kernel-livepatch-5_14_21-150400_24_170-default is &gt;=7-150400.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243929"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025314" version="1" comment="kernel-livepatch-5_14_21-150400_24_173-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025257" version="1" comment="kernel-livepatch-5_14_21-150400_24_176-default is &gt;=3-150400.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011979" version="1" comment="kernel-default is ==5.14.21-150500.55.100.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240944"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025528" version="1" comment="kernel-livepatch-5_14_21-150500_55_100-default is &gt;=9-150500.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011981" version="1" comment="kernel-default is ==5.14.21-150500.55.103.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025529" version="1" comment="kernel-livepatch-5_14_21-150500_55_103-default is &gt;=9-150500.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011983" version="1" comment="kernel-default is ==5.14.21-150500.55.110.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240946"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025315" version="1" comment="kernel-livepatch-5_14_21-150500_55_110-default is &gt;=8-150500.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011988" version="1" comment="kernel-default is ==5.14.21-150500.55.113.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240947"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025530" version="1" comment="kernel-livepatch-5_14_21-150500_55_113-default is &gt;=8-150500.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243930"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014542" version="1" comment="kernel-default is ==5.14.21-150500.55.116.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025531" version="1" comment="kernel-livepatch-5_14_21-150500_55_116-default is &gt;=6-150500.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023037" version="1" comment="kernel-default is ==5.14.21-150500.55.121.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243292"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025258" version="1" comment="kernel-livepatch-5_14_21-150500_55_121-default is &gt;=3-150500.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243902"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025532" version="1" comment="kernel-livepatch-5_14_21-150500_55_83-default is &gt;=18-150500.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025533" version="1" comment="kernel-livepatch-5_14_21-150500_55_88-default is &gt;=14-150500.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025534" version="1" comment="kernel-livepatch-5_14_21-150500_55_91-default is &gt;=14-150500.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025535" version="1" comment="kernel-livepatch-5_14_21-150500_55_94-default is &gt;=10-150500.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025536" version="1" comment="kernel-livepatch-5_14_21-150500_55_97-default is &gt;=10-150500.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035060" version="1" comment="cluster-md-kmp-64kb is &lt;6.12.0-160000.8.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623416" version="1" comment="cluster-md-kmp-64kb is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035061" version="1" comment="cluster-md-kmp-default is &lt;6.12.0-160000.8.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623278" version="1" comment="cluster-md-kmp-default is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035062" version="1" comment="cluster-md-kmp-rt is &lt;6.12.0-160000.8.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009342853" version="1" comment="cluster-md-kmp-rt is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035063" version="1" comment="dlm-kmp-64kb is &lt;6.12.0-160000.8.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623418" version="1" comment="dlm-kmp-64kb is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035064" version="1" comment="dlm-kmp-default is &lt;6.12.0-160000.8.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623280" version="1" comment="dlm-kmp-default is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035065" version="1" comment="dlm-kmp-rt is &lt;6.12.0-160000.8.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009342855" version="1" comment="dlm-kmp-rt is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035066" version="1" comment="dtb-allwinner is &lt;6.12.0-160000.8.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630924" version="1" comment="dtb-allwinner is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035067" version="1" comment="dtb-altera is &lt;6.12.0-160000.8.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630925" version="1" comment="dtb-altera is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035068" version="1" comment="dtb-amazon is &lt;6.12.0-160000.8.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701757" version="1" comment="dtb-amazon is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035069" version="1" comment="dtb-amd is &lt;6.12.0-160000.8.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630926" version="1" comment="dtb-amd is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035070" version="1" comment="dtb-amlogic is &lt;6.12.0-160000.8.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630927" version="1" comment="dtb-amlogic is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035071" version="1" comment="dtb-apm is &lt;6.12.0-160000.8.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630928" version="1" comment="dtb-apm is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035072" version="1" comment="dtb-apple is &lt;6.12.0-160000.8.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009701758" version="1" comment="dtb-apple is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035073" version="1" comment="dtb-arm is &lt;6.12.0-160000.8.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630929" version="1" comment="dtb-arm is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035074" version="1" comment="dtb-broadcom is &lt;6.12.0-160000.8.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630930" version="1" comment="dtb-broadcom is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035075" version="1" comment="dtb-cavium is &lt;6.12.0-160000.8.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630931" version="1" comment="dtb-cavium is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035076" version="1" comment="dtb-exynos is &lt;6.12.0-160000.8.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630932" version="1" comment="dtb-exynos is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035077" version="1" comment="dtb-freescale is &lt;6.12.0-160000.8.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630933" version="1" comment="dtb-freescale is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035078" version="1" comment="dtb-hisilicon is &lt;6.12.0-160000.8.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630934" version="1" comment="dtb-hisilicon is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035079" version="1" comment="dtb-lg is &lt;6.12.0-160000.8.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630935" version="1" comment="dtb-lg is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035080" version="1" comment="dtb-marvell is &lt;6.12.0-160000.8.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630936" version="1" comment="dtb-marvell is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035081" version="1" comment="dtb-mediatek is &lt;6.12.0-160000.8.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630937" version="1" comment="dtb-mediatek is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035082" version="1" comment="dtb-nvidia is &lt;6.12.0-160000.8.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630938" version="1" comment="dtb-nvidia is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035083" version="1" comment="dtb-qcom is &lt;6.12.0-160000.8.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630939" version="1" comment="dtb-qcom is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035084" version="1" comment="dtb-renesas is &lt;6.12.0-160000.8.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630940" version="1" comment="dtb-renesas is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035085" version="1" comment="dtb-rockchip is &lt;6.12.0-160000.8.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630941" version="1" comment="dtb-rockchip is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035086" version="1" comment="dtb-socionext is &lt;6.12.0-160000.8.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630942" version="1" comment="dtb-socionext is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035087" version="1" comment="dtb-sprd is &lt;6.12.0-160000.8.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630943" version="1" comment="dtb-sprd is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035088" version="1" comment="dtb-xilinx is &lt;6.12.0-160000.8.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630944" version="1" comment="dtb-xilinx is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035089" version="1" comment="gfs2-kmp-64kb is &lt;6.12.0-160000.8.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623420" version="1" comment="gfs2-kmp-64kb is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035090" version="1" comment="gfs2-kmp-default is &lt;6.12.0-160000.8.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623282" version="1" comment="gfs2-kmp-default is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035091" version="1" comment="gfs2-kmp-rt is &lt;6.12.0-160000.8.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009342857" version="1" comment="gfs2-kmp-rt is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035092" version="1" comment="kernel-64kb is &lt;6.12.0-160000.8.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623422" version="1" comment="kernel-64kb is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035094" version="1" comment="kernel-64kb-extra is &lt;6.12.0-160000.8.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623424" version="1" comment="kernel-64kb-extra is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035095" version="1" comment="kernel-64kb-optional is &lt;6.12.0-160000.8.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623426" version="1" comment="kernel-64kb-optional is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035096" version="1" comment="kernel-default is &lt;6.12.0-160000.8.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151354" version="1" comment="kernel-default is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035097" version="1" comment="kernel-default-base is &lt;6.12.0-160000.8.1.160000.2.5 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151960" version="1" comment="kernel-default-base is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035099" version="1" comment="kernel-default-extra is &lt;6.12.0-160000.8.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623289" version="1" comment="kernel-default-extra is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035100" version="1" comment="kernel-default-optional is &lt;6.12.0-160000.8.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623428" version="1" comment="kernel-default-optional is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035101" version="1" comment="kernel-default-vdso is &lt;6.12.0-160000.8.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772193" version="1" comment="kernel-default-vdso is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035103" version="1" comment="kernel-docs is &lt;6.12.0-160000.8.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151357" version="1" comment="kernel-docs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035104" version="1" comment="kernel-docs-html is &lt;6.12.0-160000.8.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151961" version="1" comment="kernel-docs-html is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035105" version="1" comment="kernel-kvmsmall is &lt;6.12.0-160000.8.1 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245864"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177719" version="1" comment="kernel-kvmsmall is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035107" version="1" comment="kernel-kvmsmall-vdso is &lt;6.12.0-160000.8.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009772194" version="1" comment="kernel-kvmsmall-vdso is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035108" version="1" comment="kernel-macros is &lt;6.12.0-160000.8.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151358" version="1" comment="kernel-macros is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035109" version="1" comment="kernel-obs-build is &lt;6.12.0-160000.8.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151966" version="1" comment="kernel-obs-build is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035110" version="1" comment="kernel-obs-qa is &lt;6.12.0-160000.8.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151967" version="1" comment="kernel-obs-qa is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035111" version="1" comment="kernel-rt is &lt;6.12.0-160000.8.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009342860" version="1" comment="kernel-rt is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035113" version="1" comment="kernel-rt-extra is &lt;6.12.0-160000.8.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009342862" version="1" comment="kernel-rt-extra is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035114" version="1" comment="kernel-rt-optional is &lt;6.12.0-160000.8.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771784" version="1" comment="kernel-rt-optional is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035115" version="1" comment="kernel-rt-vdso is &lt;6.12.0-160000.8.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245862"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771785" version="1" comment="kernel-rt-vdso is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035116" version="1" comment="kernel-source is &lt;6.12.0-160000.8.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151360" version="1" comment="kernel-source is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035117" version="1" comment="kernel-source-vanilla is &lt;6.12.0-160000.8.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245863"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151974" version="1" comment="kernel-source-vanilla is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035118" version="1" comment="kernel-syms is &lt;6.12.0-160000.8.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151361" version="1" comment="kernel-syms is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035119" version="1" comment="kernel-zfcpdump is &lt;6.12.0-160000.8.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623303" version="1" comment="kernel-zfcpdump is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035120" version="1" comment="kselftests-kmp-64kb is &lt;6.12.0-160000.8.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623436" version="1" comment="kselftests-kmp-64kb is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035121" version="1" comment="kselftests-kmp-default is &lt;6.12.0-160000.8.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168714" version="1" comment="kselftests-kmp-default is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035122" version="1" comment="kselftests-kmp-rt is &lt;6.12.0-160000.8.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009342868" version="1" comment="kselftests-kmp-rt is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035123" version="1" comment="ocfs2-kmp-64kb is &lt;6.12.0-160000.8.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245858"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623438" version="1" comment="ocfs2-kmp-64kb is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035124" version="1" comment="ocfs2-kmp-default is &lt;6.12.0-160000.8.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245859"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623307" version="1" comment="ocfs2-kmp-default is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035125" version="1" comment="ocfs2-kmp-rt is &lt;6.12.0-160000.8.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009342870" version="1" comment="ocfs2-kmp-rt is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038212" version="1" comment="kernel-default is ==4.12.14-122.275.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038213" version="1" comment="kgraft-patch-4_12_14-122_275-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038214" version="1" comment="kernel-default is &lt;4.12.14-122.275.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246454"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031207" version="1" comment="kernel-default is ==5.14.21-150400.24.179.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038215" version="1" comment="kernel-livepatch-5_14_21-150400_24_179-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031209" version="1" comment="kernel-default is &lt;5.14.21-150400.24.179.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038216" version="1" comment="kernel-livepatch-5_14_21-150500_55_100-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038001" version="1" comment="kernel-livepatch-5_14_21-150500_55_103-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038217" version="1" comment="kernel-livepatch-5_14_21-150500_55_110-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038218" version="1" comment="kernel-livepatch-5_14_21-150500_55_113-default is &gt;=10-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038219" version="1" comment="kernel-livepatch-5_14_21-150500_55_116-default is &gt;=8-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038220" version="1" comment="kernel-livepatch-5_14_21-150500_55_121-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037072" version="1" comment="kernel-default is ==5.14.21-150500.55.124.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038221" version="1" comment="kernel-livepatch-5_14_21-150500_55_124-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038002" version="1" comment="kernel-livepatch-5_14_21-150500_55_88-default is &gt;=17-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038509" version="1" comment="kernel-livepatch-5_14_21-150500_55_91-default is &gt;=17-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038222" version="1" comment="kernel-livepatch-5_14_21-150500_55_94-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038223" version="1" comment="kernel-livepatch-5_14_21-150500_55_97-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022248" version="1" comment="kgraft-patch-4_12_14-122_228-default is &gt;=18-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022275" version="1" comment="kgraft-patch-4_12_14-122_234-default is &gt;=17-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022276" version="1" comment="kgraft-patch-4_12_14-122_237-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022277" version="1" comment="kgraft-patch-4_12_14-122_244-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022278" version="1" comment="kgraft-patch-4_12_14-122_247-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022279" version="1" comment="kgraft-patch-4_12_14-122_250-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022280" version="1" comment="kgraft-patch-4_12_14-122_255-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022281" version="1" comment="kgraft-patch-4_12_14-122_258-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022282" version="1" comment="kgraft-patch-4_12_14-122_261-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022283" version="1" comment="kgraft-patch-4_12_14-122_266-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022611" version="1" comment="kgraft-patch-4_12_14-122_269-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022331" version="1" comment="kgraft-patch-4_12_14-122_272-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030679" version="1" comment="kernel-livepatch-5_3_18-150300_59_182-default is &gt;=18-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030649" version="1" comment="kernel-livepatch-5_3_18-150300_59_185-default is &gt;=16-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030680" version="1" comment="kernel-livepatch-5_3_18-150300_59_188-default is &gt;=15-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030681" version="1" comment="kernel-livepatch-5_3_18-150300_59_195-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030682" version="1" comment="kernel-livepatch-5_3_18-150300_59_198-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030683" version="1" comment="kernel-livepatch-5_3_18-150300_59_201-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030684" version="1" comment="kernel-livepatch-5_3_18-150300_59_204-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030685" version="1" comment="kernel-livepatch-5_3_18-150300_59_207-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030686" version="1" comment="kernel-livepatch-5_3_18-150300_59_211-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030650" version="1" comment="kernel-livepatch-5_3_18-150300_59_215-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030687" version="1" comment="kernel-livepatch-5_3_18-150300_59_218-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031652" version="1" comment="kernel-default is ==5.3.18-150300.59.221.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031653" version="1" comment="kernel-livepatch-5_3_18-150300_59_221-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031654" version="1" comment="kernel-default is &lt;5.3.18-150300.59.221.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245183"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049711" version="1" comment="kgraft-patch-4_12_14-122_247-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049712" version="1" comment="kgraft-patch-4_12_14-122_250-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050984" version="1" comment="kgraft-patch-4_12_14-122_255-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049713" version="1" comment="kgraft-patch-4_12_14-122_258-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049764" version="1" comment="kgraft-patch-4_12_14-122_261-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050306" version="1" comment="kgraft-patch-4_12_14-122_266-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049765" version="1" comment="kgraft-patch-4_12_14-122_269-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049766" version="1" comment="kgraft-patch-4_12_14-122_272-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049767" version="1" comment="kgraft-patch-4_12_14-122_275-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046222" version="1" comment="kernel-default is ==4.12.14-122.280.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049768" version="1" comment="kgraft-patch-4_12_14-122_280-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046224" version="1" comment="kernel-default is ==4.12.14-122.283.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248150"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049769" version="1" comment="kgraft-patch-4_12_14-122_283-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046236" version="1" comment="kernel-default is ==4.12.14-122.290.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049770" version="1" comment="kgraft-patch-4_12_14-122_290-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046238" version="1" comment="kernel-default is &lt;4.12.14-122.290.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050307" version="1" comment="kernel-livepatch-5_14_21-150400_24_150-default is &gt;=16-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049771" version="1" comment="kernel-livepatch-5_14_21-150400_24_153-default is &gt;=16-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049772" version="1" comment="kernel-livepatch-5_14_21-150400_24_158-default is &gt;=15-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049773" version="1" comment="kernel-livepatch-5_14_21-150400_24_161-default is &gt;=15-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050070" version="1" comment="kernel-livepatch-5_14_21-150400_24_164-default is &gt;=15-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050071" version="1" comment="kernel-livepatch-5_14_21-150400_24_167-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050072" version="1" comment="kernel-livepatch-5_14_21-150400_24_170-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050073" version="1" comment="kernel-livepatch-5_14_21-150400_24_173-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050074" version="1" comment="kernel-livepatch-5_14_21-150400_24_176-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050075" version="1" comment="kernel-livepatch-5_14_21-150400_24_179-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046274" version="1" comment="kernel-default is ==5.14.21-150400.24.184.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050308" version="1" comment="kernel-livepatch-5_14_21-150400_24_184-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046276" version="1" comment="kernel-default is ==5.14.21-150400.24.187.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248162"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050309" version="1" comment="kernel-livepatch-5_14_21-150400_24_187-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046278" version="1" comment="kernel-default is &lt;5.14.21-150400.24.187.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050310" version="1" comment="kernel-livepatch-5_14_21-150500_55_100-default is &gt;=15-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050311" version="1" comment="kernel-livepatch-5_14_21-150500_55_103-default is &gt;=15-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050312" version="1" comment="kernel-livepatch-5_14_21-150500_55_110-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050313" version="1" comment="kernel-livepatch-5_14_21-150500_55_113-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050314" version="1" comment="kernel-livepatch-5_14_21-150500_55_116-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050985" version="1" comment="kernel-livepatch-5_14_21-150500_55_121-default is &gt;=8-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050986" version="1" comment="kernel-livepatch-5_14_21-150500_55_124-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046286" version="1" comment="kernel-default is ==5.14.21-150500.55.127.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248164"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050987" version="1" comment="kernel-livepatch-5_14_21-150500_55_127-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046288" version="1" comment="kernel-default is ==5.14.21-150500.55.130.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050988" version="1" comment="kernel-livepatch-5_14_21-150500_55_130-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046292" version="1" comment="kernel-default is ==5.14.21-150500.55.133.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248166"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050989" version="1" comment="kernel-livepatch-5_14_21-150500_55_133-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050315" version="1" comment="kernel-livepatch-5_14_21-150500_55_94-default is &gt;=16-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050316" version="1" comment="kernel-livepatch-5_14_21-150500_55_97-default is &gt;=16-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045279" version="1" comment="kgraft-patch-4_12_14-122_247-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045280" version="1" comment="kgraft-patch-4_12_14-122_250-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046215" version="1" comment="kgraft-patch-4_12_14-122_255-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046216" version="1" comment="kgraft-patch-4_12_14-122_258-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046217" version="1" comment="kgraft-patch-4_12_14-122_261-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046218" version="1" comment="kgraft-patch-4_12_14-122_266-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046219" version="1" comment="kgraft-patch-4_12_14-122_269-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046220" version="1" comment="kgraft-patch-4_12_14-122_272-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046221" version="1" comment="kgraft-patch-4_12_14-122_275-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046223" version="1" comment="kgraft-patch-4_12_14-122_280-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046225" version="1" comment="kgraft-patch-4_12_14-122_283-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046226" version="1" comment="kernel-default is &lt;4.12.14-122.283.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046227" version="1" comment="kernel-livepatch-5_14_21-150400_24_150-default is &gt;=15-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046228" version="1" comment="kernel-livepatch-5_14_21-150400_24_153-default is &gt;=15-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046229" version="1" comment="kernel-livepatch-5_14_21-150400_24_158-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046230" version="1" comment="kernel-livepatch-5_14_21-150400_24_161-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046231" version="1" comment="kernel-livepatch-5_14_21-150400_24_164-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046232" version="1" comment="kernel-livepatch-5_14_21-150400_24_167-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046233" version="1" comment="kernel-livepatch-5_14_21-150400_24_170-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046234" version="1" comment="kernel-livepatch-5_14_21-150400_24_173-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046235" version="1" comment="kernel-livepatch-5_14_21-150400_24_176-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046273" version="1" comment="kernel-livepatch-5_14_21-150400_24_179-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046275" version="1" comment="kernel-livepatch-5_14_21-150400_24_184-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046277" version="1" comment="kernel-livepatch-5_14_21-150400_24_187-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046279" version="1" comment="kernel-livepatch-5_14_21-150500_55_100-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046280" version="1" comment="kernel-livepatch-5_14_21-150500_55_103-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046281" version="1" comment="kernel-livepatch-5_14_21-150500_55_110-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046282" version="1" comment="kernel-livepatch-5_14_21-150500_55_113-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046283" version="1" comment="kernel-livepatch-5_14_21-150500_55_116-default is &gt;=10-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046284" version="1" comment="kernel-livepatch-5_14_21-150500_55_121-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046285" version="1" comment="kernel-livepatch-5_14_21-150500_55_124-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046287" version="1" comment="kernel-livepatch-5_14_21-150500_55_127-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046289" version="1" comment="kernel-livepatch-5_14_21-150500_55_130-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046290" version="1" comment="kernel-livepatch-5_14_21-150500_55_94-default is &gt;=15-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046291" version="1" comment="kernel-livepatch-5_14_21-150500_55_97-default is &gt;=15-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046237" version="1" comment="kgraft-patch-4_12_14-122_290-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742267" version="1" comment="kernel-livepatch-5_3_18-150300_59_106-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742712" version="1" comment="kernel-livepatch-5_3_18-150300_59_109-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743622" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743623" version="1" comment="kernel-livepatch-5_14_21-150400_24_38-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743624" version="1" comment="kernel-default is ==5.14.21-150400.24.41.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009743625" version="1" comment="kernel-livepatch-5_14_21-150400_24_41-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877718" version="1" comment="kernel-default is &lt;5.14.21-150400.24.41.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751177" version="1" comment="kgraft-patch-4_12_14-122_116-default is &gt;=13-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751178" version="1" comment="kgraft-patch-4_12_14-122_121-default is &gt;=11-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751179" version="1" comment="kgraft-patch-4_12_14-122_124-default is &gt;=10-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751180" version="1" comment="kgraft-patch-4_12_14-122_127-default is &gt;=8-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751181" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=8-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751182" version="1" comment="kgraft-patch-4_12_14-122_133-default is &gt;=6-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751183" version="1" comment="kgraft-patch-4_12_14-122_136-default is &gt;=5-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751184" version="1" comment="kgraft-patch-4_12_14-122_139-default is &gt;=4-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751185" version="1" comment="kgraft-patch-4_12_14-122_144-default is &gt;=3-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751186" version="1" comment="kernel-default is ==4.12.14-122.147.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177701"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751187" version="1" comment="kgraft-patch-4_12_14-122_147-default is &gt;=2-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751188" version="1" comment="kernel-default is &lt;4.12.14-122.147.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750757" version="1" comment="kernel-livepatch-5_3_18-150200_24_112-default is &gt;=14-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750758" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=12-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750759" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=9-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750760" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=6-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751189" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=6-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751190" version="1" comment="kernel-livepatch-5_3_18-150200_24_139-default is &gt;=3-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742263" version="1" comment="kernel-default is &lt;5.3.18-150200.24.139.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750762" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=5-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750763" version="1" comment="kernel-livepatch-5_3_18-150300_59_106-default is &gt;=3-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751191" version="1" comment="kernel-livepatch-5_3_18-150300_59_60-default is &gt;=17-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751192" version="1" comment="kernel-livepatch-5_3_18-150300_59_63-default is &gt;=14-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059626"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751193" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=13-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751194" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=12-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751195" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=11-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751196" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=10-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751197" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=9-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750764" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=8-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751198" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=6-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751199" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=12-150400.10.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751200" version="1" comment="kernel-livepatch-5_14_21-150400_24_11-default is &gt;=9-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751201" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=9-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751202" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=8-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751203" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=6-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751204" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=5-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751205" version="1" comment="kernel-livepatch-5_14_21-150400_24_38-default is &gt;=4-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009752332" version="1" comment="kernel-livepatch-5_14_21-150400_24_41-default is &gt;=3-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877784" version="1" comment="kernel-rt is ==5.14.21-150400.15.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206737"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764659" version="1" comment="kernel-livepatch-5_14_21-150400_15_11-rt is &gt;=4-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009765065" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=14-150400.16.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764664" version="1" comment="kernel-livepatch-5_14_21-150400_24_11-default is &gt;=11-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764665" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=11-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764666" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=10-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764667" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=8-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764668" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=7-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764669" version="1" comment="kernel-livepatch-5_14_21-150400_24_38-default is &gt;=6-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764670" version="1" comment="kernel-livepatch-5_14_21-150400_24_41-default is &gt;=5-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751216" version="1" comment="kernel-default is ==5.14.21-150400.24.46.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764671" version="1" comment="kernel-livepatch-5_14_21-150400_24_46-default is &gt;=4-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755396" version="1" comment="kernel-default is ==5.14.21-150400.24.55.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764672" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=3-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764674" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=2-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796020" version="1" comment="kernel-default is &lt;5.14.21-150400.24.60.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188245"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764675" version="1" comment="kernel-livepatch-5_3_18-150200_24_115-default is &gt;=14-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764676" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=11-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764677" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=8-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764678" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=8-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764679" version="1" comment="kernel-livepatch-5_3_18-150200_24_139-default is &gt;=5-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764680" version="1" comment="kernel-livepatch-5_3_18-150200_24_142-default is &gt;=4-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764681" version="1" comment="kernel-livepatch-5_3_18-150200_24_145-default is &gt;=3-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764682" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=7-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764683" version="1" comment="kernel-livepatch-5_3_18-150300_59_106-default is &gt;=5-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764684" version="1" comment="kernel-livepatch-5_3_18-150300_59_109-default is &gt;=5-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764685" version="1" comment="kernel-livepatch-5_3_18-150300_59_112-default is &gt;=4-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764686" version="1" comment="kernel-livepatch-5_3_18-150300_59_115-default is &gt;=3-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764687" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=14-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167218"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764688" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=13-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764689" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764690" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=11-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764691" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=10-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167210"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764692" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=8-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009761482" version="1" comment="kernel-default is &lt;5.14.21-150400.24.46.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009180976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852715" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=9-150500.6.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852366" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=9-150500.6.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755385" version="1" comment="kgraft-patch-4_12_14-95_108-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755386" version="1" comment="kgraft-patch-4_12_14-95_111-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755223" version="1" comment="kgraft-patch-4_12_14-95_114-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751223" version="1" comment="kernel-default is ==4.12.14-95.117.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755387" version="1" comment="kgraft-patch-4_12_14-95_117-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755224" version="1" comment="kgraft-patch-4_12_14-122_133-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755225" version="1" comment="kgraft-patch-4_12_14-122_136-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755226" version="1" comment="kgraft-patch-4_12_14-122_139-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755227" version="1" comment="kgraft-patch-4_12_14-122_144-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755228" version="1" comment="kgraft-patch-4_12_14-122_147-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755229" version="1" comment="kernel-livepatch-4_12_14-150100_197_123-default is &gt;=6-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755230" version="1" comment="kernel-livepatch-4_12_14-150100_197_126-default is &gt;=6-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755231" version="1" comment="kernel-livepatch-4_12_14-150100_197_131-default is &gt;=4-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751233" version="1" comment="kernel-default is ==4.12.14-150100.197.134.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755232" version="1" comment="kernel-livepatch-4_12_14-150100_197_134-default is &gt;=3-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751235" version="1" comment="kernel-default is &lt;4.12.14-150100.197.134.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755233" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=7-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755234" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=7-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755235" version="1" comment="kernel-livepatch-5_3_18-150200_24_139-default is &gt;=4-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755236" version="1" comment="kernel-livepatch-5_3_18-150200_24_142-default is &gt;=3-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170169"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751236" version="1" comment="kernel-default is &lt;5.3.18-150200.24.142.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177725"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755237" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=6-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755238" version="1" comment="kernel-livepatch-5_3_18-150300_59_106-default is &gt;=4-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755388" version="1" comment="kernel-livepatch-5_3_18-150300_59_109-default is &gt;=4-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755389" version="1" comment="kernel-livepatch-5_3_18-150300_59_112-default is &gt;=3-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755239" version="1" comment="kernel-livepatch-5_3_18-150300_59_68-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059700"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755240" version="1" comment="kernel-livepatch-5_3_18-150300_59_71-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755241" version="1" comment="kernel-livepatch-5_3_18-150300_59_76-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755242" version="1" comment="kernel-livepatch-5_3_18-150300_59_87-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755243" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755244" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755245" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755390" version="1" comment="kernel-livepatch-5_14_21-150400_22-default is &gt;=13-150400.13.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060074"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755391" version="1" comment="kernel-livepatch-5_14_21-150400_24_11-default is &gt;=10-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755392" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=10-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755248" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=9-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755393" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=7-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755394" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=6-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755249" version="1" comment="kernel-livepatch-5_14_21-150400_24_38-default is &gt;=5-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755395" version="1" comment="kernel-livepatch-5_14_21-150400_24_41-default is &gt;=4-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009786219" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=13-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169924"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009786220" version="1" comment="kgraft-patch-4_12_14-122_133-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794740" version="1" comment="kgraft-patch-4_12_14-122_136-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795130" version="1" comment="kgraft-patch-4_12_14-122_139-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795131" version="1" comment="kgraft-patch-4_12_14-122_144-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795992" version="1" comment="kgraft-patch-4_12_14-122_147-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751227" version="1" comment="kernel-default is ==4.12.14-122.150.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009786221" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764702" version="1" comment="kernel-default is ==4.12.14-122.153.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009786222" version="1" comment="kgraft-patch-4_12_14-122_153-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764728" version="1" comment="kernel-default is ==4.12.14-122.156.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009786223" version="1" comment="kgraft-patch-4_12_14-122_156-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795132" version="1" comment="kgraft-patch-4_12_14-122_159-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009786224" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776023" version="1" comment="kernel-default is &lt;4.12.14-122.162.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184163"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795133" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=13-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170078"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782315" version="1" comment="kernel-livepatch-4_12_14-150100_197_123-default is &gt;=10-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782316" version="1" comment="kernel-livepatch-4_12_14-150100_197_126-default is &gt;=10-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794741" version="1" comment="kernel-livepatch-4_12_14-150100_197_131-default is &gt;=8-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795134" version="1" comment="kernel-livepatch-4_12_14-150100_197_134-default is &gt;=7-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764712" version="1" comment="kernel-default is ==4.12.14-150100.197.137.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782317" version="1" comment="kernel-livepatch-4_12_14-150100_197_137-default is &gt;=5-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764731" version="1" comment="kernel-default is ==4.12.14-150100.197.142.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782318" version="1" comment="kernel-livepatch-4_12_14-150100_197_142-default is &gt;=5-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764734" version="1" comment="kernel-default is ==4.12.14-150100.197.145.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782319" version="1" comment="kernel-livepatch-4_12_14-150100_197_145-default is &gt;=5-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764736" version="1" comment="kernel-default is &lt;4.12.14-150100.197.145.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795742" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=14-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795743" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=11-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795744" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=11-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795745" version="1" comment="kernel-livepatch-5_3_18-150200_24_139-default is &gt;=8-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795746" version="1" comment="kernel-livepatch-5_3_18-150200_24_142-default is &gt;=7-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795747" version="1" comment="kernel-livepatch-5_3_18-150200_24_145-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764715" version="1" comment="kernel-default is ==5.3.18-150200.24.148.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795748" version="1" comment="kernel-livepatch-5_3_18-150200_24_148-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795749" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795750" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776030" version="1" comment="kernel-default is &lt;5.3.18-150200.24.154.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184165"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795751" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794742" version="1" comment="kernel-livepatch-5_3_18-150300_59_106-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795752" version="1" comment="kernel-livepatch-5_3_18-150300_59_109-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795753" version="1" comment="kernel-livepatch-5_3_18-150300_59_112-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795824" version="1" comment="kernel-livepatch-5_3_18-150300_59_115-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764718" version="1" comment="kernel-default is ==5.3.18-150300.59.118.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795993" version="1" comment="kernel-livepatch-5_3_18-150300_59_118-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795825" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795994" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795135" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794743" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795136" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796654" version="1" comment="kernel-livepatch-5_14_21-150400_15_11-rt is &gt;=7-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795995" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=14-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795996" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=13-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795997" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=11-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795998" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=10-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795999" version="1" comment="kernel-livepatch-5_14_21-150400_24_38-default is &gt;=9-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796000" version="1" comment="kernel-livepatch-5_14_21-150400_24_41-default is &gt;=8-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796001" version="1" comment="kernel-livepatch-5_14_21-150400_24_46-default is &gt;=7-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796002" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796003" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796004" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796005" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796006" version="1" comment="kernel-default is &lt;5.14.21-150400.24.66.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796660" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=3-150500.6.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796007" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=3-150500.6.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751207" version="1" comment="kernel-livepatch-5_3_18-150200_24_142-default is &gt;=2-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751209" version="1" comment="kernel-livepatch-5_3_18-150200_24_145-default is &gt;=2-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751211" version="1" comment="kernel-livepatch-5_3_18-150300_59_109-default is &gt;=3-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751213" version="1" comment="kernel-livepatch-5_3_18-150300_59_112-default is &gt;=2-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751215" version="1" comment="kernel-livepatch-5_3_18-150300_59_115-default is &gt;=2-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750644" version="1" comment="kernel-livepatch-5_14_21-150400_15_11-rt is &gt;=2-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751217" version="1" comment="kernel-livepatch-5_14_21-150400_24_46-default is &gt;=2-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755122" version="1" comment="kernel-default is ==4.12.14-95.120.4" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755123" version="1" comment="kgraft-patch-4_12_14-95_120-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755250" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751229" version="1" comment="kernel-default is &lt;4.12.14-122.150.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755251" version="1" comment="kernel-livepatch-5_14_21-150400_15_11-rt is &gt;=3-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755642" version="1" comment="kernel-livepatch-5_14_21-150400_24_46-default is &gt;=3-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764693" version="1" comment="kgraft-patch-4_12_14-122_124-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764694" version="1" comment="kgraft-patch-4_12_14-122_127-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764695" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764696" version="1" comment="kgraft-patch-4_12_14-122_133-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764697" version="1" comment="kgraft-patch-4_12_14-122_136-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764698" version="1" comment="kgraft-patch-4_12_14-122_139-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764699" version="1" comment="kgraft-patch-4_12_14-122_144-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764700" version="1" comment="kgraft-patch-4_12_14-122_147-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764701" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764703" version="1" comment="kgraft-patch-4_12_14-122_153-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807351" version="1" comment="kgraft-patch-4_12_14-122_176-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807696" version="1" comment="kgraft-patch-4_12_14-122_179-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807697" version="1" comment="kernel-default is &lt;4.12.14-122.179.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764705" version="1" comment="kernel-livepatch-4_12_14-150100_197_114-default is &gt;=12-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764706" version="1" comment="kernel-livepatch-4_12_14-150100_197_117-default is &gt;=10-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764707" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=10-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764708" version="1" comment="kernel-livepatch-4_12_14-150100_197_123-default is &gt;=7-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764709" version="1" comment="kernel-livepatch-4_12_14-150100_197_126-default is &gt;=7-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764710" version="1" comment="kernel-livepatch-4_12_14-150100_197_131-default is &gt;=5-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764711" version="1" comment="kernel-livepatch-4_12_14-150100_197_134-default is &gt;=4-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764713" version="1" comment="kernel-livepatch-4_12_14-150100_197_137-default is &gt;=2-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807353" version="1" comment="kernel-default is ==4.12.14-150100.197.157.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190539"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807354" version="1" comment="kernel-livepatch-4_12_14-150100_197_157-default is &gt;=2-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807355" version="1" comment="kernel-default is &lt;4.12.14-150100.197.157.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877719" version="1" comment="kernel-default is &lt;5.14.21-150400.24.55.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206724"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769736" version="1" comment="kgraft-patch-4_12_14-95_102-default is &gt;=11-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769737" version="1" comment="kgraft-patch-4_12_14-95_105-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769987" version="1" comment="kgraft-patch-4_12_14-95_108-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770216" version="1" comment="kgraft-patch-4_12_14-95_111-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769988" version="1" comment="kgraft-patch-4_12_14-95_114-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769989" version="1" comment="kgraft-patch-4_12_14-95_117-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769738" version="1" comment="kgraft-patch-4_12_14-95_120-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755124" version="1" comment="kernel-default is &lt;4.12.14-95.120.4" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770217" version="1" comment="kgraft-patch-4_12_14-122_127-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770218" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770219" version="1" comment="kgraft-patch-4_12_14-122_133-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769990" version="1" comment="kgraft-patch-4_12_14-122_136-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769991" version="1" comment="kgraft-patch-4_12_14-122_139-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769992" version="1" comment="kgraft-patch-4_12_14-122_144-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770220" version="1" comment="kgraft-patch-4_12_14-122_147-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770221" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769993" version="1" comment="kgraft-patch-4_12_14-122_153-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764704" version="1" comment="kernel-default is &lt;4.12.14-122.153.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770222" version="1" comment="kernel-livepatch-4_12_14-150100_197_117-default is &gt;=11-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769994" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=11-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770223" version="1" comment="kernel-livepatch-4_12_14-150100_197_123-default is &gt;=8-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769995" version="1" comment="kernel-livepatch-4_12_14-150100_197_126-default is &gt;=8-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769996" version="1" comment="kernel-livepatch-4_12_14-150100_197_131-default is &gt;=6-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769997" version="1" comment="kernel-livepatch-4_12_14-150100_197_134-default is &gt;=5-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769998" version="1" comment="kernel-livepatch-4_12_14-150100_197_137-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764714" version="1" comment="kernel-default is &lt;4.12.14-150100.197.137.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755397" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=2-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798679" version="1" comment="kgraft-patch-4_12_14-122_133-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798650" version="1" comment="kgraft-patch-4_12_14-122_136-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798651" version="1" comment="kgraft-patch-4_12_14-122_139-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798680" version="1" comment="kgraft-patch-4_12_14-122_144-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798681" version="1" comment="kgraft-patch-4_12_14-122_147-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798652" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798653" version="1" comment="kgraft-patch-4_12_14-122_153-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798682" version="1" comment="kgraft-patch-4_12_14-122_156-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798654" version="1" comment="kgraft-patch-4_12_14-122_159-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798655" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798683" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798685" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816438" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845681" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845683" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849120" version="1" comment="kgraft-patch-4_12_14-122_194-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798903" version="1" comment="kernel-livepatch-4_12_14-150100_197_123-default is &gt;=11-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798687" version="1" comment="kernel-livepatch-4_12_14-150100_197_126-default is &gt;=11-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798904" version="1" comment="kernel-livepatch-4_12_14-150100_197_131-default is &gt;=9-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798905" version="1" comment="kernel-livepatch-4_12_14-150100_197_134-default is &gt;=8-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798906" version="1" comment="kernel-livepatch-4_12_14-150100_197_137-default is &gt;=6-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798907" version="1" comment="kernel-livepatch-4_12_14-150100_197_142-default is &gt;=6-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799060" version="1" comment="kernel-livepatch-4_12_14-150100_197_145-default is &gt;=6-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775802" version="1" comment="kernel-default is ==4.12.14-150100.197.148.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799061" version="1" comment="kernel-livepatch-4_12_14-150100_197_148-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782321" version="1" comment="kernel-default is ==4.12.14-150100.197.151.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799062" version="1" comment="kernel-livepatch-4_12_14-150100_197_151-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799063" version="1" comment="kernel-default is ==4.12.14-150100.197.154.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799064" version="1" comment="kernel-livepatch-4_12_14-150100_197_154-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816087" version="1" comment="kernel-default is ==4.12.14-150100.197.160.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816088" version="1" comment="kernel-livepatch-4_12_14-150100_197_160-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845685" version="1" comment="kernel-default is ==4.12.14-150100.197.165.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845686" version="1" comment="kernel-livepatch-4_12_14-150100_197_165-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845687" version="1" comment="kernel-default is ==4.12.14-150100.197.168.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845688" version="1" comment="kernel-livepatch-4_12_14-150100_197_168-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845689" version="1" comment="kernel-default is &lt;4.12.14-150100.197.168.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799066" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798908" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799558" version="1" comment="kernel-livepatch-5_3_18-150200_24_139-default is &gt;=9-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799067" version="1" comment="kernel-livepatch-5_3_18-150200_24_142-default is &gt;=8-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799068" version="1" comment="kernel-livepatch-5_3_18-150200_24_145-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799069" version="1" comment="kernel-livepatch-5_3_18-150200_24_148-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799070" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799559" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799560" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799562" version="1" comment="kernel-livepatch-5_3_18-150200_24_160-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804086" version="1" comment="kernel-livepatch-5_3_18-150200_24_163-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804088" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816091" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845691" version="1" comment="kernel-livepatch-5_3_18-150200_24_172-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845860" version="1" comment="kernel-livepatch-5_3_18-150200_24_175-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849455" version="1" comment="kernel-livepatch-5_3_18-150200_24_178-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799630" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799690" version="1" comment="kernel-livepatch-5_3_18-150300_59_106-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799631" version="1" comment="kernel-livepatch-5_3_18-150300_59_109-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799632" version="1" comment="kernel-livepatch-5_3_18-150300_59_112-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799633" version="1" comment="kernel-livepatch-5_3_18-150300_59_115-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799634" version="1" comment="kernel-livepatch-5_3_18-150300_59_118-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799635" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799636" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799637" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799639" version="1" comment="kernel-livepatch-5_3_18-150300_59_130-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804091" version="1" comment="kernel-livepatch-5_3_18-150300_59_133-default is &gt;=2-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804093" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=2-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166605"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816441" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845694" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845696" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849458" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799564" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=15-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799640" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799641" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798909" version="1" comment="kernel-livepatch-5_14_21-150400_15_11-rt is &gt;=8-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799642" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=14-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799643" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=12-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799644" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=11-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799645" version="1" comment="kernel-livepatch-5_14_21-150400_24_38-default is &gt;=10-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799646" version="1" comment="kernel-livepatch-5_14_21-150400_24_41-default is &gt;=9-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799647" version="1" comment="kernel-livepatch-5_14_21-150400_24_46-default is &gt;=8-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799648" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799649" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799650" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799651" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798916" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=4-150500.9.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799652" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=4-150500.9.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188865"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764716" version="1" comment="kernel-livepatch-5_3_18-150200_24_148-default is &gt;=2-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764717" version="1" comment="kernel-default is &lt;5.3.18-150200.24.148.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764719" version="1" comment="kernel-livepatch-5_3_18-150300_59_118-default is &gt;=2-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764720" version="1" comment="kgraft-patch-4_12_14-95_102-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764721" version="1" comment="kgraft-patch-4_12_14-95_105-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764722" version="1" comment="kgraft-patch-4_12_14-95_108-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764723" version="1" comment="kgraft-patch-4_12_14-95_111-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764724" version="1" comment="kgraft-patch-4_12_14-95_114-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764725" version="1" comment="kgraft-patch-4_12_14-95_117-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764726" version="1" comment="kgraft-patch-4_12_14-95_120-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061043"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764727" version="1" comment="kgraft-patch-4_12_14-95_99-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764729" version="1" comment="kgraft-patch-4_12_14-122_156-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764730" version="1" comment="kernel-default is &lt;4.12.14-122.156.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764732" version="1" comment="kernel-livepatch-4_12_14-150100_197_142-default is &gt;=2-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764733" version="1" comment="kernel-default is &lt;4.12.14-150100.197.142.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776019" version="1" comment="kgraft-patch-4_12_14-122_130-default is &gt;=12-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060215"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775786" version="1" comment="kgraft-patch-4_12_14-122_133-default is &gt;=10-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775787" version="1" comment="kgraft-patch-4_12_14-122_136-default is &gt;=9-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775788" version="1" comment="kgraft-patch-4_12_14-122_139-default is &gt;=8-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775789" version="1" comment="kgraft-patch-4_12_14-122_144-default is &gt;=7-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775790" version="1" comment="kgraft-patch-4_12_14-122_147-default is &gt;=6-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775791" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=6-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775792" version="1" comment="kgraft-patch-4_12_14-122_153-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775793" version="1" comment="kgraft-patch-4_12_14-122_156-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776020" version="1" comment="kgraft-patch-4_12_14-122_159-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776022" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=2-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775794" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=12-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170154"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775795" version="1" comment="kernel-livepatch-4_12_14-150100_197_123-default is &gt;=9-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775796" version="1" comment="kernel-livepatch-4_12_14-150100_197_126-default is &gt;=9-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775797" version="1" comment="kernel-livepatch-4_12_14-150100_197_131-default is &gt;=7-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775798" version="1" comment="kernel-livepatch-4_12_14-150100_197_134-default is &gt;=6-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170153"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775799" version="1" comment="kernel-livepatch-4_12_14-150100_197_137-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775800" version="1" comment="kernel-livepatch-4_12_14-150100_197_142-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775801" version="1" comment="kernel-livepatch-4_12_14-150100_197_145-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775803" version="1" comment="kernel-livepatch-4_12_14-150100_197_148-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775804" version="1" comment="kernel-default is &lt;4.12.14-150100.197.148.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775805" version="1" comment="kernel-livepatch-5_3_18-150200_24_126-default is &gt;=13-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776024" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=10-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775806" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=10-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776025" version="1" comment="kernel-livepatch-5_3_18-150200_24_139-default is &gt;=7-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775807" version="1" comment="kernel-livepatch-5_3_18-150200_24_142-default is &gt;=6-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776026" version="1" comment="kernel-livepatch-5_3_18-150200_24_145-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776027" version="1" comment="kernel-livepatch-5_3_18-150200_24_148-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775808" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776029" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776031" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776032" version="1" comment="kernel-livepatch-5_3_18-150300_59_106-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775809" version="1" comment="kernel-livepatch-5_3_18-150300_59_109-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776033" version="1" comment="kernel-livepatch-5_3_18-150300_59_112-default is &gt;=6-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775810" version="1" comment="kernel-livepatch-5_3_18-150300_59_115-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775811" version="1" comment="kernel-livepatch-5_3_18-150300_59_118-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775812" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775814" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775815" version="1" comment="kernel-livepatch-5_3_18-150300_59_90-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775816" version="1" comment="kernel-livepatch-5_3_18-150300_59_93-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775817" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775818" version="1" comment="kernel-livepatch-5_14_21-150400_15_11-rt is &gt;=6-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775823" version="1" comment="kernel-livepatch-5_14_21-150400_24_18-default is &gt;=13-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775824" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=12-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775825" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=10-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775826" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=9-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178778"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775827" version="1" comment="kernel-livepatch-5_14_21-150400_24_38-default is &gt;=8-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775828" version="1" comment="kernel-livepatch-5_14_21-150400_24_41-default is &gt;=7-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775829" version="1" comment="kernel-livepatch-5_14_21-150400_24_46-default is &gt;=6-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775830" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775831" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776228" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=2-150500.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776035" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=2-150500.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184167"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796009" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796011" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796013" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796014" version="1" comment="kernel-default is &lt;5.14.21-150400.24.74.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188240"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796016" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796018" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816442" version="1" comment="kernel-livepatch-5_3_18-150200_24_139-default is &gt;=11-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816443" version="1" comment="kernel-livepatch-5_3_18-150200_24_142-default is &gt;=10-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166595"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816444" version="1" comment="kernel-livepatch-5_3_18-150200_24_145-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816093" version="1" comment="kernel-livepatch-5_3_18-150200_24_148-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816094" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816445" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816095" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816096" version="1" comment="kernel-livepatch-5_3_18-150200_24_160-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816097" version="1" comment="kernel-livepatch-5_3_18-150200_24_163-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816446" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804089" version="1" comment="kernel-default is &lt;5.3.18-150200.24.166.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189891"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816447" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816448" version="1" comment="kernel-livepatch-5_3_18-150300_59_106-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816449" version="1" comment="kernel-livepatch-5_3_18-150300_59_109-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816450" version="1" comment="kernel-livepatch-5_3_18-150300_59_112-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816451" version="1" comment="kernel-livepatch-5_3_18-150300_59_115-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816098" version="1" comment="kernel-livepatch-5_3_18-150300_59_118-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816099" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816100" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816101" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816102" version="1" comment="kernel-livepatch-5_3_18-150300_59_130-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816452" version="1" comment="kernel-livepatch-5_3_18-150300_59_133-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816453" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816454" version="1" comment="kernel-default is &lt;5.3.18-150300.59.138.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816104" version="1" comment="kernel-livepatch-5_14_21-150400_15_11-rt is &gt;=10-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816456" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=14-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816457" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=13-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816458" version="1" comment="kernel-livepatch-5_14_21-150400_24_38-default is &gt;=12-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816114" version="1" comment="kernel-livepatch-5_14_21-150400_24_41-default is &gt;=11-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816459" version="1" comment="kernel-livepatch-5_14_21-150400_24_46-default is &gt;=10-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816460" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816115" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816116" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816461" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816462" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816117" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816463" version="1" comment="kernel-livepatch-5_14_21-150400_24_81-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816118" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816465" version="1" comment="kernel-livepatch-5_14_21-150400_24_92-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852611" version="1" comment="kernel-default is &lt;5.14.21-150400.24.92.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816119" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=6-150500.15.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816124" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=6-150500.15.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816466" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816467" version="1" comment="kernel-livepatch-5_14_21-150500_55_19-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816468" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816470" version="1" comment="kernel-livepatch-5_14_21-150500_55_31-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816125" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770231" version="1" comment="kernel-default is &lt;4.12.14-122.159.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764735" version="1" comment="kernel-livepatch-4_12_14-150100_197_145-default is &gt;=2-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764738" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=2-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177711"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764739" version="1" comment="kernel-default is &lt;5.3.18-150200.24.151.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764741" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=2-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009764744" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=2-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177490"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796021" version="1" comment="kernel-default is &lt;5.14.21-150400.24.63.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742253" version="1" comment="kernel-default is &lt;4.12.14-95.114.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742260" version="1" comment="kernel-default is &lt;4.12.14-150100.197.131.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770224" version="1" comment="kernel-livepatch-5_14_21-150400_24_21-default is &gt;=11-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770225" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=9-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770226" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=8-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770253" version="1" comment="kernel-livepatch-5_14_21-150400_24_38-default is &gt;=7-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770227" version="1" comment="kernel-livepatch-5_14_21-150400_24_41-default is &gt;=6-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177708"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751218" version="1" comment="kgraft-patch-4_12_14-95_102-default is &gt;=8-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060093"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751219" version="1" comment="kgraft-patch-4_12_14-95_105-default is &gt;=8-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167189"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751220" version="1" comment="kgraft-patch-4_12_14-95_108-default is &gt;=6-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751221" version="1" comment="kgraft-patch-4_12_14-95_111-default is &gt;=5-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751222" version="1" comment="kgraft-patch-4_12_14-95_114-default is &gt;=3-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167192"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751224" version="1" comment="kgraft-patch-4_12_14-95_117-default is &gt;=2-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060957"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751225" version="1" comment="kgraft-patch-4_12_14-95_96-default is &gt;=13-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751226" version="1" comment="kgraft-patch-4_12_14-95_99-default is &gt;=10-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059968"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751228" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=2-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750765" version="1" comment="kernel-livepatch-4_12_14-150100_197_111-default is &gt;=13-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750766" version="1" comment="kernel-livepatch-4_12_14-150100_197_114-default is &gt;=10-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751230" version="1" comment="kernel-livepatch-4_12_14-150100_197_117-default is &gt;=8-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060078"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750767" version="1" comment="kernel-livepatch-4_12_14-150100_197_120-default is &gt;=8-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177518"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009750768" version="1" comment="kernel-livepatch-4_12_14-150100_197_123-default is &gt;=5-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751231" version="1" comment="kernel-livepatch-4_12_14-150100_197_126-default is &gt;=5-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751232" version="1" comment="kernel-livepatch-4_12_14-150100_197_131-default is &gt;=3-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751234" version="1" comment="kernel-livepatch-4_12_14-150100_197_134-default is &gt;=2-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048391" version="1" comment="cJSON-devel is &lt;1.7.19-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862229" version="1" comment="cJSON-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048392" version="1" comment="libcjson1 is &lt;1.7.19-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862230" version="1" comment="libcjson1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770228" version="1" comment="kgraft-patch-4_12_14-122_156-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770230" version="1" comment="kgraft-patch-4_12_14-122_159-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770001" version="1" comment="kernel-livepatch-4_12_14-150100_197_142-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770002" version="1" comment="kernel-livepatch-4_12_14-150100_197_145-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770003" version="1" comment="kernel-livepatch-5_14_21-150400_15_11-rt is &gt;=5-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178776"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770232" version="1" comment="kernel-livepatch-5_14_21-150400_24_46-default is &gt;=5-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770233" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=4-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178777"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782320" version="1" comment="kernel-livepatch-4_12_14-150100_197_148-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799653" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009796022" version="1" comment="kernel-default is &lt;5.14.21-150400.24.69.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799654" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770234" version="1" comment="kernel-default is ==4.12.14-95.125.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770235" version="1" comment="kgraft-patch-4_12_14-95_125-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770236" version="1" comment="kernel-default is &lt;4.12.14-95.125.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770005" version="1" comment="kernel-livepatch-5_3_18-150200_24_148-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770237" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770238" version="1" comment="kernel-livepatch-5_3_18-150300_59_118-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770239" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770240" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=3-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009770241" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=3-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804094" version="1" comment="kernel-livepatch-5_3_18-150200_24_129-default is &gt;=13-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804095" version="1" comment="kernel-livepatch-5_3_18-150200_24_134-default is &gt;=13-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167208"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804096" version="1" comment="kernel-livepatch-5_3_18-150200_24_139-default is &gt;=10-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167205"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804097" version="1" comment="kernel-livepatch-5_3_18-150200_24_142-default is &gt;=9-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807356" version="1" comment="kernel-livepatch-5_3_18-150200_24_145-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804098" version="1" comment="kernel-livepatch-5_3_18-150200_24_148-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804099" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804100" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804101" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795756" version="1" comment="kernel-default is &lt;5.3.18-150200.24.157.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188193"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804102" version="1" comment="kernel-livepatch-5_3_18-150300_59_101-default is &gt;=12-150300.2.4" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189894"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804103" version="1" comment="kernel-livepatch-5_3_18-150300_59_106-default is &gt;=10-150300.2.4" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804104" version="1" comment="kernel-livepatch-5_3_18-150300_59_109-default is &gt;=10-150300.2.4" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189895"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804105" version="1" comment="kernel-livepatch-5_3_18-150300_59_112-default is &gt;=9-150300.2.4" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804106" version="1" comment="kernel-livepatch-5_3_18-150300_59_115-default is &gt;=8-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166598"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804107" version="1" comment="kernel-livepatch-5_3_18-150300_59_118-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807357" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803408" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=5-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804108" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=4-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804109" version="1" comment="kernel-livepatch-5_3_18-150300_59_98-default is &gt;=13-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803252" version="1" comment="kernel-livepatch-5_14_21-150400_15_11-rt is &gt;=9-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807336" version="1" comment="kernel-livepatch-5_14_21-150400_24_28-default is &gt;=13-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807698" version="1" comment="kernel-livepatch-5_14_21-150400_24_33-default is &gt;=12-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807358" version="1" comment="kernel-livepatch-5_14_21-150400_24_38-default is &gt;=11-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060751"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807359" version="1" comment="kernel-livepatch-5_14_21-150400_24_41-default is &gt;=10-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807699" version="1" comment="kernel-livepatch-5_14_21-150400_24_46-default is &gt;=9-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807700" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807360" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807701" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807702" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807703" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803099" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=5-150500.12.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807704" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=5-150500.12.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189687"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807705" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794745" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009794746" version="1" comment="kernel-default is &lt;4.12.14-122.165.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188040"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782322" version="1" comment="kernel-livepatch-4_12_14-150100_197_151-default is &gt;=2-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009782323" version="1" comment="kernel-default is &lt;4.12.14-150100.197.151.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009185168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009795755" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=2-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775833" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009776037" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799655" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799691" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849473" version="1" comment="kernel-default is &lt;5.14.21-150400.24.81.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200620"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009798686" version="1" comment="kernel-default is &lt;4.12.14-122.173.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799065" version="1" comment="kernel-default is &lt;4.12.14-150100.197.154.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188896"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852098" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=8-150500.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852367" version="1" comment="kernel-livepatch-5_14_21-150500_55_19-default is &gt;=7-150500.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201295"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852368" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=6-150500.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852369" version="1" comment="kernel-livepatch-5_14_21-150500_55_31-default is &gt;=5-150500.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201297"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852099" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=8-150500.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849459" version="1" comment="kgraft-patch-4_12_14-122_147-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849122" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849123" version="1" comment="kgraft-patch-4_12_14-122_153-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849124" version="1" comment="kgraft-patch-4_12_14-122_156-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849125" version="1" comment="kgraft-patch-4_12_14-122_159-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849126" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849127" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849128" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849129" version="1" comment="kgraft-patch-4_12_14-122_176-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849130" version="1" comment="kgraft-patch-4_12_14-122_179-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849131" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816439" version="1" comment="kernel-default is &lt;4.12.14-122.183.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849132" version="1" comment="kernel-livepatch-5_3_18-150200_24_142-default is &gt;=12-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849133" version="1" comment="kernel-livepatch-5_3_18-150200_24_145-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849134" version="1" comment="kernel-livepatch-5_3_18-150200_24_148-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849135" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849136" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849137" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849138" version="1" comment="kernel-livepatch-5_3_18-150200_24_160-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849139" version="1" comment="kernel-livepatch-5_3_18-150200_24_163-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849140" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849141" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816092" version="1" comment="kernel-default is &lt;5.3.18-150200.24.169.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849460" version="1" comment="kernel-livepatch-5_3_18-150300_59_109-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849461" version="1" comment="kernel-livepatch-5_3_18-150300_59_112-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849462" version="1" comment="kernel-livepatch-5_3_18-150300_59_115-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849463" version="1" comment="kernel-livepatch-5_3_18-150300_59_118-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849464" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849465" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849466" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849467" version="1" comment="kernel-livepatch-5_3_18-150300_59_130-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849468" version="1" comment="kernel-livepatch-5_3_18-150300_59_133-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849469" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849470" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845718" version="1" comment="kernel-default is &lt;5.3.18-150300.59.141.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199832"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849142" version="1" comment="kernel-livepatch-5_14_21-150400_24_41-default is &gt;=13-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849143" version="1" comment="kernel-livepatch-5_14_21-150400_24_46-default is &gt;=12-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849144" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849145" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849146" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849147" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849471" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849148" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849472" version="1" comment="kernel-livepatch-5_14_21-150400_24_81-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849149" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=8-150500.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849474" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=8-150500.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849475" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849476" version="1" comment="kernel-livepatch-5_14_21-150500_55_19-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849477" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043889" version="1" comment="libopenjp2-7 is &lt;2.5.3-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153807" version="1" comment="libopenjp2-7 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043890" version="1" comment="libopenjp2-7-x86-64-v3 is &lt;2.5.3-160000.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247630"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043905" version="1" comment="libopenjp2-7-x86-64-v3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043891" version="1" comment="openjpeg2 is &lt;2.5.3-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153813" version="1" comment="openjpeg2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043892" version="1" comment="openjpeg2-devel is &lt;2.5.3-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247629"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153814" version="1" comment="openjpeg2-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043893" version="1" comment="openjpeg2-devel-doc is &lt;2.5.3-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247631"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043906" version="1" comment="openjpeg2-devel-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804110" version="1" comment="kernel-livepatch-5_3_18-150300_59_130-default is &gt;=3-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807706" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807707" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048376" version="1" comment="freerdp is &lt;3.22.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151908" version="1" comment="freerdp is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048377" version="1" comment="freerdp-devel is &lt;3.22.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151909" version="1" comment="freerdp-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048378" version="1" comment="freerdp-proxy is &lt;3.22.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009287971" version="1" comment="freerdp-proxy is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048379" version="1" comment="freerdp-proxy-plugins is &lt;3.22.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048429" version="1" comment="freerdp-proxy-plugins is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048380" version="1" comment="freerdp-sdl is &lt;3.22.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048430" version="1" comment="freerdp-sdl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048381" version="1" comment="freerdp-server is &lt;3.22.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245861" version="1" comment="freerdp-server is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048382" version="1" comment="freerdp-wayland is &lt;3.22.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245862" version="1" comment="freerdp-wayland is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047154"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048383" version="1" comment="libfreerdp-server-proxy3-3 is &lt;3.22.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048431" version="1" comment="libfreerdp-server-proxy3-3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048384" version="1" comment="libfreerdp3-3 is &lt;3.22.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048432" version="1" comment="libfreerdp3-3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048385" version="1" comment="librdtk0-0 is &lt;3.22.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048433" version="1" comment="librdtk0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048386" version="1" comment="libuwac0-0 is &lt;3.22.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245863" version="1" comment="libuwac0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047155"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048387" version="1" comment="libwinpr3-3 is &lt;3.22.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048434" version="1" comment="libwinpr3-3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048388" version="1" comment="rdtk0-devel is &lt;3.22.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048435" version="1" comment="rdtk0-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048389" version="1" comment="uwac0-devel is &lt;3.22.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048436" version="1" comment="uwac0-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048390" version="1" comment="winpr-devel is &lt;3.22.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877482" version="1" comment="winpr-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807708" version="1" comment="kernel-livepatch-5_14_21-150400_24_81-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807709" version="1" comment="kernel-livepatch-5_14_21-150500_55_19-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032111" version="1" comment="tcpreplay is &lt;4.5.2-bp160.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245282"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154264" version="1" comment="tcpreplay is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799563" version="1" comment="kernel-default is &lt;5.3.18-150200.24.160.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188965"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799693" version="1" comment="kernel-livepatch-5_14_21-150400_24_81-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009799695" version="1" comment="kernel-livepatch-5_14_21-150500_55_19-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854051" version="1" comment="kernel-livepatch-5_3_18-150200_24_145-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854052" version="1" comment="kernel-livepatch-5_3_18-150200_24_148-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854053" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854054" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854055" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854056" version="1" comment="kernel-livepatch-5_3_18-150200_24_160-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854328" version="1" comment="kernel-livepatch-5_3_18-150200_24_163-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804116" version="1" comment="kernel-default is &lt;5.3.18-150200.24.163.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854057" version="1" comment="kernel-livepatch-5_3_18-150300_59_115-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854058" version="1" comment="kernel-livepatch-5_3_18-150300_59_118-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854059" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854060" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854061" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854062" version="1" comment="kernel-livepatch-5_3_18-150300_59_130-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854063" version="1" comment="kernel-livepatch-5_3_18-150300_59_133-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816477" version="1" comment="kernel-default is &lt;5.3.18-150300.59.133.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854707" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854708" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854836" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854709" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854710" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854711" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854712" version="1" comment="kernel-livepatch-5_14_21-150400_24_81-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854837" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849151" version="1" comment="kernel-default is &lt;5.14.21-150400.24.88.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853704" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=10-150500.9.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201543"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854064" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=10-150500.9.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854065" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854066" version="1" comment="kernel-livepatch-5_14_21-150500_55_19-default is &gt;=8-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854067" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854068" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038439" version="1" comment="WebKitGTK-4.0-lang is &lt;2.50.4-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779926" version="1" comment="WebKitGTK-4.0-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038440" version="1" comment="WebKitGTK-4.1-lang is &lt;2.50.4-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779927" version="1" comment="WebKitGTK-4.1-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038441" version="1" comment="WebKitGTK-6.0-lang is &lt;2.50.4-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246511"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779928" version="1" comment="WebKitGTK-6.0-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038442" version="1" comment="libjavascriptcoregtk-4_0-18 is &lt;2.50.4-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152638" version="1" comment="libjavascriptcoregtk-4_0-18 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038443" version="1" comment="libjavascriptcoregtk-4_1-0 is &lt;2.50.4-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698039" version="1" comment="libjavascriptcoregtk-4_1-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038444" version="1" comment="libjavascriptcoregtk-6_0-1 is &lt;2.50.4-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779930" version="1" comment="libjavascriptcoregtk-6_0-1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038445" version="1" comment="libwebkit2gtk-4_0-37 is &lt;2.50.4-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152640" version="1" comment="libwebkit2gtk-4_0-37 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038446" version="1" comment="libwebkit2gtk-4_1-0 is &lt;2.50.4-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698041" version="1" comment="libwebkit2gtk-4_1-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038447" version="1" comment="libwebkitgtk-6_0-4 is &lt;2.50.4-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779932" version="1" comment="libwebkitgtk-6_0-4 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038448" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is &lt;2.50.4-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152643" version="1" comment="typelib-1_0-JavaScriptCore-4_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040313"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038449" version="1" comment="typelib-1_0-JavaScriptCore-4_1 is &lt;2.50.4-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698148" version="1" comment="typelib-1_0-JavaScriptCore-4_1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038450" version="1" comment="typelib-1_0-JavaScriptCore-6_0 is &lt;2.50.4-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779933" version="1" comment="typelib-1_0-JavaScriptCore-6_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038451" version="1" comment="typelib-1_0-WebKit-6_0 is &lt;2.50.4-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779934" version="1" comment="typelib-1_0-WebKit-6_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038452" version="1" comment="typelib-1_0-WebKit2-4_0 is &lt;2.50.4-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152644" version="1" comment="typelib-1_0-WebKit2-4_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040314"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038453" version="1" comment="typelib-1_0-WebKit2-4_1 is &lt;2.50.4-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698149" version="1" comment="typelib-1_0-WebKit2-4_1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038454" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is &lt;2.50.4-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152645" version="1" comment="typelib-1_0-WebKit2WebExtension-4_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038455" version="1" comment="typelib-1_0-WebKit2WebExtension-4_1 is &lt;2.50.4-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698150" version="1" comment="typelib-1_0-WebKit2WebExtension-4_1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038456" version="1" comment="typelib-1_0-WebKitWebProcessExtension-6_0 is &lt;2.50.4-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779935" version="1" comment="typelib-1_0-WebKitWebProcessExtension-6_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038457" version="1" comment="webkit-jsc-4 is &lt;2.50.4-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152646" version="1" comment="webkit-jsc-4 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038458" version="1" comment="webkit-jsc-4.1 is &lt;2.50.4-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698152" version="1" comment="webkit-jsc-4.1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038459" version="1" comment="webkit-jsc-6.0 is &lt;2.50.4-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779936" version="1" comment="webkit-jsc-6.0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038460" version="1" comment="webkit2gtk-4_0-injected-bundles is &lt;2.50.4-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152647" version="1" comment="webkit2gtk-4_0-injected-bundles is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038461" version="1" comment="webkit2gtk-4_1-injected-bundles is &lt;2.50.4-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698045" version="1" comment="webkit2gtk-4_1-injected-bundles is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059866"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038462" version="1" comment="webkit2gtk3-devel is &lt;2.50.4-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152649" version="1" comment="webkit2gtk3-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038463" version="1" comment="webkit2gtk3-minibrowser is &lt;2.50.4-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243274" version="1" comment="webkit2gtk3-minibrowser is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038464" version="1" comment="webkit2gtk3-soup2-devel is &lt;2.50.4-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698154" version="1" comment="webkit2gtk3-soup2-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038465" version="1" comment="webkit2gtk3-soup2-minibrowser is &lt;2.50.4-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698155" version="1" comment="webkit2gtk3-soup2-minibrowser is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060014"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038466" version="1" comment="webkit2gtk4-devel is &lt;2.50.4-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698156" version="1" comment="webkit2gtk4-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060015"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038467" version="1" comment="webkit2gtk4-minibrowser is &lt;2.50.4-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698157" version="1" comment="webkit2gtk4-minibrowser is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038468" version="1" comment="webkitgtk-6_0-injected-bundles is &lt;2.50.4-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009779937" version="1" comment="webkitgtk-6_0-injected-bundles is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816127" version="1" comment="kgraft-patch-4_12_14-122_139-default is &gt;=12-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170051"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816128" version="1" comment="kgraft-patch-4_12_14-122_144-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816471" version="1" comment="kgraft-patch-4_12_14-122_147-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816472" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816473" version="1" comment="kgraft-patch-4_12_14-122_153-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816129" version="1" comment="kgraft-patch-4_12_14-122_156-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816130" version="1" comment="kgraft-patch-4_12_14-122_159-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816474" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816131" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816132" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816133" version="1" comment="kgraft-patch-4_12_14-122_176-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807352" version="1" comment="kernel-default is &lt;4.12.14-122.176.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816475" version="1" comment="kernel-livepatch-4_12_14-150100_197_131-default is &gt;=11-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816476" version="1" comment="kernel-livepatch-4_12_14-150100_197_134-default is &gt;=10-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170159"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816134" version="1" comment="kernel-livepatch-4_12_14-150100_197_137-default is &gt;=8-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816135" version="1" comment="kernel-livepatch-4_12_14-150100_197_142-default is &gt;=8-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816136" version="1" comment="kernel-livepatch-4_12_14-150100_197_145-default is &gt;=8-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166516"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816137" version="1" comment="kernel-livepatch-4_12_14-150100_197_148-default is &gt;=6-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816138" version="1" comment="kernel-livepatch-4_12_14-150100_197_151-default is &gt;=5-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816139" version="1" comment="kernel-livepatch-4_12_14-150100_197_154-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009816140" version="1" comment="kernel-livepatch-4_12_14-150100_197_157-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803255" version="1" comment="kgraft-patch-4_12_14-122_136-default is &gt;=12-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807710" version="1" comment="kgraft-patch-4_12_14-122_139-default is &gt;=11-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807711" version="1" comment="kgraft-patch-4_12_14-122_144-default is &gt;=10-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167187"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807712" version="1" comment="kgraft-patch-4_12_14-122_147-default is &gt;=9-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807713" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=9-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807714" version="1" comment="kgraft-patch-4_12_14-122_153-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807715" version="1" comment="kgraft-patch-4_12_14-122_156-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807716" version="1" comment="kgraft-patch-4_12_14-122_159-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009803410" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807717" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804111" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=3-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169850"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807361" version="1" comment="kernel-livepatch-4_12_14-150100_197_123-default is &gt;=12-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804112" version="1" comment="kernel-livepatch-4_12_14-150100_197_126-default is &gt;=12-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060439"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807718" version="1" comment="kernel-livepatch-4_12_14-150100_197_131-default is &gt;=10-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177517"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807362" version="1" comment="kernel-livepatch-4_12_14-150100_197_134-default is &gt;=9-150100.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009190541"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804113" version="1" comment="kernel-livepatch-4_12_14-150100_197_137-default is &gt;=7-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807363" version="1" comment="kernel-livepatch-4_12_14-150100_197_142-default is &gt;=7-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807364" version="1" comment="kernel-livepatch-4_12_14-150100_197_145-default is &gt;=7-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807365" version="1" comment="kernel-livepatch-4_12_14-150100_197_148-default is &gt;=5-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807719" version="1" comment="kernel-livepatch-4_12_14-150100_197_151-default is &gt;=4-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804114" version="1" comment="kernel-livepatch-4_12_14-150100_197_154-default is &gt;=3-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170168"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009804115" version="1" comment="kernel-livepatch-5_3_18-150200_24_160-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807721" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807723" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852602" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=12-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009183293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852603" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=11-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852604" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=11-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852605" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=9-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177706"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852606" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=8-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852607" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=8-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177707"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852608" version="1" comment="kernel-livepatch-5_14_21-150400_24_81-default is &gt;=7-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852609" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=6-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852610" version="1" comment="kernel-livepatch-5_14_21-150400_24_92-default is &gt;=5-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177709"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035139" version="1" comment="cheat is &lt;4.4.2-bp160.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961128" version="1" comment="cheat is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849150" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849478" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853304" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=13-2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852100" version="1" comment="kgraft-patch-4_12_14-122_153-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852101" version="1" comment="kgraft-patch-4_12_14-122_156-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852370" version="1" comment="kgraft-patch-4_12_14-122_159-default is &gt;=10-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169925"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852371" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=9-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169926"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852372" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=8-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169792"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852102" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=7-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169794"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852373" version="1" comment="kgraft-patch-4_12_14-122_176-default is &gt;=6-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169797"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852374" version="1" comment="kgraft-patch-4_12_14-122_179-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852103" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=5-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169789"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852375" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=4-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169961"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845730" version="1" comment="kernel-default is &lt;4.12.14-122.186.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852376" version="1" comment="kernel-livepatch-5_3_18-150200_24_145-default is &gt;=12-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167155"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852377" version="1" comment="kernel-livepatch-5_3_18-150200_24_148-default is &gt;=11-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852378" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=11-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167156"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852379" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=9-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167152"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852380" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=8-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852104" version="1" comment="kernel-livepatch-5_3_18-150200_24_160-default is &gt;=7-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852105" version="1" comment="kernel-livepatch-5_3_18-150200_24_163-default is &gt;=6-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852381" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=6-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177512"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852106" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=5-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167151"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852382" version="1" comment="kernel-livepatch-5_3_18-150200_24_172-default is &gt;=4-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845692" version="1" comment="kernel-default is &lt;5.3.18-150200.24.172.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199829"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852107" version="1" comment="kernel-livepatch-5_3_18-150300_59_115-default is &gt;=12-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167220"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852383" version="1" comment="kernel-livepatch-5_3_18-150300_59_118-default is &gt;=11-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852384" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=11-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167209"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852108" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=9-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167211"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852385" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=8-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852386" version="1" comment="kernel-livepatch-5_3_18-150300_59_130-default is &gt;=7-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852387" version="1" comment="kernel-livepatch-5_3_18-150300_59_133-default is &gt;=6-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852388" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=6-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177704"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852109" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=5-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852389" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=4-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845739" version="1" comment="kernel-default is &lt;5.3.18-150300.59.144.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199835"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852612" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=4-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852613" version="1" comment="kernel-livepatch-5_14_21-150400_24_97-default is &gt;=4-150400.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852390" version="1" comment="kernel-livepatch-5_14_21-150500_55_36-default is &gt;=4-150500.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852391" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=4-150500.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201298"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845575" version="1" comment="kernel-livepatch-5_14_21-150400_15_11-rt is &gt;=11-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061016"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845862" version="1" comment="kernel-livepatch-5_14_21-150400_24_41-default is &gt;=12-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060940"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845863" version="1" comment="kernel-livepatch-5_14_21-150400_24_46-default is &gt;=11-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845864" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845697" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845698" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845865" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845699" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845700" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845866" version="1" comment="kernel-livepatch-5_14_21-150400_24_81-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845867" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845701" version="1" comment="kernel-livepatch-5_14_21-150400_24_92-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845585" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=7-150500.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845868" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=7-150500.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199799"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845869" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845702" version="1" comment="kernel-livepatch-5_14_21-150500_55_19-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845703" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845870" version="1" comment="kernel-livepatch-5_14_21-150500_55_31-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845871" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849152" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849153" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845684" version="1" comment="kernel-default is &lt;4.12.14-122.189.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849154" version="1" comment="kernel-livepatch-5_3_18-150200_24_172-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849479" version="1" comment="kernel-livepatch-5_3_18-150200_24_175-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845861" version="1" comment="kernel-default is &lt;5.3.18-150200.24.175.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199853"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849480" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849481" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849482" version="1" comment="kernel-default is &lt;5.3.18-150300.59.147.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200621"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849155" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849157" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849158" version="1" comment="kernel-livepatch-5_14_21-150400_24_92-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849159" version="1" comment="kernel-livepatch-5_14_21-150400_24_97-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849483" version="1" comment="kernel-livepatch-5_14_21-150500_55_31-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849162" version="1" comment="kernel-livepatch-5_14_21-150500_55_36-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849484" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849164" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854069" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=14-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169922"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854070" version="1" comment="kgraft-patch-4_12_14-122_153-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854071" version="1" comment="kgraft-patch-4_12_14-122_156-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854072" version="1" comment="kgraft-patch-4_12_14-122_159-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854073" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854074" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854075" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854076" version="1" comment="kgraft-patch-4_12_14-122_176-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854077" version="1" comment="kgraft-patch-4_12_14-122_179-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854078" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854079" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854080" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854081" version="1" comment="kgraft-patch-4_12_14-122_194-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849121" version="1" comment="kernel-default is &lt;4.12.14-122.194.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854082" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854083" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854084" version="1" comment="kernel-livepatch-5_3_18-150200_24_172-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854085" version="1" comment="kernel-livepatch-5_3_18-150200_24_175-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854086" version="1" comment="kernel-livepatch-5_3_18-150200_24_178-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009849456" version="1" comment="kernel-default is &lt;5.3.18-150200.24.178.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854087" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854088" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854089" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854090" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854091" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852396" version="1" comment="kernel-default is &lt;5.3.18-150300.59.150.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201299"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854713" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854714" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854715" version="1" comment="kernel-livepatch-5_14_21-150400_24_92-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854838" version="1" comment="kernel-livepatch-5_14_21-150400_24_97-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854333" version="1" comment="kernel-livepatch-5_14_21-150500_55_31-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854092" version="1" comment="kernel-livepatch-5_14_21-150500_55_36-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854093" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854094" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868519" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868520" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868521" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868522" version="1" comment="kernel-livepatch-5_14_21-150400_24_81-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868523" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868932" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868933" version="1" comment="kernel-livepatch-5_14_21-150500_55_19-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868934" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=10-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868935" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948658" version="1" comment="kgraft-patch-4_12_14-122_179-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948659" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948660" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948661" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948662" version="1" comment="kgraft-patch-4_12_14-122_194-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878542" version="1" comment="kernel-default is &lt;4.12.14-122.219.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878065" version="1" comment="kernel-default is &lt;5.3.18-150200.24.194.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206782"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878068" version="1" comment="kernel-default is &lt;5.3.18-150300.59.164.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206784"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878777" version="1" comment="kernel-default is ==6.4.0-150600.21.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950845" version="1" comment="kernel-livepatch-6_4_0-150600_21-default is &gt;=6-150600.4.10.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227231"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944115" version="1" comment="kernel-default is ==6.4.0-150600.23.14.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225899"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961319" version="1" comment="kernel-livepatch-6_4_0-150600_23_14-default is &gt;=7-150600.13.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944117" version="1" comment="kernel-default is ==6.4.0-150600.23.17.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225901"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961320" version="1" comment="kernel-livepatch-6_4_0-150600_23_17-default is &gt;=7-150600.13.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009950848" version="1" comment="kernel-default is ==6.4.0-150600.23.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227233"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960539" version="1" comment="kernel-livepatch-6_4_0-150600_23_22-default is &gt;=3-150600.13.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944934" version="1" comment="kernel-default is ==6.4.0-150600.23.7.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961321" version="1" comment="kernel-livepatch-6_4_0-150600_23_7-default is &gt;=7-150600.13.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229952"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881324" version="1" comment="kernel-rt is ==6.4.0-150600.8.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948664" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=5-150600.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881326" version="1" comment="kernel-default is &lt;6.4.0-150600.8.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944114" version="1" comment="kernel-livepatch-6_4_0-150600_21-default is &gt;=4-150600.1.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225898"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881325" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=2-150600.3.3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009207379"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944935" version="1" comment="kernel-livepatch-6_4_0-150600_23_7-default is &gt;=2-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009944936" version="1" comment="kernel-default is &lt;6.4.0-150600.23.7.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977138" version="1" comment="kernel-livepatch-5_3_18-150300_59_158-default is &gt;=17-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976832" version="1" comment="kernel-livepatch-5_3_18-150300_59_161-default is &gt;=16-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977128" version="1" comment="kernel-livepatch-5_3_18-150300_59_164-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976885" version="1" comment="kernel-livepatch-5_3_18-150300_59_167-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043856" version="1" comment="kgraft-patch-4_12_14-122_244-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043647" version="1" comment="kgraft-patch-4_12_14-122_247-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043648" version="1" comment="kgraft-patch-4_12_14-122_250-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043857" version="1" comment="kgraft-patch-4_12_14-122_255-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043858" version="1" comment="kgraft-patch-4_12_14-122_258-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043859" version="1" comment="kgraft-patch-4_12_14-122_261-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043860" version="1" comment="kgraft-patch-4_12_14-122_266-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043861" version="1" comment="kgraft-patch-4_12_14-122_269-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043862" version="1" comment="kgraft-patch-4_12_14-122_272-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043863" version="1" comment="kernel-livepatch-5_14_21-150400_24_147-default is &gt;=19-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044016" version="1" comment="kernel-livepatch-5_14_21-150400_24_150-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043864" version="1" comment="kernel-livepatch-5_14_21-150400_24_153-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043865" version="1" comment="kernel-livepatch-5_14_21-150400_24_158-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043866" version="1" comment="kernel-livepatch-5_14_21-150400_24_161-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043867" version="1" comment="kernel-livepatch-5_14_21-150400_24_164-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043868" version="1" comment="kernel-livepatch-5_14_21-150400_24_167-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043869" version="1" comment="kernel-livepatch-5_14_21-150400_24_170-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044017" version="1" comment="kernel-livepatch-5_14_21-150400_24_173-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044134" version="1" comment="kernel-livepatch-5_14_21-150400_24_176-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043978" version="1" comment="kernel-livepatch-5_14_21-150500_55_100-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043979" version="1" comment="kernel-livepatch-5_14_21-150500_55_103-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043980" version="1" comment="kernel-livepatch-5_14_21-150500_55_110-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043981" version="1" comment="kernel-livepatch-5_14_21-150500_55_113-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043982" version="1" comment="kernel-livepatch-5_14_21-150500_55_116-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043983" version="1" comment="kernel-livepatch-5_14_21-150500_55_121-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043984" version="1" comment="kernel-livepatch-5_14_21-150500_55_91-default is &gt;=18-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043985" version="1" comment="kernel-livepatch-5_14_21-150500_55_94-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043986" version="1" comment="kernel-livepatch-5_14_21-150500_55_97-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037053" version="1" comment="kernel-livepatch-5_14_21-150400_24_141-default is &gt;=19-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037054" version="1" comment="kernel-livepatch-5_14_21-150400_24_144-default is &gt;=18-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037055" version="1" comment="kernel-livepatch-5_14_21-150400_24_147-default is &gt;=17-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037056" version="1" comment="kernel-livepatch-5_14_21-150400_24_150-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037057" version="1" comment="kernel-livepatch-5_14_21-150400_24_153-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037058" version="1" comment="kernel-livepatch-5_14_21-150400_24_158-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037059" version="1" comment="kernel-livepatch-5_14_21-150400_24_161-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037060" version="1" comment="kernel-livepatch-5_14_21-150400_24_164-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037061" version="1" comment="kernel-livepatch-5_14_21-150400_24_167-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037062" version="1" comment="kernel-livepatch-5_14_21-150400_24_170-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037063" version="1" comment="kernel-livepatch-5_14_21-150400_24_173-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037064" version="1" comment="kernel-livepatch-5_14_21-150400_24_176-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037065" version="1" comment="kernel-livepatch-5_14_21-150400_24_179-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037066" version="1" comment="kernel-livepatch-5_14_21-150500_55_100-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037067" version="1" comment="kernel-livepatch-5_14_21-150500_55_103-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037068" version="1" comment="kernel-livepatch-5_14_21-150500_55_110-default is &gt;=10-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037069" version="1" comment="kernel-livepatch-5_14_21-150500_55_113-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037070" version="1" comment="kernel-livepatch-5_14_21-150500_55_116-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037071" version="1" comment="kernel-livepatch-5_14_21-150500_55_121-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037073" version="1" comment="kernel-livepatch-5_14_21-150500_55_124-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037074" version="1" comment="kernel-livepatch-5_14_21-150500_55_88-default is &gt;=16-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037075" version="1" comment="kernel-livepatch-5_14_21-150500_55_91-default is &gt;=16-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037076" version="1" comment="kernel-livepatch-5_14_21-150500_55_94-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037077" version="1" comment="kernel-livepatch-5_14_21-150500_55_97-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030688" version="1" comment="kernel-livepatch-5_14_21-150400_24_141-default is &gt;=18-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240308"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030689" version="1" comment="kernel-livepatch-5_14_21-150400_24_144-default is &gt;=17-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030690" version="1" comment="kernel-livepatch-5_14_21-150400_24_147-default is &gt;=16-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030740" version="1" comment="kernel-livepatch-5_14_21-150400_24_150-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031201" version="1" comment="kernel-livepatch-5_14_21-150400_24_153-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030741" version="1" comment="kernel-livepatch-5_14_21-150400_24_158-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031202" version="1" comment="kernel-livepatch-5_14_21-150400_24_161-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031203" version="1" comment="kernel-livepatch-5_14_21-150400_24_164-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031204" version="1" comment="kernel-livepatch-5_14_21-150400_24_167-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031205" version="1" comment="kernel-livepatch-5_14_21-150400_24_170-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031655" version="1" comment="kernel-livepatch-5_14_21-150400_24_173-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031206" version="1" comment="kernel-livepatch-5_14_21-150400_24_176-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031208" version="1" comment="kernel-livepatch-5_14_21-150400_24_179-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968302" version="1" comment="kernel-default is ==6.4.0-150600.23.30.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039018" version="1" comment="kernel-livepatch-6_4_0-150600_23_30-default is &gt;=17-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968304" version="1" comment="kernel-default is ==6.4.0-150600.23.33.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231624"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039019" version="1" comment="kernel-livepatch-6_4_0-150600_23_33-default is &gt;=17-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986736" version="1" comment="kernel-default is ==6.4.0-150600.23.38.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038510" version="1" comment="kernel-livepatch-6_4_0-150600_23_38-default is &gt;=12-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986738" version="1" comment="kernel-default is ==6.4.0-150600.23.42.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039020" version="1" comment="kernel-livepatch-6_4_0-150600_23_42-default is &gt;=12-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010060" version="1" comment="kernel-default is ==6.4.0-150600.23.47.2" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240478"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039021" version="1" comment="kernel-livepatch-6_4_0-150600_23_47-default is &gt;=11-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012361" version="1" comment="kernel-default is ==6.4.0-150600.23.50.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039022" version="1" comment="kernel-livepatch-6_4_0-150600_23_50-default is &gt;=10-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012363" version="1" comment="kernel-default is ==6.4.0-150600.23.53.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241033"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039023" version="1" comment="kernel-livepatch-6_4_0-150600_23_53-default is &gt;=10-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014544" version="1" comment="kernel-default is ==6.4.0-150600.23.60.5" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241407"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039024" version="1" comment="kernel-livepatch-6_4_0-150600_23_60-default is &gt;=9-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023342" version="1" comment="kernel-default is ==6.4.0-150600.23.65.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038224" version="1" comment="kernel-livepatch-6_4_0-150600_23_65-default is &gt;=5-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023348" version="1" comment="kernel-default is ==6.4.0-150600.23.70.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038225" version="1" comment="kernel-livepatch-6_4_0-150600_23_70-default is &gt;=5-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038226" version="1" comment="kernel-default is ==6.4.0-150600.23.73.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038227" version="1" comment="kernel-livepatch-6_4_0-150600_23_73-default is &gt;=2-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038228" version="1" comment="kernel-default is &lt;6.4.0-150600.23.73.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246456"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014264" version="1" comment="kernel-rt is ==6.4.0-150700.5.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037826" version="1" comment="kernel-livepatch-6_4_0-150700_5-rt is &gt;=9-150700.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246408"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014746" version="1" comment="kernel-default is ==6.4.0-150700.51.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241458"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039025" version="1" comment="kernel-livepatch-6_4_0-150700_51-default is &gt;=9-150700.3.24.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023034" version="1" comment="kernel-default is ==6.4.0-150700.53.11.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243290"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038229" version="1" comment="kernel-livepatch-6_4_0-150700_53_11-default is &gt;=5-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023039" version="1" comment="kernel-default is ==6.4.0-150700.53.16.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243293"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038230" version="1" comment="kernel-livepatch-6_4_0-150700_53_16-default is &gt;=5-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038511" version="1" comment="kernel-default is ==6.4.0-150700.53.19.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038512" version="1" comment="kernel-livepatch-6_4_0-150700_53_19-default is &gt;=2-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014749" version="1" comment="kernel-default is ==6.4.0-150700.53.3.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241461"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039026" version="1" comment="kernel-livepatch-6_4_0-150700_53_3-default is &gt;=9-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014757" version="1" comment="kernel-default is ==6.4.0-150700.53.6.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241466"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039027" version="1" comment="kernel-livepatch-6_4_0-150700_53_6-default is &gt;=9-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246634"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014759" version="1" comment="kernel-default is &lt;6.4.0-150700.53.6.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241467"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056353" version="1" comment="kgraft-patch-4_12_14-122_250-default is &gt;=16-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053077" version="1" comment="kgraft-patch-4_12_14-122_255-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056286" version="1" comment="kgraft-patch-4_12_14-122_258-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056287" version="1" comment="kgraft-patch-4_12_14-122_261-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056288" version="1" comment="kgraft-patch-4_12_14-122_266-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056354" version="1" comment="kgraft-patch-4_12_14-122_269-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056355" version="1" comment="kgraft-patch-4_12_14-122_272-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056356" version="1" comment="kgraft-patch-4_12_14-122_275-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056357" version="1" comment="kgraft-patch-4_12_14-122_280-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056358" version="1" comment="kgraft-patch-4_12_14-122_283-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056359" version="1" comment="kgraft-patch-4_12_14-122_290-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050317" version="1" comment="kernel-default is ==4.12.14-122.293.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056360" version="1" comment="kgraft-patch-4_12_14-122_293-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050319" version="1" comment="kernel-default is &lt;4.12.14-122.293.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046293" version="1" comment="kernel-livepatch-5_14_21-150500_55_133-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858925" version="1" comment="kgraft-patch-4_12_14-122_156-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858926" version="1" comment="kgraft-patch-4_12_14-122_159-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858856" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858857" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855859" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855684" version="1" comment="kgraft-patch-4_12_14-122_176-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855685" version="1" comment="kgraft-patch-4_12_14-122_179-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855686" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859175" version="1" comment="kernel-livepatch-5_3_18-150200_24_148-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859176" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859177" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859178" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859626" version="1" comment="kernel-livepatch-5_3_18-150200_24_160-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859179" version="1" comment="kernel-livepatch-5_3_18-150200_24_163-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858927" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858867" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859627" version="1" comment="kernel-livepatch-5_3_18-150300_59_118-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859957" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859374" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859375" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859376" version="1" comment="kernel-livepatch-5_3_18-150300_59_130-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859377" version="1" comment="kernel-livepatch-5_3_18-150300_59_133-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859958" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859959" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859628" version="1" comment="kernel-livepatch-5_14_21-150400_24_55-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859629" version="1" comment="kernel-livepatch-5_14_21-150400_24_60-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062027"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859960" version="1" comment="kernel-livepatch-5_14_21-150400_24_63-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062070"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859630" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859631" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855860" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855687" version="1" comment="kernel-livepatch-5_14_21-150400_24_81-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855861" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009856129" version="1" comment="kernel-livepatch-5_14_21-150400_24_92-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855688" version="1" comment="kernel-livepatch-5_14_21-150400_24_97-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855569" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=11-150500.12.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859961" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=11-150500.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202870"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855689" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=10-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855862" version="1" comment="kernel-livepatch-5_14_21-150500_55_19-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855690" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=8-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855863" version="1" comment="kernel-livepatch-5_14_21-150500_55_31-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855691" version="1" comment="kernel-livepatch-5_14_21-150500_55_36-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855692" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=10-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845872" version="1" comment="kernel-livepatch-5_3_18-150200_24_142-default is &gt;=11-150200.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060956"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166594"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845704" version="1" comment="kernel-livepatch-5_3_18-150200_24_145-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845705" version="1" comment="kernel-livepatch-5_3_18-150200_24_148-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845706" version="1" comment="kernel-livepatch-5_3_18-150200_24_151-default is &gt;=9-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062086"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166538"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845707" version="1" comment="kernel-livepatch-5_3_18-150200_24_154-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845708" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845709" version="1" comment="kernel-livepatch-5_3_18-150200_24_160-default is &gt;=5-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166567"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845710" version="1" comment="kernel-livepatch-5_3_18-150200_24_163-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845711" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=4-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845873" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=3-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845874" version="1" comment="kernel-livepatch-5_3_18-150300_59_109-default is &gt;=12-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060937"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166611"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845875" version="1" comment="kernel-livepatch-5_3_18-150300_59_112-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845876" version="1" comment="kernel-livepatch-5_3_18-150300_59_115-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061085"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845712" version="1" comment="kernel-livepatch-5_3_18-150300_59_118-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845713" version="1" comment="kernel-livepatch-5_3_18-150300_59_121-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062100"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845714" version="1" comment="kernel-livepatch-5_3_18-150300_59_124-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845877" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845878" version="1" comment="kernel-livepatch-5_3_18-150300_59_130-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845715" version="1" comment="kernel-livepatch-5_3_18-150300_59_133-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845716" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845717" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846010" version="1" comment="kernel-livepatch-5_14_21-150400_24_97-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845880" version="1" comment="kernel-livepatch-5_14_21-150500_55_36-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852392" version="1" comment="kernel-livepatch-5_3_18-150200_24_175-default is &gt;=4-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009182094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852393" version="1" comment="kernel-livepatch-5_3_18-150200_24_178-default is &gt;=3-150200.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177703"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854325" version="1" comment="kernel-default is &lt;5.3.18-150200.24.183.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201680"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852394" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=4-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167214"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009852395" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=3-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009177514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009854336" version="1" comment="kernel-default is &lt;5.3.18-150300.59.153.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868524" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868936" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=8-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845720" version="1" comment="kgraft-patch-4_12_14-122_147-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845881" version="1" comment="kgraft-patch-4_12_14-122_150-default is &gt;=11-2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845721" version="1" comment="kgraft-patch-4_12_14-122_153-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061064"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845722" version="1" comment="kgraft-patch-4_12_14-122_156-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845723" version="1" comment="kgraft-patch-4_12_14-122_159-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845724" version="1" comment="kgraft-patch-4_12_14-122_162-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062252"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845725" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845726" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845727" version="1" comment="kgraft-patch-4_12_14-122_176-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845728" version="1" comment="kgraft-patch-4_12_14-122_179-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845729" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845882" version="1" comment="kernel-livepatch-4_12_14-150100_197_134-default is &gt;=11-150100.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173047"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845731" version="1" comment="kernel-livepatch-4_12_14-150100_197_137-default is &gt;=9-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845732" version="1" comment="kernel-livepatch-4_12_14-150100_197_142-default is &gt;=9-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845733" version="1" comment="kernel-livepatch-4_12_14-150100_197_145-default is &gt;=9-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062103"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175731"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845734" version="1" comment="kernel-livepatch-4_12_14-150100_197_148-default is &gt;=7-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845735" version="1" comment="kernel-livepatch-4_12_14-150100_197_151-default is &gt;=6-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170161"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845736" version="1" comment="kernel-livepatch-4_12_14-150100_197_154-default is &gt;=5-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845737" version="1" comment="kernel-livepatch-4_12_14-150100_197_157-default is &gt;=4-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845883" version="1" comment="kernel-livepatch-4_12_14-150100_197_160-default is &gt;=3-150100.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845738" version="1" comment="kernel-default is &lt;4.12.14-150100.197.165.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009846012" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009845885" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033446" version="1" comment="hauler is &lt;1.3.1-bp160.1.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245551"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033447" version="1" comment="hauler is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859180" version="1" comment="kernel-livepatch-5_3_18-150200_24_172-default is &gt;=6-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858928" version="1" comment="kernel-livepatch-5_3_18-150200_24_175-default is &gt;=7-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166542"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859632" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009859378" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858858" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=12-150500.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044663" version="1" comment="libmosquitto1 is &lt;2.0.23-bp160.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244945" version="1" comment="libmosquitto1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047134"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044664" version="1" comment="libmosquittopp1 is &lt;2.0.23-bp160.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244946" version="1" comment="libmosquittopp1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047135"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044665" version="1" comment="mosquitto is &lt;2.0.23-bp160.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244947" version="1" comment="mosquitto is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044666" version="1" comment="mosquitto-clients is &lt;2.0.23-bp160.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244948" version="1" comment="mosquitto-clients is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047137"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044667" version="1" comment="mosquitto-devel is &lt;2.0.23-bp160.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247836"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009244949" version="1" comment="mosquitto-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855693" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855864" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855694" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855695" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855865" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855696" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041352" version="1" comment="cloud-init is &lt;25.1.3-160000.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009273021" version="1" comment="cloud-init is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041353" version="1" comment="cloud-init-config-suse is &lt;25.1.3-160000.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009273022" version="1" comment="cloud-init-config-suse is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041354" version="1" comment="cloud-init-doc is &lt;25.1.3-160000.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009273023" version="1" comment="cloud-init-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038432" version="1" comment="cargo-c is &lt;0.10.15-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246506"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948421" version="1" comment="cargo-c is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050018" version="1" comment="gdk-pixbuf-loader-rsvg is &lt;2.60.2-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151634" version="1" comment="gdk-pixbuf-loader-rsvg is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050019" version="1" comment="librsvg-2-2 is &lt;2.60.2-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151635" version="1" comment="librsvg-2-2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050702" version="1" comment="librsvg-devel is &lt;2.60.2-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151636" version="1" comment="librsvg-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050703" version="1" comment="rsvg-convert is &lt;2.60.2-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009353380" version="1" comment="rsvg-convert is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050704" version="1" comment="rsvg-thumbnailer is &lt;2.60.2-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249137"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161885" version="1" comment="rsvg-thumbnailer is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050705" version="1" comment="typelib-1_0-Rsvg-2_0 is &lt;2.60.2-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151637" version="1" comment="typelib-1_0-Rsvg-2_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030533" version="1" comment="libtiff-devel is &lt;4.7.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151316" version="1" comment="libtiff-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031676"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030534" version="1" comment="libtiff-devel-docs is &lt;4.7.1-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030587" version="1" comment="libtiff-devel-docs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030535" version="1" comment="libtiff6 is &lt;4.7.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009940809" version="1" comment="libtiff6 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030536" version="1" comment="tiff is &lt;4.7.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151319" version="1" comment="tiff is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030537" version="1" comment="tiff-docs is &lt;4.7.1-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030588" version="1" comment="tiff-docs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048713" version="1" comment="obs-scm-bridge is &lt;0.7.4-bp160.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248650"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956651" version="1" comment="obs-scm-bridge is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048714" version="1" comment="osc is &lt;1.24.0-bp160.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248651"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151686" version="1" comment="osc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034837"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047341" version="1" comment="freerdp2 is &lt;2.11.7-bp160.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047350" version="1" comment="freerdp2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067328"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047342" version="1" comment="freerdp2-devel is &lt;2.11.7-bp160.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047351" version="1" comment="freerdp2-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047343" version="1" comment="freerdp2-proxy is &lt;2.11.7-bp160.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047352" version="1" comment="freerdp2-proxy is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047344" version="1" comment="freerdp2-server is &lt;2.11.7-bp160.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047353" version="1" comment="freerdp2-server is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047345" version="1" comment="libfreerdp2-2 is &lt;2.11.7-bp160.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877480" version="1" comment="libfreerdp2-2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047346" version="1" comment="libwinpr2-2 is &lt;2.11.7-bp160.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877481" version="1" comment="libwinpr2-2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047347" version="1" comment="winpr2-devel is &lt;2.11.7-bp160.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248382"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245865" version="1" comment="winpr2-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042602" version="1" comment="gdcm is &lt;3.0.24-bp160.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717493" version="1" comment="gdcm is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042603" version="1" comment="gdcm-applications is &lt;3.0.24-bp160.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717494" version="1" comment="gdcm-applications is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042604" version="1" comment="gdcm-devel is &lt;3.0.24-bp160.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717495" version="1" comment="gdcm-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042605" version="1" comment="gdcm-examples is &lt;3.0.24-bp160.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717496" version="1" comment="gdcm-examples is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042606" version="1" comment="libgdcm3_0 is &lt;3.0.24-bp160.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717497" version="1" comment="libgdcm3_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042607" version="1" comment="libsocketxx1_2 is &lt;3.0.24-bp160.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717498" version="1" comment="libsocketxx1_2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042608" version="1" comment="orthanc is &lt;1.12.10-bp160.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247326"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717499" version="1" comment="orthanc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042609" version="1" comment="orthanc-authorization is &lt;0.10.3-bp160.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247327"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042625" version="1" comment="orthanc-authorization is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042610" version="1" comment="orthanc-devel is &lt;1.12.10-bp160.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717500" version="1" comment="orthanc-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042611" version="1" comment="orthanc-dicomweb is &lt;1.22-bp160.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042626" version="1" comment="orthanc-dicomweb is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042612" version="1" comment="orthanc-doc is &lt;1.12.10-bp160.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717501" version="1" comment="orthanc-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060455"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042613" version="1" comment="orthanc-gdcm is &lt;1.8-bp160.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717502" version="1" comment="orthanc-gdcm is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060456"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042614" version="1" comment="orthanc-indexer is &lt;1.0-bp160.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042627" version="1" comment="orthanc-indexer is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071762"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042615" version="1" comment="orthanc-mysql is &lt;5.2-bp160.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247332"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042628" version="1" comment="orthanc-mysql is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071763"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042616" version="1" comment="orthanc-neuro is &lt;1.1-bp160.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247333"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042629" version="1" comment="orthanc-neuro is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042617" version="1" comment="orthanc-postgresql is &lt;10.0-bp160.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247334"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042630" version="1" comment="orthanc-postgresql is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042618" version="1" comment="orthanc-python is &lt;7.0-bp160.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247335"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042631" version="1" comment="orthanc-python is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042619" version="1" comment="orthanc-source is &lt;1.12.10-bp160.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247328"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717503" version="1" comment="orthanc-source is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042620" version="1" comment="orthanc-stl is &lt;1.2-bp160.2.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247336"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042632" version="1" comment="orthanc-stl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042621" version="1" comment="orthanc-tcia is &lt;1.3-bp160.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042633" version="1" comment="orthanc-tcia is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042622" version="1" comment="orthanc-wsi is &lt;3.3-bp160.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247338"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042634" version="1" comment="orthanc-wsi is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042623" version="1" comment="python3-gdcm is &lt;3.0.24-bp160.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247325"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009717505" version="1" comment="python3-gdcm is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042624" version="1" comment="python313-pyorthanc is &lt;1.22.1-bp160.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247339"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042635" version="1" comment="python313-pyorthanc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071770"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047568" version="1" comment="shim is &lt;16.1-160000.1.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248442"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152144" version="1" comment="shim is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872665" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872666" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872667" version="1" comment="kernel-livepatch-5_14_21-150400_24_66-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872668" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872669" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872670" version="1" comment="kernel-livepatch-5_14_21-150400_24_81-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872671" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872672" version="1" comment="kernel-livepatch-5_14_21-150400_24_92-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872673" version="1" comment="kernel-livepatch-5_14_21-150400_24_97-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871638" version="1" comment="kernel-livepatch-5_14_21-150500_11-rt is &gt;=15-150500.9.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205344"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873482" version="1" comment="kernel-livepatch-5_14_21-150500_53-default is &gt;=14-150500.12.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873483" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873484" version="1" comment="kernel-livepatch-5_14_21-150500_55_19-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873485" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873922" version="1" comment="kernel-livepatch-5_14_21-150500_55_31-default is &gt;=10-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872674" version="1" comment="kernel-livepatch-5_14_21-150500_55_36-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872675" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873486" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=8-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009873487" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051765" version="1" comment="exiv2 is &lt;0.28.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154125" version="1" comment="exiv2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051766" version="1" comment="exiv2-lang is &lt;0.28.8-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249411"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154126" version="1" comment="exiv2-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050764" version="1" comment="libexiv2-28 is &lt;0.28.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051915" version="1" comment="libexiv2-28 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050765" version="1" comment="libexiv2-28-x86-64-v3 is &lt;0.28.8-160000.1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051916" version="1" comment="libexiv2-28-x86-64-v3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051767" version="1" comment="libexiv2-devel is &lt;0.28.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152552" version="1" comment="libexiv2-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050021" version="1" comment="ucode-intel is &lt;20260210-160000.1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009169251" version="1" comment="ucode-intel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042104"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032408" version="1" comment="python313-cbor2 is &lt;5.6.5-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245331"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032409" version="1" comment="python313-cbor2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009855866" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019451" version="1" comment="kernel-livepatch-5_14_21-150400_24_133-default is &gt;=15-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019452" version="1" comment="kernel-livepatch-5_14_21-150400_24_136-default is &gt;=15-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019453" version="1" comment="kernel-livepatch-5_14_21-150400_24_141-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019454" version="1" comment="kernel-livepatch-5_14_21-150400_24_144-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019702" version="1" comment="kernel-livepatch-5_14_21-150400_24_147-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019455" version="1" comment="kernel-livepatch-5_14_21-150400_24_150-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019456" version="1" comment="kernel-livepatch-5_14_21-150400_24_153-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019457" version="1" comment="kernel-livepatch-5_14_21-150400_24_158-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019458" version="1" comment="kernel-livepatch-5_14_21-150400_24_161-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019703" version="1" comment="kernel-livepatch-5_14_21-150400_24_164-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019459" version="1" comment="kernel-livepatch-5_14_21-150400_24_167-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012374" version="1" comment="kernel-default is &lt;5.14.21-150400.24.167.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241039"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012356" version="1" comment="kernel-livepatch-6_4_0-150600_23_14-default is &gt;=18-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011944" version="1" comment="kernel-livepatch-6_4_0-150600_23_17-default is &gt;=18-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011824" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=19-150600.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240905"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868525" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868528" version="1" comment="kernel-livepatch-5_14_21-150400_24_92-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868529" version="1" comment="kernel-livepatch-5_14_21-150400_24_97-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868937" version="1" comment="kernel-livepatch-5_14_21-150500_55_31-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868938" version="1" comment="kernel-livepatch-5_14_21-150500_55_36-default is &gt;=8-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868939" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878779" version="1" comment="kernel-default is &lt;6.4.0-150600.21.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009206953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961322" version="1" comment="kernel-livepatch-6_4_0-150600_21-default is &gt;=9-150600.4.19.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878547" version="1" comment="kgraft-patch-4_12_14-122_165-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878548" version="1" comment="kgraft-patch-4_12_14-122_173-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878549" version="1" comment="kgraft-patch-4_12_14-122_176-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878550" version="1" comment="kgraft-patch-4_12_14-122_179-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878551" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878552" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878553" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878554" version="1" comment="kgraft-patch-4_12_14-122_194-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877990" version="1" comment="kernel-livepatch-5_3_18-150200_24_157-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878069" version="1" comment="kernel-livepatch-5_3_18-150200_24_160-default is &gt;=13-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877991" version="1" comment="kernel-livepatch-5_3_18-150200_24_163-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877992" version="1" comment="kernel-livepatch-5_3_18-150200_24_166-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062934"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877993" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877994" version="1" comment="kernel-livepatch-5_3_18-150200_24_172-default is &gt;=10-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009877995" version="1" comment="kernel-livepatch-5_3_18-150200_24_175-default is &gt;=11-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878070" version="1" comment="kernel-livepatch-5_3_18-150200_24_178-default is &gt;=8-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166540"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878071" version="1" comment="kernel-livepatch-5_3_18-150300_59_127-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878072" version="1" comment="kernel-livepatch-5_3_18-150300_59_130-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878073" version="1" comment="kernel-livepatch-5_3_18-150300_59_133-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878074" version="1" comment="kernel-livepatch-5_3_18-150300_59_138-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062928"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878075" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878076" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878077" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878212" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878555" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878556" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878557" version="1" comment="kernel-livepatch-5_14_21-150400_24_69-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878558" version="1" comment="kernel-livepatch-5_14_21-150400_24_74-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878559" version="1" comment="kernel-livepatch-5_14_21-150400_24_81-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878560" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878561" version="1" comment="kernel-livepatch-5_14_21-150400_24_92-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878562" version="1" comment="kernel-livepatch-5_14_21-150400_24_97-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878563" version="1" comment="kernel-livepatch-5_14_21-150500_55_12-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878564" version="1" comment="kernel-livepatch-5_14_21-150500_55_19-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878565" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878566" version="1" comment="kernel-livepatch-5_14_21-150500_55_31-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878567" version="1" comment="kernel-livepatch-5_14_21-150500_55_36-default is &gt;=10-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878568" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=10-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878569" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009878570" version="1" comment="kernel-livepatch-5_14_21-150500_55_7-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045691" version="1" comment="containerized-data-importer-api is &lt;1.64.0-160000.1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624359" version="1" comment="containerized-data-importer-api is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052140"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045692" version="1" comment="containerized-data-importer-cloner is &lt;1.64.0-160000.1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624360" version="1" comment="containerized-data-importer-cloner is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045693" version="1" comment="containerized-data-importer-controller is &lt;1.64.0-160000.1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624361" version="1" comment="containerized-data-importer-controller is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052142"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045694" version="1" comment="containerized-data-importer-importer is &lt;1.64.0-160000.1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624362" version="1" comment="containerized-data-importer-importer is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045695" version="1" comment="containerized-data-importer-manifests is &lt;1.64.0-160000.1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624363" version="1" comment="containerized-data-importer-manifests is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052144"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045696" version="1" comment="containerized-data-importer-operator is &lt;1.64.0-160000.1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624364" version="1" comment="containerized-data-importer-operator is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045697" version="1" comment="containerized-data-importer-uploadproxy is &lt;1.64.0-160000.1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624365" version="1" comment="containerized-data-importer-uploadproxy is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045698" version="1" comment="containerized-data-importer-uploadserver is &lt;1.64.0-160000.1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624366" version="1" comment="containerized-data-importer-uploadserver is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045699" version="1" comment="obs-service-cdi_containers_meta is &lt;1.64.0-160000.1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248059"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009714767" version="1" comment="obs-service-cdi_containers_meta is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965821" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=17-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966032" version="1" comment="kernel-livepatch-5_3_18-150300_59_153-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966033" version="1" comment="kernel-livepatch-5_3_18-150300_59_158-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966284" version="1" comment="kernel-livepatch-5_3_18-150300_59_161-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966285" version="1" comment="kernel-livepatch-5_3_18-150300_59_164-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966286" version="1" comment="kernel-livepatch-5_14_21-150400_24_108-default is &gt;=15-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066204"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966034" version="1" comment="kernel-livepatch-5_14_21-150400_24_111-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966035" version="1" comment="kernel-livepatch-5_14_21-150400_24_116-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966036" version="1" comment="kernel-livepatch-5_14_21-150400_24_119-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966037" version="1" comment="kernel-livepatch-5_14_21-150400_24_122-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948623" version="1" comment="kernel-default is &lt;5.14.21-150400.24.122.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966038" version="1" comment="kernel-livepatch-5_14_21-150500_55_49-default is &gt;=15-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966039" version="1" comment="kernel-livepatch-5_14_21-150500_55_52-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965822" version="1" comment="kernel-livepatch-5_14_21-150500_55_59-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966040" version="1" comment="kernel-livepatch-6_4_0-150600_21-default is &gt;=11-150600.4.25.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965286" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=10-150600.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230950"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943402" version="1" comment="kernel-default is &lt;5.14.21-150500.55.52.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009943025" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=3-150600.3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225712"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947519" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947520" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947521" version="1" comment="kernel-livepatch-5_14_21-150400_24_88-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062854"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947522" version="1" comment="kernel-livepatch-5_14_21-150400_24_92-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062929"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947523" version="1" comment="kernel-livepatch-5_14_21-150400_24_97-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947524" version="1" comment="kernel-livepatch-5_14_21-150500_55_28-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947525" version="1" comment="kernel-livepatch-5_14_21-150500_55_31-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062931"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947526" version="1" comment="kernel-livepatch-5_14_21-150500_55_36-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947527" version="1" comment="kernel-livepatch-5_14_21-150500_55_39-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064259"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947528" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947409" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=4-150600.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948666" version="1" comment="kernel-default is &lt;5.14.21-150400.24.119.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957145" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956863" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956201" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956556" version="1" comment="kgraft-patch-4_12_14-122_194-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956558" version="1" comment="kernel-livepatch-6_4_0-150600_21-default is &gt;=7-150600.4.13.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228855"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955679" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=6-150600.3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957241" version="1" comment="kernel-livepatch-5_3_18-150200_24_169-default is &gt;=16-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956864" version="1" comment="kernel-livepatch-5_3_18-150200_24_172-default is &gt;=14-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956865" version="1" comment="kernel-livepatch-5_3_18-150200_24_175-default is &gt;=15-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957242" version="1" comment="kernel-livepatch-5_3_18-150200_24_178-default is &gt;=12-150200.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956202" version="1" comment="kernel-livepatch-5_3_18-150300_59_141-default is &gt;=15-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956203" version="1" comment="kernel-livepatch-5_3_18-150300_59_144-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956866" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956867" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957146" version="1" comment="kernel-livepatch-5_14_21-150400_24_100-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064265"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957243" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957244" version="1" comment="kernel-livepatch-5_14_21-150400_24_97-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063890"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947531" version="1" comment="kgraft-patch-4_12_14-122_176-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947532" version="1" comment="kgraft-patch-4_12_14-122_179-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062933"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947410" version="1" comment="kgraft-patch-4_12_14-122_183-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947533" version="1" comment="kgraft-patch-4_12_14-122_186-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064271"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947534" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009947535" version="1" comment="kgraft-patch-4_12_14-122_194-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961323" version="1" comment="kernel-livepatch-5_3_18-150300_59_147-default is &gt;=16-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961324" version="1" comment="kernel-livepatch-5_3_18-150300_59_150-default is &gt;=15-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066202"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961326" version="1" comment="kernel-livepatch-5_14_21-150400_24_103-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064367"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961302" version="1" comment="kernel-livepatch-5_14_21-150500_55_44-default is &gt;=15-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064397"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961528" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=8-150600.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014214" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=20-150600.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966041" version="1" comment="kernel-livepatch-5_3_18-150300_59_167-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966042" version="1" comment="kernel-livepatch-5_14_21-150400_24_125-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960119" version="1" comment="kernel-default is &lt;5.14.21-150400.24.125.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966043" version="1" comment="kernel-livepatch-5_14_21-150500_55_62-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965823" version="1" comment="kernel-livepatch-5_14_21-150500_55_65-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965824" version="1" comment="kernel-livepatch-5_14_21-150500_55_68-default is &gt;=10-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966044" version="1" comment="kernel-livepatch-6_4_0-150600_23_14-default is &gt;=9-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966045" version="1" comment="kernel-livepatch-6_4_0-150600_23_7-default is &gt;=9-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014742" version="1" comment="kernel-livepatch-5_3_18-150300_59_170-default is &gt;=16-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014507" version="1" comment="kernel-livepatch-5_3_18-150300_59_174-default is &gt;=15-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014671" version="1" comment="kernel-livepatch-5_3_18-150300_59_179-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014743" version="1" comment="kernel-livepatch-5_3_18-150300_59_182-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014744" version="1" comment="kernel-livepatch-5_3_18-150300_59_185-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014745" version="1" comment="kernel-livepatch-5_3_18-150300_59_188-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014260" version="1" comment="kernel-livepatch-5_3_18-150300_59_195-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014672" version="1" comment="kernel-livepatch-5_3_18-150300_59_198-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014508" version="1" comment="kernel-livepatch-5_3_18-150300_59_201-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014261" version="1" comment="kernel-livepatch-5_3_18-150300_59_204-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014254" version="1" comment="kernel-livepatch-5_3_18-150300_59_207-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012377" version="1" comment="kernel-default is &lt;5.3.18-150300.59.207.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241041"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014509" version="1" comment="kernel-livepatch-5_14_21-150400_24_125-default is &gt;=17-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014255" version="1" comment="kernel-livepatch-5_14_21-150400_24_128-default is &gt;=15-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014262" version="1" comment="kernel-livepatch-5_14_21-150400_24_133-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014510" version="1" comment="kernel-livepatch-5_14_21-150400_24_136-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014511" version="1" comment="kernel-livepatch-5_14_21-150400_24_141-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014263" version="1" comment="kernel-livepatch-5_14_21-150400_24_144-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014512" version="1" comment="kernel-livepatch-5_14_21-150400_24_147-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014513" version="1" comment="kernel-livepatch-5_14_21-150400_24_150-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014514" version="1" comment="kernel-livepatch-5_14_21-150400_24_153-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014256" version="1" comment="kernel-livepatch-5_14_21-150400_24_158-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014515" version="1" comment="kernel-livepatch-5_14_21-150400_24_161-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014516" version="1" comment="kernel-livepatch-5_14_21-150400_24_164-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014517" version="1" comment="kernel-livepatch-5_14_21-150400_24_167-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032107" version="1" comment="trivy is &lt;0.66.0-bp160.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245279"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698141" version="1" comment="trivy is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996819" version="1" comment="kernel-livepatch-5_14_21-150400_24_119-default is &gt;=19-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996820" version="1" comment="kernel-livepatch-5_14_21-150400_24_122-default is &gt;=17-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996821" version="1" comment="kernel-livepatch-5_14_21-150400_24_125-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987645" version="1" comment="kernel-livepatch-5_14_21-150500_55_62-default is &gt;=18-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997087" version="1" comment="kernel-livepatch-5_14_21-150500_55_65-default is &gt;=18-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987646" version="1" comment="kernel-livepatch-5_14_21-150500_55_68-default is &gt;=17-150500.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235693"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987906" version="1" comment="kernel-livepatch-6_4_0-150600_21-default is &gt;=18-150600.4.46.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235734"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996822" version="1" comment="kernel-livepatch-6_4_0-150600_23_14-default is &gt;=16-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987676" version="1" comment="kernel-livepatch-6_4_0-150600_23_7-default is &gt;=16-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987573" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=17-150600.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956561" version="1" comment="kernel-default is &lt;4.12.14-122.225.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228857"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974053" version="1" comment="kernel-livepatch-5_14_21-150400_24_111-default is &gt;=15-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974054" version="1" comment="kernel-livepatch-5_14_21-150400_24_116-default is &gt;=15-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974055" version="1" comment="kernel-livepatch-5_14_21-150400_24_119-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974056" version="1" comment="kernel-livepatch-5_14_21-150400_24_122-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974057" version="1" comment="kernel-livepatch-5_14_21-150400_24_125-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974058" version="1" comment="kernel-livepatch-5_14_21-150400_24_128-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974059" version="1" comment="kernel-livepatch-5_14_21-150500_55_52-default is &gt;=15-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974060" version="1" comment="kernel-livepatch-5_14_21-150500_55_59-default is &gt;=15-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974061" version="1" comment="kernel-livepatch-5_14_21-150500_55_62-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974062" version="1" comment="kernel-livepatch-5_14_21-150500_55_65-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974063" version="1" comment="kernel-livepatch-5_14_21-150500_55_68-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974064" version="1" comment="kernel-livepatch-5_14_21-150500_55_73-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970646" version="1" comment="kernel-livepatch-6_4_0-150600_21-default is &gt;=13-150600.4.31.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970647" version="1" comment="kernel-livepatch-6_4_0-150600_23_14-default is &gt;=11-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970648" version="1" comment="kernel-livepatch-6_4_0-150600_23_17-default is &gt;=11-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970649" version="1" comment="kernel-livepatch-6_4_0-150600_23_7-default is &gt;=11-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970351" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=12-150600.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231910"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011945" version="1" comment="kernel-livepatch-5_3_18-150300_59_167-default is &gt;=17-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011946" version="1" comment="kernel-livepatch-5_14_21-150400_24_125-default is &gt;=16-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975054" version="1" comment="kernel-livepatch-5_14_21-150400_24_111-default is &gt;=16-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975055" version="1" comment="kernel-livepatch-5_14_21-150400_24_116-default is &gt;=16-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975056" version="1" comment="kernel-livepatch-5_14_21-150400_24_119-default is &gt;=15-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975031" version="1" comment="kernel-livepatch-5_14_21-150400_24_122-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975057" version="1" comment="kernel-livepatch-5_14_21-150400_24_125-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975058" version="1" comment="kernel-livepatch-5_14_21-150500_55_52-default is &gt;=16-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975059" version="1" comment="kernel-livepatch-5_14_21-150500_55_59-default is &gt;=16-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975060" version="1" comment="kernel-livepatch-5_14_21-150500_55_62-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975061" version="1" comment="kernel-livepatch-5_14_21-150500_55_65-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975062" version="1" comment="kernel-livepatch-5_14_21-150500_55_68-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975063" version="1" comment="kernel-livepatch-6_4_0-150600_21-default is &gt;=14-150600.4.34.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232953"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975064" version="1" comment="kernel-livepatch-6_4_0-150600_23_14-default is &gt;=12-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975065" version="1" comment="kernel-livepatch-6_4_0-150600_23_7-default is &gt;=12-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975032" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=13-150600.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232951"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968281" version="1" comment="kernel-livepatch-6_4_0-150600_21-default is &gt;=12-150600.4.28.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231616"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968282" version="1" comment="kernel-livepatch-6_4_0-150600_23_14-default is &gt;=10-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968283" version="1" comment="kernel-livepatch-6_4_0-150600_23_17-default is &gt;=10-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968284" version="1" comment="kernel-livepatch-6_4_0-150600_23_7-default is &gt;=10-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968285" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=11-150600.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231618"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008795" version="1" comment="kernel-livepatch-5_14_21-150500_55_68-default is &gt;=18-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235692"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008796" version="1" comment="kernel-livepatch-6_4_0-150600_21-default is &gt;=19-150600.4.49.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008797" version="1" comment="kernel-livepatch-6_4_0-150600_23_14-default is &gt;=17-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008798" version="1" comment="kernel-livepatch-6_4_0-150600_23_7-default is &gt;=17-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008703" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=18-150600.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956868" version="1" comment="kernel-default is ==5.3.18-150200.24.200.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228908"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956869" version="1" comment="kernel-livepatch-5_3_18-150200_24_200-default is &gt;=2-150200.5.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201679"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956870" version="1" comment="kernel-default is &lt;5.3.18-150200.24.200.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009228909"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982353" version="1" comment="kgraft-patch-4_12_14-122_216-default is &gt;=16-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982354" version="1" comment="kgraft-patch-4_12_14-122_219-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982355" version="1" comment="kgraft-patch-4_12_14-122_222-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982627" version="1" comment="kgraft-patch-4_12_14-122_225-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982927" version="1" comment="kernel-livepatch-5_3_18-150300_59_158-default is &gt;=18-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171219"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983055" version="1" comment="kernel-livepatch-5_3_18-150300_59_161-default is &gt;=17-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166607"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982628" version="1" comment="kernel-livepatch-5_3_18-150300_59_164-default is &gt;=14-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067523"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982629" version="1" comment="kernel-livepatch-5_3_18-150300_59_167-default is &gt;=13-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166610"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982928" version="1" comment="kernel-livepatch-5_3_18-150300_59_170-default is &gt;=11-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982929" version="1" comment="kernel-livepatch-5_14_21-150400_24_116-default is &gt;=18-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983056" version="1" comment="kernel-livepatch-5_14_21-150400_24_119-default is &gt;=17-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983057" version="1" comment="kernel-livepatch-5_14_21-150400_24_122-default is &gt;=15-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982930" version="1" comment="kernel-livepatch-5_14_21-150400_24_125-default is &gt;=12-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982931" version="1" comment="kernel-livepatch-5_14_21-150400_24_128-default is &gt;=10-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982932" version="1" comment="kernel-livepatch-5_14_21-150500_55_59-default is &gt;=18-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982933" version="1" comment="kernel-livepatch-5_14_21-150500_55_62-default is &gt;=16-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982934" version="1" comment="kernel-livepatch-5_14_21-150500_55_65-default is &gt;=16-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982935" version="1" comment="kernel-livepatch-5_14_21-150500_55_68-default is &gt;=15-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009983058" version="1" comment="kernel-livepatch-5_14_21-150500_55_73-default is &gt;=10-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009225897"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982936" version="1" comment="kernel-livepatch-6_4_0-150600_21-default is &gt;=16-150600.4.40.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982937" version="1" comment="kernel-livepatch-6_4_0-150600_23_14-default is &gt;=14-150600.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982938" version="1" comment="kernel-livepatch-6_4_0-150600_23_17-default is &gt;=14-150600.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982939" version="1" comment="kernel-livepatch-6_4_0-150600_23_7-default is &gt;=14-150600.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982451" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=15-150600.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234609"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963364" version="1" comment="kgraft-patch-4_12_14-122_189-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963365" version="1" comment="kgraft-patch-4_12_14-122_194-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066207"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963366" version="1" comment="kgraft-patch-4_12_14-122_201-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963367" version="1" comment="kgraft-patch-4_12_14-122_216-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963368" version="1" comment="kgraft-patch-4_12_14-122_219-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963369" version="1" comment="kgraft-patch-4_12_14-122_222-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963370" version="1" comment="kgraft-patch-4_12_14-122_225-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963371" version="1" comment="kgraft-patch-4_12_14-122_228-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963297" version="1" comment="kgraft-patch-4_12_14-122_234-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960543" version="1" comment="kernel-default is &lt;4.12.14-122.234.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229713"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963661" version="1" comment="kernel-livepatch-5_3_18-150300_59_174-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963373" version="1" comment="kernel-livepatch-5_3_18-150300_59_179-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963374" version="1" comment="kernel-livepatch-5_14_21-150400_24_136-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963662" version="1" comment="kernel-livepatch-5_14_21-150500_55_80-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963663" version="1" comment="kernel-livepatch-5_14_21-150500_55_83-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963375" version="1" comment="kernel-livepatch-6_4_0-150600_21-default is &gt;=10-150600.4.22.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230569"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963376" version="1" comment="kernel-livepatch-6_4_0-150600_23_14-default is &gt;=8-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963377" version="1" comment="kernel-livepatch-6_4_0-150600_23_17-default is &gt;=8-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963378" version="1" comment="kernel-livepatch-6_4_0-150600_23_22-default is &gt;=4-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960548" version="1" comment="kernel-default is ==6.4.0-150600.23.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229717"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963379" version="1" comment="kernel-livepatch-6_4_0-150600_23_25-default is &gt;=3-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963380" version="1" comment="kernel-livepatch-6_4_0-150600_23_7-default is &gt;=8-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009963163" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=9-150600.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045700" version="1" comment="kubevirt-container-disk is &lt;1.7.0-160000.1.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624367" version="1" comment="kubevirt-container-disk is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045701" version="1" comment="kubevirt-manifests is &lt;1.7.0-160000.1.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624368" version="1" comment="kubevirt-manifests is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052138"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045702" version="1" comment="kubevirt-pr-helper-conf is &lt;1.7.0-160000.1.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009871691" version="1" comment="kubevirt-pr-helper-conf is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064023"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045703" version="1" comment="kubevirt-sidecar-shim is &lt;1.7.0-160000.1.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045808" version="1" comment="kubevirt-sidecar-shim is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045704" version="1" comment="kubevirt-tests is &lt;1.7.0-160000.1.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624369" version="1" comment="kubevirt-tests is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045705" version="1" comment="kubevirt-virt-api is &lt;1.7.0-160000.1.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624370" version="1" comment="kubevirt-virt-api is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045706" version="1" comment="kubevirt-virt-controller is &lt;1.7.0-160000.1.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624371" version="1" comment="kubevirt-virt-controller is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045707" version="1" comment="kubevirt-virt-exportproxy is &lt;1.7.0-160000.1.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814386" version="1" comment="kubevirt-virt-exportproxy is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061897"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045708" version="1" comment="kubevirt-virt-exportserver is &lt;1.7.0-160000.1.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009814387" version="1" comment="kubevirt-virt-exportserver is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045709" version="1" comment="kubevirt-virt-handler is &lt;1.7.0-160000.1.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624372" version="1" comment="kubevirt-virt-handler is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045710" version="1" comment="kubevirt-virt-launcher is &lt;1.7.0-160000.1.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624373" version="1" comment="kubevirt-virt-launcher is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045711" version="1" comment="kubevirt-virt-operator is &lt;1.7.0-160000.1.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624374" version="1" comment="kubevirt-virt-operator is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045712" version="1" comment="kubevirt-virt-synchronization-controller is &lt;1.7.0-160000.1.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045809" version="1" comment="kubevirt-virt-synchronization-controller is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045713" version="1" comment="kubevirt-virtctl is &lt;1.7.0-160000.1.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624375" version="1" comment="kubevirt-virtctl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045714" version="1" comment="obs-service-kubevirt_containers_meta is &lt;1.7.0-160000.1.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009662899" version="1" comment="obs-service-kubevirt_containers_meta is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059111"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032565" version="1" comment="git-bug is &lt;0.10.1-bp160.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245361"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969399" version="1" comment="git-bug is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032566" version="1" comment="git-bug-bash-completion is &lt;0.10.1-bp160.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969400" version="1" comment="git-bug-bash-completion is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032567" version="1" comment="git-bug-fish-completion is &lt;0.10.1-bp160.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969401" version="1" comment="git-bug-fish-completion is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032568" version="1" comment="git-bug-zsh-completion is &lt;0.10.1-bp160.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245362"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009969402" version="1" comment="git-bug-zsh-completion is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035658" version="1" comment="helmfile is &lt;1.1.9-bp160.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245995"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031777" version="1" comment="helmfile is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035659" version="1" comment="helmfile-bash-completion is &lt;1.1.9-bp160.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031778" version="1" comment="helmfile-bash-completion is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035660" version="1" comment="helmfile-fish-completion is &lt;1.1.9-bp160.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031779" version="1" comment="helmfile-fish-completion is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067652"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035661" version="1" comment="helmfile-zsh-completion is &lt;1.1.9-bp160.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245996"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031780" version="1" comment="helmfile-zsh-completion is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067653"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043904" version="1" comment="htmldoc is &lt;1.9.23-bp160.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247639"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151341" version="1" comment="htmldoc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968286" version="1" comment="kernel-livepatch-5_14_21-150400_24_136-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968287" version="1" comment="kernel-livepatch-6_4_0-150600_23_22-default is &gt;=6-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968289" version="1" comment="kernel-livepatch-5_3_18-150300_59_179-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018025" version="1" comment="kernel-livepatch-6_4_0-150600_23_17-default is &gt;=20-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017977" version="1" comment="kernel-livepatch-6_4_0-150600_23_22-default is &gt;=16-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018026" version="1" comment="kernel-livepatch-6_4_0-150600_23_25-default is &gt;=15-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017332" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=21-150600.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241964"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986628" version="1" comment="kernel-livepatch-6_4_0-150600_21-default is &gt;=17-150600.4.43.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986733" version="1" comment="kernel-livepatch-6_4_0-150600_23_14-default is &gt;=15-150600.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986629" version="1" comment="kernel-livepatch-6_4_0-150600_23_17-default is &gt;=15-150600.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986630" version="1" comment="kernel-livepatch-6_4_0-150600_23_22-default is &gt;=11-150600.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986631" version="1" comment="kernel-livepatch-6_4_0-150600_23_25-default is &gt;=10-150600.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986632" version="1" comment="kernel-livepatch-6_4_0-150600_23_7-default is &gt;=15-150600.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986107" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=16-150600.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235294"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019242" version="1" comment="kgraft-patch-4_12_14-122_228-default is &gt;=16-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019406" version="1" comment="kernel-livepatch-5_3_18-150300_59_174-default is &gt;=17-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019407" version="1" comment="kernel-livepatch-5_3_18-150300_59_179-default is &gt;=16-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019704" version="1" comment="kernel-livepatch-5_14_21-150500_55_80-default is &gt;=15-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019705" version="1" comment="kernel-livepatch-6_4_0-150600_23_22-default is &gt;=17-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987908" version="1" comment="kernel-default is &lt;6.4.0-150600.23.22.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235735"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022284" version="1" comment="kernel-livepatch-5_3_18-150300_59_174-default is &gt;=19-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022309" version="1" comment="kernel-livepatch-5_3_18-150300_59_179-default is &gt;=18-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022333" version="1" comment="kernel-livepatch-5_14_21-150400_24_133-default is &gt;=17-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022612" version="1" comment="kernel-livepatch-5_14_21-150400_24_136-default is &gt;=17-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022801" version="1" comment="kernel-livepatch-5_14_21-150500_55_80-default is &gt;=17-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022802" version="1" comment="kernel-livepatch-5_14_21-150500_55_83-default is &gt;=17-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023023" version="1" comment="kernel-livepatch-6_4_0-150600_23_22-default is &gt;=19-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023024" version="1" comment="kernel-livepatch-6_4_0-150600_23_25-default is &gt;=18-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996825" version="1" comment="kernel-default is &lt;6.4.0-150600.23.25.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982356" version="1" comment="kgraft-patch-4_12_14-122_228-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982358" version="1" comment="kgraft-patch-4_12_14-122_234-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982940" version="1" comment="kernel-livepatch-5_3_18-150300_59_174-default is &gt;=10-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166596"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982941" version="1" comment="kernel-livepatch-5_3_18-150300_59_179-default is &gt;=9-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166597"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982942" version="1" comment="kernel-livepatch-5_3_18-150300_59_182-default is &gt;=7-150300.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960546" version="1" comment="kernel-default is &lt;5.3.18-150300.59.182.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229715"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982943" version="1" comment="kernel-livepatch-5_14_21-150400_24_133-default is &gt;=8-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982944" version="1" comment="kernel-livepatch-5_14_21-150400_24_136-default is &gt;=8-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009184120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982945" version="1" comment="kernel-livepatch-5_14_21-150400_24_141-default is &gt;=7-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960754" version="1" comment="kernel-default is &lt;5.14.21-150400.24.141.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229785"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982946" version="1" comment="kernel-livepatch-5_14_21-150500_55_80-default is &gt;=8-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982947" version="1" comment="kernel-livepatch-5_14_21-150500_55_83-default is &gt;=8-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201217"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982948" version="1" comment="kernel-livepatch-6_4_0-150600_23_22-default is &gt;=10-150600.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234721"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982949" version="1" comment="kernel-livepatch-6_4_0-150600_23_25-default is &gt;=9-150600.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234722"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987647" version="1" comment="kernel-livepatch-5_14_21-150500_55_73-default is &gt;=12-150500.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202676"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997139" version="1" comment="kernel-livepatch-5_14_21-150500_55_80-default is &gt;=10-150500.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987648" version="1" comment="kernel-livepatch-5_14_21-150500_55_83-default is &gt;=10-150500.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235694"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997088" version="1" comment="kernel-livepatch-6_4_0-150600_23_17-default is &gt;=16-150600.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237833"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987907" version="1" comment="kernel-livepatch-6_4_0-150600_23_22-default is &gt;=12-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996823" version="1" comment="kernel-livepatch-6_4_0-150600_23_25-default is &gt;=11-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987649" version="1" comment="kernel-livepatch-5_14_21-150400_24_128-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996824" version="1" comment="kernel-livepatch-5_14_21-150400_24_133-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987650" version="1" comment="kernel-livepatch-5_14_21-150400_24_136-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997089" version="1" comment="kernel-livepatch-5_14_21-150400_24_141-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020202" version="1" comment="kgraft-patch-4_12_14-122_228-default is &gt;=17-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020204" version="1" comment="kgraft-patch-4_12_14-122_234-default is &gt;=16-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020375" version="1" comment="kernel-livepatch-5_3_18-150300_59_174-default is &gt;=18-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020741" version="1" comment="kernel-livepatch-5_3_18-150300_59_179-default is &gt;=17-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230627"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020376" version="1" comment="kernel-livepatch-5_3_18-150300_59_182-default is &gt;=15-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020673" version="1" comment="kernel-livepatch-5_14_21-150400_24_133-default is &gt;=16-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020674" version="1" comment="kernel-livepatch-5_14_21-150400_24_136-default is &gt;=16-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020507" version="1" comment="kernel-livepatch-5_14_21-150400_24_141-default is &gt;=15-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020675" version="1" comment="kernel-livepatch-5_14_21-150500_55_80-default is &gt;=16-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020676" version="1" comment="kernel-livepatch-5_14_21-150500_55_83-default is &gt;=16-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020702" version="1" comment="kernel-livepatch-6_4_0-150600_23_22-default is &gt;=18-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020703" version="1" comment="kernel-livepatch-6_4_0-150600_23_25-default is &gt;=17-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977139" version="1" comment="kernel-livepatch-5_3_18-150300_59_170-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977140" version="1" comment="kernel-livepatch-5_3_18-150300_59_174-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977280" version="1" comment="kernel-livepatch-5_3_18-150300_59_179-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976833" version="1" comment="kernel-livepatch-5_3_18-150300_59_182-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976886" version="1" comment="kernel-livepatch-5_14_21-150400_24_116-default is &gt;=17-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977129" version="1" comment="kernel-livepatch-5_14_21-150400_24_119-default is &gt;=16-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977141" version="1" comment="kernel-livepatch-5_14_21-150400_24_122-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977122" version="1" comment="kernel-livepatch-5_14_21-150400_24_125-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976887" version="1" comment="kernel-livepatch-5_14_21-150400_24_128-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976888" version="1" comment="kernel-livepatch-5_14_21-150400_24_133-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976889" version="1" comment="kernel-livepatch-5_14_21-150400_24_136-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977130" version="1" comment="kernel-livepatch-5_14_21-150400_24_141-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977281" version="1" comment="kernel-livepatch-5_14_21-150500_55_59-default is &gt;=17-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977282" version="1" comment="kernel-livepatch-5_14_21-150500_55_62-default is &gt;=15-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066894"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977283" version="1" comment="kernel-livepatch-5_14_21-150500_55_65-default is &gt;=15-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977284" version="1" comment="kernel-livepatch-5_14_21-150500_55_68-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977285" version="1" comment="kernel-livepatch-5_14_21-150500_55_73-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977286" version="1" comment="kernel-livepatch-5_14_21-150500_55_80-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977287" version="1" comment="kernel-livepatch-5_14_21-150500_55_83-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008963" version="1" comment="kernel-livepatch-5_14_21-150500_55_73-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008799" version="1" comment="kernel-livepatch-5_14_21-150500_55_80-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008800" version="1" comment="kernel-livepatch-5_14_21-150500_55_83-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008801" version="1" comment="kernel-livepatch-6_4_0-150600_23_17-default is &gt;=17-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240310"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008802" version="1" comment="kernel-livepatch-6_4_0-150600_23_22-default is &gt;=13-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008803" version="1" comment="kernel-livepatch-6_4_0-150600_23_25-default is &gt;=12-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960542" version="1" comment="kgraft-patch-4_12_14-122_234-default is &gt;=2-8.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204907"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960545" version="1" comment="kernel-livepatch-5_3_18-150300_59_182-default is &gt;=2-150300.7.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201682"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960753" version="1" comment="kernel-livepatch-5_14_21-150400_24_141-default is &gt;=2-150400.9.8.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201684"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960547" version="1" comment="kernel-livepatch-6_4_0-150600_21-default is &gt;=8-150600.4.16.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229716"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960549" version="1" comment="kernel-livepatch-6_4_0-150600_23_25-default is &gt;=2-150600.13.6.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009227234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009960122" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=7-150600.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968290" version="1" comment="kgraft-patch-4_12_14-122_234-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968291" version="1" comment="kernel-livepatch-5_3_18-150300_59_182-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968292" version="1" comment="kernel-livepatch-5_14_21-150400_24_141-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968293" version="1" comment="kernel-livepatch-5_14_21-150500_55_83-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968294" version="1" comment="kernel-livepatch-6_4_0-150600_23_25-default is &gt;=5-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039725" version="1" comment="coredns is &lt;1.14.0-bp160.1.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945102" version="1" comment="coredns is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039726" version="1" comment="coredns-extras is &lt;1.14.0-bp160.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009945103" version="1" comment="coredns-extras is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037153" version="1" comment="avahi is &lt;0.8-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151208" version="1" comment="avahi is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037154" version="1" comment="avahi-autoipd is &lt;0.8-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151209" version="1" comment="avahi-autoipd is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037155" version="1" comment="avahi-compat-howl-devel is &lt;0.8-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243729" version="1" comment="avahi-compat-howl-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037156" version="1" comment="avahi-compat-mDNSResponder-devel is &lt;0.8-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151210" version="1" comment="avahi-compat-mDNSResponder-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037157" version="1" comment="avahi-lang is &lt;0.8-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246262"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151211" version="1" comment="avahi-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037158" version="1" comment="avahi-utils is &lt;0.8-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243733" version="1" comment="avahi-utils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037159" version="1" comment="avahi-utils-gtk is &lt;0.8-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243734" version="1" comment="avahi-utils-gtk is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037160" version="1" comment="libavahi-client3 is &lt;0.8-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151212" version="1" comment="libavahi-client3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037161" version="1" comment="libavahi-common3 is &lt;0.8-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151214" version="1" comment="libavahi-common3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037162" version="1" comment="libavahi-core7 is &lt;0.8-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151216" version="1" comment="libavahi-core7 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037163" version="1" comment="libavahi-devel is &lt;0.8-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151217" version="1" comment="libavahi-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037164" version="1" comment="libavahi-glib-devel is &lt;0.8-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243735" version="1" comment="libavahi-glib-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037165" version="1" comment="libavahi-glib1 is &lt;0.8-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243736" version="1" comment="libavahi-glib1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037166" version="1" comment="libavahi-gobject-devel is &lt;0.8-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243738" version="1" comment="libavahi-gobject-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037167" version="1" comment="libavahi-gobject0 is &lt;0.8-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243739" version="1" comment="libavahi-gobject0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037168" version="1" comment="libavahi-libevent1 is &lt;0.8-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755253" version="1" comment="libavahi-libevent1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037169" version="1" comment="libavahi-qt6-1 is &lt;0.8-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037217" version="1" comment="libavahi-qt6-1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037170" version="1" comment="libavahi-qt6-devel is &lt;0.8-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037218" version="1" comment="libavahi-qt6-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037171" version="1" comment="libavahi-ui-gtk3-0 is &lt;0.8-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243742" version="1" comment="libavahi-ui-gtk3-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037172" version="1" comment="libdns_sd is &lt;0.8-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151218" version="1" comment="libdns_sd is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037173" version="1" comment="libhowl0 is &lt;0.8-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243745" version="1" comment="libhowl0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037174" version="1" comment="python3-avahi-gtk is &lt;0.8-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009346637" version="1" comment="python3-avahi-gtk is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037175" version="1" comment="python313-avahi is &lt;0.8-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037219" version="1" comment="python313-avahi is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037176" version="1" comment="typelib-1_0-Avahi-0_6 is &lt;0.8-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246261"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009243748" version="1" comment="typelib-1_0-Avahi-0_6 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977288" version="1" comment="kernel-livepatch-6_4_0-150600_21-default is &gt;=15-150600.4.37.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068206"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977289" version="1" comment="kernel-livepatch-6_4_0-150600_23_14-default is &gt;=13-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977290" version="1" comment="kernel-livepatch-6_4_0-150600_23_17-default is &gt;=13-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977291" version="1" comment="kernel-livepatch-6_4_0-150600_23_22-default is &gt;=9-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977292" version="1" comment="kernel-livepatch-6_4_0-150600_23_25-default is &gt;=8-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977293" version="1" comment="kernel-livepatch-6_4_0-150600_23_7-default is &gt;=13-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976432" version="1" comment="kernel-livepatch-6_4_0-150600_8-rt is &gt;=14-150600.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233223"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965287" version="1" comment="kgraft-patch-4_12_14-122_219-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965288" version="1" comment="kgraft-patch-4_12_14-122_222-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965289" version="1" comment="kgraft-patch-4_12_14-122_225-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965290" version="1" comment="kgraft-patch-4_12_14-122_228-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966046" version="1" comment="kgraft-patch-4_12_14-122_234-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966047" version="1" comment="kernel-livepatch-5_3_18-150300_59_170-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966287" version="1" comment="kernel-livepatch-5_3_18-150300_59_174-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965825" version="1" comment="kernel-livepatch-5_3_18-150300_59_179-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966048" version="1" comment="kernel-livepatch-5_3_18-150300_59_182-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966289" version="1" comment="kernel-livepatch-5_3_18-150300_59_185-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966291" version="1" comment="kernel-livepatch-5_3_18-150300_59_188-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966292" version="1" comment="kernel-default is &lt;5.3.18-150300.59.188.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966049" version="1" comment="kernel-livepatch-5_14_21-150400_24_128-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966050" version="1" comment="kernel-livepatch-5_14_21-150400_24_133-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966051" version="1" comment="kernel-livepatch-5_14_21-150400_24_136-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966052" version="1" comment="kernel-livepatch-5_14_21-150400_24_141-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966294" version="1" comment="kernel-livepatch-5_14_21-150400_24_144-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966296" version="1" comment="kernel-livepatch-5_14_21-150400_24_147-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966297" version="1" comment="kernel-default is &lt;5.14.21-150400.24.147.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009965826" version="1" comment="kernel-livepatch-5_14_21-150500_55_73-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966053" version="1" comment="kernel-livepatch-5_14_21-150500_55_80-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966054" version="1" comment="kernel-livepatch-5_14_21-150500_55_83-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966055" version="1" comment="kernel-livepatch-6_4_0-150600_23_17-default is &gt;=9-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966056" version="1" comment="kernel-livepatch-6_4_0-150600_23_22-default is &gt;=5-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009966057" version="1" comment="kernel-livepatch-6_4_0-150600_23_25-default is &gt;=4-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011947" version="1" comment="kernel-livepatch-5_14_21-150400_24_128-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011948" version="1" comment="kernel-livepatch-5_14_21-150400_24_133-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011949" version="1" comment="kernel-livepatch-5_14_21-150400_24_136-default is &gt;=12-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011950" version="1" comment="kernel-livepatch-5_14_21-150400_24_141-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011889" version="1" comment="kernel-livepatch-5_14_21-150400_24_144-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011951" version="1" comment="kernel-livepatch-5_14_21-150400_24_147-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011952" version="1" comment="kernel-livepatch-5_14_21-150400_24_150-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011953" version="1" comment="kernel-livepatch-5_14_21-150400_24_153-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011890" version="1" comment="kernel-livepatch-5_14_21-150400_24_158-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011954" version="1" comment="kernel-livepatch-5_14_21-150400_24_161-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011955" version="1" comment="kernel-livepatch-5_14_21-150400_24_164-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012373" version="1" comment="kernel-livepatch-5_14_21-150400_24_167-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011956" version="1" comment="kernel-livepatch-5_14_21-150500_55_73-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011957" version="1" comment="kernel-livepatch-5_14_21-150500_55_80-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011958" version="1" comment="kernel-livepatch-5_14_21-150500_55_83-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012357" version="1" comment="kernel-livepatch-5_14_21-150500_55_88-default is &gt;=8-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987653" version="1" comment="kernel-default is &lt;5.14.21-150500.55.88.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235695"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011959" version="1" comment="kernel-livepatch-6_4_0-150600_23_22-default is &gt;=14-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011960" version="1" comment="kernel-livepatch-6_4_0-150600_23_25-default is &gt;=13-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012358" version="1" comment="kernel-livepatch-6_4_0-150600_23_30-default is &gt;=9-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030691" version="1" comment="kgraft-patch-4_12_14-122_234-default is &gt;=19-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030651" version="1" comment="kgraft-patch-4_12_14-122_237-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976561" version="1" comment="kernel-default is &lt;4.12.14-122.237.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031210" version="1" comment="kernel-livepatch-5_14_21-150500_55_100-default is &gt;=10-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031656" version="1" comment="kernel-livepatch-5_14_21-150500_55_103-default is &gt;=10-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202048"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031468" version="1" comment="kernel-livepatch-5_14_21-150500_55_110-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031657" version="1" comment="kernel-livepatch-5_14_21-150500_55_88-default is &gt;=15-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031469" version="1" comment="kernel-livepatch-5_14_21-150500_55_91-default is &gt;=15-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031470" version="1" comment="kernel-livepatch-5_14_21-150500_55_94-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031471" version="1" comment="kernel-livepatch-5_14_21-150500_55_97-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031472" version="1" comment="kernel-livepatch-6_4_0-150600_23_30-default is &gt;=16-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020709" version="1" comment="kernel-default is &lt;6.4.0-150600.23.30.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242824"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982951" version="1" comment="kernel-default is &lt;5.3.18-150300.59.185.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234723"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977143" version="1" comment="kernel-default is &lt;5.14.21-150400.24.144.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008804" version="1" comment="kernel-livepatch-5_14_21-150500_55_88-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008805" version="1" comment="kernel-livepatch-6_4_0-150600_23_30-default is &gt;=8-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982452" version="1" comment="kgraft-patch-4_12_14-122_237-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982950" version="1" comment="kernel-livepatch-5_3_18-150300_59_185-default is &gt;=5-150300.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167213"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982630" version="1" comment="kernel-livepatch-5_14_21-150400_24_144-default is &gt;=6-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009178812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012381" version="1" comment="kernel-default is &lt;5.3.18-150300.59.211.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241043"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014754" version="1" comment="kernel-default is &lt;5.14.21-150400.24.170.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241465"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025110" version="1" comment="kernel-livepatch-6_4_0-150600_23_25-default is &gt;=19-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024668" version="1" comment="kernel-livepatch-6_4_0-150600_23_30-default is &gt;=15-150600.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024669" version="1" comment="kernel-livepatch-6_4_0-150600_23_33-default is &gt;=15-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019716" version="1" comment="kernel-default is &lt;6.4.0-150600.23.33.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025404" version="1" comment="cluster-md-kmp-64kb is &lt;6.12.0-160000.6.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025405" version="1" comment="cluster-md-kmp-default is &lt;6.12.0-160000.6.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025406" version="1" comment="cluster-md-kmp-rt is &lt;6.12.0-160000.6.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025407" version="1" comment="dlm-kmp-64kb is &lt;6.12.0-160000.6.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025408" version="1" comment="dlm-kmp-default is &lt;6.12.0-160000.6.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025409" version="1" comment="dlm-kmp-rt is &lt;6.12.0-160000.6.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025410" version="1" comment="dtb-allwinner is &lt;6.12.0-160000.6.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025411" version="1" comment="dtb-altera is &lt;6.12.0-160000.6.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025412" version="1" comment="dtb-amazon is &lt;6.12.0-160000.6.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025413" version="1" comment="dtb-amd is &lt;6.12.0-160000.6.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025414" version="1" comment="dtb-amlogic is &lt;6.12.0-160000.6.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025415" version="1" comment="dtb-apm is &lt;6.12.0-160000.6.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025416" version="1" comment="dtb-apple is &lt;6.12.0-160000.6.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025417" version="1" comment="dtb-arm is &lt;6.12.0-160000.6.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025418" version="1" comment="dtb-broadcom is &lt;6.12.0-160000.6.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025419" version="1" comment="dtb-cavium is &lt;6.12.0-160000.6.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025420" version="1" comment="dtb-exynos is &lt;6.12.0-160000.6.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025421" version="1" comment="dtb-freescale is &lt;6.12.0-160000.6.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025422" version="1" comment="dtb-hisilicon is &lt;6.12.0-160000.6.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025423" version="1" comment="dtb-lg is &lt;6.12.0-160000.6.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025424" version="1" comment="dtb-marvell is &lt;6.12.0-160000.6.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025425" version="1" comment="dtb-mediatek is &lt;6.12.0-160000.6.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025426" version="1" comment="dtb-nvidia is &lt;6.12.0-160000.6.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025427" version="1" comment="dtb-qcom is &lt;6.12.0-160000.6.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025428" version="1" comment="dtb-renesas is &lt;6.12.0-160000.6.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025429" version="1" comment="dtb-rockchip is &lt;6.12.0-160000.6.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025430" version="1" comment="dtb-socionext is &lt;6.12.0-160000.6.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025431" version="1" comment="dtb-sprd is &lt;6.12.0-160000.6.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025432" version="1" comment="dtb-xilinx is &lt;6.12.0-160000.6.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025433" version="1" comment="gfs2-kmp-64kb is &lt;6.12.0-160000.6.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025434" version="1" comment="gfs2-kmp-default is &lt;6.12.0-160000.6.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025435" version="1" comment="gfs2-kmp-rt is &lt;6.12.0-160000.6.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025436" version="1" comment="kernel-64kb is &lt;6.12.0-160000.6.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025438" version="1" comment="kernel-64kb-extra is &lt;6.12.0-160000.6.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025439" version="1" comment="kernel-64kb-optional is &lt;6.12.0-160000.6.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025440" version="1" comment="kernel-default is &lt;6.12.0-160000.6.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031628" version="1" comment="kernel-default-base is &lt;6.12.0-160000.6.1.160000.2.4 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025442" version="1" comment="kernel-default-extra is &lt;6.12.0-160000.6.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025443" version="1" comment="kernel-default-optional is &lt;6.12.0-160000.6.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025444" version="1" comment="kernel-default-vdso is &lt;6.12.0-160000.6.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025446" version="1" comment="kernel-docs is &lt;6.12.0-160000.6.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025447" version="1" comment="kernel-docs-html is &lt;6.12.0-160000.6.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025448" version="1" comment="kernel-kvmsmall is &lt;6.12.0-160000.6.1 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025450" version="1" comment="kernel-kvmsmall-vdso is &lt;6.12.0-160000.6.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025451" version="1" comment="kernel-macros is &lt;6.12.0-160000.6.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025452" version="1" comment="kernel-obs-build is &lt;6.12.0-160000.6.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025453" version="1" comment="kernel-obs-qa is &lt;6.12.0-160000.6.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025454" version="1" comment="kernel-rt is &lt;6.12.0-160000.6.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025456" version="1" comment="kernel-rt-extra is &lt;6.12.0-160000.6.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025457" version="1" comment="kernel-rt-optional is &lt;6.12.0-160000.6.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025458" version="1" comment="kernel-rt-vdso is &lt;6.12.0-160000.6.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025459" version="1" comment="kernel-source is &lt;6.12.0-160000.6.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025460" version="1" comment="kernel-source-vanilla is &lt;6.12.0-160000.6.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025461" version="1" comment="kernel-syms is &lt;6.12.0-160000.6.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025462" version="1" comment="kernel-zfcpdump is &lt;6.12.0-160000.6.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025463" version="1" comment="kselftests-kmp-64kb is &lt;6.12.0-160000.6.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025464" version="1" comment="kselftests-kmp-default is &lt;6.12.0-160000.6.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025465" version="1" comment="kselftests-kmp-rt is &lt;6.12.0-160000.6.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025466" version="1" comment="ocfs2-kmp-64kb is &lt;6.12.0-160000.6.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243967"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025467" version="1" comment="ocfs2-kmp-default is &lt;6.12.0-160000.6.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243968"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025468" version="1" comment="ocfs2-kmp-rt is &lt;6.12.0-160000.6.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243969"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008806" version="1" comment="kernel-livepatch-5_14_21-150500_55_91-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968301" version="1" comment="kernel-default is &lt;5.14.21-150500.55.91.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231622"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020205" version="1" comment="kgraft-patch-4_12_14-122_237-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020704" version="1" comment="kgraft-patch-4_12_14-122_244-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020308" version="1" comment="kgraft-patch-4_12_14-122_247-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020309" version="1" comment="kgraft-patch-4_12_14-122_250-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020206" version="1" comment="kgraft-patch-4_12_14-122_255-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020310" version="1" comment="kgraft-patch-4_12_14-122_258-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011975" version="1" comment="kernel-default is &lt;4.12.14-122.258.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240943"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020377" version="1" comment="kernel-livepatch-5_3_18-150300_59_185-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020508" version="1" comment="kernel-livepatch-5_3_18-150300_59_188-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020509" version="1" comment="kernel-livepatch-5_3_18-150300_59_195-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020510" version="1" comment="kernel-livepatch-5_3_18-150300_59_198-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020511" version="1" comment="kernel-livepatch-5_3_18-150300_59_201-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020378" version="1" comment="kernel-livepatch-5_3_18-150300_59_204-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008966" version="1" comment="kernel-default is &lt;5.3.18-150300.59.204.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240350"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020512" version="1" comment="kernel-livepatch-5_14_21-150400_24_144-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020513" version="1" comment="kernel-livepatch-5_14_21-150400_24_147-default is &gt;=13-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020514" version="1" comment="kernel-livepatch-5_14_21-150400_24_150-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020515" version="1" comment="kernel-livepatch-5_14_21-150400_24_153-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020705" version="1" comment="kernel-livepatch-5_14_21-150400_24_158-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020742" version="1" comment="kernel-livepatch-5_14_21-150400_24_161-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020677" version="1" comment="kernel-livepatch-5_14_21-150400_24_164-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008971" version="1" comment="kernel-default is &lt;5.14.21-150400.24.164.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020706" version="1" comment="kernel-livepatch-5_14_21-150500_55_100-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020707" version="1" comment="kernel-livepatch-5_14_21-150500_55_103-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020678" version="1" comment="kernel-livepatch-5_14_21-150500_55_88-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020679" version="1" comment="kernel-livepatch-5_14_21-150500_55_91-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020680" version="1" comment="kernel-livepatch-5_14_21-150500_55_94-default is &gt;=8-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020681" version="1" comment="kernel-livepatch-5_14_21-150500_55_97-default is &gt;=8-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020708" version="1" comment="kernel-livepatch-6_4_0-150600_23_30-default is &gt;=13-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045719" version="1" comment="cluster-md-kmp-64kb is &lt;6.12.0-160000.26.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045720" version="1" comment="cluster-md-kmp-azure is &lt;6.12.0-160000.26.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623277" version="1" comment="cluster-md-kmp-azure is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045721" version="1" comment="cluster-md-kmp-default is &lt;6.12.0-160000.26.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045722" version="1" comment="cluster-md-kmp-rt is &lt;6.12.0-160000.26.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045723" version="1" comment="dlm-kmp-64kb is &lt;6.12.0-160000.26.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045724" version="1" comment="dlm-kmp-azure is &lt;6.12.0-160000.26.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623279" version="1" comment="dlm-kmp-azure is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045725" version="1" comment="dlm-kmp-default is &lt;6.12.0-160000.26.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045726" version="1" comment="dlm-kmp-rt is &lt;6.12.0-160000.26.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045727" version="1" comment="dtb-allwinner is &lt;6.12.0-160000.26.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045728" version="1" comment="dtb-altera is &lt;6.12.0-160000.26.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045729" version="1" comment="dtb-amazon is &lt;6.12.0-160000.26.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045730" version="1" comment="dtb-amd is &lt;6.12.0-160000.26.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045731" version="1" comment="dtb-amlogic is &lt;6.12.0-160000.26.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045732" version="1" comment="dtb-apm is &lt;6.12.0-160000.26.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045733" version="1" comment="dtb-apple is &lt;6.12.0-160000.26.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045734" version="1" comment="dtb-arm is &lt;6.12.0-160000.26.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045735" version="1" comment="dtb-broadcom is &lt;6.12.0-160000.26.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045736" version="1" comment="dtb-cavium is &lt;6.12.0-160000.26.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045737" version="1" comment="dtb-exynos is &lt;6.12.0-160000.26.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045738" version="1" comment="dtb-freescale is &lt;6.12.0-160000.26.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045739" version="1" comment="dtb-hisilicon is &lt;6.12.0-160000.26.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045740" version="1" comment="dtb-lg is &lt;6.12.0-160000.26.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045741" version="1" comment="dtb-marvell is &lt;6.12.0-160000.26.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045742" version="1" comment="dtb-mediatek is &lt;6.12.0-160000.26.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045743" version="1" comment="dtb-nvidia is &lt;6.12.0-160000.26.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045744" version="1" comment="dtb-qcom is &lt;6.12.0-160000.26.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045745" version="1" comment="dtb-renesas is &lt;6.12.0-160000.26.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045746" version="1" comment="dtb-rockchip is &lt;6.12.0-160000.26.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045747" version="1" comment="dtb-socionext is &lt;6.12.0-160000.26.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045748" version="1" comment="dtb-sprd is &lt;6.12.0-160000.26.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045749" version="1" comment="dtb-xilinx is &lt;6.12.0-160000.26.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045750" version="1" comment="gfs2-kmp-64kb is &lt;6.12.0-160000.26.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045751" version="1" comment="gfs2-kmp-azure is &lt;6.12.0-160000.26.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623281" version="1" comment="gfs2-kmp-azure is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045752" version="1" comment="gfs2-kmp-default is &lt;6.12.0-160000.26.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045753" version="1" comment="gfs2-kmp-rt is &lt;6.12.0-160000.26.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045754" version="1" comment="kernel-64kb is &lt;6.12.0-160000.26.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045756" version="1" comment="kernel-64kb-extra is &lt;6.12.0-160000.26.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045757" version="1" comment="kernel-64kb-optional is &lt;6.12.0-160000.26.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045758" version="1" comment="kernel-azure is &lt;6.12.0-160000.26.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623283" version="1" comment="kernel-azure is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045760" version="1" comment="kernel-azure-extra is &lt;6.12.0-160000.26.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623286" version="1" comment="kernel-azure-extra is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045761" version="1" comment="kernel-azure-optional is &lt;6.12.0-160000.26.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623427" version="1" comment="kernel-azure-optional is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045762" version="1" comment="kernel-azure-vdso is &lt;6.12.0-160000.26.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769740" version="1" comment="kernel-azure-vdso is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045763" version="1" comment="kernel-default is &lt;6.12.0-160000.26.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045764" version="1" comment="kernel-default-base is &lt;6.12.0-160000.26.1.160000.2.7 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248067"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045766" version="1" comment="kernel-default-extra is &lt;6.12.0-160000.26.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045767" version="1" comment="kernel-default-optional is &lt;6.12.0-160000.26.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045768" version="1" comment="kernel-default-vdso is &lt;6.12.0-160000.26.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045770" version="1" comment="kernel-docs is &lt;6.12.0-160000.26.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045771" version="1" comment="kernel-docs-html is &lt;6.12.0-160000.26.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045772" version="1" comment="kernel-kvmsmall is &lt;6.12.0-160000.26.1 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045774" version="1" comment="kernel-kvmsmall-vdso is &lt;6.12.0-160000.26.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045775" version="1" comment="kernel-macros is &lt;6.12.0-160000.26.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045776" version="1" comment="kernel-obs-build is &lt;6.12.0-160000.26.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045777" version="1" comment="kernel-obs-qa is &lt;6.12.0-160000.26.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045778" version="1" comment="kernel-rt is &lt;6.12.0-160000.26.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045780" version="1" comment="kernel-rt-extra is &lt;6.12.0-160000.26.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045781" version="1" comment="kernel-rt-optional is &lt;6.12.0-160000.26.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045782" version="1" comment="kernel-rt-vdso is &lt;6.12.0-160000.26.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248066"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045783" version="1" comment="kernel-source is &lt;6.12.0-160000.26.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045784" version="1" comment="kernel-source-vanilla is &lt;6.12.0-160000.26.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248068"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045785" version="1" comment="kernel-syms is &lt;6.12.0-160000.26.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045786" version="1" comment="kernel-zfcpdump is &lt;6.12.0-160000.26.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045787" version="1" comment="kselftests-kmp-64kb is &lt;6.12.0-160000.26.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045788" version="1" comment="kselftests-kmp-azure is &lt;6.12.0-160000.26.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623305" version="1" comment="kselftests-kmp-azure is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045789" version="1" comment="kselftests-kmp-default is &lt;6.12.0-160000.26.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045790" version="1" comment="kselftests-kmp-rt is &lt;6.12.0-160000.26.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045791" version="1" comment="ocfs2-kmp-64kb is &lt;6.12.0-160000.26.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248063"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045792" version="1" comment="ocfs2-kmp-azure is &lt;6.12.0-160000.26.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623306" version="1" comment="ocfs2-kmp-azure is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045793" version="1" comment="ocfs2-kmp-default is &lt;6.12.0-160000.26.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248065"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045794" version="1" comment="ocfs2-kmp-rt is &lt;6.12.0-160000.26.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248064"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008808" version="1" comment="kernel-livepatch-5_3_18-150300_59_201-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008965" version="1" comment="kernel-livepatch-5_3_18-150300_59_204-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008968" version="1" comment="kernel-livepatch-5_14_21-150400_24_161-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008970" version="1" comment="kernel-livepatch-5_14_21-150400_24_164-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997090" version="1" comment="kernel-livepatch-6_4_0-150600_23_30-default is &gt;=7-150600.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009237834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975407" version="1" comment="kernel-default is &lt;4.12.14-122.244.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975033" version="1" comment="kernel-livepatch-5_14_21-150400_24_128-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975411" version="1" comment="kernel-livepatch-5_14_21-150400_24_133-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975412" version="1" comment="kernel-livepatch-5_14_21-150400_24_136-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975413" version="1" comment="kernel-livepatch-5_14_21-150400_24_141-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975414" version="1" comment="kernel-livepatch-5_14_21-150400_24_144-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975415" version="1" comment="kernel-livepatch-5_14_21-150400_24_147-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975066" version="1" comment="kernel-livepatch-5_14_21-150500_55_73-default is &gt;=8-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975416" version="1" comment="kernel-livepatch-5_14_21-150500_55_80-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975417" version="1" comment="kernel-livepatch-5_14_21-150500_55_83-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975418" version="1" comment="kernel-livepatch-5_14_21-150500_55_88-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975419" version="1" comment="kernel-livepatch-5_14_21-150500_55_91-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975067" version="1" comment="kernel-livepatch-6_4_0-150600_23_17-default is &gt;=12-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975068" version="1" comment="kernel-livepatch-6_4_0-150600_23_22-default is &gt;=8-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975069" version="1" comment="kernel-livepatch-6_4_0-150600_23_25-default is &gt;=7-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975070" version="1" comment="kernel-livepatch-6_4_0-150600_23_30-default is &gt;=4-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009975071" version="1" comment="kernel-livepatch-6_4_0-150600_23_33-default is &gt;=4-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987651" version="1" comment="kernel-livepatch-5_14_21-150400_24_144-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997091" version="1" comment="kernel-livepatch-5_14_21-150400_24_147-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009987652" version="1" comment="kernel-livepatch-5_14_21-150500_55_88-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997092" version="1" comment="kernel-livepatch-5_14_21-150500_55_91-default is &gt;=6-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009996826" version="1" comment="kernel-livepatch-6_4_0-150600_23_33-default is &gt;=7-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968295" version="1" comment="kernel-livepatch-5_14_21-150400_24_144-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968296" version="1" comment="kernel-livepatch-5_14_21-150400_24_147-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968298" version="1" comment="kernel-livepatch-5_14_21-150500_55_88-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968300" version="1" comment="kernel-livepatch-5_14_21-150500_55_91-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968303" version="1" comment="kernel-livepatch-6_4_0-150600_23_30-default is &gt;=2-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968305" version="1" comment="kernel-livepatch-6_4_0-150600_23_33-default is &gt;=2-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976552" version="1" comment="kgraft-patch-4_12_14-122_216-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976553" version="1" comment="kgraft-patch-4_12_14-122_219-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067525"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976554" version="1" comment="kgraft-patch-4_12_14-122_222-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976555" version="1" comment="kgraft-patch-4_12_14-122_225-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976556" version="1" comment="kgraft-patch-4_12_14-122_228-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976558" version="1" comment="kgraft-patch-4_12_14-122_234-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976559" version="1" comment="kgraft-patch-4_12_14-122_237-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976560" version="1" comment="kgraft-patch-4_12_14-122_244-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977294" version="1" comment="kernel-livepatch-5_3_18-150300_59_185-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009976834" version="1" comment="kernel-livepatch-5_3_18-150300_59_188-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977142" version="1" comment="kernel-livepatch-5_14_21-150400_24_144-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977131" version="1" comment="kernel-livepatch-5_14_21-150400_24_147-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977295" version="1" comment="kernel-livepatch-5_14_21-150500_55_88-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977296" version="1" comment="kernel-livepatch-5_14_21-150500_55_91-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977297" version="1" comment="kernel-livepatch-6_4_0-150600_23_30-default is &gt;=5-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977298" version="1" comment="kernel-livepatch-6_4_0-150600_23_33-default is &gt;=5-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011961" version="1" comment="kgraft-patch-4_12_14-122_222-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011962" version="1" comment="kgraft-patch-4_12_14-122_225-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011963" version="1" comment="kgraft-patch-4_12_14-122_228-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011826" version="1" comment="kgraft-patch-4_12_14-122_234-default is &gt;=12-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166502"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011964" version="1" comment="kgraft-patch-4_12_14-122_237-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011965" version="1" comment="kernel-livepatch-5_3_18-150300_59_170-default is &gt;=15-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068220"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170149"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011827" version="1" comment="kernel-livepatch-5_3_18-150300_59_174-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068332"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011966" version="1" comment="kernel-livepatch-5_3_18-150300_59_179-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012359" version="1" comment="kernel-livepatch-5_3_18-150300_59_182-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011891" version="1" comment="kernel-livepatch-5_3_18-150300_59_185-default is &gt;=9-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166560"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011967" version="1" comment="kernel-livepatch-5_3_18-150300_59_188-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011968" version="1" comment="kernel-livepatch-5_14_21-150500_55_91-default is &gt;=8-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011969" version="1" comment="kernel-livepatch-6_4_0-150600_23_33-default is &gt;=9-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034125" version="1" comment="grub2 is &lt;2.12-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153175" version="1" comment="grub2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034126" version="1" comment="grub2-arm64-efi is &lt;2.12-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623763" version="1" comment="grub2-arm64-efi is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034127" version="1" comment="grub2-arm64-efi-bls is &lt;2.12-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034157" version="1" comment="grub2-arm64-efi-bls is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034128" version="1" comment="grub2-arm64-efi-debug is &lt;2.12-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623764" version="1" comment="grub2-arm64-efi-debug is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048995"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034129" version="1" comment="grub2-arm64-efi-extras is &lt;2.12-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802512" version="1" comment="grub2-arm64-efi-extras is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034130" version="1" comment="grub2-branding-upstream is &lt;2.12-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153176" version="1" comment="grub2-branding-upstream is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034131" version="1" comment="grub2-common is &lt;2.12-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034158" version="1" comment="grub2-common is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034132" version="1" comment="grub2-i386-pc is &lt;2.12-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153178" version="1" comment="grub2-i386-pc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034133" version="1" comment="grub2-i386-pc-debug is &lt;2.12-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009291438" version="1" comment="grub2-i386-pc-debug is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034134" version="1" comment="grub2-i386-pc-extras is &lt;2.12-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802514" version="1" comment="grub2-i386-pc-extras is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034135" version="1" comment="grub2-powerpc-ieee1275 is &lt;2.12-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623765" version="1" comment="grub2-powerpc-ieee1275 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034136" version="1" comment="grub2-powerpc-ieee1275-debug is &lt;2.12-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623766" version="1" comment="grub2-powerpc-ieee1275-debug is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048997"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034137" version="1" comment="grub2-powerpc-ieee1275-extras is &lt;2.12-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802516" version="1" comment="grub2-powerpc-ieee1275-extras is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034138" version="1" comment="grub2-s390x-emu is &lt;2.12-160000.3.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623767" version="1" comment="grub2-s390x-emu is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034139" version="1" comment="grub2-s390x-emu-debug is &lt;2.12-160000.3.1 for s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245669"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623768" version="1" comment="grub2-s390x-emu-debug is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048998"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034140" version="1" comment="grub2-s390x-emu-extras is &lt;2.12-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802517" version="1" comment="grub2-s390x-emu-extras is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034141" version="1" comment="grub2-snapper-plugin is &lt;2.12-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153179" version="1" comment="grub2-snapper-plugin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034142" version="1" comment="grub2-systemd-sleep-plugin is &lt;2.12-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154139" version="1" comment="grub2-systemd-sleep-plugin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041067"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034143" version="1" comment="grub2-x86_64-efi is &lt;2.12-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153180" version="1" comment="grub2-x86_64-efi is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034144" version="1" comment="grub2-x86_64-efi-bls is &lt;2.12-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034159" version="1" comment="grub2-x86_64-efi-bls is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034145" version="1" comment="grub2-x86_64-efi-debug is &lt;2.12-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009291439" version="1" comment="grub2-x86_64-efi-debug is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034146" version="1" comment="grub2-x86_64-efi-extras is &lt;2.12-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802518" version="1" comment="grub2-x86_64-efi-extras is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034147" version="1" comment="grub2-x86_64-xen is &lt;2.12-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153181" version="1" comment="grub2-x86_64-xen is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034148" version="1" comment="grub2-x86_64-xen-debug is &lt;2.12-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964903" version="1" comment="grub2-x86_64-xen-debug is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034149" version="1" comment="grub2-x86_64-xen-extras is &lt;2.12-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009802519" version="1" comment="grub2-x86_64-xen-extras is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008810" version="1" comment="kernel-livepatch-6_4_0-150600_23_33-default is &gt;=8-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970650" version="1" comment="kernel-livepatch-6_4_0-150600_23_22-default is &gt;=7-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970651" version="1" comment="kernel-livepatch-6_4_0-150600_23_25-default is &gt;=6-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970652" version="1" comment="kernel-livepatch-6_4_0-150600_23_30-default is &gt;=3-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009970653" version="1" comment="kernel-livepatch-6_4_0-150600_23_33-default is &gt;=3-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986634" version="1" comment="kernel-livepatch-5_14_21-150400_24_153-default is &gt;=2-150400.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170606"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986635" version="1" comment="kernel-default is &lt;5.14.21-150400.24.153.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235399"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986284" version="1" comment="kernel-livepatch-5_14_21-150500_55_97-default is &gt;=2-150500.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986734" version="1" comment="kernel-livepatch-6_4_0-150600_23_30-default is &gt;=6-150600.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986735" version="1" comment="kernel-livepatch-6_4_0-150600_23_33-default is &gt;=6-150600.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986737" version="1" comment="kernel-livepatch-6_4_0-150600_23_38-default is &gt;=2-150600.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009986739" version="1" comment="kernel-livepatch-6_4_0-150600_23_42-default is &gt;=2-150600.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019723" version="1" comment="kernel-default is &lt;5.14.21-150400.24.173.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041421" version="1" comment="cross-aarch64-glibc-devel is &lt;2.40-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041605" version="1" comment="cross-aarch64-glibc-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041422" version="1" comment="cross-ppc64le-glibc-devel is &lt;2.40-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041606" version="1" comment="cross-ppc64le-glibc-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041423" version="1" comment="cross-riscv64-glibc-devel is &lt;2.40-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041607" version="1" comment="cross-riscv64-glibc-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071720"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041424" version="1" comment="cross-s390x-glibc-devel is &lt;2.40-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041608" version="1" comment="cross-s390x-glibc-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071721"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041425" version="1" comment="glibc is &lt;2.40-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151368" version="1" comment="glibc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031926"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041426" version="1" comment="glibc-devel is &lt;2.40-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151370" version="1" comment="glibc-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041427" version="1" comment="glibc-devel-static is &lt;2.40-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152567" version="1" comment="glibc-devel-static is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036782"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041428" version="1" comment="glibc-extra is &lt;2.40-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151371" version="1" comment="glibc-extra is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037325"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041429" version="1" comment="glibc-gconv-modules-extra is &lt;2.40-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041609" version="1" comment="glibc-gconv-modules-extra is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069263"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041430" version="1" comment="glibc-html is &lt;2.40-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152569" version="1" comment="glibc-html is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032391"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041431" version="1" comment="glibc-i18ndata is &lt;2.40-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152570" version="1" comment="glibc-i18ndata is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032392"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041432" version="1" comment="glibc-info is &lt;2.40-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151372" version="1" comment="glibc-info is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032393"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041433" version="1" comment="glibc-lang is &lt;2.40-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247100"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009651309" version="1" comment="glibc-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052234"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041434" version="1" comment="glibc-locale is &lt;2.40-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151373" version="1" comment="glibc-locale is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031925"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041435" version="1" comment="glibc-locale-base is &lt;2.40-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251612" version="1" comment="glibc-locale-base is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041436" version="1" comment="glibc-profile is &lt;2.40-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152572" version="1" comment="glibc-profile is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041437" version="1" comment="glibc-utils is &lt;2.40-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247101"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152575" version="1" comment="glibc-utils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036787"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033339" version="1" comment="binutils is &lt;2.45-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152512" version="1" comment="binutils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033340" version="1" comment="binutils-devel is &lt;2.45-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152513" version="1" comment="binutils-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038395"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033444" version="1" comment="bpftool is &lt;7.5.0-160000.2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009955992" version="1" comment="bpftool is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049702"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033445" version="1" comment="bpftool-bash-completion is &lt;7.5.0-160000.2.3 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033375" version="1" comment="bpftool-bash-completion is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033343" version="1" comment="cross-aarch64-binutils is &lt;2.45-160000.1.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245530"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167594" version="1" comment="cross-aarch64-binutils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033344" version="1" comment="cross-arm-binutils is &lt;2.45-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167596" version="1" comment="cross-arm-binutils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033345" version="1" comment="cross-avr-binutils is &lt;2.45-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167598" version="1" comment="cross-avr-binutils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033346" version="1" comment="cross-bpf-binutils is &lt;2.45-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029579" version="1" comment="cross-bpf-binutils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071230"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033347" version="1" comment="cross-epiphany-binutils is &lt;2.45-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238034" version="1" comment="cross-epiphany-binutils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033348" version="1" comment="cross-hppa-binutils is &lt;2.45-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167600" version="1" comment="cross-hppa-binutils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033349" version="1" comment="cross-hppa64-binutils is &lt;2.45-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167602" version="1" comment="cross-hppa64-binutils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033350" version="1" comment="cross-i386-binutils is &lt;2.45-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167604" version="1" comment="cross-i386-binutils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033351" version="1" comment="cross-ia64-binutils is &lt;2.45-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167606" version="1" comment="cross-ia64-binutils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033352" version="1" comment="cross-loongarch64-binutils is &lt;2.45-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033376" version="1" comment="cross-loongarch64-binutils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071387"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033353" version="1" comment="cross-m68k-binutils is &lt;2.45-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167608" version="1" comment="cross-m68k-binutils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033354" version="1" comment="cross-mips-binutils is &lt;2.45-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167610" version="1" comment="cross-mips-binutils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033355" version="1" comment="cross-ppc-binutils is &lt;2.45-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167612" version="1" comment="cross-ppc-binutils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033356" version="1" comment="cross-ppc64-binutils is &lt;2.45-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167614" version="1" comment="cross-ppc64-binutils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033357" version="1" comment="cross-ppc64le-binutils is &lt;2.45-160000.1.1 for aarch64,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245531"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167616" version="1" comment="cross-ppc64le-binutils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033358" version="1" comment="cross-pru-binutils is &lt;2.45-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010029580" version="1" comment="cross-pru-binutils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033359" version="1" comment="cross-riscv64-binutils is &lt;2.45-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238035" version="1" comment="cross-riscv64-binutils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033360" version="1" comment="cross-rx-binutils is &lt;2.45-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238036" version="1" comment="cross-rx-binutils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033361" version="1" comment="cross-s390-binutils is &lt;2.45-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167618" version="1" comment="cross-s390-binutils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033362" version="1" comment="cross-s390x-binutils is &lt;2.45-160000.1.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245532"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167620" version="1" comment="cross-s390x-binutils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033363" version="1" comment="cross-sparc-binutils is &lt;2.45-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167622" version="1" comment="cross-sparc-binutils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033364" version="1" comment="cross-sparc64-binutils is &lt;2.45-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167624" version="1" comment="cross-sparc64-binutils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033365" version="1" comment="cross-spu-binutils is &lt;2.45-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167626" version="1" comment="cross-spu-binutils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033366" version="1" comment="cross-x86_64-binutils is &lt;2.45-160000.1.1 for aarch64,ppc64le,s390x" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245533"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009167628" version="1" comment="cross-x86_64-binutils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033367" version="1" comment="cross-xtensa-binutils is &lt;2.45-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009297932" version="1" comment="cross-xtensa-binutils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033368" version="1" comment="gprofng is &lt;2.45-160000.1.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245534"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033377" version="1" comment="gprofng is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033369" version="1" comment="libctf-nobfd0 is &lt;2.45-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009297779" version="1" comment="libctf-nobfd0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033370" version="1" comment="libctf0 is &lt;2.45-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245528"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009297780" version="1" comment="libctf0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049345"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031702" version="1" comment="curl is &lt;8.14.1-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151177" version="1" comment="curl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031703" version="1" comment="curl-fish-completion is &lt;8.14.1-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031781" version="1" comment="curl-fish-completion is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031704" version="1" comment="curl-zsh-completion is &lt;8.14.1-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031782" version="1" comment="curl-zsh-completion is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031705" version="1" comment="libcurl-devel is &lt;8.14.1-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151178" version="1" comment="libcurl-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031706" version="1" comment="libcurl-devel-doc is &lt;8.14.1-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245196"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031783" version="1" comment="libcurl-devel-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031707" version="1" comment="libcurl4 is &lt;8.14.1-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245195"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151179" version="1" comment="libcurl4 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030508" version="1" comment="ctdb is &lt;4.22.5+git.431.dc5a539f124-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152996" version="1" comment="ctdb is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030509" version="1" comment="ctdb-pcp-pmda is &lt;4.22.5+git.431.dc5a539f124-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009233089" version="1" comment="ctdb-pcp-pmda is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030510" version="1" comment="ldb-tools is &lt;4.22.5+git.431.dc5a539f124-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152723" version="1" comment="ldb-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030511" version="1" comment="libldb-devel is &lt;4.22.5+git.431.dc5a539f124-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152732" version="1" comment="libldb-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030512" version="1" comment="libldb2 is &lt;4.22.5+git.431.dc5a539f124-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009291435" version="1" comment="libldb2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030513" version="1" comment="python3-ldb is &lt;4.22.5+git.431.dc5a539f124-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009247520" version="1" comment="python3-ldb is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042688"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030514" version="1" comment="samba is &lt;4.22.5+git.431.dc5a539f124-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151301" version="1" comment="samba is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030515" version="1" comment="samba-ad-dc is &lt;4.22.5+git.431.dc5a539f124-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266821" version="1" comment="samba-ad-dc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047526"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030516" version="1" comment="samba-ad-dc-libs is &lt;4.22.5+git.431.dc5a539f124-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666845" version="1" comment="samba-ad-dc-libs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059226"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030517" version="1" comment="samba-ceph is &lt;4.22.5+git.431.dc5a539f124-160000.1.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244971"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009162650" version="1" comment="samba-ceph is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030518" version="1" comment="samba-client is &lt;4.22.5+git.431.dc5a539f124-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151303" version="1" comment="samba-client is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030519" version="1" comment="samba-client-libs is &lt;4.22.5+git.431.dc5a539f124-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666847" version="1" comment="samba-client-libs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059228"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030520" version="1" comment="samba-dcerpc is &lt;4.22.5+git.431.dc5a539f124-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010021989" version="1" comment="samba-dcerpc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030521" version="1" comment="samba-devel is &lt;4.22.5+git.431.dc5a539f124-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666849" version="1" comment="samba-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030522" version="1" comment="samba-doc is &lt;4.22.5+git.431.dc5a539f124-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151305" version="1" comment="samba-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030523" version="1" comment="samba-dsdb-modules is &lt;4.22.5+git.431.dc5a539f124-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177163" version="1" comment="samba-dsdb-modules is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030524" version="1" comment="samba-gpupdate is &lt;4.22.5+git.431.dc5a539f124-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655385" version="1" comment="samba-gpupdate is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030525" version="1" comment="samba-ldb-ldap is &lt;4.22.5+git.431.dc5a539f124-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009655386" version="1" comment="samba-ldb-ldap is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030526" version="1" comment="samba-libs is &lt;4.22.5+git.431.dc5a539f124-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151306" version="1" comment="samba-libs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030527" version="1" comment="samba-libs-python3 is &lt;4.22.5+git.431.dc5a539f124-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266825" version="1" comment="samba-libs-python3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030528" version="1" comment="samba-python3 is &lt;4.22.5+git.431.dc5a539f124-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266827" version="1" comment="samba-python3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030529" version="1" comment="samba-test is &lt;4.22.5+git.431.dc5a539f124-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152778" version="1" comment="samba-test is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030530" version="1" comment="samba-tool is &lt;4.22.5+git.431.dc5a539f124-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666851" version="1" comment="samba-tool is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030531" version="1" comment="samba-winbind is &lt;4.22.5+git.431.dc5a539f124-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151308" version="1" comment="samba-winbind is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030532" version="1" comment="samba-winbind-libs is &lt;4.22.5+git.431.dc5a539f124-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244970"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009666852" version="1" comment="samba-winbind-libs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059231"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030561" version="1" comment="MozillaFirefox is &lt;140.5.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151161" version="1" comment="MozillaFirefox is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030562" version="1" comment="MozillaFirefox-branding-upstream is &lt;140.5.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152806" version="1" comment="MozillaFirefox-branding-upstream is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030563" version="1" comment="MozillaFirefox-devel is &lt;140.5.0-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152808" version="1" comment="MozillaFirefox-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030564" version="1" comment="MozillaFirefox-translations-common is &lt;140.5.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151162" version="1" comment="MozillaFirefox-translations-common is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030565" version="1" comment="MozillaFirefox-translations-other is &lt;140.5.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244981"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152809" version="1" comment="MozillaFirefox-translations-other is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025469" version="1" comment="MozillaThunderbird is &lt;140.3.0-bp160.1.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151180" version="1" comment="MozillaThunderbird is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025470" version="1" comment="MozillaThunderbird-openpgp-librnp is &lt;140.3.0-bp160.1.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025480" version="1" comment="MozillaThunderbird-openpgp-librnp is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025471" version="1" comment="MozillaThunderbird-translations-common is &lt;140.3.0-bp160.1.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151181" version="1" comment="MozillaThunderbird-translations-common is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025472" version="1" comment="MozillaThunderbird-translations-other is &lt;140.3.0-bp160.1.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243974"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152805" version="1" comment="MozillaThunderbird-translations-other is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033436" version="1" comment="keylime-config is &lt;7.13.0+40-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704319" version="1" comment="keylime-config is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033437" version="1" comment="keylime-firewalld is &lt;7.13.0+40-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704320" version="1" comment="keylime-firewalld is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033438" version="1" comment="keylime-logrotate is &lt;7.13.0+40-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777628" version="1" comment="keylime-logrotate is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033439" version="1" comment="keylime-registrar is &lt;7.13.0+40-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704321" version="1" comment="keylime-registrar is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033440" version="1" comment="keylime-tenant is &lt;7.13.0+40-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033448" version="1" comment="keylime-tenant is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033441" version="1" comment="keylime-tpm_cert_store is &lt;7.13.0+40-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704322" version="1" comment="keylime-tpm_cert_store is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033442" version="1" comment="keylime-verifier is &lt;7.13.0+40-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704323" version="1" comment="keylime-verifier is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033443" version="1" comment="python313-keylime is &lt;7.13.0+40-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245549"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033449" version="1" comment="python313-keylime is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024375" version="1" comment="chromedriver is &lt;141.0.7390.76-bp160.1.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152651" version="1" comment="chromedriver is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024376" version="1" comment="chromium is &lt;141.0.7390.76-bp160.1.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243664"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152652" version="1" comment="chromium is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047326" version="1" comment="libexslt0 is &lt;1.1.43-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030589" version="1" comment="libexslt0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047327" version="1" comment="libxml2-2 is &lt;2.13.8-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151137" version="1" comment="libxml2-2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047328" version="1" comment="libxml2-devel is &lt;2.13.8-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151139" version="1" comment="libxml2-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047329" version="1" comment="libxml2-doc is &lt;2.13.8-160000.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248378"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152664" version="1" comment="libxml2-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047330" version="1" comment="libxml2-tools is &lt;2.13.8-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151140" version="1" comment="libxml2-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047331" version="1" comment="libxslt-devel is &lt;1.1.43-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155744" version="1" comment="libxslt-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047332" version="1" comment="libxslt-tools is &lt;1.1.43-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155747" version="1" comment="libxslt-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047333" version="1" comment="libxslt1 is &lt;1.1.43-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248376"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155748" version="1" comment="libxslt1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047334" version="1" comment="python313-libxml2 is &lt;2.13.8-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248377"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042235" version="1" comment="python313-libxml2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037896" version="1" comment="gimp is &lt;3.0.6-bp160.1.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151540" version="1" comment="gimp is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037897" version="1" comment="gimp-devel is &lt;3.0.6-bp160.1.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153688" version="1" comment="gimp-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037898" version="1" comment="gimp-extension-goat-excercises is &lt;3.0.6-bp160.1.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037906" version="1" comment="gimp-extension-goat-excercises is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037899" version="1" comment="gimp-lang is &lt;3.0.6-bp160.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151542" version="1" comment="gimp-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037900" version="1" comment="gimp-plugin-aa is &lt;3.0.6-bp160.1.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151543" version="1" comment="gimp-plugin-aa is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037901" version="1" comment="gimp-plugin-python3 is &lt;3.0.6-bp160.1.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037907" version="1" comment="gimp-plugin-python3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037902" version="1" comment="gimp-vala is &lt;3.0.6-bp160.1.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037908" version="1" comment="gimp-vala is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037903" version="1" comment="libgimp-3_0-0 is &lt;3.0.6-bp160.1.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037909" version="1" comment="libgimp-3_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037904" version="1" comment="libgimpui-3_0-0 is &lt;3.0.6-bp160.1.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037910" version="1" comment="libgimpui-3_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041474" version="1" comment="libsoup-3_0-0 is &lt;3.6.5-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698059" version="1" comment="libsoup-3_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041475" version="1" comment="libsoup-devel is &lt;3.6.5-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151597" version="1" comment="libsoup-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041476" version="1" comment="libsoup-lang is &lt;3.6.5-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247114"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151598" version="1" comment="libsoup-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041477" version="1" comment="typelib-1_0-Soup-3_0 is &lt;3.6.5-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247113"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698061" version="1" comment="typelib-1_0-Soup-3_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030578" version="1" comment="alloy is &lt;1.11.3-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030590" version="1" comment="alloy is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050183" version="1" comment="cosign is &lt;3.0.5-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249021"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707674" version="1" comment="cosign is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050184" version="1" comment="cosign-bash-completion is &lt;3.0.5-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050218" version="1" comment="cosign-bash-completion is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069408"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050185" version="1" comment="cosign-fish-completion is &lt;3.0.5-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050219" version="1" comment="cosign-fish-completion is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050186" version="1" comment="cosign-zsh-completion is &lt;3.0.5-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249022"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050220" version="1" comment="cosign-zsh-completion is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041595" version="1" comment="libopenssl-3-devel is &lt;3.5.0-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700693" version="1" comment="libopenssl-3-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041596" version="1" comment="libopenssl-3-fips-provider is &lt;3.5.0-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009868077" version="1" comment="libopenssl-3-fips-provider is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041597" version="1" comment="libopenssl-3-fips-provider-x86-64-v3 is &lt;3.5.0-160000.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034160" version="1" comment="libopenssl-3-fips-provider-x86-64-v3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041598" version="1" comment="libopenssl3 is &lt;3.5.0-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700695" version="1" comment="libopenssl3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041599" version="1" comment="libopenssl3-x86-64-v3 is &lt;3.5.0-160000.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247133"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034161" version="1" comment="libopenssl3-x86-64-v3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041600" version="1" comment="openssl-3 is &lt;3.5.0-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247132"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700697" version="1" comment="openssl-3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041601" version="1" comment="openssl-3-doc is &lt;3.5.0-160000.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247134"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700698" version="1" comment="openssl-3-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037726" version="1" comment="haproxy is &lt;3.2.0+git0.e134140d2-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246396"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238038" version="1" comment="haproxy is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052662" version="1" comment="kea is &lt;3.0.3-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048437" version="1" comment="kea is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052663" version="1" comment="kea-devel is &lt;3.0.3-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048438" version="1" comment="kea-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052664" version="1" comment="kea-doc is &lt;3.0.3-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249590"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048439" version="1" comment="kea-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052665" version="1" comment="kea-hooks is &lt;3.0.3-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048440" version="1" comment="kea-hooks is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052666" version="1" comment="libkea-asiodns62 is &lt;3.0.3-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048441" version="1" comment="libkea-asiodns62 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052667" version="1" comment="libkea-asiolink88 is &lt;3.0.3-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048442" version="1" comment="libkea-asiolink88 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052668" version="1" comment="libkea-cc83 is &lt;3.0.3-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052699" version="1" comment="libkea-cc83 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072000"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052669" version="1" comment="libkea-cfgrpt3 is &lt;3.0.3-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048444" version="1" comment="libkea-cfgrpt3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052670" version="1" comment="libkea-config84 is &lt;3.0.3-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052700" version="1" comment="libkea-config84 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072001"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052671" version="1" comment="libkea-cryptolink64 is &lt;3.0.3-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048446" version="1" comment="libkea-cryptolink64 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052672" version="1" comment="libkea-d2srv63 is &lt;3.0.3-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048447" version="1" comment="libkea-d2srv63 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052673" version="1" comment="libkea-database76 is &lt;3.0.3-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048448" version="1" comment="libkea-database76 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052674" version="1" comment="libkea-dhcp109 is &lt;3.0.3-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048449" version="1" comment="libkea-dhcp109 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052675" version="1" comment="libkea-dhcp_ddns68 is &lt;3.0.3-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048450" version="1" comment="libkea-dhcp_ddns68 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052676" version="1" comment="libkea-dhcpsrv131 is &lt;3.0.3-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052701" version="1" comment="libkea-dhcpsrv131 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052677" version="1" comment="libkea-dns71 is &lt;3.0.3-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048452" version="1" comment="libkea-dns71 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052678" version="1" comment="libkea-eval84 is &lt;3.0.3-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048453" version="1" comment="libkea-eval84 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052679" version="1" comment="libkea-exceptions45 is &lt;3.0.3-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048454" version="1" comment="libkea-exceptions45 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052680" version="1" comment="libkea-hooks121 is &lt;3.0.3-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052702" version="1" comment="libkea-hooks121 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072002"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052681" version="1" comment="libkea-http87 is &lt;3.0.3-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048456" version="1" comment="libkea-http87 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052682" version="1" comment="libkea-log-interprocess3 is &lt;3.0.3-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048457" version="1" comment="libkea-log-interprocess3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052683" version="1" comment="libkea-log75 is &lt;3.0.3-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048458" version="1" comment="libkea-log75 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052684" version="1" comment="libkea-mysql88 is &lt;3.0.3-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048459" version="1" comment="libkea-mysql88 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052685" version="1" comment="libkea-pgsql88 is &lt;3.0.3-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048460" version="1" comment="libkea-pgsql88 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052686" version="1" comment="libkea-process91 is &lt;3.0.3-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052703" version="1" comment="libkea-process91 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052687" version="1" comment="libkea-stats53 is &lt;3.0.3-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048462" version="1" comment="libkea-stats53 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052688" version="1" comment="libkea-tcp33 is &lt;3.0.3-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048463" version="1" comment="libkea-tcp33 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052689" version="1" comment="libkea-util-io12 is &lt;3.0.3-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048464" version="1" comment="libkea-util-io12 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052690" version="1" comment="libkea-util102 is &lt;3.0.3-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052704" version="1" comment="libkea-util102 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052691" version="1" comment="python3-kea is &lt;3.0.3-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249589"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048466" version="1" comment="python3-kea is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034877" version="1" comment="qemu is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151104" version="1" comment="qemu is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034878" version="1" comment="qemu-SLOF is &lt;10.0.7-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009676699" version="1" comment="qemu-SLOF is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035029" version="1" comment="qemu-accel-qtest is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700691" version="1" comment="qemu-accel-qtest is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035030" version="1" comment="qemu-arm is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151105" version="1" comment="qemu-arm is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035031" version="1" comment="qemu-audio-alsa is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266837" version="1" comment="qemu-audio-alsa is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035032" version="1" comment="qemu-audio-dbus is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775936" version="1" comment="qemu-audio-dbus is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035033" version="1" comment="qemu-audio-jack is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700692" version="1" comment="qemu-audio-jack is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035034" version="1" comment="qemu-audio-oss is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266838" version="1" comment="qemu-audio-oss is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035035" version="1" comment="qemu-audio-pa is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266839" version="1" comment="qemu-audio-pa is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035036" version="1" comment="qemu-audio-pipewire is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881182" version="1" comment="qemu-audio-pipewire is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034880" version="1" comment="qemu-audio-spice is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623393" version="1" comment="qemu-audio-spice is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035037" version="1" comment="qemu-block-curl is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151106" version="1" comment="qemu-block-curl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035038" version="1" comment="qemu-block-dmg is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154081" version="1" comment="qemu-block-dmg is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034881" version="1" comment="qemu-block-iscsi is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154082" version="1" comment="qemu-block-iscsi is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035039" version="1" comment="qemu-block-nfs is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266841" version="1" comment="qemu-block-nfs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035040" version="1" comment="qemu-block-rbd is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151107" version="1" comment="qemu-block-rbd is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034882" version="1" comment="qemu-block-ssh is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154083" version="1" comment="qemu-block-ssh is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035041" version="1" comment="qemu-chardev-baum is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623394" version="1" comment="qemu-chardev-baum is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034883" version="1" comment="qemu-chardev-spice is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623395" version="1" comment="qemu-chardev-spice is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035042" version="1" comment="qemu-doc is &lt;10.0.7-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881183" version="1" comment="qemu-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035043" version="1" comment="qemu-extra is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151108" version="1" comment="qemu-extra is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034884" version="1" comment="qemu-guest-agent is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153019" version="1" comment="qemu-guest-agent is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035044" version="1" comment="qemu-headless is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881184" version="1" comment="qemu-headless is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034885" version="1" comment="qemu-hw-display-qxl is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623396" version="1" comment="qemu-hw-display-qxl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034886" version="1" comment="qemu-hw-display-virtio-gpu is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623397" version="1" comment="qemu-hw-display-virtio-gpu is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034887" version="1" comment="qemu-hw-display-virtio-gpu-pci is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623398" version="1" comment="qemu-hw-display-virtio-gpu-pci is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034888" version="1" comment="qemu-hw-display-virtio-vga is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623399" version="1" comment="qemu-hw-display-virtio-vga is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035045" version="1" comment="qemu-hw-s390x-virtio-gpu-ccw is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623400" version="1" comment="qemu-hw-s390x-virtio-gpu-ccw is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034890" version="1" comment="qemu-hw-usb-host is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698021" version="1" comment="qemu-hw-usb-host is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034891" version="1" comment="qemu-hw-usb-redirect is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623401" version="1" comment="qemu-hw-usb-redirect is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035046" version="1" comment="qemu-hw-usb-smartcard is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623402" version="1" comment="qemu-hw-usb-smartcard is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034892" version="1" comment="qemu-img is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881185" version="1" comment="qemu-img is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034893" version="1" comment="qemu-ipxe is &lt;10.0.7-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151109" version="1" comment="qemu-ipxe is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035047" version="1" comment="qemu-ivshmem-tools is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623403" version="1" comment="qemu-ivshmem-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034894" version="1" comment="qemu-ksm is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161270" version="1" comment="qemu-ksm is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034895" version="1" comment="qemu-lang is &lt;10.0.7-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151111" version="1" comment="qemu-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035048" version="1" comment="qemu-linux-user is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151112" version="1" comment="qemu-linux-user is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035049" version="1" comment="qemu-microvm is &lt;10.0.7-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009291440" version="1" comment="qemu-microvm is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035050" version="1" comment="qemu-ppc is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151113" version="1" comment="qemu-ppc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034897" version="1" comment="qemu-pr-helper is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881186" version="1" comment="qemu-pr-helper is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035051" version="1" comment="qemu-s390x is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623404" version="1" comment="qemu-s390x is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034899" version="1" comment="qemu-seabios is &lt;10.0.71.16.3_3_g3d33c746-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151115" version="1" comment="qemu-seabios is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035052" version="1" comment="qemu-skiboot is &lt;10.0.7-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623405" version="1" comment="qemu-skiboot is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035053" version="1" comment="qemu-spice is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009881187" version="1" comment="qemu-spice is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034900" version="1" comment="qemu-tools is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151117" version="1" comment="qemu-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035054" version="1" comment="qemu-ui-curses is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266842" version="1" comment="qemu-ui-curses is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035055" version="1" comment="qemu-ui-dbus is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009775937" version="1" comment="qemu-ui-dbus is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035056" version="1" comment="qemu-ui-gtk is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266843" version="1" comment="qemu-ui-gtk is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034901" version="1" comment="qemu-ui-opengl is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623406" version="1" comment="qemu-ui-opengl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035057" version="1" comment="qemu-ui-spice-app is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009291441" version="1" comment="qemu-ui-spice-app is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034902" version="1" comment="qemu-ui-spice-core is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623407" version="1" comment="qemu-ui-spice-core is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034903" version="1" comment="qemu-vgabios is &lt;10.0.71.16.3_3_g3d33c746-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151118" version="1" comment="qemu-vgabios is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035058" version="1" comment="qemu-vhost-user-gpu is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009291442" version="1" comment="qemu-vhost-user-gpu is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034904" version="1" comment="qemu-vmsr-helper is &lt;10.0.7-160000.1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035142" version="1" comment="qemu-vmsr-helper is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035059" version="1" comment="qemu-x86 is &lt;10.0.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245810"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151119" version="1" comment="qemu-x86 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041456" version="1" comment="libunbound8 is &lt;1.24.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009864081" version="1" comment="libunbound8 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053458"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041457" version="1" comment="python3-unbound is &lt;1.24.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041610" version="1" comment="python3-unbound is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041458" version="1" comment="unbound is &lt;1.24.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009286673" version="1" comment="unbound is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041459" version="1" comment="unbound-anchor is &lt;1.24.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177205" version="1" comment="unbound-anchor is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041460" version="1" comment="unbound-devel is &lt;1.24.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247108"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009286674" version="1" comment="unbound-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033167"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041461" version="1" comment="unbound-munin is &lt;1.24.1-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247109"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009286675" version="1" comment="unbound-munin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044584" version="1" comment="libpython3_13-1_0 is &lt;3.13.12-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039739" version="1" comment="libpython3_13-1_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044585" version="1" comment="libpython3_13-1_0-x86-64-v3 is &lt;3.13.12-160000.1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039740" version="1" comment="libpython3_13-1_0-x86-64-v3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044586" version="1" comment="libpython3_13t1_0 is &lt;3.13.12-160000.1.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039741" version="1" comment="libpython3_13t1_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044587" version="1" comment="python313 is &lt;3.13.12-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039742" version="1" comment="python313 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044588" version="1" comment="python313-base is &lt;3.13.12-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039743" version="1" comment="python313-base is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044589" version="1" comment="python313-base-x86-64-v3 is &lt;3.13.12-160000.1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039744" version="1" comment="python313-base-x86-64-v3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044590" version="1" comment="python313-curses is &lt;3.13.12-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039745" version="1" comment="python313-curses is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044591" version="1" comment="python313-dbm is &lt;3.13.12-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039746" version="1" comment="python313-dbm is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044592" version="1" comment="python313-devel is &lt;3.13.12-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039747" version="1" comment="python313-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044593" version="1" comment="python313-doc is &lt;3.13.12-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039748" version="1" comment="python313-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044594" version="1" comment="python313-doc-devhelp is &lt;3.13.12-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039749" version="1" comment="python313-doc-devhelp is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044595" version="1" comment="python313-idle is &lt;3.13.12-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039750" version="1" comment="python313-idle is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044596" version="1" comment="python313-nogil is &lt;3.13.12-160000.1.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039751" version="1" comment="python313-nogil is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044597" version="1" comment="python313-nogil-base is &lt;3.13.12-160000.1.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039752" version="1" comment="python313-nogil-base is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044598" version="1" comment="python313-nogil-curses is &lt;3.13.12-160000.1.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039753" version="1" comment="python313-nogil-curses is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044599" version="1" comment="python313-nogil-dbm is &lt;3.13.12-160000.1.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039754" version="1" comment="python313-nogil-dbm is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044600" version="1" comment="python313-nogil-devel is &lt;3.13.12-160000.1.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039755" version="1" comment="python313-nogil-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044601" version="1" comment="python313-nogil-idle is &lt;3.13.12-160000.1.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039756" version="1" comment="python313-nogil-idle is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044602" version="1" comment="python313-nogil-testsuite is &lt;3.13.12-160000.1.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039757" version="1" comment="python313-nogil-testsuite is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044603" version="1" comment="python313-nogil-tk is &lt;3.13.12-160000.1.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039758" version="1" comment="python313-nogil-tk is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044604" version="1" comment="python313-nogil-tools is &lt;3.13.12-160000.1.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247815"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039759" version="1" comment="python313-nogil-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044605" version="1" comment="python313-testsuite is &lt;3.13.12-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039760" version="1" comment="python313-testsuite is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044606" version="1" comment="python313-tk is &lt;3.13.12-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039761" version="1" comment="python313-tk is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044607" version="1" comment="python313-tools is &lt;3.13.12-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247813"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039762" version="1" comment="python313-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044608" version="1" comment="python313-x86-64-v3 is &lt;3.13.12-160000.1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247814"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039763" version="1" comment="python313-x86-64-v3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035629" version="1" comment="libipa_hbac-devel is &lt;2.9.5-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152068" version="1" comment="libipa_hbac-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035630" version="1" comment="libipa_hbac0 is &lt;2.9.5-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152069" version="1" comment="libipa_hbac0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035631" version="1" comment="libnfsidmap-sss is &lt;2.9.5-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231788" version="1" comment="libnfsidmap-sss is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038187"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035632" version="1" comment="libsss_certmap-devel is &lt;2.9.5-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231789" version="1" comment="libsss_certmap-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042685"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035633" version="1" comment="libsss_certmap0 is &lt;2.9.5-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231790" version="1" comment="libsss_certmap0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042686"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035634" version="1" comment="libsss_idmap-devel is &lt;2.9.5-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152070" version="1" comment="libsss_idmap-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036553"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035635" version="1" comment="libsss_idmap0 is &lt;2.9.5-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151530" version="1" comment="libsss_idmap0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035636" version="1" comment="libsss_nss_idmap-devel is &lt;2.9.5-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152071" version="1" comment="libsss_nss_idmap-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038188"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035637" version="1" comment="libsss_nss_idmap0 is &lt;2.9.5-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152072" version="1" comment="libsss_nss_idmap0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038189"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035638" version="1" comment="python3-ipa_hbac is &lt;2.9.5-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231793" version="1" comment="python3-ipa_hbac is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035639" version="1" comment="python3-sss-murmur is &lt;2.9.5-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231794" version="1" comment="python3-sss-murmur is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035640" version="1" comment="python3-sss_nss_idmap is &lt;2.9.5-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231795" version="1" comment="python3-sss_nss_idmap is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035641" version="1" comment="python3-sssd-config is &lt;2.9.5-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231796" version="1" comment="python3-sssd-config is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042687"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035642" version="1" comment="sssd is &lt;2.9.5-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151531" version="1" comment="sssd is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035643" version="1" comment="sssd-ad is &lt;2.9.5-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152077" version="1" comment="sssd-ad is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035644" version="1" comment="sssd-cifs-idmap-plugin is &lt;2.9.5-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035673" version="1" comment="sssd-cifs-idmap-plugin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035645" version="1" comment="sssd-dbus is &lt;2.9.5-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231797" version="1" comment="sssd-dbus is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035646" version="1" comment="sssd-ipa is &lt;2.9.5-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152078" version="1" comment="sssd-ipa is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035647" version="1" comment="sssd-kcm is &lt;2.9.5-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706576" version="1" comment="sssd-kcm is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035648" version="1" comment="sssd-krb5 is &lt;2.9.5-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152079" version="1" comment="sssd-krb5 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038196"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035649" version="1" comment="sssd-krb5-common is &lt;2.9.5-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151533" version="1" comment="sssd-krb5-common is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035650" version="1" comment="sssd-ldap is &lt;2.9.5-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151534" version="1" comment="sssd-ldap is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035651" version="1" comment="sssd-proxy is &lt;2.9.5-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152080" version="1" comment="sssd-proxy is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035652" version="1" comment="sssd-tools is &lt;2.9.5-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152081" version="1" comment="sssd-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035653" version="1" comment="sssd-winbind-idmap is &lt;2.9.5-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245993"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009231800" version="1" comment="sssd-winbind-idmap is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041589" version="1" comment="libwireshark18 is &lt;4.4.13-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041611" version="1" comment="libwireshark18 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041590" version="1" comment="libwiretap15 is &lt;4.4.13-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041612" version="1" comment="libwiretap15 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068338"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041591" version="1" comment="libwsutil16 is &lt;4.4.13-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041613" version="1" comment="libwsutil16 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041592" version="1" comment="wireshark is &lt;4.4.13-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151250" version="1" comment="wireshark is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031055"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041593" version="1" comment="wireshark-devel is &lt;4.4.13-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153033" version="1" comment="wireshark-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041594" version="1" comment="wireshark-ui-qt is &lt;4.4.13-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247131"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153034" version="1" comment="wireshark-ui-qt is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025476" version="1" comment="MozillaThunderbird is &lt;140.4.0-bp160.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025477" version="1" comment="MozillaThunderbird-openpgp-librnp is &lt;140.4.0-bp160.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025478" version="1" comment="MozillaThunderbird-translations-common is &lt;140.4.0-bp160.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025479" version="1" comment="MozillaThunderbird-translations-other is &lt;140.4.0-bp160.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030538" version="1" comment="libexslt0 is &lt;1.1.43-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030539" version="1" comment="libxslt-devel is &lt;1.1.43-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030842"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030540" version="1" comment="libxslt-tools is &lt;1.1.43-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035827"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030541" version="1" comment="libxslt1 is &lt;1.1.43-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035829"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024377" version="1" comment="chromedriver is &lt;141.0.7390.107-bp160.1.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024378" version="1" comment="chromium is &lt;141.0.7390.107-bp160.1.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050706" version="1" comment="libpoppler-cpp2 is &lt;25.04.0-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030591" version="1" comment="libpoppler-cpp2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050707" version="1" comment="libpoppler-devel is &lt;25.04.0-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151223" version="1" comment="libpoppler-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051757" version="1" comment="libpoppler-glib-devel is &lt;25.04.0-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153236" version="1" comment="libpoppler-glib-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050708" version="1" comment="libpoppler-glib8 is &lt;25.04.0-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151224" version="1" comment="libpoppler-glib8 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051758" version="1" comment="libpoppler-qt5-1 is &lt;25.04.0-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153238" version="1" comment="libpoppler-qt5-1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051759" version="1" comment="libpoppler-qt5-devel is &lt;25.04.0-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153239" version="1" comment="libpoppler-qt5-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050709" version="1" comment="libpoppler-qt6-3 is &lt;25.04.0-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742105" version="1" comment="libpoppler-qt6-3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050710" version="1" comment="libpoppler-qt6-devel is &lt;25.04.0-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742106" version="1" comment="libpoppler-qt6-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050711" version="1" comment="libpoppler148 is &lt;25.04.0-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030592" version="1" comment="libpoppler148 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050712" version="1" comment="poppler-tools is &lt;25.04.0-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151227" version="1" comment="poppler-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050713" version="1" comment="typelib-1_0-Poppler-0_18 is &lt;25.04.0-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249138"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153243" version="1" comment="typelib-1_0-Poppler-0_18 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039638" version="1" comment="libpcap-devel is &lt;1.10.5-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155206" version="1" comment="libpcap-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039639" version="1" comment="libpcap-devel-static is &lt;1.10.5-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155210" version="1" comment="libpcap-devel-static is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039640" version="1" comment="libpcap1 is &lt;1.10.5-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009155212" version="1" comment="libpcap1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024386" version="1" comment="chromedriver is &lt;141.0.7390.122-bp160.1.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024387" version="1" comment="chromium is &lt;141.0.7390.122-bp160.1.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243668"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039656" version="1" comment="libpython3_13-1_0 is &lt;3.13.11-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039657" version="1" comment="libpython3_13-1_0-x86-64-v3 is &lt;3.13.11-160000.1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039658" version="1" comment="libpython3_13t1_0 is &lt;3.13.11-160000.1.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071663"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039659" version="1" comment="python313 is &lt;3.13.11-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039660" version="1" comment="python313-base is &lt;3.13.11-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069767"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039661" version="1" comment="python313-base-x86-64-v3 is &lt;3.13.11-160000.1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071080"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039662" version="1" comment="python313-curses is &lt;3.13.11-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067815"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039663" version="1" comment="python313-dbm is &lt;3.13.11-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039664" version="1" comment="python313-devel is &lt;3.13.11-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039665" version="1" comment="python313-doc is &lt;3.13.11-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039666" version="1" comment="python313-doc-devhelp is &lt;3.13.11-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039667" version="1" comment="python313-idle is &lt;3.13.11-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039668" version="1" comment="python313-nogil is &lt;3.13.11-160000.1.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071664"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039669" version="1" comment="python313-nogil-base is &lt;3.13.11-160000.1.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039670" version="1" comment="python313-nogil-curses is &lt;3.13.11-160000.1.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039671" version="1" comment="python313-nogil-dbm is &lt;3.13.11-160000.1.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039672" version="1" comment="python313-nogil-devel is &lt;3.13.11-160000.1.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039673" version="1" comment="python313-nogil-idle is &lt;3.13.11-160000.1.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071669"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039674" version="1" comment="python313-nogil-testsuite is &lt;3.13.11-160000.1.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039675" version="1" comment="python313-nogil-tk is &lt;3.13.11-160000.1.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039676" version="1" comment="python313-nogil-tools is &lt;3.13.11-160000.1.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071672"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039677" version="1" comment="python313-testsuite is &lt;3.13.11-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071673"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039678" version="1" comment="python313-tk is &lt;3.13.11-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039679" version="1" comment="python313-tools is &lt;3.13.11-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069769"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039680" version="1" comment="python313-x86-64-v3 is &lt;3.13.11-160000.1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246747"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050015" version="1" comment="libsoup-3_0-0 is &lt;3.6.6-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050176" version="1" comment="libsoup-devel is &lt;3.6.6-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050177" version="1" comment="libsoup-lang is &lt;3.6.6-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249018"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050178" version="1" comment="typelib-1_0-Soup-3_0 is &lt;3.6.6-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050179" version="1" comment="libjxl-devel is &lt;0.11.2-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771646" version="1" comment="libjxl-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050180" version="1" comment="libjxl-tools is &lt;0.11.2-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009771647" version="1" comment="libjxl-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050181" version="1" comment="libjxl0_11 is &lt;0.11.2-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249019"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050221" version="1" comment="libjxl0_11 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050182" version="1" comment="libjxl0_11-x86-64-v3 is &lt;0.11.2-160000.1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249020"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050222" version="1" comment="libjxl0_11-x86-64-v3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033326" version="1" comment="libIex-3_2-31 is &lt;3.2.2-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030593" version="1" comment="libIex-3_2-31 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033327" version="1" comment="libIex-3_2-31-x86-64-v3 is &lt;3.2.2-160000.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030594" version="1" comment="libIex-3_2-31-x86-64-v3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033328" version="1" comment="libIlmThread-3_2-31 is &lt;3.2.2-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030595" version="1" comment="libIlmThread-3_2-31 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033329" version="1" comment="libIlmThread-3_2-31-x86-64-v3 is &lt;3.2.2-160000.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030596" version="1" comment="libIlmThread-3_2-31-x86-64-v3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033330" version="1" comment="libOpenEXR-3_2-31 is &lt;3.2.2-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030597" version="1" comment="libOpenEXR-3_2-31 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033331" version="1" comment="libOpenEXR-3_2-31-x86-64-v3 is &lt;3.2.2-160000.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030598" version="1" comment="libOpenEXR-3_2-31-x86-64-v3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033332" version="1" comment="libOpenEXRCore-3_2-31 is &lt;3.2.2-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030599" version="1" comment="libOpenEXRCore-3_2-31 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033333" version="1" comment="libOpenEXRCore-3_2-31-x86-64-v3 is &lt;3.2.2-160000.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030600" version="1" comment="libOpenEXRCore-3_2-31-x86-64-v3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033334" version="1" comment="libOpenEXRUtil-3_2-31 is &lt;3.2.2-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030601" version="1" comment="libOpenEXRUtil-3_2-31 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033335" version="1" comment="libOpenEXRUtil-3_2-31-x86-64-v3 is &lt;3.2.2-160000.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030602" version="1" comment="libOpenEXRUtil-3_2-31-x86-64-v3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033336" version="1" comment="openexr is &lt;3.2.2-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172752" version="1" comment="openexr is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033337" version="1" comment="openexr-devel is &lt;3.2.2-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245525"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151255" version="1" comment="openexr-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033338" version="1" comment="openexr-doc is &lt;3.2.2-160000.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245527"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172753" version="1" comment="openexr-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025474" version="1" comment="chromedriver is &lt;142.0.7444.59-bp160.1.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025475" version="1" comment="chromium is &lt;142.0.7444.59-bp160.1.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032043" version="1" comment="libvirt is &lt;11.4.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151423" version="1" comment="libvirt is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032044" version="1" comment="libvirt-client is &lt;11.4.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151424" version="1" comment="libvirt-client is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032045" version="1" comment="libvirt-client-qemu is &lt;11.4.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769741" version="1" comment="libvirt-client-qemu is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032046" version="1" comment="libvirt-daemon is &lt;11.4.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151425" version="1" comment="libvirt-daemon is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032047" version="1" comment="libvirt-daemon-common is &lt;11.4.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865252" version="1" comment="libvirt-daemon-common is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032048" version="1" comment="libvirt-daemon-config-network is &lt;11.4.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151426" version="1" comment="libvirt-daemon-config-network is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032049" version="1" comment="libvirt-daemon-config-nwfilter is &lt;11.4.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151427" version="1" comment="libvirt-daemon-config-nwfilter is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032050" version="1" comment="libvirt-daemon-driver-network is &lt;11.4.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151431" version="1" comment="libvirt-daemon-driver-network is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032051" version="1" comment="libvirt-daemon-driver-nodedev is &lt;11.4.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151432" version="1" comment="libvirt-daemon-driver-nodedev is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032052" version="1" comment="libvirt-daemon-driver-nwfilter is &lt;11.4.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151433" version="1" comment="libvirt-daemon-driver-nwfilter is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032053" version="1" comment="libvirt-daemon-driver-qemu is &lt;11.4.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151434" version="1" comment="libvirt-daemon-driver-qemu is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032054" version="1" comment="libvirt-daemon-driver-secret is &lt;11.4.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151435" version="1" comment="libvirt-daemon-driver-secret is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032055" version="1" comment="libvirt-daemon-driver-storage is &lt;11.4.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151436" version="1" comment="libvirt-daemon-driver-storage is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032056" version="1" comment="libvirt-daemon-driver-storage-core is &lt;11.4.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161274" version="1" comment="libvirt-daemon-driver-storage-core is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041752"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032057" version="1" comment="libvirt-daemon-driver-storage-disk is &lt;11.4.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161275" version="1" comment="libvirt-daemon-driver-storage-disk is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032058" version="1" comment="libvirt-daemon-driver-storage-iscsi is &lt;11.4.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161276" version="1" comment="libvirt-daemon-driver-storage-iscsi is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032059" version="1" comment="libvirt-daemon-driver-storage-iscsi-direct is &lt;11.4.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631621" version="1" comment="libvirt-daemon-driver-storage-iscsi-direct is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052211"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032060" version="1" comment="libvirt-daemon-driver-storage-logical is &lt;11.4.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161277" version="1" comment="libvirt-daemon-driver-storage-logical is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032061" version="1" comment="libvirt-daemon-driver-storage-mpath is &lt;11.4.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161278" version="1" comment="libvirt-daemon-driver-storage-mpath is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032062" version="1" comment="libvirt-daemon-driver-storage-scsi is &lt;11.4.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161280" version="1" comment="libvirt-daemon-driver-storage-scsi is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041758"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032063" version="1" comment="libvirt-daemon-hooks is &lt;11.4.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009170836" version="1" comment="libvirt-daemon-hooks is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032064" version="1" comment="libvirt-daemon-lock is &lt;11.4.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865253" version="1" comment="libvirt-daemon-lock is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062410"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032065" version="1" comment="libvirt-daemon-log is &lt;11.4.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865254" version="1" comment="libvirt-daemon-log is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062411"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032066" version="1" comment="libvirt-daemon-plugin-lockd is &lt;11.4.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865255" version="1" comment="libvirt-daemon-plugin-lockd is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032067" version="1" comment="libvirt-daemon-proxy is &lt;11.4.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865257" version="1" comment="libvirt-daemon-proxy is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032068" version="1" comment="libvirt-daemon-qemu is &lt;11.4.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151440" version="1" comment="libvirt-daemon-qemu is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032069" version="1" comment="libvirt-devel is &lt;11.4.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152991" version="1" comment="libvirt-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032070" version="1" comment="libvirt-doc is &lt;11.4.0-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152993" version="1" comment="libvirt-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032071" version="1" comment="libvirt-libs is &lt;11.4.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009161281" version="1" comment="libvirt-libs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041759"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032072" version="1" comment="libvirt-nss is &lt;11.4.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009166269" version="1" comment="libvirt-nss is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032073" version="1" comment="libvirt-ssh-proxy is &lt;11.4.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032117" version="1" comment="libvirt-ssh-proxy is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032074" version="1" comment="wireshark-plugin-libvirt is &lt;11.4.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009223340" version="1" comment="wireshark-plugin-libvirt is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042229" version="1" comment="golang-github-prometheus-prometheus is &lt;3.5.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247235"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009630838" version="1" comment="golang-github-prometheus-prometheus is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050151" version="1" comment="libecpg6 is &lt;18.1-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151069" version="1" comment="libecpg6 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050152" version="1" comment="libpq5 is &lt;18.1-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151071" version="1" comment="libpq5 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041369" version="1" comment="postgresql is &lt;18-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177236" version="1" comment="postgresql is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030474"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041370" version="1" comment="postgresql-contrib is &lt;18-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009289717" version="1" comment="postgresql-contrib is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041371" version="1" comment="postgresql-devel is &lt;18-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009289718" version="1" comment="postgresql-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030469"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041372" version="1" comment="postgresql-docs is &lt;18-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009289719" version="1" comment="postgresql-docs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041373" version="1" comment="postgresql-llvmjit is &lt;18-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009289720" version="1" comment="postgresql-llvmjit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041374" version="1" comment="postgresql-llvmjit-devel is &lt;18-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811565" version="1" comment="postgresql-llvmjit-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041375" version="1" comment="postgresql-plperl is &lt;18-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009289721" version="1" comment="postgresql-plperl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041376" version="1" comment="postgresql-plpython is &lt;18-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009289722" version="1" comment="postgresql-plpython is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041377" version="1" comment="postgresql-pltcl is &lt;18-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009289723" version="1" comment="postgresql-pltcl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031376"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041378" version="1" comment="postgresql-server is &lt;18-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177237" version="1" comment="postgresql-server is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041379" version="1" comment="postgresql-server-devel is &lt;18-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009289724" version="1" comment="postgresql-server-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041380" version="1" comment="postgresql-test is &lt;18-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009289725" version="1" comment="postgresql-test is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048386"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052636" version="1" comment="postgresql13 is &lt;13.23-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623868" version="1" comment="postgresql13 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052637" version="1" comment="postgresql13-contrib is &lt;13.23-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623869" version="1" comment="postgresql13-contrib is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052638" version="1" comment="postgresql13-devel is &lt;13.23-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623870" version="1" comment="postgresql13-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052639" version="1" comment="postgresql13-docs is &lt;13.23-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249584"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623872" version="1" comment="postgresql13-docs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052640" version="1" comment="postgresql13-llvmjit is &lt;13.23-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009624044" version="1" comment="postgresql13-llvmjit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052641" version="1" comment="postgresql13-llvmjit-devel is &lt;13.23-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698137" version="1" comment="postgresql13-llvmjit-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059703"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041381" version="1" comment="postgresql13-pgaudit is &lt;1.5.3-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247088"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041614" version="1" comment="postgresql13-pgaudit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071705"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041382" version="1" comment="postgresql13-pgvector is &lt;0.8.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041615" version="1" comment="postgresql13-pgvector is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052642" version="1" comment="postgresql13-plperl is &lt;13.23-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623873" version="1" comment="postgresql13-plperl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052643" version="1" comment="postgresql13-plpython is &lt;13.23-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623874" version="1" comment="postgresql13-plpython is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052644" version="1" comment="postgresql13-pltcl is &lt;13.23-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623875" version="1" comment="postgresql13-pltcl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052645" version="1" comment="postgresql13-server is &lt;13.23-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623876" version="1" comment="postgresql13-server is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052646" version="1" comment="postgresql13-server-devel is &lt;13.23-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623877" version="1" comment="postgresql13-server-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050449"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052647" version="1" comment="postgresql13-test is &lt;13.23-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009623878" version="1" comment="postgresql13-test is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050438"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045662" version="1" comment="postgresql14 is &lt;14.21-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657383" version="1" comment="postgresql14 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045663" version="1" comment="postgresql14-contrib is &lt;14.21-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657384" version="1" comment="postgresql14-contrib is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045664" version="1" comment="postgresql14-devel is &lt;14.21-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657385" version="1" comment="postgresql14-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045665" version="1" comment="postgresql14-docs is &lt;14.21-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248053"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657387" version="1" comment="postgresql14-docs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045666" version="1" comment="postgresql14-llvmjit is &lt;14.21-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657388" version="1" comment="postgresql14-llvmjit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045667" version="1" comment="postgresql14-llvmjit-devel is &lt;14.21-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698138" version="1" comment="postgresql14-llvmjit-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041383" version="1" comment="postgresql14-pgaudit is &lt;1.6.3-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247090"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041616" version="1" comment="postgresql14-pgaudit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041384" version="1" comment="postgresql14-pgvector is &lt;0.8.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041617" version="1" comment="postgresql14-pgvector is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071708"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045668" version="1" comment="postgresql14-plperl is &lt;14.21-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657389" version="1" comment="postgresql14-plperl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045669" version="1" comment="postgresql14-plpython is &lt;14.21-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657390" version="1" comment="postgresql14-plpython is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045670" version="1" comment="postgresql14-pltcl is &lt;14.21-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657391" version="1" comment="postgresql14-pltcl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045671" version="1" comment="postgresql14-server is &lt;14.21-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657392" version="1" comment="postgresql14-server is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045672" version="1" comment="postgresql14-server-devel is &lt;14.21-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657393" version="1" comment="postgresql14-server-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045673" version="1" comment="postgresql14-test is &lt;14.21-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248052"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009657394" version="1" comment="postgresql14-test is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058621"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045674" version="1" comment="postgresql15 is &lt;15.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742699" version="1" comment="postgresql15 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045675" version="1" comment="postgresql15-contrib is &lt;15.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742700" version="1" comment="postgresql15-contrib is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045676" version="1" comment="postgresql15-devel is &lt;15.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742701" version="1" comment="postgresql15-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045677" version="1" comment="postgresql15-docs is &lt;15.16-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248055"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742702" version="1" comment="postgresql15-docs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045678" version="1" comment="postgresql15-llvmjit is &lt;15.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742703" version="1" comment="postgresql15-llvmjit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045679" version="1" comment="postgresql15-llvmjit-devel is &lt;15.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742704" version="1" comment="postgresql15-llvmjit-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060961"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041385" version="1" comment="postgresql15-pgaudit is &lt;1.7.1-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041618" version="1" comment="postgresql15-pgaudit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071709"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041386" version="1" comment="postgresql15-pgvector is &lt;0.8.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041619" version="1" comment="postgresql15-pgvector is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071710"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045680" version="1" comment="postgresql15-plperl is &lt;15.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742705" version="1" comment="postgresql15-plperl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045681" version="1" comment="postgresql15-plpython is &lt;15.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742706" version="1" comment="postgresql15-plpython is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045682" version="1" comment="postgresql15-pltcl is &lt;15.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742707" version="1" comment="postgresql15-pltcl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045683" version="1" comment="postgresql15-server is &lt;15.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742708" version="1" comment="postgresql15-server is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045684" version="1" comment="postgresql15-server-devel is &lt;15.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742709" version="1" comment="postgresql15-server-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045685" version="1" comment="postgresql15-test is &lt;15.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248054"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009742710" version="1" comment="postgresql15-test is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041355" version="1" comment="postgresql16 is &lt;16.11-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811566" version="1" comment="postgresql16 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041356" version="1" comment="postgresql16-contrib is &lt;16.11-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811567" version="1" comment="postgresql16-contrib is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041357" version="1" comment="postgresql16-devel is &lt;16.11-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811568" version="1" comment="postgresql16-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041358" version="1" comment="postgresql16-docs is &lt;16.11-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247085"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811570" version="1" comment="postgresql16-docs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041359" version="1" comment="postgresql16-llvmjit is &lt;16.11-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811571" version="1" comment="postgresql16-llvmjit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041360" version="1" comment="postgresql16-llvmjit-devel is &lt;16.11-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811572" version="1" comment="postgresql16-llvmjit-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041387" version="1" comment="postgresql16-pgaudit is &lt;16.1-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247092"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041620" version="1" comment="postgresql16-pgaudit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071711"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041388" version="1" comment="postgresql16-pgvector is &lt;0.8.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041621" version="1" comment="postgresql16-pgvector is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071712"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041361" version="1" comment="postgresql16-plperl is &lt;16.11-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811573" version="1" comment="postgresql16-plperl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041362" version="1" comment="postgresql16-plpython is &lt;16.11-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811574" version="1" comment="postgresql16-plpython is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041363" version="1" comment="postgresql16-pltcl is &lt;16.11-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811575" version="1" comment="postgresql16-pltcl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041364" version="1" comment="postgresql16-server is &lt;16.11-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811576" version="1" comment="postgresql16-server is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041365" version="1" comment="postgresql16-server-devel is &lt;16.11-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811577" version="1" comment="postgresql16-server-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041366" version="1" comment="postgresql16-test is &lt;16.11-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247084"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009811578" version="1" comment="postgresql16-test is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041389" version="1" comment="postgresql17 is &lt;17.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954906" version="1" comment="postgresql17 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041390" version="1" comment="postgresql17-contrib is &lt;17.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954907" version="1" comment="postgresql17-contrib is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041391" version="1" comment="postgresql17-devel is &lt;17.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954908" version="1" comment="postgresql17-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041392" version="1" comment="postgresql17-docs is &lt;17.7-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247094"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954909" version="1" comment="postgresql17-docs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041393" version="1" comment="postgresql17-llvmjit is &lt;17.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954910" version="1" comment="postgresql17-llvmjit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041394" version="1" comment="postgresql17-llvmjit-devel is &lt;17.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954911" version="1" comment="postgresql17-llvmjit-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041395" version="1" comment="postgresql17-pgaudit is &lt;17.1-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247095"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041622" version="1" comment="postgresql17-pgaudit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071713"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041396" version="1" comment="postgresql17-pgvector is &lt;0.8.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041623" version="1" comment="postgresql17-pgvector is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041397" version="1" comment="postgresql17-plperl is &lt;17.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954912" version="1" comment="postgresql17-plperl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041398" version="1" comment="postgresql17-plpython is &lt;17.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954913" version="1" comment="postgresql17-plpython is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041399" version="1" comment="postgresql17-pltcl is &lt;17.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954914" version="1" comment="postgresql17-pltcl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041400" version="1" comment="postgresql17-server is &lt;17.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954915" version="1" comment="postgresql17-server is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041401" version="1" comment="postgresql17-server-devel is &lt;17.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954916" version="1" comment="postgresql17-server-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041402" version="1" comment="postgresql17-test is &lt;17.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247093"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009954917" version="1" comment="postgresql17-test is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050153" version="1" comment="postgresql18 is &lt;18.1-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033162" version="1" comment="postgresql18 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050154" version="1" comment="postgresql18-contrib is &lt;18.1-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033163" version="1" comment="postgresql18-contrib is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050155" version="1" comment="postgresql18-devel is &lt;18.1-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033164" version="1" comment="postgresql18-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041406" version="1" comment="postgresql18-devel-mini is &lt;18.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247086"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041624" version="1" comment="postgresql18-devel-mini is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050156" version="1" comment="postgresql18-docs is &lt;18.1-160000.1.2 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249015"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033165" version="1" comment="postgresql18-docs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050157" version="1" comment="postgresql18-llvmjit is &lt;18.1-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033166" version="1" comment="postgresql18-llvmjit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050158" version="1" comment="postgresql18-llvmjit-devel is &lt;18.1-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033167" version="1" comment="postgresql18-llvmjit-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041410" version="1" comment="postgresql18-pgaudit is &lt;18.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247097"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041625" version="1" comment="postgresql18-pgaudit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071716"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041411" version="1" comment="postgresql18-pgvector is &lt;0.8.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247089"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041626" version="1" comment="postgresql18-pgvector is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071717"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050159" version="1" comment="postgresql18-plperl is &lt;18.1-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033168" version="1" comment="postgresql18-plperl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050160" version="1" comment="postgresql18-plpython is &lt;18.1-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033169" version="1" comment="postgresql18-plpython is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050161" version="1" comment="postgresql18-pltcl is &lt;18.1-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033170" version="1" comment="postgresql18-pltcl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050162" version="1" comment="postgresql18-server is &lt;18.1-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033171" version="1" comment="postgresql18-server is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050163" version="1" comment="postgresql18-server-devel is &lt;18.1-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033172" version="1" comment="postgresql18-server-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050164" version="1" comment="postgresql18-test is &lt;18.1-160000.1.2 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249014"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033173" version="1" comment="postgresql18-test is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035654" version="1" comment="MozillaThunderbird is &lt;140.5.0-bp160.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035655" version="1" comment="MozillaThunderbird-openpgp-librnp is &lt;140.5.0-bp160.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035656" version="1" comment="MozillaThunderbird-translations-common is &lt;140.5.0-bp160.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035657" version="1" comment="MozillaThunderbird-translations-other is &lt;140.5.0-bp160.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245994"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041449" version="1" comment="openvpn is &lt;2.6.10-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152221" version="1" comment="openvpn is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032165"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041450" version="1" comment="openvpn-auth-pam-plugin is &lt;2.6.10-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157252" version="1" comment="openvpn-auth-pam-plugin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041451" version="1" comment="openvpn-devel is &lt;2.6.10-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157253" version="1" comment="openvpn-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041452" version="1" comment="openvpn-down-root-plugin is &lt;2.6.10-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247106"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157254" version="1" comment="openvpn-down-root-plugin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053369" version="1" comment="libtasn1-6 is &lt;4.21.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152120" version="1" comment="libtasn1-6 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038681"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053370" version="1" comment="libtasn1-devel is &lt;4.21.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152122" version="1" comment="libtasn1-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053371" version="1" comment="libtasn1-tools is &lt;4.21.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053404" version="1" comment="libtasn1-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030585" version="1" comment="chromedriver is &lt;142.0.7444.162-bp160.1.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030586" version="1" comment="chromium is &lt;142.0.7444.162-bp160.1.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047672" version="1" comment="python313-uv is &lt;0.7.18-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248450"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037741" version="1" comment="python313-uv is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047673" version="1" comment="python313-uv-bash-completion is &lt;0.7.18-160000.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037742" version="1" comment="python313-uv-bash-completion is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047674" version="1" comment="python313-uv-fish-completion is &lt;0.7.18-160000.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037743" version="1" comment="python313-uv-fish-completion is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047675" version="1" comment="python313-uv-zsh-completion is &lt;0.7.18-160000.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248451"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037744" version="1" comment="python313-uv-zsh-completion is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033371" version="1" comment="python313-Django is &lt;5.2.4-bp160.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245535"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025481" version="1" comment="python313-Django is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032104" version="1" comment="librnp0 is &lt;0.18.1-bp160.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032118" version="1" comment="librnp0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032105" version="1" comment="rnp is &lt;0.18.1-bp160.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032119" version="1" comment="rnp is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032106" version="1" comment="rnp-devel is &lt;0.18.1-bp160.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245278"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032120" version="1" comment="rnp-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044370" version="1" comment="cockpit is &lt;354-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874847" version="1" comment="cockpit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044371" version="1" comment="cockpit-bridge is &lt;354-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874848" version="1" comment="cockpit-bridge is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044372" version="1" comment="cockpit-devel is &lt;354-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874849" version="1" comment="cockpit-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044373" version="1" comment="cockpit-doc is &lt;354-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874850" version="1" comment="cockpit-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044374" version="1" comment="cockpit-firewalld is &lt;354-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042320" version="1" comment="cockpit-firewalld is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044375" version="1" comment="cockpit-kdump is &lt;354-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874851" version="1" comment="cockpit-kdump is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067806"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044376" version="1" comment="cockpit-machines is &lt;346-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044387" version="1" comment="cockpit-machines is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061920"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044377" version="1" comment="cockpit-networkmanager is &lt;354-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874852" version="1" comment="cockpit-networkmanager is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061922"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044378" version="1" comment="cockpit-packagekit is &lt;354-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874853" version="1" comment="cockpit-packagekit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067797"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042592" version="1" comment="cockpit-packages is &lt;3-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247319"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042636" version="1" comment="cockpit-packages is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047931" version="1" comment="cockpit-podman is &lt;117-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047946" version="1" comment="cockpit-podman is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044577" version="1" comment="cockpit-repos is &lt;4.7-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247809"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044612" version="1" comment="cockpit-repos is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044379" version="1" comment="cockpit-selinux is &lt;354-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874855" version="1" comment="cockpit-selinux is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061923"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044380" version="1" comment="cockpit-storaged is &lt;354-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874856" version="1" comment="cockpit-storaged is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061924"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042306" version="1" comment="cockpit-subscriptions is &lt;12.1-160000.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041633" version="1" comment="cockpit-subscriptions is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044381" version="1" comment="cockpit-system is &lt;354-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874857" version="1" comment="cockpit-system is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044382" version="1" comment="cockpit-ws is &lt;354-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009874858" version="1" comment="cockpit-ws is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044383" version="1" comment="cockpit-ws-selinux is &lt;354-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042321" version="1" comment="cockpit-ws-selinux is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042368" version="1" comment="python313-Django is &lt;5.2.4-bp160.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037192" version="1" comment="gio-branding-upstream is &lt;2.84.4-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241263" version="1" comment="gio-branding-upstream is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037193" version="1" comment="glib2-devel is &lt;2.84.4-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151142" version="1" comment="glib2-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037194" version="1" comment="glib2-devel-static is &lt;2.84.4-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009241266" version="1" comment="glib2-devel-static is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037195" version="1" comment="glib2-doc is &lt;2.84.4-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862594" version="1" comment="glib2-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037196" version="1" comment="glib2-lang is &lt;2.84.4-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246269"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151143" version="1" comment="glib2-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037197" version="1" comment="glib2-tests-devel is &lt;2.84.4-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009755645" version="1" comment="glib2-tests-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037198" version="1" comment="glib2-tools is &lt;2.84.4-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151144" version="1" comment="glib2-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037199" version="1" comment="libgio-2_0-0 is &lt;2.84.4-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151145" version="1" comment="libgio-2_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037200" version="1" comment="libgirepository-2_0-0 is &lt;2.84.4-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037220" version="1" comment="libgirepository-2_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037201" version="1" comment="libglib-2_0-0 is &lt;2.84.4-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151147" version="1" comment="libglib-2_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037202" version="1" comment="libgmodule-2_0-0 is &lt;2.84.4-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151149" version="1" comment="libgmodule-2_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037203" version="1" comment="libgobject-2_0-0 is &lt;2.84.4-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151151" version="1" comment="libgobject-2_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037204" version="1" comment="libgthread-2_0-0 is &lt;2.84.4-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151153" version="1" comment="libgthread-2_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037205" version="1" comment="typelib-1_0-GIRepository-3_0 is &lt;2.84.4-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037221" version="1" comment="typelib-1_0-GIRepository-3_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037206" version="1" comment="typelib-1_0-GLib-2_0 is &lt;2.84.4-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037222" version="1" comment="typelib-1_0-GLib-2_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037207" version="1" comment="typelib-1_0-GLibUnix-2_0 is &lt;2.84.4-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037223" version="1" comment="typelib-1_0-GLibUnix-2_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037208" version="1" comment="typelib-1_0-GModule-2_0 is &lt;2.84.4-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037224" version="1" comment="typelib-1_0-GModule-2_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037209" version="1" comment="typelib-1_0-GObject-2_0 is &lt;2.84.4-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037225" version="1" comment="typelib-1_0-GObject-2_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037210" version="1" comment="typelib-1_0-Gio-2_0 is &lt;2.84.4-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037226" version="1" comment="typelib-1_0-Gio-2_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035129" version="1" comment="libmariadbd-devel is &lt;11.8.5-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338686" version="1" comment="libmariadbd-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035130" version="1" comment="libmariadbd19 is &lt;11.8.5-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338687" version="1" comment="libmariadbd19 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035131" version="1" comment="mariadb is &lt;11.8.5-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151099" version="1" comment="mariadb is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035132" version="1" comment="mariadb-bench is &lt;11.8.5-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152841" version="1" comment="mariadb-bench is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035133" version="1" comment="mariadb-client is &lt;11.8.5-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151100" version="1" comment="mariadb-client is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035134" version="1" comment="mariadb-errormessages is &lt;11.8.5-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245869"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151101" version="1" comment="mariadb-errormessages is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035135" version="1" comment="mariadb-galera is &lt;11.8.5-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009178284" version="1" comment="mariadb-galera is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035136" version="1" comment="mariadb-rpm-macros is &lt;11.8.5-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009338688" version="1" comment="mariadb-rpm-macros is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035137" version="1" comment="mariadb-test is &lt;11.8.5-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152842" version="1" comment="mariadb-test is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035138" version="1" comment="mariadb-tools is &lt;11.8.5-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245868"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152843" version="1" comment="mariadb-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051768" version="1" comment="python313-salt is &lt;3006.0-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035674" version="1" comment="python313-salt is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051769" version="1" comment="python313-salt-testsuite is &lt;3006.0-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035675" version="1" comment="python313-salt-testsuite is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051770" version="1" comment="salt is &lt;3006.0-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153592" version="1" comment="salt is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051771" version="1" comment="salt-api is &lt;3006.0-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153593" version="1" comment="salt-api is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051772" version="1" comment="salt-bash-completion is &lt;3006.0-160000.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153594" version="1" comment="salt-bash-completion is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051773" version="1" comment="salt-cloud is &lt;3006.0-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153595" version="1" comment="salt-cloud is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051774" version="1" comment="salt-doc is &lt;3006.0-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153596" version="1" comment="salt-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051775" version="1" comment="salt-fish-completion is &lt;3006.0-160000.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153597" version="1" comment="salt-fish-completion is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051776" version="1" comment="salt-master is &lt;3006.0-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153598" version="1" comment="salt-master is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051777" version="1" comment="salt-minion is &lt;3006.0-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153599" version="1" comment="salt-minion is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051778" version="1" comment="salt-proxy is &lt;3006.0-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153600" version="1" comment="salt-proxy is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051779" version="1" comment="salt-ssh is &lt;3006.0-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153602" version="1" comment="salt-ssh is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051780" version="1" comment="salt-standalone-formulas-configuration is &lt;3006.0-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009280429" version="1" comment="salt-standalone-formulas-configuration is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051781" version="1" comment="salt-syndic is &lt;3006.0-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153603" version="1" comment="salt-syndic is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051782" version="1" comment="salt-transactional-update is &lt;3006.0-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249412"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009479908" version="1" comment="salt-transactional-update is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051783" version="1" comment="salt-zsh-completion is &lt;3006.0-160000.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153604" version="1" comment="salt-zsh-completion is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039712" version="1" comment="bind is &lt;9.20.18-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151203" version="1" comment="bind is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039713" version="1" comment="bind-doc is &lt;9.20.18-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151205" version="1" comment="bind-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039714" version="1" comment="bind-modules-bdbhpt is &lt;9.20.18-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037911" version="1" comment="bind-modules-bdbhpt is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039715" version="1" comment="bind-modules-generic is &lt;9.20.18-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037912" version="1" comment="bind-modules-generic is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039716" version="1" comment="bind-modules-ldap is &lt;9.20.18-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037913" version="1" comment="bind-modules-ldap is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039717" version="1" comment="bind-modules-mysql is &lt;9.20.18-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037914" version="1" comment="bind-modules-mysql is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039718" version="1" comment="bind-modules-perl is &lt;9.20.18-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037915" version="1" comment="bind-modules-perl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039719" version="1" comment="bind-modules-sqlite3 is &lt;9.20.18-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037916" version="1" comment="bind-modules-sqlite3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039720" version="1" comment="bind-utils is &lt;9.20.18-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151207" version="1" comment="bind-utils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037720" version="1" comment="curl is &lt;8.14.1-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037721" version="1" comment="curl-fish-completion is &lt;8.14.1-160000.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037722" version="1" comment="curl-zsh-completion is &lt;8.14.1-160000.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037723" version="1" comment="libcurl-devel is &lt;8.14.1-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037724" version="1" comment="libcurl-devel-doc is &lt;8.14.1-160000.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246395"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037725" version="1" comment="libcurl4 is &lt;8.14.1-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246394"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035671" version="1" comment="chromedriver is &lt;143.0.7499.146-bp160.1.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035672" version="1" comment="chromium is &lt;143.0.7499.146-bp160.1.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246004"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040052" version="1" comment="apache2-mod_php8 is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700639" version="1" comment="apache2-mod_php8 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040053" version="1" comment="php8 is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700640" version="1" comment="php8 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040054" version="1" comment="php8-bcmath is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700641" version="1" comment="php8-bcmath is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040055" version="1" comment="php8-bz2 is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700642" version="1" comment="php8-bz2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053561"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040056" version="1" comment="php8-calendar is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700643" version="1" comment="php8-calendar is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040057" version="1" comment="php8-cli is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700644" version="1" comment="php8-cli is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053563"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040058" version="1" comment="php8-ctype is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700645" version="1" comment="php8-ctype is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053564"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040059" version="1" comment="php8-curl is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700646" version="1" comment="php8-curl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053565"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040060" version="1" comment="php8-dba is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700647" version="1" comment="php8-dba is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040061" version="1" comment="php8-devel is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700648" version="1" comment="php8-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040062" version="1" comment="php8-dom is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700649" version="1" comment="php8-dom is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040063" version="1" comment="php8-embed is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700650" version="1" comment="php8-embed is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040064" version="1" comment="php8-enchant is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700651" version="1" comment="php8-enchant is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053569"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040065" version="1" comment="php8-exif is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700652" version="1" comment="php8-exif is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040066" version="1" comment="php8-fastcgi is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700653" version="1" comment="php8-fastcgi is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040067" version="1" comment="php8-ffi is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948059" version="1" comment="php8-ffi is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040068" version="1" comment="php8-fileinfo is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700654" version="1" comment="php8-fileinfo is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053571"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040069" version="1" comment="php8-fpm is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700655" version="1" comment="php8-fpm is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040070" version="1" comment="php8-fpm-apache is &lt;8.4.16-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246823"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009948060" version="1" comment="php8-fpm-apache is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068444"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040071" version="1" comment="php8-ftp is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700656" version="1" comment="php8-ftp is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053572"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040072" version="1" comment="php8-gd is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700657" version="1" comment="php8-gd is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053573"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040073" version="1" comment="php8-gettext is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700658" version="1" comment="php8-gettext is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040074" version="1" comment="php8-gmp is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700659" version="1" comment="php8-gmp is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053575"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040075" version="1" comment="php8-iconv is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700660" version="1" comment="php8-iconv is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053576"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040076" version="1" comment="php8-intl is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700661" version="1" comment="php8-intl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053577"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040077" version="1" comment="php8-ldap is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700662" version="1" comment="php8-ldap is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053578"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040078" version="1" comment="php8-mbstring is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700663" version="1" comment="php8-mbstring is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053579"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040079" version="1" comment="php8-mysql is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700664" version="1" comment="php8-mysql is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053580"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040080" version="1" comment="php8-odbc is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700665" version="1" comment="php8-odbc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040081" version="1" comment="php8-opcache is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700666" version="1" comment="php8-opcache is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053582"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040082" version="1" comment="php8-openssl is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700667" version="1" comment="php8-openssl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040083" version="1" comment="php8-pcntl is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700668" version="1" comment="php8-pcntl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053584"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040084" version="1" comment="php8-pdo is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700669" version="1" comment="php8-pdo is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053585"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040085" version="1" comment="php8-pgsql is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700670" version="1" comment="php8-pgsql is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053586"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040086" version="1" comment="php8-phar is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700671" version="1" comment="php8-phar is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040087" version="1" comment="php8-posix is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700672" version="1" comment="php8-posix is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040088" version="1" comment="php8-readline is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700673" version="1" comment="php8-readline is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040089" version="1" comment="php8-shmop is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700674" version="1" comment="php8-shmop is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040090" version="1" comment="php8-snmp is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700675" version="1" comment="php8-snmp is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040091" version="1" comment="php8-soap is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700676" version="1" comment="php8-soap is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040092" version="1" comment="php8-sockets is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700677" version="1" comment="php8-sockets is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040093" version="1" comment="php8-sodium is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700678" version="1" comment="php8-sodium is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040094" version="1" comment="php8-sqlite is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700679" version="1" comment="php8-sqlite is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040095" version="1" comment="php8-sysvmsg is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700680" version="1" comment="php8-sysvmsg is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040096" version="1" comment="php8-sysvsem is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700681" version="1" comment="php8-sysvsem is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040097" version="1" comment="php8-sysvshm is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700682" version="1" comment="php8-sysvshm is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040098" version="1" comment="php8-test is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700683" version="1" comment="php8-test is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040099" version="1" comment="php8-tidy is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700684" version="1" comment="php8-tidy is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040100" version="1" comment="php8-tokenizer is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700685" version="1" comment="php8-tokenizer is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040101" version="1" comment="php8-xmlreader is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700686" version="1" comment="php8-xmlreader is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040102" version="1" comment="php8-xmlwriter is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700687" version="1" comment="php8-xmlwriter is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040103" version="1" comment="php8-xsl is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700688" version="1" comment="php8-xsl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040104" version="1" comment="php8-zip is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700689" version="1" comment="php8-zip is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040105" version="1" comment="php8-zlib is &lt;8.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246822"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009700690" version="1" comment="php8-zlib is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037177" version="1" comment="MozillaFirefox is &lt;140.6.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037178" version="1" comment="MozillaFirefox-branding-upstream is &lt;140.6.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037179" version="1" comment="MozillaFirefox-devel is &lt;140.6.0-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246264"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037180" version="1" comment="MozillaFirefox-translations-common is &lt;140.6.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037181" version="1" comment="MozillaFirefox-translations-other is &lt;140.6.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246263"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037890" version="1" comment="MozillaThunderbird is &lt;140.6.0-bp160.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037891" version="1" comment="MozillaThunderbird-openpgp-librnp is &lt;140.6.0-bp160.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037892" version="1" comment="MozillaThunderbird-translations-common is &lt;140.6.0-bp160.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037893" version="1" comment="MozillaThunderbird-translations-other is &lt;140.6.0-bp160.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037856" version="1" comment="MozillaFirefox is &lt;140.7.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037857" version="1" comment="MozillaFirefox-branding-upstream is &lt;140.7.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037858" version="1" comment="MozillaFirefox-devel is &lt;140.7.0-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037859" version="1" comment="MozillaFirefox-translations-common is &lt;140.7.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037860" version="1" comment="MozillaFirefox-translations-other is &lt;140.7.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050210" version="1" comment="MozillaThunderbird is &lt;140.8.1-bp160.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050211" version="1" comment="MozillaThunderbird-openpgp-librnp is &lt;140.8.1-bp160.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066420"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050212" version="1" comment="MozillaThunderbird-translations-common is &lt;140.8.1-bp160.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050213" version="1" comment="MozillaThunderbird-translations-other is &lt;140.8.1-bp160.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249029"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032563" version="1" comment="chromedriver is &lt;143.0.7499.40-bp160.1.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032564" version="1" comment="chromium is &lt;143.0.7499.40-bp160.1.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245360"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041943" version="1" comment="gimp is &lt;3.0.8-bp160.1.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041944" version="1" comment="gimp-devel is &lt;3.0.8-bp160.1.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041945" version="1" comment="gimp-extension-goat-excercises is &lt;3.0.8-bp160.1.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041946" version="1" comment="gimp-lang is &lt;3.0.8-bp160.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247182"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041947" version="1" comment="gimp-plugin-aa is &lt;3.0.8-bp160.1.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041948" version="1" comment="gimp-plugin-python3 is &lt;3.0.8-bp160.1.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041949" version="1" comment="gimp-vala is &lt;3.0.8-bp160.1.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041950" version="1" comment="libgimp-3_0-0 is &lt;3.0.8-bp160.1.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041951" version="1" comment="libgimpui-3_0-0 is &lt;3.0.8-bp160.1.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247181"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048654" version="1" comment="libsoup-2_4-1 is &lt;2.74.3-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151596" version="1" comment="libsoup-2_4-1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048655" version="1" comment="libsoup2-devel is &lt;2.74.3-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009957647" version="1" comment="libsoup2-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048656" version="1" comment="libsoup2-lang is &lt;2.74.3-160000.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248645"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698060" version="1" comment="libsoup2-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048657" version="1" comment="typelib-1_0-Soup-2_4 is &lt;2.74.3-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151599" version="1" comment="typelib-1_0-Soup-2_4 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052615" version="1" comment="gnutls is &lt;3.8.10-160000.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151156" version="1" comment="gnutls is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030524"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052616" version="1" comment="libgnutls-devel is &lt;3.8.10-160000.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151157" version="1" comment="libgnutls-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033052"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052617" version="1" comment="libgnutls-devel-doc is &lt;3.8.10-160000.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052705" version="1" comment="libgnutls-devel-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052618" version="1" comment="libgnutls30 is &lt;3.8.10-160000.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177128" version="1" comment="libgnutls30 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052619" version="1" comment="libgnutlsxx-devel is &lt;3.8.10-160000.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153805" version="1" comment="libgnutlsxx-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052620" version="1" comment="libgnutlsxx30 is &lt;3.8.10-160000.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009967067" version="1" comment="libgnutlsxx30 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060222"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048658" version="1" comment="qemu is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048659" version="1" comment="qemu-SLOF is &lt;10.0.8-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048660" version="1" comment="qemu-accel-qtest is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048661" version="1" comment="qemu-arm is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048662" version="1" comment="qemu-audio-alsa is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048663" version="1" comment="qemu-audio-dbus is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060190"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048664" version="1" comment="qemu-audio-jack is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048665" version="1" comment="qemu-audio-oss is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048666" version="1" comment="qemu-audio-pa is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047435"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048667" version="1" comment="qemu-audio-pipewire is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063031"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048668" version="1" comment="qemu-audio-spice is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048669" version="1" comment="qemu-block-curl is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038463"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048670" version="1" comment="qemu-block-dmg is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041090"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048671" version="1" comment="qemu-block-iscsi is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041091"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048672" version="1" comment="qemu-block-nfs is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048039"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048673" version="1" comment="qemu-block-rbd is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038707"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048674" version="1" comment="qemu-block-ssh is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048675" version="1" comment="qemu-chardev-baum is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048676" version="1" comment="qemu-chardev-spice is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048677" version="1" comment="qemu-doc is &lt;10.0.8-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048678" version="1" comment="qemu-extra is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048679" version="1" comment="qemu-guest-agent is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048680" version="1" comment="qemu-headless is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062399"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048681" version="1" comment="qemu-hw-display-qxl is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048682" version="1" comment="qemu-hw-display-virtio-gpu is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048683" version="1" comment="qemu-hw-display-virtio-gpu-pci is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051638"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048684" version="1" comment="qemu-hw-display-virtio-vga is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051639"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048685" version="1" comment="qemu-hw-s390x-virtio-gpu-ccw is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048686" version="1" comment="qemu-hw-usb-host is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048687" version="1" comment="qemu-hw-usb-redirect is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051641"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048688" version="1" comment="qemu-hw-usb-smartcard is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048689" version="1" comment="qemu-img is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048690" version="1" comment="qemu-ipxe is &lt;10.0.8-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048691" version="1" comment="qemu-ivshmem-tools is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048692" version="1" comment="qemu-ksm is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038706"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048693" version="1" comment="qemu-lang is &lt;10.0.8-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037632"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048694" version="1" comment="qemu-linux-user is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048695" version="1" comment="qemu-microvm is &lt;10.0.8-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048696" version="1" comment="qemu-ppc is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048697" version="1" comment="qemu-pr-helper is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048698" version="1" comment="qemu-s390x is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048699" version="1" comment="qemu-seabios is &lt;10.0.81.16.3_3_g3d33c746-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048700" version="1" comment="qemu-skiboot is &lt;10.0.8-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248647"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048701" version="1" comment="qemu-spice is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048702" version="1" comment="qemu-tools is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048703" version="1" comment="qemu-ui-curses is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047436"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048704" version="1" comment="qemu-ui-dbus is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060191"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048705" version="1" comment="qemu-ui-gtk is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047437"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048706" version="1" comment="qemu-ui-opengl is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048707" version="1" comment="qemu-ui-spice-app is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048708" version="1" comment="qemu-ui-spice-core is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048709" version="1" comment="qemu-vgabios is &lt;10.0.81.16.3_3_g3d33c746-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248648"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048710" version="1" comment="qemu-vhost-user-gpu is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048711" version="1" comment="qemu-vmsr-helper is &lt;10.0.8-160000.1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068445"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248649"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048712" version="1" comment="qemu-x86 is &lt;10.0.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248646"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051798" version="1" comment="389-ds is &lt;3.0.6~git249.6688af9b2-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168666" version="1" comment="389-ds is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042094"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051799" version="1" comment="389-ds-devel is &lt;3.0.6~git249.6688af9b2-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168668" version="1" comment="389-ds-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042095"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051800" version="1" comment="389-ds-snmp is &lt;3.0.6~git249.6688af9b2-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009253606" version="1" comment="389-ds-snmp is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051801" version="1" comment="lib389 is &lt;3.0.6~git249.6688af9b2-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009347740" version="1" comment="lib389 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051802" version="1" comment="libsvrcore0 is &lt;3.0.6~git249.6688af9b2-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249416"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009347741" version="1" comment="libsvrcore0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044190" version="1" comment="fontforge is &lt;20251009-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276598" version="1" comment="fontforge is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047800"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044191" version="1" comment="fontforge-devel is &lt;20251009-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247696"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276599" version="1" comment="fontforge-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044192" version="1" comment="fontforge-doc is &lt;20251009-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247697"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276600" version="1" comment="fontforge-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050722" version="1" comment="libsodium-devel is &lt;1.0.20-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039417" version="1" comment="libsodium-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071457"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050020" version="1" comment="libsodium26 is &lt;1.0.20-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248982"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051917" version="1" comment="libsodium26 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018027" version="1" comment="kernel-livepatch-6_4_0-150600_23_30-default is &gt;=11-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017978" version="1" comment="kernel-livepatch-6_4_0-150600_23_33-default is &gt;=11-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017979" version="1" comment="kernel-livepatch-6_4_0-150600_23_38-default is &gt;=6-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018028" version="1" comment="kernel-livepatch-6_4_0-150600_23_42-default is &gt;=6-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018016" version="1" comment="kernel-livepatch-6_4_0-150700_51-default is &gt;=3-150700.3.6.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242096"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014748" version="1" comment="kernel-default is &lt;6.4.0-150700.51.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241460"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020710" version="1" comment="kernel-livepatch-6_4_0-150600_23_33-default is &gt;=13-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020711" version="1" comment="kernel-livepatch-6_4_0-150600_23_38-default is &gt;=8-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020712" version="1" comment="kernel-default is &lt;6.4.0-150600.23.38.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242825"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017864" version="1" comment="kernel-livepatch-5_14_21-150500_55_100-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017865" version="1" comment="kernel-livepatch-5_14_21-150500_55_103-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017866" version="1" comment="kernel-livepatch-5_14_21-150500_55_110-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017867" version="1" comment="kernel-livepatch-5_14_21-150500_55_113-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019706" version="1" comment="kernel-livepatch-5_14_21-150500_55_116-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011970" version="1" comment="kgraft-patch-4_12_14-122_244-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011971" version="1" comment="kgraft-patch-4_12_14-122_247-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011828" version="1" comment="kgraft-patch-4_12_14-122_250-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011972" version="1" comment="kgraft-patch-4_12_14-122_255-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011974" version="1" comment="kgraft-patch-4_12_14-122_258-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011976" version="1" comment="kernel-livepatch-5_3_18-150300_59_195-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011977" version="1" comment="kernel-livepatch-5_3_18-150300_59_198-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011978" version="1" comment="kernel-livepatch-5_3_18-150300_59_201-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011829" version="1" comment="kernel-livepatch-5_3_18-150300_59_204-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012376" version="1" comment="kernel-livepatch-5_3_18-150300_59_207-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011980" version="1" comment="kernel-livepatch-5_14_21-150500_55_100-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011982" version="1" comment="kernel-livepatch-5_14_21-150500_55_103-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011984" version="1" comment="kernel-livepatch-5_14_21-150500_55_110-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011985" version="1" comment="kernel-livepatch-5_14_21-150500_55_94-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011986" version="1" comment="kernel-livepatch-5_14_21-150500_55_97-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011987" version="1" comment="kernel-livepatch-6_4_0-150600_23_38-default is &gt;=4-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012360" version="1" comment="kernel-livepatch-6_4_0-150600_23_42-default is &gt;=4-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012378" version="1" comment="kernel-livepatch-6_4_0-150600_23_47-default is &gt;=3-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012362" version="1" comment="kernel-livepatch-6_4_0-150600_23_50-default is &gt;=2-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014265" version="1" comment="kernel-livepatch-6_4_0-150700_5-rt is &gt;=2-150700.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241337"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014747" version="1" comment="kernel-livepatch-6_4_0-150700_51-default is &gt;=2-150700.3.3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241459"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050318" version="1" comment="kgraft-patch-4_12_14-122_293-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071779"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050990" version="1" comment="kernel-default is ==5.14.21-150500.55.136.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249246"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050991" version="1" comment="kernel-livepatch-5_14_21-150500_55_136-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019707" version="1" comment="kernel-livepatch-5_14_21-150500_55_100-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019708" version="1" comment="kernel-livepatch-5_14_21-150500_55_103-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019709" version="1" comment="kernel-livepatch-5_14_21-150500_55_110-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019710" version="1" comment="kernel-livepatch-5_14_21-150500_55_83-default is &gt;=15-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019711" version="1" comment="kernel-livepatch-5_14_21-150500_55_88-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019712" version="1" comment="kernel-livepatch-5_14_21-150500_55_91-default is &gt;=11-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202677"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019713" version="1" comment="kernel-livepatch-5_14_21-150500_55_94-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019714" version="1" comment="kernel-livepatch-5_14_21-150500_55_97-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019744" version="1" comment="kernel-livepatch-6_4_0-150600_23_25-default is &gt;=16-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019745" version="1" comment="kernel-livepatch-6_4_0-150600_23_30-default is &gt;=12-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019715" version="1" comment="kernel-livepatch-6_4_0-150600_23_33-default is &gt;=12-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008704" version="1" comment="kernel-livepatch-5_14_21-150500_55_94-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008811" version="1" comment="kernel-livepatch-5_14_21-150500_55_97-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008812" version="1" comment="kernel-livepatch-6_4_0-150600_23_38-default is &gt;=3-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008813" version="1" comment="kernel-livepatch-6_4_0-150600_23_42-default is &gt;=3-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010008809" version="1" comment="kernel-default is &lt;5.3.18-150300.59.201.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240312"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020743" version="1" comment="kernel-default is &lt;5.14.21-150400.24.161.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242831"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020713" version="1" comment="kernel-livepatch-6_4_0-150600_23_42-default is &gt;=8-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020714" version="1" comment="kernel-default is &lt;6.4.0-150600.23.42.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242826"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031708" version="1" comment="cluster-md-kmp-64kb is &lt;6.12.0-160000.7.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031709" version="1" comment="cluster-md-kmp-default is &lt;6.12.0-160000.7.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031710" version="1" comment="cluster-md-kmp-rt is &lt;6.12.0-160000.7.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031711" version="1" comment="dlm-kmp-64kb is &lt;6.12.0-160000.7.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031712" version="1" comment="dlm-kmp-default is &lt;6.12.0-160000.7.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031713" version="1" comment="dlm-kmp-rt is &lt;6.12.0-160000.7.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031714" version="1" comment="dtb-allwinner is &lt;6.12.0-160000.7.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031715" version="1" comment="dtb-altera is &lt;6.12.0-160000.7.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031716" version="1" comment="dtb-amazon is &lt;6.12.0-160000.7.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031717" version="1" comment="dtb-amd is &lt;6.12.0-160000.7.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031718" version="1" comment="dtb-amlogic is &lt;6.12.0-160000.7.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031719" version="1" comment="dtb-apm is &lt;6.12.0-160000.7.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031720" version="1" comment="dtb-apple is &lt;6.12.0-160000.7.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031721" version="1" comment="dtb-arm is &lt;6.12.0-160000.7.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031722" version="1" comment="dtb-broadcom is &lt;6.12.0-160000.7.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031723" version="1" comment="dtb-cavium is &lt;6.12.0-160000.7.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031724" version="1" comment="dtb-exynos is &lt;6.12.0-160000.7.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031725" version="1" comment="dtb-freescale is &lt;6.12.0-160000.7.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031726" version="1" comment="dtb-hisilicon is &lt;6.12.0-160000.7.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031727" version="1" comment="dtb-lg is &lt;6.12.0-160000.7.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031728" version="1" comment="dtb-marvell is &lt;6.12.0-160000.7.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031729" version="1" comment="dtb-mediatek is &lt;6.12.0-160000.7.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031730" version="1" comment="dtb-nvidia is &lt;6.12.0-160000.7.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031731" version="1" comment="dtb-qcom is &lt;6.12.0-160000.7.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031732" version="1" comment="dtb-renesas is &lt;6.12.0-160000.7.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031733" version="1" comment="dtb-rockchip is &lt;6.12.0-160000.7.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031734" version="1" comment="dtb-socionext is &lt;6.12.0-160000.7.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031735" version="1" comment="dtb-sprd is &lt;6.12.0-160000.7.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031736" version="1" comment="dtb-xilinx is &lt;6.12.0-160000.7.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031737" version="1" comment="gfs2-kmp-64kb is &lt;6.12.0-160000.7.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031738" version="1" comment="gfs2-kmp-default is &lt;6.12.0-160000.7.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031739" version="1" comment="gfs2-kmp-rt is &lt;6.12.0-160000.7.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031740" version="1" comment="kernel-64kb is &lt;6.12.0-160000.7.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031742" version="1" comment="kernel-64kb-extra is &lt;6.12.0-160000.7.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031743" version="1" comment="kernel-64kb-optional is &lt;6.12.0-160000.7.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031744" version="1" comment="kernel-default is &lt;6.12.0-160000.7.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031746" version="1" comment="kernel-default-extra is &lt;6.12.0-160000.7.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031747" version="1" comment="kernel-default-optional is &lt;6.12.0-160000.7.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031748" version="1" comment="kernel-default-vdso is &lt;6.12.0-160000.7.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031750" version="1" comment="kernel-docs is &lt;6.12.0-160000.7.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031751" version="1" comment="kernel-docs-html is &lt;6.12.0-160000.7.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031752" version="1" comment="kernel-kvmsmall is &lt;6.12.0-160000.7.1 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245202"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031754" version="1" comment="kernel-kvmsmall-vdso is &lt;6.12.0-160000.7.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031755" version="1" comment="kernel-macros is &lt;6.12.0-160000.7.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031756" version="1" comment="kernel-obs-build is &lt;6.12.0-160000.7.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031757" version="1" comment="kernel-obs-qa is &lt;6.12.0-160000.7.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031758" version="1" comment="kernel-rt is &lt;6.12.0-160000.7.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031760" version="1" comment="kernel-rt-extra is &lt;6.12.0-160000.7.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031761" version="1" comment="kernel-rt-optional is &lt;6.12.0-160000.7.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031762" version="1" comment="kernel-rt-vdso is &lt;6.12.0-160000.7.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245200"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031763" version="1" comment="kernel-source is &lt;6.12.0-160000.7.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031764" version="1" comment="kernel-source-vanilla is &lt;6.12.0-160000.7.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245201"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031765" version="1" comment="kernel-syms is &lt;6.12.0-160000.7.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031766" version="1" comment="kernel-zfcpdump is &lt;6.12.0-160000.7.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245203"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031767" version="1" comment="kselftests-kmp-64kb is &lt;6.12.0-160000.7.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031768" version="1" comment="kselftests-kmp-default is &lt;6.12.0-160000.7.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031769" version="1" comment="kselftests-kmp-rt is &lt;6.12.0-160000.7.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031770" version="1" comment="ocfs2-kmp-64kb is &lt;6.12.0-160000.7.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245197"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031771" version="1" comment="ocfs2-kmp-default is &lt;6.12.0-160000.7.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245198"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031772" version="1" comment="ocfs2-kmp-rt is &lt;6.12.0-160000.7.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245199"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014541" version="1" comment="kernel-default is &lt;4.12.14-122.261.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241405"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022285" version="1" comment="kernel-livepatch-5_3_18-150300_59_182-default is &gt;=16-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009229954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022334" version="1" comment="kernel-livepatch-5_3_18-150300_59_185-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022310" version="1" comment="kernel-livepatch-5_3_18-150300_59_188-default is &gt;=13-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166553"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022311" version="1" comment="kernel-livepatch-5_3_18-150300_59_195-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022286" version="1" comment="kernel-livepatch-5_3_18-150300_59_198-default is &gt;=10-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166557"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022287" version="1" comment="kernel-livepatch-5_3_18-150300_59_201-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022288" version="1" comment="kernel-livepatch-5_3_18-150300_59_204-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022289" version="1" comment="kernel-livepatch-5_3_18-150300_59_207-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022312" version="1" comment="kernel-livepatch-5_3_18-150300_59_211-default is &gt;=7-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022290" version="1" comment="kernel-livepatch-5_3_18-150300_59_215-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019757" version="1" comment="kernel-default is &lt;5.3.18-150300.59.215.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022613" version="1" comment="kernel-livepatch-5_14_21-150400_24_141-default is &gt;=16-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068738"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022335" version="1" comment="kernel-livepatch-5_14_21-150400_24_144-default is &gt;=15-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022614" version="1" comment="kernel-livepatch-5_14_21-150400_24_147-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068959"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022803" version="1" comment="kernel-livepatch-5_14_21-150400_24_150-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022336" version="1" comment="kernel-livepatch-5_14_21-150400_24_153-default is &gt;=9-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192069"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022804" version="1" comment="kernel-livepatch-5_14_21-150400_24_158-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022805" version="1" comment="kernel-livepatch-5_14_21-150400_24_161-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022615" version="1" comment="kernel-livepatch-5_14_21-150400_24_164-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022806" version="1" comment="kernel-livepatch-5_14_21-150400_24_167-default is &gt;=7-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009174882"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022616" version="1" comment="kernel-livepatch-5_14_21-150400_24_170-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022807" version="1" comment="kernel-livepatch-5_14_21-150500_55_100-default is &gt;=8-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022808" version="1" comment="kernel-livepatch-5_14_21-150500_55_103-default is &gt;=8-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201544"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022809" version="1" comment="kernel-livepatch-5_14_21-150500_55_110-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022810" version="1" comment="kernel-livepatch-5_14_21-150500_55_113-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023025" version="1" comment="kernel-livepatch-5_14_21-150500_55_116-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022811" version="1" comment="kernel-livepatch-5_14_21-150500_55_88-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022812" version="1" comment="kernel-livepatch-5_14_21-150500_55_91-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022813" version="1" comment="kernel-livepatch-5_14_21-150500_55_94-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022814" version="1" comment="kernel-livepatch-5_14_21-150500_55_97-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023026" version="1" comment="kernel-livepatch-6_4_0-150600_23_30-default is &gt;=14-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023027" version="1" comment="kernel-livepatch-6_4_0-150600_23_33-default is &gt;=14-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023028" version="1" comment="kernel-livepatch-6_4_0-150600_23_38-default is &gt;=9-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023339" version="1" comment="kernel-livepatch-6_4_0-150600_23_42-default is &gt;=9-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023029" version="1" comment="kernel-livepatch-6_4_0-150700_51-default is &gt;=6-150700.3.15.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243289"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017412" version="1" comment="kernel-livepatch-5_3_18-150300_59_201-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017413" version="1" comment="kernel-livepatch-5_3_18-150300_59_204-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017676" version="1" comment="kernel-livepatch-5_14_21-150400_24_161-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017677" version="1" comment="kernel-livepatch-5_14_21-150400_24_164-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017980" version="1" comment="kernel-livepatch-6_4_0-150600_23_47-default is &gt;=5-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020715" version="1" comment="kernel-livepatch-6_4_0-150700_51-default is &gt;=5-150700.3.12.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242827"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010010061" version="1" comment="kernel-livepatch-6_4_0-150600_23_47-default is &gt;=2-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047314" version="1" comment="podman is &lt;5.4.2-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266791" version="1" comment="podman is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047315" version="1" comment="podman-docker is &lt;5.4.2-160000.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248373"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707063" version="1" comment="podman-docker is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047316" version="1" comment="podman-remote is &lt;5.4.2-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707064" version="1" comment="podman-remote is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053612"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047317" version="1" comment="podmansh is &lt;5.4.2-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248372"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009853422" version="1" comment="podmansh is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066482"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042598" version="1" comment="tailscale is &lt;1.94.1-bp160.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247323"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042637" version="1" comment="tailscale is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042599" version="1" comment="tailscale-bash-completion is &lt;1.94.1-bp160.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042638" version="1" comment="tailscale-bash-completion is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042600" version="1" comment="tailscale-fish-completion is &lt;1.94.1-bp160.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042639" version="1" comment="tailscale-fish-completion is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068879"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042601" version="1" comment="tailscale-zsh-completion is &lt;1.94.1-bp160.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247324"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042640" version="1" comment="tailscale-zsh-completion is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068880"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041418" version="1" comment="elemental-register is &lt;1.8.1-160000.1.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041627" version="1" comment="elemental-register is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069266"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041419" version="1" comment="elemental-support is &lt;1.8.1-160000.1.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247098"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041628" version="1" comment="elemental-support is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069267"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041420" version="1" comment="elemental-toolkit is &lt;2.3.2-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247099"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041629" version="1" comment="elemental-toolkit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069268"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037905" version="1" comment="go-sendxmpp is &lt;0.15.1-bp160.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015344" version="1" comment="go-sendxmpp is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031473" version="1" comment="kernel-livepatch-6_4_0-150600_23_33-default is &gt;=16-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031474" version="1" comment="kernel-livepatch-6_4_0-150600_23_38-default is &gt;=11-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031475" version="1" comment="kernel-livepatch-6_4_0-150600_23_42-default is &gt;=11-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031476" version="1" comment="kernel-livepatch-6_4_0-150600_23_47-default is &gt;=10-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019719" version="1" comment="kernel-default is &lt;6.4.0-150600.23.47.2" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030638" version="1" comment="kernel-livepatch-6_4_0-150700_5-rt is &gt;=8-150700.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031906" version="1" comment="kernel-livepatch-6_4_0-150700_51-default is &gt;=8-150700.3.21.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041563" version="1" comment="dpdk is &lt;24.11.4-160000.1.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173355" version="1" comment="dpdk is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041564" version="1" comment="dpdk-devel is &lt;24.11.4-160000.1.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173356" version="1" comment="dpdk-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042322"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041565" version="1" comment="dpdk-devel-static is &lt;24.11.4-160000.1.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009959140" version="1" comment="dpdk-devel-static is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059692"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041566" version="1" comment="dpdk-doc is &lt;24.11.4-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173357" version="1" comment="dpdk-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042323"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041567" version="1" comment="dpdk-examples is &lt;24.11.4-160000.1.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173358" version="1" comment="dpdk-examples is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042324"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041568" version="1" comment="dpdk-tools is &lt;24.11.4-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247128"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009173360" version="1" comment="dpdk-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042326"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041569" version="1" comment="libdpdk-25 is &lt;24.11.4-160000.1.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247127"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041630" version="1" comment="libdpdk-25 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037214" version="1" comment="libmatio-devel is &lt;1.5.29-bp160.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009727698" version="1" comment="libmatio-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053246"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037215" version="1" comment="libmatio13 is &lt;1.5.29-bp160.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037227" version="1" comment="libmatio13 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071459"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037216" version="1" comment="matio-tools is &lt;1.5.29-bp160.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009727700" version="1" comment="matio-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053248"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050012" version="1" comment="libpng16-16 is &lt;1.6.44-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151414" version="1" comment="libpng16-16 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050165" version="1" comment="libpng16-16-x86-64-v3 is &lt;1.6.44-160000.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037228" version="1" comment="libpng16-16-x86-64-v3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050166" version="1" comment="libpng16-compat-devel is &lt;1.6.44-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151416" version="1" comment="libpng16-compat-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050167" version="1" comment="libpng16-compat-devel-x86-64-v3 is &lt;1.6.44-160000.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037229" version="1" comment="libpng16-compat-devel-x86-64-v3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050168" version="1" comment="libpng16-devel is &lt;1.6.44-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151417" version="1" comment="libpng16-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050169" version="1" comment="libpng16-devel-x86-64-v3 is &lt;1.6.44-160000.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249016"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037230" version="1" comment="libpng16-devel-x86-64-v3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050170" version="1" comment="libpng16-tools is &lt;1.6.44-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153137" version="1" comment="libpng16-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035663" version="1" comment="golang-github-teddysun-v2ray-plugin is &lt;5.25.0-bp160.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245998"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018580" version="1" comment="golang-github-teddysun-v2ray-plugin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035664" version="1" comment="golang-github-v2fly-v2ray-core is &lt;5.40.0-bp160.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245999"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015623" version="1" comment="golang-github-v2fly-v2ray-core is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035665" version="1" comment="shadowsocks-v2ray-plugin is &lt;5.25.0-bp160.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246000"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018581" version="1" comment="shadowsocks-v2ray-plugin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035666" version="1" comment="v2ray-core is &lt;5.40.0-bp160.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246001"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015624" version="1" comment="v2ray-core is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066568"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053168" version="1" comment="dnsdist is &lt;1.9.11-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249702"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009815139" version="1" comment="dnsdist is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061017"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032086" version="1" comment="dovecot24 is &lt;2.4.2-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032121" version="1" comment="dovecot24 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069056"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032087" version="1" comment="dovecot24-backend-mysql is &lt;2.4.2-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032122" version="1" comment="dovecot24-backend-mysql is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032088" version="1" comment="dovecot24-backend-pgsql is &lt;2.4.2-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032123" version="1" comment="dovecot24-backend-pgsql is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069058"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032089" version="1" comment="dovecot24-backend-sqlite is &lt;2.4.2-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032124" version="1" comment="dovecot24-backend-sqlite is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069059"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032090" version="1" comment="dovecot24-devel is &lt;2.4.2-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032125" version="1" comment="dovecot24-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069060"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032091" version="1" comment="dovecot24-fts is &lt;2.4.2-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032126" version="1" comment="dovecot24-fts is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069061"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032092" version="1" comment="dovecot24-fts-flatcurve is &lt;2.4.2-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032127" version="1" comment="dovecot24-fts-flatcurve is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032093" version="1" comment="dovecot24-fts-solr is &lt;2.4.2-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245274"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032128" version="1" comment="dovecot24-fts-solr is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049119" version="1" comment="docker-stable is &lt;24.0.9_ce-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248767"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956652" version="1" comment="docker-stable is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049120" version="1" comment="docker-stable-bash-completion is &lt;24.0.9_ce-160000.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956653" version="1" comment="docker-stable-bash-completion is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049121" version="1" comment="docker-stable-buildx is &lt;0.25.0-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248769"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049137" version="1" comment="docker-stable-buildx is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049122" version="1" comment="docker-stable-fish-completion is &lt;24.0.9_ce-160000.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956654" version="1" comment="docker-stable-fish-completion is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049123" version="1" comment="docker-stable-rootless-extras is &lt;24.0.9_ce-160000.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956655" version="1" comment="docker-stable-rootless-extras is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068619"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049124" version="1" comment="docker-stable-zsh-completion is &lt;24.0.9_ce-160000.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248768"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009956656" version="1" comment="docker-stable-zsh-completion is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068620"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039681" version="1" comment="erlang-rabbitmq-client is &lt;4.1.5-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154286" version="1" comment="erlang-rabbitmq-client is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039682" version="1" comment="rabbitmq-server is &lt;4.1.5-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154287" version="1" comment="rabbitmq-server is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039683" version="1" comment="rabbitmq-server-bash-completion is &lt;4.1.5-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039764" version="1" comment="rabbitmq-server-bash-completion is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052803"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039684" version="1" comment="rabbitmq-server-plugins is &lt;4.1.5-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154288" version="1" comment="rabbitmq-server-plugins is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039685" version="1" comment="rabbitmq-server-zsh-completion is &lt;4.1.5-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039765" version="1" comment="rabbitmq-server-zsh-completion is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045806" version="1" comment="chromedriver is &lt;145.0.7632.116-bp160.1.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045807" version="1" comment="chromium is &lt;145.0.7632.116-bp160.1.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248075"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031701" version="1" comment="mysql-connector-java is &lt;9.3.0-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152673" version="1" comment="mysql-connector-java is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041462" version="1" comment="alloy is &lt;1.12.2-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039655" version="1" comment="buildah is &lt;1.39.5-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246745"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009266828" version="1" comment="buildah is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030577" version="1" comment="runc is &lt;1.3.3-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153867" version="1" comment="runc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012364" version="1" comment="kernel-livepatch-6_4_0-150600_23_53-default is &gt;=2-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014750" version="1" comment="kernel-livepatch-6_4_0-150700_53_3-default is &gt;=2-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014751" version="1" comment="kernel-default is &lt;6.4.0-150700.53.3.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241463"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010012380" version="1" comment="kernel-livepatch-5_3_18-150300_59_211-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010011989" version="1" comment="kernel-livepatch-5_14_21-150500_55_113-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017414" version="1" comment="kernel-livepatch-5_3_18-150300_59_207-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017678" version="1" comment="kernel-livepatch-5_14_21-150400_24_167-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017233" version="1" comment="kernel-livepatch-6_4_0-150700_5-rt is &gt;=3-150700.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241945"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017415" version="1" comment="kgraft-patch-4_12_14-122_255-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017416" version="1" comment="kgraft-patch-4_12_14-122_258-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017417" version="1" comment="kgraft-patch-4_12_14-122_261-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018029" version="1" comment="kernel-livepatch-6_4_0-150600_23_50-default is &gt;=4-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017981" version="1" comment="kernel-livepatch-6_4_0-150600_23_53-default is &gt;=4-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018030" version="1" comment="kernel-livepatch-6_4_0-150700_53_3-default is &gt;=3-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014215" version="1" comment="kgraft-patch-4_12_14-122_222-default is &gt;=16-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068113"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166485"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014267" version="1" comment="kgraft-patch-4_12_14-122_225-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068223"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014518" version="1" comment="kgraft-patch-4_12_14-122_228-default is &gt;=14-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014268" version="1" comment="kgraft-patch-4_12_14-122_234-default is &gt;=13-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166489"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014269" version="1" comment="kgraft-patch-4_12_14-122_237-default is &gt;=9-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014217" version="1" comment="kgraft-patch-4_12_14-122_244-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014218" version="1" comment="kgraft-patch-4_12_14-122_247-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014219" version="1" comment="kgraft-patch-4_12_14-122_250-default is &gt;=6-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014220" version="1" comment="kgraft-patch-4_12_14-122_255-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014221" version="1" comment="kgraft-patch-4_12_14-122_258-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014520" version="1" comment="kgraft-patch-4_12_14-122_261-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014522" version="1" comment="kgraft-patch-4_12_14-122_266-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014523" version="1" comment="kernel-default is &lt;4.12.14-122.266.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241402"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014673" version="1" comment="kernel-livepatch-5_3_18-150300_59_211-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014753" version="1" comment="kernel-livepatch-5_14_21-150400_24_170-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014524" version="1" comment="kernel-livepatch-5_14_21-150500_55_100-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014525" version="1" comment="kernel-livepatch-5_14_21-150500_55_103-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014526" version="1" comment="kernel-livepatch-5_14_21-150500_55_110-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014527" version="1" comment="kernel-livepatch-5_14_21-150500_55_113-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014528" version="1" comment="kernel-livepatch-5_14_21-150500_55_73-default is &gt;=15-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068221"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014529" version="1" comment="kernel-livepatch-5_14_21-150500_55_80-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014530" version="1" comment="kernel-livepatch-5_14_21-150500_55_83-default is &gt;=13-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009204843"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014531" version="1" comment="kernel-livepatch-5_14_21-150500_55_88-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014532" version="1" comment="kernel-livepatch-5_14_21-150500_55_91-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068960"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014533" version="1" comment="kernel-livepatch-5_14_21-150500_55_94-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014534" version="1" comment="kernel-livepatch-5_14_21-150500_55_97-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014535" version="1" comment="kernel-livepatch-6_4_0-150600_23_14-default is &gt;=19-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014536" version="1" comment="kernel-livepatch-6_4_0-150600_23_17-default is &gt;=19-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068201"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241403"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014537" version="1" comment="kernel-livepatch-6_4_0-150600_23_22-default is &gt;=15-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014538" version="1" comment="kernel-livepatch-6_4_0-150600_23_25-default is &gt;=14-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014755" version="1" comment="kernel-livepatch-6_4_0-150600_23_30-default is &gt;=10-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068844"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014539" version="1" comment="kernel-livepatch-6_4_0-150600_23_33-default is &gt;=10-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014540" version="1" comment="kernel-livepatch-6_4_0-150600_23_38-default is &gt;=5-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014674" version="1" comment="kernel-livepatch-6_4_0-150600_23_42-default is &gt;=5-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014675" version="1" comment="kernel-livepatch-6_4_0-150600_23_47-default is &gt;=4-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014676" version="1" comment="kernel-livepatch-6_4_0-150600_23_50-default is &gt;=3-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014756" version="1" comment="kernel-livepatch-6_4_0-150600_23_53-default is &gt;=3-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020716" version="1" comment="kernel-livepatch-6_4_0-150600_23_47-default is &gt;=7-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020717" version="1" comment="kernel-livepatch-6_4_0-150600_23_50-default is &gt;=6-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020718" version="1" comment="kernel-livepatch-6_4_0-150600_23_53-default is &gt;=6-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019749" version="1" comment="kernel-default is &lt;6.4.0-150600.23.53.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020207" version="1" comment="kernel-livepatch-6_4_0-150700_5-rt is &gt;=5-150700.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242689"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020719" version="1" comment="kernel-livepatch-6_4_0-150700_53_3-default is &gt;=5-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019746" version="1" comment="kernel-livepatch-6_4_0-150600_23_38-default is &gt;=7-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019717" version="1" comment="kernel-livepatch-6_4_0-150600_23_42-default is &gt;=7-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019718" version="1" comment="kernel-livepatch-6_4_0-150600_23_47-default is &gt;=6-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019747" version="1" comment="kernel-livepatch-6_4_0-150600_23_50-default is &gt;=5-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019748" version="1" comment="kernel-livepatch-6_4_0-150600_23_53-default is &gt;=5-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018809" version="1" comment="kernel-livepatch-6_4_0-150700_5-rt is &gt;=4-150700.3.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242309"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019750" version="1" comment="kernel-livepatch-6_4_0-150700_51-default is &gt;=4-150700.3.9.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019751" version="1" comment="kernel-livepatch-6_4_0-150700_53_3-default is &gt;=4-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023030" version="1" comment="kernel-livepatch-6_4_0-150600_23_47-default is &gt;=8-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023031" version="1" comment="kernel-livepatch-6_4_0-150600_23_50-default is &gt;=7-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023032" version="1" comment="kernel-livepatch-6_4_0-150600_23_53-default is &gt;=7-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022250" version="1" comment="kernel-livepatch-6_4_0-150700_5-rt is &gt;=6-150700.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243194"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023340" version="1" comment="kernel-livepatch-6_4_0-150700_53_3-default is &gt;=6-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043987" version="1" comment="kernel-livepatch-6_4_0-150600_23_33-default is &gt;=18-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068955"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240940"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044018" version="1" comment="kernel-livepatch-6_4_0-150600_23_38-default is &gt;=13-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043988" version="1" comment="kernel-livepatch-6_4_0-150600_23_42-default is &gt;=13-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044019" version="1" comment="kernel-livepatch-6_4_0-150600_23_47-default is &gt;=12-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043989" version="1" comment="kernel-livepatch-6_4_0-150600_23_50-default is &gt;=11-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044020" version="1" comment="kernel-livepatch-6_4_0-150600_23_53-default is &gt;=11-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043649" version="1" comment="kernel-livepatch-6_4_0-150700_5-rt is &gt;=10-150700.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247564"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044021" version="1" comment="kernel-livepatch-6_4_0-150700_51-default is &gt;=10-150700.3.27.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247656"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044022" version="1" comment="kernel-livepatch-6_4_0-150700_53_3-default is &gt;=10-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046340" version="1" comment="kernel-livepatch-6_4_0-150600_23_38-default is &gt;=14-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046341" version="1" comment="kernel-livepatch-6_4_0-150600_23_42-default is &gt;=14-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046294" version="1" comment="kernel-livepatch-6_4_0-150600_23_47-default is &gt;=13-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046342" version="1" comment="kernel-livepatch-6_4_0-150600_23_50-default is &gt;=12-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046343" version="1" comment="kernel-livepatch-6_4_0-150600_23_53-default is &gt;=12-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045281" version="1" comment="kernel-livepatch-6_4_0-150700_5-rt is &gt;=11-150700.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247957"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046344" version="1" comment="kernel-livepatch-6_4_0-150700_51-default is &gt;=11-150700.3.30.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248176"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046345" version="1" comment="kernel-livepatch-6_4_0-150700_53_3-default is &gt;=11-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050992" version="1" comment="kernel-livepatch-6_4_0-150600_23_42-default is &gt;=15-150600.2.3" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249247"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050993" version="1" comment="kernel-livepatch-6_4_0-150600_23_47-default is &gt;=14-150600.2.2" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009234720"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050994" version="1" comment="kernel-livepatch-6_4_0-150600_23_50-default is &gt;=13-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051499" version="1" comment="kernel-livepatch-6_4_0-150600_23_53-default is &gt;=13-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233406"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049627" version="1" comment="kernel-livepatch-6_4_0-150700_5-rt is &gt;=12-150700.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051500" version="1" comment="kernel-livepatch-6_4_0-150700_51-default is &gt;=12-150700.3.33.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050995" version="1" comment="kernel-livepatch-6_4_0-150700_53_3-default is &gt;=12-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019244" version="1" comment="kgraft-patch-4_12_14-122_234-default is &gt;=15-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166487"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019245" version="1" comment="kgraft-patch-4_12_14-122_237-default is &gt;=11-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169834"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019246" version="1" comment="kgraft-patch-4_12_14-122_244-default is &gt;=10-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166504"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019247" version="1" comment="kgraft-patch-4_12_14-122_247-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069141"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019248" version="1" comment="kgraft-patch-4_12_14-122_250-default is &gt;=8-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166491"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019249" version="1" comment="kgraft-patch-4_12_14-122_255-default is &gt;=7-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019250" version="1" comment="kgraft-patch-4_12_14-122_258-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019408" version="1" comment="kernel-livepatch-5_3_18-150300_59_182-default is &gt;=14-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068737"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166550"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019409" version="1" comment="kernel-livepatch-5_3_18-150300_59_185-default is &gt;=12-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068841"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166555"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019460" version="1" comment="kernel-livepatch-5_3_18-150300_59_188-default is &gt;=11-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068958"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019410" version="1" comment="kernel-livepatch-5_3_18-150300_59_195-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019752" version="1" comment="kernel-livepatch-5_3_18-150300_59_198-default is &gt;=8-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166562"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019753" version="1" comment="kernel-livepatch-5_3_18-150300_59_201-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019461" version="1" comment="kernel-livepatch-5_3_18-150300_59_204-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019462" version="1" comment="kernel-livepatch-5_3_18-150300_59_207-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019754" version="1" comment="kernel-default is &lt;6.4.0-150600.23.50.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019251" version="1" comment="kgraft-patch-4_12_14-122_261-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019411" version="1" comment="kgraft-patch-4_12_14-122_266-default is &gt;=4-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169746"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019463" version="1" comment="kernel-livepatch-5_3_18-150300_59_211-default is &gt;=5-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019464" version="1" comment="kernel-livepatch-5_14_21-150400_24_170-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019720" version="1" comment="kernel-livepatch-5_14_21-150500_55_113-default is &gt;=5-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009192071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023033" version="1" comment="kernel-livepatch-6_4_0-150600_23_60-default is &gt;=6-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019759" version="1" comment="kernel-default is &lt;6.4.0-150600.23.60.5" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242583"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023341" version="1" comment="kernel-livepatch-6_4_0-150700_53_6-default is &gt;=6-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017418" version="1" comment="kgraft-patch-4_12_14-122_266-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017419" version="1" comment="kernel-livepatch-5_3_18-150300_59_211-default is &gt;=4-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166578"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017679" version="1" comment="kernel-livepatch-5_14_21-150400_24_170-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017982" version="1" comment="kernel-livepatch-6_4_0-150600_23_60-default is &gt;=3-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018031" version="1" comment="kernel-livepatch-6_4_0-150700_53_6-default is &gt;=3-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019467" version="1" comment="kernel-default is &lt;4.12.14-122.269.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043990" version="1" comment="kernel-livepatch-6_4_0-150600_23_60-default is &gt;=10-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044023" version="1" comment="kernel-livepatch-6_4_0-150700_53_6-default is &gt;=10-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247657"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024448" version="1" comment="kernel-livepatch-6_4_0-150700_5-rt is &gt;=7-150700.5.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243686"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025537" version="1" comment="kernel-livepatch-6_4_0-150700_51-default is &gt;=7-150700.3.18.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025167" version="1" comment="kernel-livepatch-6_4_0-150700_53_3-default is &gt;=7-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025111" version="1" comment="kernel-livepatch-6_4_0-150700_53_6-default is &gt;=7-150700.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243860"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020311" version="1" comment="kgraft-patch-4_12_14-122_261-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020208" version="1" comment="kgraft-patch-4_12_14-122_266-default is &gt;=5-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020744" version="1" comment="kernel-livepatch-5_3_18-150300_59_207-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070242"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020745" version="1" comment="kernel-livepatch-5_3_18-150300_59_211-default is &gt;=6-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020746" version="1" comment="kernel-livepatch-5_3_18-150300_59_215-default is &gt;=3-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009166580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020682" version="1" comment="kernel-livepatch-5_14_21-150400_24_167-default is &gt;=6-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009173644"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020683" version="1" comment="kernel-livepatch-5_14_21-150400_24_170-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020720" version="1" comment="kernel-livepatch-5_14_21-150500_55_110-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020684" version="1" comment="kernel-livepatch-5_14_21-150500_55_113-default is &gt;=6-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199800"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020685" version="1" comment="kernel-livepatch-5_14_21-150500_55_116-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020721" version="1" comment="kernel-livepatch-6_4_0-150600_23_60-default is &gt;=5-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020722" version="1" comment="kernel-livepatch-6_4_0-150700_53_6-default is &gt;=5-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050996" version="1" comment="kernel-livepatch-6_4_0-150600_23_60-default is &gt;=11-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231972"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050997" version="1" comment="kernel-livepatch-6_4_0-150600_23_65-default is &gt;=7-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050998" version="1" comment="kernel-livepatch-6_4_0-150600_23_70-default is &gt;=7-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231973"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023350" version="1" comment="kernel-default is &lt;6.4.0-150600.23.70.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243355"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051501" version="1" comment="kernel-livepatch-6_4_0-150700_53_11-default is &gt;=7-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051502" version="1" comment="kernel-livepatch-6_4_0-150700_53_16-default is &gt;=7-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243878"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051503" version="1" comment="kernel-livepatch-6_4_0-150700_53_6-default is &gt;=11-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248177"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014543" version="1" comment="kernel-livepatch-5_14_21-150500_55_116-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014545" version="1" comment="kernel-livepatch-6_4_0-150600_23_60-default is &gt;=2-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014758" version="1" comment="kernel-livepatch-6_4_0-150700_53_6-default is &gt;=2-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019466" version="1" comment="kgraft-patch-4_12_14-122_269-default is &gt;=2-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009167110"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019756" version="1" comment="kernel-livepatch-5_3_18-150300_59_215-default is &gt;=2-150300.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070651"/>
		<state state_ref="oval:org.opensuse.security:ste:2009168230"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019722" version="1" comment="kernel-livepatch-5_14_21-150400_24_173-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019758" version="1" comment="kernel-livepatch-6_4_0-150600_23_60-default is &gt;=4-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010019760" version="1" comment="kernel-livepatch-6_4_0-150700_53_6-default is &gt;=4-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022815" version="1" comment="kernel-livepatch-5_14_21-150400_24_173-default is &gt;=3-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171148"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023343" version="1" comment="kernel-livepatch-6_4_0-150600_23_65-default is &gt;=2-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023344" version="1" comment="kernel-default is &lt;6.4.0-150600.23.65.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243351"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023035" version="1" comment="kernel-livepatch-6_4_0-150700_53_11-default is &gt;=2-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031658" version="1" comment="kernel-livepatch-6_4_0-150600_23_50-default is &gt;=9-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031477" version="1" comment="kernel-livepatch-6_4_0-150600_23_53-default is &gt;=9-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031478" version="1" comment="kernel-livepatch-6_4_0-150600_23_60-default is &gt;=8-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031479" version="1" comment="kernel-livepatch-6_4_0-150600_23_65-default is &gt;=4-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031907" version="1" comment="kernel-livepatch-6_4_0-150700_53_11-default is &gt;=4-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031908" version="1" comment="kernel-livepatch-6_4_0-150700_53_3-default is &gt;=8-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031909" version="1" comment="kernel-livepatch-6_4_0-150700_53_6-default is &gt;=8-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031659" version="1" comment="kernel-livepatch-6_4_0-150600_23_70-default is &gt;=4-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031910" version="1" comment="kernel-livepatch-6_4_0-150700_53_16-default is &gt;=4-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024670" version="1" comment="kernel-livepatch-6_4_0-150600_23_38-default is &gt;=10-150600.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069143"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024671" version="1" comment="kernel-livepatch-6_4_0-150600_23_42-default is &gt;=10-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231617"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024672" version="1" comment="kernel-livepatch-6_4_0-150600_23_47-default is &gt;=9-150600.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024673" version="1" comment="kernel-livepatch-6_4_0-150600_23_50-default is &gt;=8-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024674" version="1" comment="kernel-livepatch-6_4_0-150600_23_53-default is &gt;=8-150600.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024675" version="1" comment="kernel-livepatch-6_4_0-150600_23_60-default is &gt;=7-150600.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025538" version="1" comment="kernel-livepatch-6_4_0-150600_23_65-default is &gt;=3-150600.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243989"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025112" version="1" comment="kernel-livepatch-6_4_0-150700_53_11-default is &gt;=3-150700.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024676" version="1" comment="kernel-livepatch-6_4_0-150600_23_70-default is &gt;=3-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025113" version="1" comment="kernel-livepatch-6_4_0-150700_53_16-default is &gt;=3-150700.4.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243861"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023346" version="1" comment="kernel-livepatch-5_14_21-150400_24_176-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023038" version="1" comment="kernel-livepatch-5_14_21-150500_55_121-default is &gt;=2-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188242"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023349" version="1" comment="kernel-livepatch-6_4_0-150600_23_70-default is &gt;=2-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010023040" version="1" comment="kernel-livepatch-6_4_0-150700_53_16-default is &gt;=2-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041486" version="1" comment="cluster-md-kmp-64kb is &lt;6.12.0-160000.9.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041487" version="1" comment="cluster-md-kmp-azure is &lt;6.12.0-160000.9.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041488" version="1" comment="cluster-md-kmp-default is &lt;6.12.0-160000.9.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041489" version="1" comment="cluster-md-kmp-rt is &lt;6.12.0-160000.9.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041490" version="1" comment="dlm-kmp-64kb is &lt;6.12.0-160000.9.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041491" version="1" comment="dlm-kmp-azure is &lt;6.12.0-160000.9.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041492" version="1" comment="dlm-kmp-default is &lt;6.12.0-160000.9.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041493" version="1" comment="dlm-kmp-rt is &lt;6.12.0-160000.9.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041494" version="1" comment="dtb-allwinner is &lt;6.12.0-160000.9.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041495" version="1" comment="dtb-altera is &lt;6.12.0-160000.9.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041496" version="1" comment="dtb-amazon is &lt;6.12.0-160000.9.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041497" version="1" comment="dtb-amd is &lt;6.12.0-160000.9.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041498" version="1" comment="dtb-amlogic is &lt;6.12.0-160000.9.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041499" version="1" comment="dtb-apm is &lt;6.12.0-160000.9.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041500" version="1" comment="dtb-apple is &lt;6.12.0-160000.9.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041501" version="1" comment="dtb-arm is &lt;6.12.0-160000.9.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041502" version="1" comment="dtb-broadcom is &lt;6.12.0-160000.9.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041503" version="1" comment="dtb-cavium is &lt;6.12.0-160000.9.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041504" version="1" comment="dtb-exynos is &lt;6.12.0-160000.9.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041505" version="1" comment="dtb-freescale is &lt;6.12.0-160000.9.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041506" version="1" comment="dtb-hisilicon is &lt;6.12.0-160000.9.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041507" version="1" comment="dtb-lg is &lt;6.12.0-160000.9.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041508" version="1" comment="dtb-marvell is &lt;6.12.0-160000.9.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041509" version="1" comment="dtb-mediatek is &lt;6.12.0-160000.9.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041510" version="1" comment="dtb-nvidia is &lt;6.12.0-160000.9.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041511" version="1" comment="dtb-qcom is &lt;6.12.0-160000.9.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041512" version="1" comment="dtb-renesas is &lt;6.12.0-160000.9.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041513" version="1" comment="dtb-rockchip is &lt;6.12.0-160000.9.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041514" version="1" comment="dtb-socionext is &lt;6.12.0-160000.9.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041515" version="1" comment="dtb-sprd is &lt;6.12.0-160000.9.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041516" version="1" comment="dtb-xilinx is &lt;6.12.0-160000.9.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041517" version="1" comment="gfs2-kmp-64kb is &lt;6.12.0-160000.9.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041518" version="1" comment="gfs2-kmp-azure is &lt;6.12.0-160000.9.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041519" version="1" comment="gfs2-kmp-default is &lt;6.12.0-160000.9.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041520" version="1" comment="gfs2-kmp-rt is &lt;6.12.0-160000.9.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041521" version="1" comment="kernel-64kb is &lt;6.12.0-160000.9.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041523" version="1" comment="kernel-64kb-extra is &lt;6.12.0-160000.9.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041524" version="1" comment="kernel-64kb-optional is &lt;6.12.0-160000.9.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041525" version="1" comment="kernel-azure is &lt;6.12.0-160000.9.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041527" version="1" comment="kernel-azure-extra is &lt;6.12.0-160000.9.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041528" version="1" comment="kernel-azure-optional is &lt;6.12.0-160000.9.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041529" version="1" comment="kernel-azure-vdso is &lt;6.12.0-160000.9.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041530" version="1" comment="kernel-default is &lt;6.12.0-160000.9.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041531" version="1" comment="kernel-default-base is &lt;6.12.0-160000.9.1.160000.2.6 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247122"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041533" version="1" comment="kernel-default-extra is &lt;6.12.0-160000.9.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041534" version="1" comment="kernel-default-optional is &lt;6.12.0-160000.9.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041535" version="1" comment="kernel-default-vdso is &lt;6.12.0-160000.9.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041537" version="1" comment="kernel-docs is &lt;6.12.0-160000.9.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041538" version="1" comment="kernel-docs-html is &lt;6.12.0-160000.9.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041539" version="1" comment="kernel-kvmsmall is &lt;6.12.0-160000.9.1 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247124"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041541" version="1" comment="kernel-kvmsmall-vdso is &lt;6.12.0-160000.9.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041542" version="1" comment="kernel-macros is &lt;6.12.0-160000.9.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041543" version="1" comment="kernel-obs-build is &lt;6.12.0-160000.9.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041544" version="1" comment="kernel-obs-qa is &lt;6.12.0-160000.9.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041545" version="1" comment="kernel-rt is &lt;6.12.0-160000.9.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041547" version="1" comment="kernel-rt-extra is &lt;6.12.0-160000.9.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041548" version="1" comment="kernel-rt-optional is &lt;6.12.0-160000.9.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041549" version="1" comment="kernel-rt-vdso is &lt;6.12.0-160000.9.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247121"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041550" version="1" comment="kernel-source is &lt;6.12.0-160000.9.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041551" version="1" comment="kernel-source-vanilla is &lt;6.12.0-160000.9.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247123"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041552" version="1" comment="kernel-syms is &lt;6.12.0-160000.9.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041553" version="1" comment="kernel-zfcpdump is &lt;6.12.0-160000.9.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247125"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041554" version="1" comment="kselftests-kmp-64kb is &lt;6.12.0-160000.9.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041555" version="1" comment="kselftests-kmp-azure is &lt;6.12.0-160000.9.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041556" version="1" comment="kselftests-kmp-default is &lt;6.12.0-160000.9.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041557" version="1" comment="kselftests-kmp-rt is &lt;6.12.0-160000.9.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041558" version="1" comment="ocfs2-kmp-64kb is &lt;6.12.0-160000.9.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247118"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041559" version="1" comment="ocfs2-kmp-azure is &lt;6.12.0-160000.9.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041560" version="1" comment="ocfs2-kmp-default is &lt;6.12.0-160000.9.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247120"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041561" version="1" comment="ocfs2-kmp-rt is &lt;6.12.0-160000.9.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247119"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043991" version="1" comment="kernel-livepatch-5_14_21-150400_24_179-default is &gt;=5-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009172959"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043992" version="1" comment="kernel-livepatch-5_14_21-150500_55_124-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044024" version="1" comment="kernel-livepatch-6_4_0-150600_23_65-default is &gt;=6-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044025" version="1" comment="kernel-livepatch-6_4_0-150700_53_11-default is &gt;=6-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051803" version="1" comment="cluster-md-kmp-64kb is &lt;6.12.0-160000.27.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051984"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051804" version="1" comment="cluster-md-kmp-azure is &lt;6.12.0-160000.27.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047470"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051805" version="1" comment="cluster-md-kmp-default is &lt;6.12.0-160000.27.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051806" version="1" comment="cluster-md-kmp-rt is &lt;6.12.0-160000.27.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051807" version="1" comment="dlm-kmp-64kb is &lt;6.12.0-160000.27.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051808" version="1" comment="dlm-kmp-azure is &lt;6.12.0-160000.27.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047471"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051809" version="1" comment="dlm-kmp-default is &lt;6.12.0-160000.27.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051810" version="1" comment="dlm-kmp-rt is &lt;6.12.0-160000.27.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051811" version="1" comment="dtb-allwinner is &lt;6.12.0-160000.27.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051812" version="1" comment="dtb-altera is &lt;6.12.0-160000.27.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051813" version="1" comment="dtb-amazon is &lt;6.12.0-160000.27.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051814" version="1" comment="dtb-amd is &lt;6.12.0-160000.27.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047493"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051815" version="1" comment="dtb-amlogic is &lt;6.12.0-160000.27.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051816" version="1" comment="dtb-apm is &lt;6.12.0-160000.27.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047495"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051817" version="1" comment="dtb-apple is &lt;6.12.0-160000.27.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060177"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051818" version="1" comment="dtb-arm is &lt;6.12.0-160000.27.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047496"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051819" version="1" comment="dtb-broadcom is &lt;6.12.0-160000.27.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051820" version="1" comment="dtb-cavium is &lt;6.12.0-160000.27.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051821" version="1" comment="dtb-exynos is &lt;6.12.0-160000.27.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051822" version="1" comment="dtb-freescale is &lt;6.12.0-160000.27.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051823" version="1" comment="dtb-hisilicon is &lt;6.12.0-160000.27.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051824" version="1" comment="dtb-lg is &lt;6.12.0-160000.27.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051825" version="1" comment="dtb-marvell is &lt;6.12.0-160000.27.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051826" version="1" comment="dtb-mediatek is &lt;6.12.0-160000.27.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051827" version="1" comment="dtb-nvidia is &lt;6.12.0-160000.27.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051828" version="1" comment="dtb-qcom is &lt;6.12.0-160000.27.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047506"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051829" version="1" comment="dtb-renesas is &lt;6.12.0-160000.27.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051830" version="1" comment="dtb-rockchip is &lt;6.12.0-160000.27.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051831" version="1" comment="dtb-socionext is &lt;6.12.0-160000.27.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051832" version="1" comment="dtb-sprd is &lt;6.12.0-160000.27.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051833" version="1" comment="dtb-xilinx is &lt;6.12.0-160000.27.1 for aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051834" version="1" comment="gfs2-kmp-64kb is &lt;6.12.0-160000.27.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051835" version="1" comment="gfs2-kmp-azure is &lt;6.12.0-160000.27.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047472"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051836" version="1" comment="gfs2-kmp-default is &lt;6.12.0-160000.27.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051837" version="1" comment="gfs2-kmp-rt is &lt;6.12.0-160000.27.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041790"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051838" version="1" comment="kernel-64kb is &lt;6.12.0-160000.27.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051839" version="1" comment="kernel-64kb-extra is &lt;6.12.0-160000.27.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051987"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051840" version="1" comment="kernel-64kb-optional is &lt;6.12.0-160000.27.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051841" version="1" comment="kernel-azure is &lt;6.12.0-160000.27.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051842" version="1" comment="kernel-azure-extra is &lt;6.12.0-160000.27.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051843" version="1" comment="kernel-azure-optional is &lt;6.12.0-160000.27.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051844" version="1" comment="kernel-azure-vdso is &lt;6.12.0-160000.27.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062312"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051845" version="1" comment="kernel-default is &lt;6.12.0-160000.27.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051846" version="1" comment="kernel-default-base is &lt;6.12.0-160000.27.1.160000.2.8 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051847" version="1" comment="kernel-default-extra is &lt;6.12.0-160000.27.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051848" version="1" comment="kernel-default-optional is &lt;6.12.0-160000.27.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051849" version="1" comment="kernel-default-vdso is &lt;6.12.0-160000.27.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051850" version="1" comment="kernel-docs is &lt;6.12.0-160000.27.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032101"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051851" version="1" comment="kernel-docs-html is &lt;6.12.0-160000.27.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051852" version="1" comment="kernel-kvmsmall is &lt;6.12.0-160000.27.1 for aarch64,ppc64le,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051853" version="1" comment="kernel-kvmsmall-vdso is &lt;6.12.0-160000.27.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051854" version="1" comment="kernel-macros is &lt;6.12.0-160000.27.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051855" version="1" comment="kernel-obs-build is &lt;6.12.0-160000.27.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051856" version="1" comment="kernel-obs-qa is &lt;6.12.0-160000.27.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051857" version="1" comment="kernel-rt is &lt;6.12.0-160000.27.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031299"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051858" version="1" comment="kernel-rt-extra is &lt;6.12.0-160000.27.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047932"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051859" version="1" comment="kernel-rt-optional is &lt;6.12.0-160000.27.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051860" version="1" comment="kernel-rt-vdso is &lt;6.12.0-160000.27.1 for x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051861" version="1" comment="kernel-source is &lt;6.12.0-160000.27.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051862" version="1" comment="kernel-source-vanilla is &lt;6.12.0-160000.27.1 for noarch" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051863" version="1" comment="kernel-syms is &lt;6.12.0-160000.27.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051864" version="1" comment="kernel-zfcpdump is &lt;6.12.0-160000.27.1 for s390x" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038375"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249424"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051865" version="1" comment="kselftests-kmp-64kb is &lt;6.12.0-160000.27.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051993"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051866" version="1" comment="kselftests-kmp-azure is &lt;6.12.0-160000.27.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051867" version="1" comment="kselftests-kmp-default is &lt;6.12.0-160000.27.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042097"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051868" version="1" comment="kselftests-kmp-rt is &lt;6.12.0-160000.27.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047939"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051869" version="1" comment="ocfs2-kmp-64kb is &lt;6.12.0-160000.27.1 for aarch64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051994"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051870" version="1" comment="ocfs2-kmp-azure is &lt;6.12.0-160000.27.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051871" version="1" comment="ocfs2-kmp-default is &lt;6.12.0-160000.27.1 for aarch64,ppc64le,s390x,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033152"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051872" version="1" comment="ocfs2-kmp-rt is &lt;6.12.0-160000.27.1 for aarch64,x86_64" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039384"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056187" version="1" comment="kernel-livepatch-5_14_21-150400_24_153-default is &gt;=17-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233296"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056188" version="1" comment="kernel-livepatch-5_14_21-150400_24_158-default is &gt;=16-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056189" version="1" comment="kernel-livepatch-5_14_21-150400_24_161-default is &gt;=16-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069406"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053078" version="1" comment="kernel-livepatch-5_14_21-150400_24_164-default is &gt;=16-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231614"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056190" version="1" comment="kernel-livepatch-5_14_21-150400_24_167-default is &gt;=15-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070115"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226740"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056289" version="1" comment="kernel-livepatch-5_14_21-150400_24_170-default is &gt;=14-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009202840"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053244" version="1" comment="kernel-livepatch-5_14_21-150400_24_173-default is &gt;=11-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053079" version="1" comment="kernel-livepatch-5_14_21-150400_24_176-default is &gt;=10-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009199798"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053245" version="1" comment="kernel-livepatch-5_14_21-150400_24_179-default is &gt;=8-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009175990"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056191" version="1" comment="kernel-livepatch-5_14_21-150500_55_100-default is &gt;=16-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069407"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053498" version="1" comment="kernel-livepatch-5_14_21-150500_55_103-default is &gt;=16-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053499" version="1" comment="kernel-livepatch-5_14_21-150500_55_110-default is &gt;=15-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070235"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053500" version="1" comment="kernel-livepatch-5_14_21-150500_55_113-default is &gt;=14-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070236"/>
		<state state_ref="oval:org.opensuse.security:ste:2009205345"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053501" version="1" comment="kernel-livepatch-5_14_21-150500_55_116-default is &gt;=12-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009203216"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053080" version="1" comment="kernel-livepatch-5_14_21-150500_55_121-default is &gt;=9-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070785"/>
		<state state_ref="oval:org.opensuse.security:ste:2009201545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053081" version="1" comment="kernel-livepatch-5_14_21-150500_55_124-default is &gt;=7-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071507"/>
		<state state_ref="oval:org.opensuse.security:ste:2009200448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053246" version="1" comment="kernel-livepatch-5_14_21-150500_55_97-default is &gt;=17-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009233404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053502" version="1" comment="kernel-livepatch-6_4_0-150600_23_42-default is &gt;=16-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009235705"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053247" version="1" comment="kernel-livepatch-6_4_0-150600_23_47-default is &gt;=15-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241404"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053248" version="1" comment="kernel-livepatch-6_4_0-150600_23_50-default is &gt;=14-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053249" version="1" comment="kernel-livepatch-6_4_0-150600_23_53-default is &gt;=14-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009240941"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056290" version="1" comment="kernel-livepatch-6_4_0-150600_23_60-default is &gt;=12-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009232954"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056192" version="1" comment="kernel-livepatch-6_4_0-150600_23_65-default is &gt;=8-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070823"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053083" version="1" comment="kernel-livepatch-6_4_0-150600_23_70-default is &gt;=8-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230570"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053084" version="1" comment="kernel-livepatch-6_4_0-150600_23_73-default is &gt;=5-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231083"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052765" version="1" comment="kernel-livepatch-6_4_0-150700_5-rt is &gt;=13-150700.3.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249612"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056291" version="1" comment="kernel-livepatch-6_4_0-150700_51-default is &gt;=13-150700.3.36.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070316"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250301"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056193" version="1" comment="kernel-livepatch-6_4_0-150700_53_11-default is &gt;=8-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070784"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053503" version="1" comment="kernel-livepatch-6_4_0-150700_53_16-default is &gt;=8-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245243"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056194" version="1" comment="kernel-livepatch-6_4_0-150700_53_19-default is &gt;=5-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242828"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056195" version="1" comment="kernel-livepatch-6_4_0-150700_53_3-default is &gt;=13-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070317"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250285"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056196" version="1" comment="kernel-livepatch-6_4_0-150700_53_6-default is &gt;=12-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249248"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044026" version="1" comment="kernel-livepatch-6_4_0-150600_23_70-default is &gt;=6-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070825"/>
		<state state_ref="oval:org.opensuse.security:ste:2009231619"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044027" version="1" comment="kernel-livepatch-6_4_0-150600_23_73-default is &gt;=3-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044028" version="1" comment="kernel-livepatch-6_4_0-150700_53_16-default is &gt;=6-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070786"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044029" version="1" comment="kernel-livepatch-6_4_0-150700_53_19-default is &gt;=3-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051000" version="1" comment="kernel-default is ==6.4.0-150600.23.78.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249249"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053504" version="1" comment="kernel-livepatch-6_4_0-150600_23_78-default is &gt;=3-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051005" version="1" comment="kernel-default is &lt;6.4.0-150600.23.78.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249252"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051505" version="1" comment="kernel-default is ==6.4.0-150700.53.22.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249352"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053505" version="1" comment="kernel-livepatch-6_4_0-150700_53_22-default is &gt;=3-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043870" version="1" comment="kgraft-patch-4_12_14-122_275-default is &gt;=3-2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071615"/>
		<state state_ref="oval:org.opensuse.security:ste:2009169749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050999" version="1" comment="kernel-livepatch-6_4_0-150600_23_73-default is &gt;=4-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230571"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051001" version="1" comment="kernel-livepatch-6_4_0-150600_23_78-default is &gt;=2-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051002" version="1" comment="kernel-default is ==6.4.0-150600.23.81.3" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249250"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051003" version="1" comment="kernel-livepatch-6_4_0-150600_23_81-default is &gt;=2-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051004" version="1" comment="kernel-default is &lt;6.4.0-150600.23.81.3" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249251"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051504" version="1" comment="kernel-livepatch-6_4_0-150700_53_19-default is &gt;=4-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242579"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051506" version="1" comment="kernel-livepatch-6_4_0-150700_53_22-default is &gt;=2-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072024"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051507" version="1" comment="kernel-default is ==6.4.0-150700.53.25.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249353"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051508" version="1" comment="kernel-livepatch-6_4_0-150700_53_25-default is &gt;=2-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037847" version="1" comment="bind is &lt;9.20.15-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037848" version="1" comment="bind-doc is &lt;9.20.15-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031554"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037849" version="1" comment="bind-modules-bdbhpt is &lt;9.20.15-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059722"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037850" version="1" comment="bind-modules-generic is &lt;9.20.15-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059723"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037851" version="1" comment="bind-modules-ldap is &lt;9.20.15-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037852" version="1" comment="bind-modules-mysql is &lt;9.20.15-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037853" version="1" comment="bind-modules-perl is &lt;9.20.15-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037854" version="1" comment="bind-modules-sqlite3 is &lt;9.20.15-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037855" version="1" comment="bind-utils is &lt;9.20.15-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030649"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246413"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048393" version="1" comment="kea is &lt;3.0.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069634"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048394" version="1" comment="kea-devel is &lt;3.0.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069635"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048395" version="1" comment="kea-doc is &lt;3.0.1-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069636"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248600"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048396" version="1" comment="kea-hooks is &lt;3.0.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069637"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048397" version="1" comment="libkea-asiodns62 is &lt;3.0.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070527"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048398" version="1" comment="libkea-asiolink88 is &lt;3.0.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070528"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048399" version="1" comment="libkea-cc82 is &lt;3.0.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048443" version="1" comment="libkea-cc82 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048400" version="1" comment="libkea-cfgrpt3 is &lt;3.0.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070530"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048401" version="1" comment="libkea-config83 is &lt;3.0.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048445" version="1" comment="libkea-config83 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048402" version="1" comment="libkea-cryptolink64 is &lt;3.0.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048403" version="1" comment="libkea-d2srv63 is &lt;3.0.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048404" version="1" comment="libkea-database76 is &lt;3.0.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048405" version="1" comment="libkea-dhcp109 is &lt;3.0.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048406" version="1" comment="libkea-dhcp_ddns68 is &lt;3.0.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048407" version="1" comment="libkea-dhcpsrv130 is &lt;3.0.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048451" version="1" comment="libkea-dhcpsrv130 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070537"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048408" version="1" comment="libkea-dns71 is &lt;3.0.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048409" version="1" comment="libkea-eval84 is &lt;3.0.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070539"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048410" version="1" comment="libkea-exceptions45 is &lt;3.0.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070540"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048411" version="1" comment="libkea-hooks119 is &lt;3.0.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048455" version="1" comment="libkea-hooks119 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070541"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048412" version="1" comment="libkea-http87 is &lt;3.0.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070542"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048413" version="1" comment="libkea-log-interprocess3 is &lt;3.0.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070543"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048414" version="1" comment="libkea-log75 is &lt;3.0.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070544"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048415" version="1" comment="libkea-mysql88 is &lt;3.0.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070545"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048416" version="1" comment="libkea-pgsql88 is &lt;3.0.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070546"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048417" version="1" comment="libkea-process90 is &lt;3.0.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048461" version="1" comment="libkea-process90 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070547"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048418" version="1" comment="libkea-stats53 is &lt;3.0.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070548"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048419" version="1" comment="libkea-tcp33 is &lt;3.0.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070549"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048420" version="1" comment="libkea-util-io12 is &lt;3.0.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048421" version="1" comment="libkea-util101 is &lt;3.0.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048465" version="1" comment="libkea-util101 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048422" version="1" comment="python3-kea is &lt;3.0.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069633"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248599"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038469" version="1" comment="libvmtools-devel is &lt;13.0.5-160000.1.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152856" version="1" comment="libvmtools-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038470" version="1" comment="libvmtools0 is &lt;13.0.5-160000.1.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152857" version="1" comment="libvmtools0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038471" version="1" comment="open-vm-tools is &lt;13.0.5-160000.1.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152858" version="1" comment="open-vm-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034562"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038472" version="1" comment="open-vm-tools-containerinfo is &lt;13.0.5-160000.1.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009781019" version="1" comment="open-vm-tools-containerinfo is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038473" version="1" comment="open-vm-tools-desktop is &lt;13.0.5-160000.1.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152859" version="1" comment="open-vm-tools-desktop is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041467"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038474" version="1" comment="open-vm-tools-salt-minion is &lt;13.0.5-160000.1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246514"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009769148" version="1" comment="open-vm-tools-salt-minion is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060309"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038475" version="1" comment="open-vm-tools-sdmp is &lt;13.0.5-160000.1.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246513"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009708084" version="1" comment="open-vm-tools-sdmp is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053388" version="1" comment="tar is &lt;1.35-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151391" version="1" comment="tar is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030401"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053389" version="1" comment="tar-backup-scripts is &lt;1.35-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153774" version="1" comment="tar-backup-scripts is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053390" version="1" comment="tar-doc is &lt;1.35-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009251575" version="1" comment="tar-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053391" version="1" comment="tar-lang is &lt;1.35-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151392" version="1" comment="tar-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053392" version="1" comment="tar-rmt is &lt;1.35-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177166" version="1" comment="tar-rmt is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042566"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053393" version="1" comment="tar-tests is &lt;1.35-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153775" version="1" comment="tar-tests is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050202" version="1" comment="libprotobuf-lite28_3_0 is &lt;28.3-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050223" version="1" comment="libprotobuf-lite28_3_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050016" version="1" comment="libprotobuf28_3_0 is &lt;28.3-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050224" version="1" comment="libprotobuf28_3_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069243"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050203" version="1" comment="libprotoc28_3_0 is &lt;28.3-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050225" version="1" comment="libprotoc28_3_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069245"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050017" version="1" comment="libutf8_range-28_3_0 is &lt;28.3-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050226" version="1" comment="libutf8_range-28_3_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069247"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050204" version="1" comment="protobuf-devel is &lt;28.3-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677909" version="1" comment="protobuf-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050205" version="1" comment="protobuf-java is &lt;28.3-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009677910" version="1" comment="protobuf-java is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050206" version="1" comment="protobuf-java-bom is &lt;28.3-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007673" version="1" comment="protobuf-java-bom is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069804"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050207" version="1" comment="protobuf-java-javadoc is &lt;28.3-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050227" version="1" comment="protobuf-java-javadoc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071985"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050208" version="1" comment="protobuf-java-parent is &lt;28.3-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249027"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010007674" version="1" comment="protobuf-java-parent is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069805"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050209" version="1" comment="python313-protobuf is &lt;5.28.3-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249028"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050228" version="1" comment="python313-protobuf is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071986"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039709" version="1" comment="busybox is &lt;1.37.0-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152555" version="1" comment="busybox is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039710" version="1" comment="busybox-static is &lt;1.37.0-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009653584" version="1" comment="busybox-static is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039711" version="1" comment="busybox-warewulf3 is &lt;1.37.0-160000.4.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724864" version="1" comment="busybox-warewulf3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031629" version="1" comment="liblasso-devel is &lt;2.8.2-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625538" version="1" comment="liblasso-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052193"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031630" version="1" comment="liblasso3 is &lt;2.8.2-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625539" version="1" comment="liblasso3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052194"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010031631" version="1" comment="python3-lasso is &lt;2.8.2-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245178"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625540" version="1" comment="python3-lasso is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052195"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035662" version="1" comment="redis is &lt;8.2.3-bp160.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245997"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152049" version="1" comment="redis is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038991"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037150" version="1" comment="valkey is &lt;8.0.6-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982165" version="1" comment="valkey is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037151" version="1" comment="valkey-compat-redis is &lt;8.0.6-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246260"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982166" version="1" comment="valkey-compat-redis is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037152" version="1" comment="valkey-devel is &lt;8.0.6-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009982167" version="1" comment="valkey-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068448"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052277" version="1" comment="net-tools is &lt;2.10-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018364" version="1" comment="net-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052589" version="1" comment="net-tools-deprecated is &lt;2.10-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018365" version="1" comment="net-tools-deprecated is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052278" version="1" comment="net-tools-lang is &lt;2.10-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010018366" version="1" comment="net-tools-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033428" version="1" comment="go1.25 is &lt;1.25.5-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014715" version="1" comment="go1.25 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033429" version="1" comment="go1.25-doc is &lt;1.25.5-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014716" version="1" comment="go1.25-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033430" version="1" comment="go1.25-libstd is &lt;1.25.5-160000.1.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245546"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033450" version="1" comment="go1.25-libstd is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033431" version="1" comment="go1.25-race is &lt;1.25.5-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245545"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010014717" version="1" comment="go1.25-race is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037881" version="1" comment="alloy is &lt;1.12.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246419"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047338" version="1" comment="gitea-tea is &lt;0.12.0-bp160.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248380"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968665" version="1" comment="gitea-tea is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069319"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047339" version="1" comment="gitea-tea-bash-completion is &lt;0.12.0-bp160.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968666" version="1" comment="gitea-tea-bash-completion is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069320"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047340" version="1" comment="gitea-tea-zsh-completion is &lt;0.12.0-bp160.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248381"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009968667" version="1" comment="gitea-tea-zsh-completion is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069321"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047570" version="1" comment="helm is &lt;3.19.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248444"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718853" version="1" comment="helm is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047571" version="1" comment="helm-bash-completion is &lt;3.19.1-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718854" version="1" comment="helm-bash-completion is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052918"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047572" version="1" comment="helm-fish-completion is &lt;3.19.1-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718855" version="1" comment="helm-fish-completion is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060272"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047573" version="1" comment="helm-zsh-completion is &lt;3.19.1-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009718856" version="1" comment="helm-zsh-completion is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052919"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043899" version="1" comment="kepler is &lt;0.11.3-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247636"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043907" version="1" comment="kepler is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068944"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039738" version="1" comment="sbctl is &lt;0.18-bp160.1.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039767" version="1" comment="sbctl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070556"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037211" version="1" comment="trivy is &lt;0.68.2-bp160.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246271"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033432" version="1" comment="go1.24 is &lt;1.24.11-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961683" version="1" comment="go1.24 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033433" version="1" comment="go1.24-doc is &lt;1.24.11-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961684" version="1" comment="go1.24-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033434" version="1" comment="go1.24-libstd is &lt;1.24.11-160000.1.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245548"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033451" version="1" comment="go1.24-libstd is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047321" version="1" comment="go1.24-openssl is &lt;1.24.13-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017809" version="1" comment="go1.24-openssl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069741"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047322" version="1" comment="go1.24-openssl-doc is &lt;1.24.13-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017810" version="1" comment="go1.24-openssl-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047323" version="1" comment="go1.24-openssl-race is &lt;1.24.13-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017811" version="1" comment="go1.24-openssl-race is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033435" version="1" comment="go1.24-race is &lt;1.24.11-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245547"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961685" version="1" comment="go1.24-race is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047311" version="1" comment="go1.25-openssl is &lt;1.25.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017812" version="1" comment="go1.25-openssl is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070616"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047312" version="1" comment="go1.25-openssl-doc is &lt;1.25.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017813" version="1" comment="go1.25-openssl-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047313" version="1" comment="go1.25-openssl-race is &lt;1.25.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017814" version="1" comment="go1.25-openssl-race is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032562" version="1" comment="act is &lt;0.2.64-bp160.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245359"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032318" version="1" comment="act is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048653" version="1" comment="amazon-ssm-agent is &lt;3.3.2299.0-160000.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248643"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009682775" version="1" comment="amazon-ssm-agent is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059661"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052590" version="1" comment="docker-compose is &lt;2.33.1-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249573"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052706" version="1" comment="docker-compose is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037861" version="1" comment="erlang is &lt;27.1.3-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168070" version="1" comment="erlang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037862" version="1" comment="erlang-debugger is &lt;27.1.3-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168072" version="1" comment="erlang-debugger is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037863" version="1" comment="erlang-debugger-src is &lt;27.1.3-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168074" version="1" comment="erlang-debugger-src is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037864" version="1" comment="erlang-dialyzer is &lt;27.1.3-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168076" version="1" comment="erlang-dialyzer is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037865" version="1" comment="erlang-dialyzer-src is &lt;27.1.3-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168078" version="1" comment="erlang-dialyzer-src is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037866" version="1" comment="erlang-diameter is &lt;27.1.3-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168080" version="1" comment="erlang-diameter is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037867" version="1" comment="erlang-diameter-src is &lt;27.1.3-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168082" version="1" comment="erlang-diameter-src is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037868" version="1" comment="erlang-doc is &lt;27.1.3-160000.3.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246418"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168084" version="1" comment="erlang-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037869" version="1" comment="erlang-epmd is &lt;27.1.3-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168086" version="1" comment="erlang-epmd is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037870" version="1" comment="erlang-et is &lt;27.1.3-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168088" version="1" comment="erlang-et is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039864"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037871" version="1" comment="erlang-et-src is &lt;27.1.3-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168090" version="1" comment="erlang-et-src is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037872" version="1" comment="erlang-jinterface is &lt;27.1.3-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168096" version="1" comment="erlang-jinterface is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039868"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037873" version="1" comment="erlang-jinterface-src is &lt;27.1.3-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168098" version="1" comment="erlang-jinterface-src is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039869"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037874" version="1" comment="erlang-observer is &lt;27.1.3-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168100" version="1" comment="erlang-observer is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037875" version="1" comment="erlang-observer-src is &lt;27.1.3-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168102" version="1" comment="erlang-observer-src is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037876" version="1" comment="erlang-reltool is &lt;27.1.3-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168104" version="1" comment="erlang-reltool is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039872"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037877" version="1" comment="erlang-reltool-src is &lt;27.1.3-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168106" version="1" comment="erlang-reltool-src is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037878" version="1" comment="erlang-src is &lt;27.1.3-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168108" version="1" comment="erlang-src is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037879" version="1" comment="erlang-wx is &lt;27.1.3-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168110" version="1" comment="erlang-wx is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037880" version="1" comment="erlang-wx-src is &lt;27.1.3-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246417"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009168112" version="1" comment="erlang-wx-src is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009039876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032507" version="1" comment="libmozjs-128-0 is &lt;128.14.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032510" version="1" comment="libmozjs-128-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032508" version="1" comment="mozjs128 is &lt;128.14.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032511" version="1" comment="mozjs128 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032509" version="1" comment="mozjs128-devel is &lt;128.14.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245349"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032512" version="1" comment="mozjs128-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030566" version="1" comment="libpoppler-cpp2 is &lt;25.04.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069400"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030567" version="1" comment="libpoppler-devel is &lt;25.04.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030568" version="1" comment="libpoppler-glib-devel is &lt;25.04.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030569" version="1" comment="libpoppler-glib8 is &lt;25.04.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037288"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030570" version="1" comment="libpoppler-qt5-1 is &lt;25.04.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030571" version="1" comment="libpoppler-qt5-devel is &lt;25.04.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040433"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030572" version="1" comment="libpoppler-qt6-3 is &lt;25.04.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030573" version="1" comment="libpoppler-qt6-devel is &lt;25.04.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061010"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030574" version="1" comment="libpoppler148 is &lt;25.04.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069402"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030575" version="1" comment="poppler-tools is &lt;25.04.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030576" version="1" comment="typelib-1_0-Poppler-0_18 is &lt;25.04.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244983"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032334" version="1" comment="java-17-openjdk is &lt;17.0.17.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704325" version="1" comment="java-17-openjdk is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032335" version="1" comment="java-17-openjdk-demo is &lt;17.0.17.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704327" version="1" comment="java-17-openjdk-demo is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032336" version="1" comment="java-17-openjdk-devel is &lt;17.0.17.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704328" version="1" comment="java-17-openjdk-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032337" version="1" comment="java-17-openjdk-headless is &lt;17.0.17.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704329" version="1" comment="java-17-openjdk-headless is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032338" version="1" comment="java-17-openjdk-javadoc is &lt;17.0.17.0-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245317"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704330" version="1" comment="java-17-openjdk-javadoc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032339" version="1" comment="java-17-openjdk-jmods is &lt;17.0.17.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704331" version="1" comment="java-17-openjdk-jmods is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032340" version="1" comment="java-17-openjdk-src is &lt;17.0.17.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245316"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704332" version="1" comment="java-17-openjdk-src is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032327" version="1" comment="java-21-openjdk is &lt;21.0.9.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875276" version="1" comment="java-21-openjdk is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032328" version="1" comment="java-21-openjdk-demo is &lt;21.0.9.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875277" version="1" comment="java-21-openjdk-demo is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032329" version="1" comment="java-21-openjdk-devel is &lt;21.0.9.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875278" version="1" comment="java-21-openjdk-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032330" version="1" comment="java-21-openjdk-headless is &lt;21.0.9.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875279" version="1" comment="java-21-openjdk-headless is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032331" version="1" comment="java-21-openjdk-javadoc is &lt;21.0.9.0-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245315"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875280" version="1" comment="java-21-openjdk-javadoc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032332" version="1" comment="java-21-openjdk-jmods is &lt;21.0.9.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875281" version="1" comment="java-21-openjdk-jmods is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032333" version="1" comment="java-21-openjdk-src is &lt;21.0.9.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245314"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009875282" version="1" comment="java-21-openjdk-src is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047302" version="1" comment="cpp-httplib-devel is &lt;0.22.0-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009964479" version="1" comment="cpp-httplib-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047303" version="1" comment="libcpp-httplib0_22 is &lt;0.22.0-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248369"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037918" version="1" comment="libcpp-httplib0_22 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043894" version="1" comment="python313-Brotli is &lt;1.1.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247632"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043908" version="1" comment="python313-Brotli is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043895" version="1" comment="python313-aiohttp is &lt;3.11.16-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247633"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043909" version="1" comment="python313-aiohttp is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068776"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045690" version="1" comment="7zip is &lt;25.01-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248058"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017317" version="1" comment="7zip is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070581"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035668" version="1" comment="exim is &lt;4.98.2-bp160.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153580" version="1" comment="exim is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035669" version="1" comment="eximon is &lt;4.98.2-bp160.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153581" version="1" comment="eximon is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035670" version="1" comment="eximstats-html is &lt;4.98.2-bp160.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246003"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153582" version="1" comment="eximstats-html is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033836"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050725" version="1" comment="gvim is &lt;9.2.0110-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151192" version="1" comment="gvim is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030753"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050726" version="1" comment="vim is &lt;9.2.0110-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151193" version="1" comment="vim is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032775"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050727" version="1" comment="vim-data is &lt;9.2.0110-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151194" version="1" comment="vim-data is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050022" version="1" comment="vim-data-common is &lt;9.2.0110-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248984"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177135" version="1" comment="vim-data-common is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042567"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050023" version="1" comment="vim-small is &lt;9.2.0110-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009670993" version="1" comment="vim-small is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050728" version="1" comment="xxd is &lt;9.2.0110-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248985"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009756472" version="1" comment="xxd is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037884" version="1" comment="docker is &lt;28.5.1_ce-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246421"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152505" version="1" comment="docker is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037885" version="1" comment="docker-bash-completion is &lt;28.5.1_ce-160000.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152506" version="1" comment="docker-bash-completion is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037886" version="1" comment="docker-buildx is &lt;0.29.0-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246423"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037917" version="1" comment="docker-buildx is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037887" version="1" comment="docker-fish-completion is &lt;28.5.1_ce-160000.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009343480" version="1" comment="docker-fish-completion is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037888" version="1" comment="docker-rootless-extras is &lt;28.5.1_ce-160000.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009817681" version="1" comment="docker-rootless-extras is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037889" version="1" comment="docker-zsh-completion is &lt;28.5.1_ce-160000.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246422"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152508" version="1" comment="docker-zsh-completion is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052692" version="1" comment="himmelblau is &lt;2.3.8+git0.dec3693-160000.1.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032129" version="1" comment="himmelblau is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052693" version="1" comment="himmelblau-qr-greeter is &lt;2.3.8+git0.dec3693-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032130" version="1" comment="himmelblau-qr-greeter is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052694" version="1" comment="himmelblau-sshd-config is &lt;2.3.8+git0.dec3693-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249592"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032131" version="1" comment="himmelblau-sshd-config is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052695" version="1" comment="himmelblau-sso is &lt;2.3.8+git0.dec3693-160000.1.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032132" version="1" comment="himmelblau-sso is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052696" version="1" comment="libnss_himmelblau2 is &lt;2.3.8+git0.dec3693-160000.1.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032133" version="1" comment="libnss_himmelblau2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052697" version="1" comment="pam-himmelblau is &lt;2.3.8+git0.dec3693-160000.1.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249591"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032134" version="1" comment="pam-himmelblau is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044193" version="1" comment="corepack22 is &lt;22.22.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961686" version="1" comment="corepack22 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044194" version="1" comment="nodejs22 is &lt;22.22.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961687" version="1" comment="nodejs22 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044195" version="1" comment="nodejs22-devel is &lt;22.22.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961688" version="1" comment="nodejs22-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044196" version="1" comment="nodejs22-docs is &lt;22.22.0-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247699"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961689" version="1" comment="nodejs22-docs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044197" version="1" comment="npm22 is &lt;22.22.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247698"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009961690" version="1" comment="npm22 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024369" version="1" comment="flake-pilot is &lt;3.1.22-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024388" version="1" comment="flake-pilot is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024370" version="1" comment="flake-pilot-firecracker is &lt;3.1.22-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024389" version="1" comment="flake-pilot-firecracker is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024371" version="1" comment="flake-pilot-firecracker-dracut-netstart is &lt;3.1.22-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243662"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024390" version="1" comment="flake-pilot-firecracker-dracut-netstart is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069876"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024372" version="1" comment="flake-pilot-firecracker-guestvm-tools is &lt;3.1.22-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024391" version="1" comment="flake-pilot-firecracker-guestvm-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069877"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024373" version="1" comment="flake-pilot-podman is &lt;3.1.22-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243661"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024392" version="1" comment="flake-pilot-podman is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047574" version="1" comment="gstreamer is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154019" version="1" comment="gstreamer is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047575" version="1" comment="gstreamer-devel is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154021" version="1" comment="gstreamer-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041488"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047576" version="1" comment="gstreamer-devtools is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047679" version="1" comment="gstreamer-devtools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047577" version="1" comment="gstreamer-devtools-devel is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047680" version="1" comment="gstreamer-devtools-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047578" version="1" comment="gstreamer-docs is &lt;1.26.7-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047681" version="1" comment="gstreamer-docs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071870"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047579" version="1" comment="gstreamer-lang is &lt;1.26.7-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154023" version="1" comment="gstreamer-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041490"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047580" version="1" comment="gstreamer-plugins-bad is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153876" version="1" comment="gstreamer-plugins-bad is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041149"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047581" version="1" comment="gstreamer-plugins-bad-chromaprint is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009476859" version="1" comment="gstreamer-plugins-bad-chromaprint is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049512"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047582" version="1" comment="gstreamer-plugins-bad-devel is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153878" version="1" comment="gstreamer-plugins-bad-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041151"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047583" version="1" comment="gstreamer-plugins-bad-lang is &lt;1.26.7-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153880" version="1" comment="gstreamer-plugins-bad-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047584" version="1" comment="gstreamer-plugins-base is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153927" version="1" comment="gstreamer-plugins-base is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041337"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047585" version="1" comment="gstreamer-plugins-base-devel is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153929" version="1" comment="gstreamer-plugins-base-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047586" version="1" comment="gstreamer-plugins-base-lang is &lt;1.26.7-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153931" version="1" comment="gstreamer-plugins-base-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041341"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047587" version="1" comment="gstreamer-plugins-good is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153915" version="1" comment="gstreamer-plugins-good is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041307"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047588" version="1" comment="gstreamer-plugins-good-extra is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153918" version="1" comment="gstreamer-plugins-good-extra is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041333"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047589" version="1" comment="gstreamer-plugins-good-gtk is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009476863" version="1" comment="gstreamer-plugins-good-gtk is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047590" version="1" comment="gstreamer-plugins-good-jack is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009476864" version="1" comment="gstreamer-plugins-good-jack is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047591" version="1" comment="gstreamer-plugins-good-lang is &lt;1.26.7-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153920" version="1" comment="gstreamer-plugins-good-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041308"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047592" version="1" comment="gstreamer-plugins-good-qtqml6 is &lt;1.26.7-160000.1.1 for ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248448"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047682" version="1" comment="gstreamer-plugins-good-qtqml6 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047593" version="1" comment="gstreamer-plugins-libav is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047683" version="1" comment="gstreamer-plugins-libav is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047594" version="1" comment="gstreamer-plugins-rs is &lt;1.26.7+git0.6ab75814-160000.1.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248449"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010022222" version="1" comment="gstreamer-plugins-rs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060389"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047595" version="1" comment="gstreamer-plugins-ugly is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177245" version="1" comment="gstreamer-plugins-ugly is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047596" version="1" comment="gstreamer-plugins-ugly-lang is &lt;1.26.7-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248447"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177246" version="1" comment="gstreamer-plugins-ugly-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047597" version="1" comment="gstreamer-rtsp-server-devel is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009281635" version="1" comment="gstreamer-rtsp-server-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048764"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047598" version="1" comment="gstreamer-transcoder is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813195" version="1" comment="gstreamer-transcoder is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052891"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047599" version="1" comment="gstreamer-transcoder-devel is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813197" version="1" comment="gstreamer-transcoder-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047600" version="1" comment="gstreamer-utils is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154024" version="1" comment="gstreamer-utils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041491"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049112" version="1" comment="keylime-ima-policy is &lt;0.2.8+116-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049138" version="1" comment="keylime-ima-policy is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062034"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047601" version="1" comment="libgstadaptivedemux-1_0-0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154275" version="1" comment="libgstadaptivedemux-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041310"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047602" version="1" comment="libgstallocators-1_0-0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153932" version="1" comment="libgstallocators-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041342"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047603" version="1" comment="libgstanalytics-1_0-0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997376" version="1" comment="libgstanalytics-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047604" version="1" comment="libgstapp-1_0-0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153936" version="1" comment="libgstapp-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047605" version="1" comment="libgstaudio-1_0-0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153938" version="1" comment="libgstaudio-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041346"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047606" version="1" comment="libgstbadaudio-1_0-0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154277" version="1" comment="libgstbadaudio-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041311"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047607" version="1" comment="libgstbasecamerabinsrc-1_0-0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153886" version="1" comment="libgstbasecamerabinsrc-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047608" version="1" comment="libgstcodecparsers-1_0-0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153890" version="1" comment="libgstcodecparsers-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047609" version="1" comment="libgstcodecs-1_0-0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698063" version="1" comment="libgstcodecs-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047610" version="1" comment="libgstcuda-1_0-0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813277" version="1" comment="libgstcuda-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062275"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047611" version="1" comment="libgstdxva-1_0-0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997379" version="1" comment="libgstdxva-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047612" version="1" comment="libgstfft-1_0-0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153940" version="1" comment="libgstfft-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047613" version="1" comment="libgstgl-1_0-0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153892" version="1" comment="libgstgl-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047614" version="1" comment="libgstinsertbin-1_0-0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153894" version="1" comment="libgstinsertbin-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047615" version="1" comment="libgstisoff-1_0-0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009476869" version="1" comment="libgstisoff-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049513"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047616" version="1" comment="libgstmpegts-1_0-0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153896" version="1" comment="libgstmpegts-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041166"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047617" version="1" comment="libgstmse-1_0-0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997382" version="1" comment="libgstmse-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066627"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047618" version="1" comment="libgstpbutils-1_0-0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153944" version="1" comment="libgstpbutils-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047619" version="1" comment="libgstphotography-1_0-0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153899" version="1" comment="libgstphotography-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041168"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047620" version="1" comment="libgstplay-1_0-0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698064" version="1" comment="libgstplay-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059846"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047621" version="1" comment="libgstplayer-1_0-0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154279" version="1" comment="libgstplayer-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041327"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047622" version="1" comment="libgstreamer-1_0-0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154025" version="1" comment="libgstreamer-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047623" version="1" comment="libgstriff-1_0-0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153946" version="1" comment="libgstriff-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047624" version="1" comment="libgstrtp-1_0-0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153948" version="1" comment="libgstrtp-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047625" version="1" comment="libgstrtsp-1_0-0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153950" version="1" comment="libgstrtsp-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047626" version="1" comment="libgstrtspserver-1_0-0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009281636" version="1" comment="libgstrtspserver-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047627" version="1" comment="libgstsctp-1_0-0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009476871" version="1" comment="libgstsctp-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049514"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047628" version="1" comment="libgstsdp-1_0-0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153952" version="1" comment="libgstsdp-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047629" version="1" comment="libgsttag-1_0-0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153954" version="1" comment="libgsttag-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047630" version="1" comment="libgsttranscoder-1_0-0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813239" version="1" comment="libgsttranscoder-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052895"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047631" version="1" comment="libgsturidownloader-1_0-0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153902" version="1" comment="libgsturidownloader-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041170"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047632" version="1" comment="libgstva-1_0-0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698065" version="1" comment="libgstva-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059856"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047633" version="1" comment="libgstvalidate-1_0-0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047684" version="1" comment="libgstvalidate-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047634" version="1" comment="libgstvideo-1_0-0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153956" version="1" comment="libgstvideo-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047635" version="1" comment="libgstvulkan-1_0-0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698066" version="1" comment="libgstvulkan-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047636" version="1" comment="libgstwayland-1_0-0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153905" version="1" comment="libgstwayland-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047637" version="1" comment="libgstwebrtc-1_0-0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009476873" version="1" comment="libgstwebrtc-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047638" version="1" comment="libgstwebrtcnice-1_0-0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813280" version="1" comment="libgstwebrtcnice-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062276"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049113" version="1" comment="rust-keylime is &lt;0.2.8+116-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248764"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049139" version="1" comment="rust-keylime is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047639" version="1" comment="typelib-1_0-CudaGst-1_0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813283" version="1" comment="typelib-1_0-CudaGst-1_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047640" version="1" comment="typelib-1_0-Gst-1_0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154027" version="1" comment="typelib-1_0-Gst-1_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041494"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047641" version="1" comment="typelib-1_0-GstAllocators-1_0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153958" version="1" comment="typelib-1_0-GstAllocators-1_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047642" version="1" comment="typelib-1_0-GstAnalytics-1_0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997387" version="1" comment="typelib-1_0-GstAnalytics-1_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047643" version="1" comment="typelib-1_0-GstApp-1_0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153960" version="1" comment="typelib-1_0-GstApp-1_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041365"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047644" version="1" comment="typelib-1_0-GstAudio-1_0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153961" version="1" comment="typelib-1_0-GstAudio-1_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041366"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047645" version="1" comment="typelib-1_0-GstBadAudio-1_0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813260" version="1" comment="typelib-1_0-GstBadAudio-1_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052898"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047646" version="1" comment="typelib-1_0-GstCodecs-1_0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813262" version="1" comment="typelib-1_0-GstCodecs-1_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047647" version="1" comment="typelib-1_0-GstCuda-1_0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813284" version="1" comment="typelib-1_0-GstCuda-1_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047648" version="1" comment="typelib-1_0-GstDxva-1_0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997388" version="1" comment="typelib-1_0-GstDxva-1_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066630"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047649" version="1" comment="typelib-1_0-GstGL-1_0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009476875" version="1" comment="typelib-1_0-GstGL-1_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047650" version="1" comment="typelib-1_0-GstGLEGL-1_0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777499" version="1" comment="typelib-1_0-GstGLEGL-1_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047651" version="1" comment="typelib-1_0-GstGLWayland-1_0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777500" version="1" comment="typelib-1_0-GstGLWayland-1_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047652" version="1" comment="typelib-1_0-GstGLX11-1_0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009777501" version="1" comment="typelib-1_0-GstGLX11-1_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047653" version="1" comment="typelib-1_0-GstInsertBin-1_0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009476876" version="1" comment="typelib-1_0-GstInsertBin-1_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047654" version="1" comment="typelib-1_0-GstMpegts-1_0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009476877" version="1" comment="typelib-1_0-GstMpegts-1_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042735"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047655" version="1" comment="typelib-1_0-GstMse-1_0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009997389" version="1" comment="typelib-1_0-GstMse-1_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066631"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047656" version="1" comment="typelib-1_0-GstPbutils-1_0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153964" version="1" comment="typelib-1_0-GstPbutils-1_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041368"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047657" version="1" comment="typelib-1_0-GstPlay-1_0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813266" version="1" comment="typelib-1_0-GstPlay-1_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047658" version="1" comment="typelib-1_0-GstPlayer-1_0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009476878" version="1" comment="typelib-1_0-GstPlayer-1_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042736"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047659" version="1" comment="typelib-1_0-GstRtp-1_0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153966" version="1" comment="typelib-1_0-GstRtp-1_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047660" version="1" comment="typelib-1_0-GstRtsp-1_0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153967" version="1" comment="typelib-1_0-GstRtsp-1_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047661" version="1" comment="typelib-1_0-GstRtspServer-1_0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009281637" version="1" comment="typelib-1_0-GstRtspServer-1_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048766"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047662" version="1" comment="typelib-1_0-GstSdp-1_0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153968" version="1" comment="typelib-1_0-GstSdp-1_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041372"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047663" version="1" comment="typelib-1_0-GstTag-1_0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153969" version="1" comment="typelib-1_0-GstTag-1_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041373"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047664" version="1" comment="typelib-1_0-GstTranscoder-1_0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813269" version="1" comment="typelib-1_0-GstTranscoder-1_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052900"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047665" version="1" comment="typelib-1_0-GstVa-1_0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813285" version="1" comment="typelib-1_0-GstVa-1_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047666" version="1" comment="typelib-1_0-GstValidate-1_0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047685" version="1" comment="typelib-1_0-GstValidate-1_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047667" version="1" comment="typelib-1_0-GstVideo-1_0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153970" version="1" comment="typelib-1_0-GstVideo-1_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041374"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047668" version="1" comment="typelib-1_0-GstVulkan-1_0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813271" version="1" comment="typelib-1_0-GstVulkan-1_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052901"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047669" version="1" comment="typelib-1_0-GstVulkanWayland-1_0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813273" version="1" comment="typelib-1_0-GstVulkanWayland-1_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047670" version="1" comment="typelib-1_0-GstVulkanXCB-1_0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009813275" version="1" comment="typelib-1_0-GstVulkanXCB-1_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052903"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047671" version="1" comment="typelib-1_0-GstWebRTC-1_0 is &lt;1.26.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248446"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009476879" version="1" comment="typelib-1_0-GstWebRTC-1_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049516"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037703" version="1" comment="hawk2 is &lt;2.7.0+git.1742310530.bfcd0e2c-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246386"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009341551" version="1" comment="hawk2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047678" version="1" comment="python313-PyPDF2 is &lt;2.11.1-bp160.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248453"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047686" version="1" comment="python313-PyPDF2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034111" version="1" comment="ImageMagick is &lt;7.1.2.0-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151674" version="1" comment="ImageMagick is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034112" version="1" comment="ImageMagick-config-7-SUSE is &lt;7.1.2.0-160000.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009252941" version="1" comment="ImageMagick-config-7-SUSE is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034113" version="1" comment="ImageMagick-config-7-upstream-limited is &lt;7.1.2.0-160000.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977490" version="1" comment="ImageMagick-config-7-upstream-limited is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034114" version="1" comment="ImageMagick-config-7-upstream-open is &lt;7.1.2.0-160000.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977491" version="1" comment="ImageMagick-config-7-upstream-open is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034115" version="1" comment="ImageMagick-config-7-upstream-secure is &lt;7.1.2.0-160000.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977492" version="1" comment="ImageMagick-config-7-upstream-secure is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034116" version="1" comment="ImageMagick-config-7-upstream-websafe is &lt;7.1.2.0-160000.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009977493" version="1" comment="ImageMagick-config-7-upstream-websafe is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034117" version="1" comment="ImageMagick-devel is &lt;7.1.2.0-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151675" version="1" comment="ImageMagick-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034118" version="1" comment="ImageMagick-doc is &lt;7.1.2.0-160000.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151676" version="1" comment="ImageMagick-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034119" version="1" comment="ImageMagick-extra is &lt;7.1.2.0-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151677" version="1" comment="ImageMagick-extra is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034120" version="1" comment="libMagick++-7_Q16HDRI5 is &lt;7.1.2.0-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698047" version="1" comment="libMagick++-7_Q16HDRI5 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034121" version="1" comment="libMagick++-devel is &lt;7.1.2.0-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152596" version="1" comment="libMagick++-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034122" version="1" comment="libMagickCore-7_Q16HDRI10 is &lt;7.1.2.0-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698048" version="1" comment="libMagickCore-7_Q16HDRI10 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034123" version="1" comment="libMagickWand-7_Q16HDRI10 is &lt;7.1.2.0-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698049" version="1" comment="libMagickWand-7_Q16HDRI10 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034124" version="1" comment="perl-PerlMagick is &lt;7.1.2.0-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245665"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151681" version="1" comment="perl-PerlMagick is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037727" version="1" comment="tomcat is &lt;9.0.111-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152844" version="1" comment="tomcat is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037728" version="1" comment="tomcat-admin-webapps is &lt;9.0.111-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152845" version="1" comment="tomcat-admin-webapps is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037729" version="1" comment="tomcat-docs-webapp is &lt;9.0.111-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152846" version="1" comment="tomcat-docs-webapp is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037730" version="1" comment="tomcat-el-3_0-api is &lt;9.0.111-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152847" version="1" comment="tomcat-el-3_0-api is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037731" version="1" comment="tomcat-embed is &lt;9.0.111-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152848" version="1" comment="tomcat-embed is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037732" version="1" comment="tomcat-javadoc is &lt;9.0.111-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152849" version="1" comment="tomcat-javadoc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037733" version="1" comment="tomcat-jsp-2_3-api is &lt;9.0.111-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152850" version="1" comment="tomcat-jsp-2_3-api is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037734" version="1" comment="tomcat-jsvc is &lt;9.0.111-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152851" version="1" comment="tomcat-jsvc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037735" version="1" comment="tomcat-lib is &lt;9.0.111-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152852" version="1" comment="tomcat-lib is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037736" version="1" comment="tomcat-servlet-4_0-api is &lt;9.0.111-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009236693" version="1" comment="tomcat-servlet-4_0-api is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037737" version="1" comment="tomcat-webapps is &lt;9.0.111-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246397"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152854" version="1" comment="tomcat-webapps is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052604" version="1" comment="tomcat10 is &lt;10.1.52-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844333" version="1" comment="tomcat10 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063970"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052605" version="1" comment="tomcat10-admin-webapps is &lt;10.1.52-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844334" version="1" comment="tomcat10-admin-webapps is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063971"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052606" version="1" comment="tomcat10-doc is &lt;10.1.52-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009872621" version="1" comment="tomcat10-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052607" version="1" comment="tomcat10-docs-webapp is &lt;10.1.52-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844335" version="1" comment="tomcat10-docs-webapp is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052608" version="1" comment="tomcat10-el-5_0-api is &lt;10.1.52-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844336" version="1" comment="tomcat10-el-5_0-api is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052609" version="1" comment="tomcat10-embed is &lt;10.1.52-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844337" version="1" comment="tomcat10-embed is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052610" version="1" comment="tomcat10-jsp-3_1-api is &lt;10.1.52-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844338" version="1" comment="tomcat10-jsp-3_1-api is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052611" version="1" comment="tomcat10-jsvc is &lt;10.1.52-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844339" version="1" comment="tomcat10-jsvc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052612" version="1" comment="tomcat10-lib is &lt;10.1.52-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844340" version="1" comment="tomcat10-lib is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052613" version="1" comment="tomcat10-servlet-6_0-api is &lt;10.1.52-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844341" version="1" comment="tomcat10-servlet-6_0-api is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052614" version="1" comment="tomcat10-webapps is &lt;10.1.52-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249577"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009844342" version="1" comment="tomcat10-webapps is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032075" version="1" comment="tomcat11 is &lt;11.0.13-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015348" version="1" comment="tomcat11 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032076" version="1" comment="tomcat11-admin-webapps is &lt;11.0.13-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015349" version="1" comment="tomcat11-admin-webapps is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032077" version="1" comment="tomcat11-doc is &lt;11.0.13-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015350" version="1" comment="tomcat11-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032078" version="1" comment="tomcat11-docs-webapp is &lt;11.0.13-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015351" version="1" comment="tomcat11-docs-webapp is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032079" version="1" comment="tomcat11-el-6_0-api is &lt;11.0.13-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015352" version="1" comment="tomcat11-el-6_0-api is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032080" version="1" comment="tomcat11-embed is &lt;11.0.13-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015353" version="1" comment="tomcat11-embed is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032081" version="1" comment="tomcat11-jsp-4_0-api is &lt;11.0.13-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015354" version="1" comment="tomcat11-jsp-4_0-api is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032082" version="1" comment="tomcat11-jsvc is &lt;11.0.13-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015355" version="1" comment="tomcat11-jsvc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032083" version="1" comment="tomcat11-lib is &lt;11.0.13-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015356" version="1" comment="tomcat11-lib is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032084" version="1" comment="tomcat11-servlet-6_1-api is &lt;11.0.13-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015357" version="1" comment="tomcat11-servlet-6_1-api is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032085" version="1" comment="tomcat11-webapps is &lt;11.0.13-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010015358" version="1" comment="tomcat11-webapps is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037713" version="1" comment="apache2 is &lt;2.4.63-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151165" version="1" comment="apache2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030668"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037714" version="1" comment="apache2-devel is &lt;2.4.63-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151166" version="1" comment="apache2-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030665"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037715" version="1" comment="apache2-event is &lt;2.4.63-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153274" version="1" comment="apache2-event is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035538"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037716" version="1" comment="apache2-manual is &lt;2.4.63-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246393"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009865251" version="1" comment="apache2-manual is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067339"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037717" version="1" comment="apache2-prefork is &lt;2.4.63-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151169" version="1" comment="apache2-prefork is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030666"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037718" version="1" comment="apache2-utils is &lt;2.4.63-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151170" version="1" comment="apache2-utils is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031260"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037719" version="1" comment="apache2-worker is &lt;2.4.63-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246392"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153275" version="1" comment="apache2-worker is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030667"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046322" version="1" comment="fluidsynth is &lt;2.3.5-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009351203" version="1" comment="fluidsynth is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046323" version="1" comment="fluidsynth-devel is &lt;2.3.5-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009351204" version="1" comment="fluidsynth-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051505"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046324" version="1" comment="libfluidsynth3 is &lt;2.3.5-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248173"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046325" version="1" comment="libfluidsynth3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071462"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041339" version="1" comment="python313-h2 is &lt;4.2.0-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247076"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041632" version="1" comment="python313-h2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070521"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024379" version="1" comment="warewulf4 is &lt;4.6.4-bp160.1.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862595" version="1" comment="warewulf4 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060989"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024380" version="1" comment="warewulf4-dracut is &lt;4.6.4-bp160.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974127" version="1" comment="warewulf4-dracut is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068953"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024381" version="1" comment="warewulf4-man is &lt;4.6.4-bp160.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862596" version="1" comment="warewulf4-man is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066755"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024382" version="1" comment="warewulf4-overlay is &lt;4.6.4-bp160.1.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243666"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862597" version="1" comment="warewulf4-overlay is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060992"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024383" version="1" comment="warewulf4-overlay-rke2 is &lt;4.6.4-bp160.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024393" version="1" comment="warewulf4-overlay-rke2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069343"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024384" version="1" comment="warewulf4-overlay-slurm is &lt;4.6.4-bp160.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009862598" version="1" comment="warewulf4-overlay-slurm is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066756"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010024385" version="1" comment="warewulf4-reference-doc is &lt;4.6.4-bp160.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243667"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009974128" version="1" comment="warewulf4-reference-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069344"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042222" version="1" comment="cups is &lt;2.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151184" version="1" comment="cups is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030428"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042223" version="1" comment="cups-client is &lt;2.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151185" version="1" comment="cups-client is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042224" version="1" comment="cups-config is &lt;2.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177129" version="1" comment="cups-config is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042225" version="1" comment="cups-ddk is &lt;2.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009172754" version="1" comment="cups-ddk is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033999"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042226" version="1" comment="cups-devel is &lt;2.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151186" version="1" comment="cups-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042227" version="1" comment="libcups2 is &lt;2.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177130" version="1" comment="libcups2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042228" version="1" comment="libcupsimage2 is &lt;2.4.16-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247234"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177132" version="1" comment="libcupsimage2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042305" version="1" comment="python313-maturin is &lt;1.8.7-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247259"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042322" version="1" comment="python313-maturin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037704" version="1" comment="python313-uv is &lt;0.7.18-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070277"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246387"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037705" version="1" comment="python313-uv-bash-completion is &lt;0.7.18-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070278"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037706" version="1" comment="python313-uv-fish-completion is &lt;0.7.18-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037707" version="1" comment="python313-uv-zsh-completion is &lt;0.7.18-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246388"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044571" version="1" comment="docker is &lt;28.5.1_ce-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247806"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044572" version="1" comment="docker-bash-completion is &lt;28.5.1_ce-160000.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044573" version="1" comment="docker-buildx is &lt;0.29.0-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068671"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247808"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044574" version="1" comment="docker-fish-completion is &lt;28.5.1_ce-160000.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050511"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044575" version="1" comment="docker-rootless-extras is &lt;28.5.1_ce-160000.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044576" version="1" comment="docker-zsh-completion is &lt;28.5.1_ce-160000.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038210"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247807"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032094" version="1" comment="himmelblau is &lt;0.9.23+git.0.9776141-160000.1.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068743"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032095" version="1" comment="himmelblau-qr-greeter is &lt;0.9.23+git.0.9776141-160000.1.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069882"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032096" version="1" comment="himmelblau-sshd-config is &lt;0.9.23+git.0.9776141-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068744"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245276"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032097" version="1" comment="himmelblau-sso is &lt;0.9.23+git.0.9776141-160000.1.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068745"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032098" version="1" comment="libnss_himmelblau2 is &lt;0.9.23+git.0.9776141-160000.1.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068746"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032099" version="1" comment="pam-himmelblau is &lt;0.9.23+git.0.9776141-160000.1.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068747"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245275"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037708" version="1" comment="squid is &lt;6.12-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246389"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152563" version="1" comment="squid is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052591" version="1" comment="MozillaFirefox is &lt;140.9.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052592" version="1" comment="MozillaFirefox-branding-upstream is &lt;140.9.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052593" version="1" comment="MozillaFirefox-devel is &lt;140.9.0-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249575"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052594" version="1" comment="MozillaFirefox-translations-common is &lt;140.9.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052595" version="1" comment="MozillaFirefox-translations-other is &lt;140.9.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249574"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030542" version="1" comment="expat is &lt;2.7.1-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151330" version="1" comment="expat is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030543" version="1" comment="libexpat-devel is &lt;2.7.1-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151331" version="1" comment="libexpat-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030544" version="1" comment="libexpat1 is &lt;2.7.1-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151332" version="1" comment="libexpat1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030558" version="1" comment="ongres-scram is &lt;3.1-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706499" version="1" comment="ongres-scram is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030559" version="1" comment="ongres-scram-client is &lt;3.1-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706500" version="1" comment="ongres-scram-client is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030560" version="1" comment="ongres-scram-javadoc is &lt;3.1-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244980"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009706502" version="1" comment="ongres-scram-javadoc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060264"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025790" version="1" comment="micropython is &lt;1.26.0-bp160.1.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025793" version="1" comment="micropython is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025791" version="1" comment="mpremote is &lt;1.26.0-bp160.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025794" version="1" comment="mpremote is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025792" version="1" comment="mpy-tools is &lt;1.26.0-bp160.1.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244060"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025795" version="1" comment="mpy-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025473" version="1" comment="python313-Django is &lt;5.2.4-bp160.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009243975"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037183" version="1" comment="libmicrohttpd-devel is &lt;1.0.1-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157573" version="1" comment="libmicrohttpd-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041640"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037184" version="1" comment="libmicrohttpd12 is &lt;1.0.1-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246266"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009751539" version="1" comment="libmicrohttpd12 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046381"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044293" version="1" comment="golang-github-prometheus-prometheus is &lt;3.5.0-160000.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047889"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247729"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035667" version="1" comment="bash-git-prompt is &lt;2.7.1-bp160.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246002"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032346" version="1" comment="bash-git-prompt is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071318"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039651" version="1" comment="go1.24 is &lt;1.24.12-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039652" version="1" comment="go1.24-doc is &lt;1.24.12-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039653" version="1" comment="go1.24-libstd is &lt;1.24.12-160000.1.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246744"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039654" version="1" comment="go1.24-race is &lt;1.24.12-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246743"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039700" version="1" comment="go1.25 is &lt;1.25.6-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039701" version="1" comment="go1.25-doc is &lt;1.25.6-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039702" version="1" comment="go1.25-libstd is &lt;1.25.6-160000.1.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039703" version="1" comment="go1.25-race is &lt;1.25.6-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246755"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044008" version="1" comment="go1.24 is &lt;1.24.13-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044009" version="1" comment="go1.24-doc is &lt;1.24.13-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044010" version="1" comment="go1.24-libstd is &lt;1.24.13-160000.1.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247653"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044011" version="1" comment="go1.24-race is &lt;1.24.13-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247652"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043900" version="1" comment="go1.25 is &lt;1.25.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070116"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043901" version="1" comment="go1.25-doc is &lt;1.25.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070117"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043902" version="1" comment="go1.25-libstd is &lt;1.25.7-160000.1.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070118"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247638"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043903" version="1" comment="go1.25-race is &lt;1.25.7-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070119"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247637"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051893" version="1" comment="python313-ldap is &lt;3.4.4-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249429"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051918" version="1" comment="python313-ldap is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070772"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052264" version="1" comment="fetchmail is &lt;6.5.2-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151334" version="1" comment="fetchmail is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030551"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052587" version="1" comment="fetchmailconf is &lt;6.5.2-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249493"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009631524" version="1" comment="fetchmailconf is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030768"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032319" version="1" comment="openssh is &lt;10.0p2-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152110" version="1" comment="openssh is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030403"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032320" version="1" comment="openssh-askpass-gnome is &lt;10.0p2-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153167" version="1" comment="openssh-askpass-gnome is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032321" version="1" comment="openssh-cavs is &lt;10.0p2-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153168" version="1" comment="openssh-cavs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032322" version="1" comment="openssh-clients is &lt;10.0p2-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659235" version="1" comment="openssh-clients is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032323" version="1" comment="openssh-common is &lt;10.0p2-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659236" version="1" comment="openssh-common is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032324" version="1" comment="openssh-helpers is &lt;10.0p2-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152111" version="1" comment="openssh-helpers is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032325" version="1" comment="openssh-server is &lt;10.0p2-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009659237" version="1" comment="openssh-server is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032326" version="1" comment="openssh-server-config-rootlogin is &lt;10.0p2-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245313"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032347" version="1" comment="openssh-server-config-rootlogin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062249"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039693" version="1" comment="gdk-pixbuf-devel is &lt;2.42.12-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151614" version="1" comment="gdk-pixbuf-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039694" version="1" comment="gdk-pixbuf-lang is &lt;2.42.12-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151615" version="1" comment="gdk-pixbuf-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039695" version="1" comment="gdk-pixbuf-query-loaders is &lt;2.42.12-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151616" version="1" comment="gdk-pixbuf-query-loaders is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037125"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039696" version="1" comment="gdk-pixbuf-thumbnailer is &lt;2.42.12-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009177170" version="1" comment="gdk-pixbuf-thumbnailer is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039697" version="1" comment="libgdk_pixbuf-2_0-0 is &lt;2.42.12-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151618" version="1" comment="libgdk_pixbuf-2_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037131"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039698" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is &lt;2.42.12-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151620" version="1" comment="typelib-1_0-GdkPixbuf-2_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038954"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039699" version="1" comment="typelib-1_0-GdkPixdata-2_0 is &lt;2.42.12-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009342391" version="1" comment="typelib-1_0-GdkPixdata-2_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049492"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043200" version="1" comment="xorg-x11-server is &lt;21.1.15-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151420" version="1" comment="xorg-x11-server is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031304"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043201" version="1" comment="xorg-x11-server-Xvfb is &lt;21.1.15-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009807388" version="1" comment="xorg-x11-server-Xvfb is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058478"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043202" version="1" comment="xorg-x11-server-extra is &lt;21.1.15-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151421" version="1" comment="xorg-x11-server-extra is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043203" version="1" comment="xorg-x11-server-sdk is &lt;21.1.15-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151422" version="1" comment="xorg-x11-server-sdk is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031303"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043204" version="1" comment="xorg-x11-server-source is &lt;21.1.15-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009157107" version="1" comment="xorg-x11-server-source is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041650"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043205" version="1" comment="xorg-x11-server-wrapper is &lt;21.1.15-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247475"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043209" version="1" comment="xorg-x11-server-wrapper is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058479"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032041" version="1" comment="xwayland is &lt;24.1.6-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698123" version="1" comment="xwayland is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058480"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032042" version="1" comment="xwayland-devel is &lt;24.1.6-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245270"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009724867" version="1" comment="xwayland-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058481"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032401" version="1" comment="strongswan is &lt;6.0.1-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153116" version="1" comment="strongswan is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032402" version="1" comment="strongswan-doc is &lt;6.0.1-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245330"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153117" version="1" comment="strongswan-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031036"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032403" version="1" comment="strongswan-fips is &lt;6.0.1-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032410" version="1" comment="strongswan-fips is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070867"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032404" version="1" comment="strongswan-ipsec is &lt;6.0.1-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153119" version="1" comment="strongswan-ipsec is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033871"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032405" version="1" comment="strongswan-mysql is &lt;6.0.1-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153121" version="1" comment="strongswan-mysql is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035946"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032406" version="1" comment="strongswan-nm is &lt;6.0.1-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153122" version="1" comment="strongswan-nm is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033873"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010032407" version="1" comment="strongswan-sqlite is &lt;6.0.1-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245329"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153123" version="1" comment="strongswan-sqlite is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035613" version="1" comment="python313-salt is &lt;3006.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069969"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035614" version="1" comment="python313-salt-testsuite is &lt;3006.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071460"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035615" version="1" comment="salt is &lt;3006.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040290"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035616" version="1" comment="salt-api is &lt;3006.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040291"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035617" version="1" comment="salt-bash-completion is &lt;3006.0-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040292"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035618" version="1" comment="salt-cloud is &lt;3006.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040293"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035619" version="1" comment="salt-doc is &lt;3006.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040294"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035620" version="1" comment="salt-fish-completion is &lt;3006.0-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040295"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035621" version="1" comment="salt-master is &lt;3006.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035622" version="1" comment="salt-minion is &lt;3006.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040297"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035623" version="1" comment="salt-proxy is &lt;3006.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040298"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035624" version="1" comment="salt-ssh is &lt;3006.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040300"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035625" version="1" comment="salt-standalone-formulas-configuration is &lt;3006.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048691"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035626" version="1" comment="salt-syndic is &lt;3006.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035627" version="1" comment="salt-transactional-update is &lt;3006.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009051618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245991"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010035628" version="1" comment="salt-zsh-completion is &lt;3006.0-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040302"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245992"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038060" version="1" comment="ffmpeg-4 is &lt;4.4.5-bp160.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234593" version="1" comment="ffmpeg-4 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046724"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038061" version="1" comment="ffmpeg-4-libavcodec-devel is &lt;4.4.5-bp160.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234594" version="1" comment="ffmpeg-4-libavcodec-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038062" version="1" comment="ffmpeg-4-libavdevice-devel is &lt;4.4.5-bp160.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234595" version="1" comment="ffmpeg-4-libavdevice-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046726"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038063" version="1" comment="ffmpeg-4-libavfilter-devel is &lt;4.4.5-bp160.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234596" version="1" comment="ffmpeg-4-libavfilter-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046727"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038064" version="1" comment="ffmpeg-4-libavformat-devel is &lt;4.4.5-bp160.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234597" version="1" comment="ffmpeg-4-libavformat-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046728"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038065" version="1" comment="ffmpeg-4-libavresample-devel is &lt;4.4.5-bp160.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234598" version="1" comment="ffmpeg-4-libavresample-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046729"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038066" version="1" comment="ffmpeg-4-libavutil-devel is &lt;4.4.5-bp160.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234599" version="1" comment="ffmpeg-4-libavutil-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046730"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038067" version="1" comment="ffmpeg-4-libpostproc-devel is &lt;4.4.5-bp160.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234600" version="1" comment="ffmpeg-4-libpostproc-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046731"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038068" version="1" comment="ffmpeg-4-libswresample-devel is &lt;4.4.5-bp160.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234601" version="1" comment="ffmpeg-4-libswresample-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046732"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038069" version="1" comment="ffmpeg-4-libswscale-devel is &lt;4.4.5-bp160.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234602" version="1" comment="ffmpeg-4-libswscale-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046733"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038070" version="1" comment="ffmpeg-4-private-devel is &lt;4.4.5-bp160.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009234603" version="1" comment="ffmpeg-4-private-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038071" version="1" comment="libavcodec58_134 is &lt;4.4.5-bp160.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695527" version="1" comment="libavcodec58_134 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038072" version="1" comment="libavdevice58_13 is &lt;4.4.5-bp160.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695528" version="1" comment="libavdevice58_13 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052814"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038073" version="1" comment="libavfilter7_110 is &lt;4.4.5-bp160.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695529" version="1" comment="libavfilter7_110 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052816"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038074" version="1" comment="libavformat58_76 is &lt;4.4.5-bp160.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695530" version="1" comment="libavformat58_76 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038075" version="1" comment="libavresample4_0 is &lt;4.4.5-bp160.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695531" version="1" comment="libavresample4_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052820"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038076" version="1" comment="libavutil56_70 is &lt;4.4.5-bp160.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695532" version="1" comment="libavutil56_70 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038077" version="1" comment="libpostproc55_9 is &lt;4.4.5-bp160.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695533" version="1" comment="libpostproc55_9 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052824"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038078" version="1" comment="libswresample3_9 is &lt;4.4.5-bp160.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695534" version="1" comment="libswresample3_9 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052826"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038079" version="1" comment="libswscale5_9 is &lt;4.4.5-bp160.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246445"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695535" version="1" comment="libswscale5_9 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052828"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030545" version="1" comment="libIex-3_2-31 is &lt;3.2.2-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030546" version="1" comment="libIex-3_2-31-x86-64-v3 is &lt;3.2.2-160000.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030547" version="1" comment="libIlmThread-3_2-31 is &lt;3.2.2-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030548" version="1" comment="libIlmThread-3_2-31-x86-64-v3 is &lt;3.2.2-160000.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030549" version="1" comment="libOpenEXR-3_2-31 is &lt;3.2.2-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030550" version="1" comment="libOpenEXR-3_2-31-x86-64-v3 is &lt;3.2.2-160000.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030551" version="1" comment="libOpenEXRCore-3_2-31 is &lt;3.2.2-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030552" version="1" comment="libOpenEXRCore-3_2-31-x86-64-v3 is &lt;3.2.2-160000.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030553" version="1" comment="libOpenEXRUtil-3_2-31 is &lt;3.2.2-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030554" version="1" comment="libOpenEXRUtil-3_2-31-x86-64-v3 is &lt;3.2.2-160000.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030555" version="1" comment="openexr is &lt;3.2.2-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030556" version="1" comment="openexr-devel is &lt;3.2.2-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244977"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010030557" version="1" comment="openexr-doc is &lt;3.2.2-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009244979"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037185" version="1" comment="libpng16-16 is &lt;1.6.44-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037186" version="1" comment="libpng16-16-x86-64-v3 is &lt;1.6.44-160000.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037187" version="1" comment="libpng16-compat-devel is &lt;1.6.44-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037188" version="1" comment="libpng16-compat-devel-x86-64-v3 is &lt;1.6.44-160000.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037189" version="1" comment="libpng16-devel is &lt;1.6.44-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037190" version="1" comment="libpng16-devel-x86-64-v3 is &lt;1.6.44-160000.3.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246268"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037191" version="1" comment="libpng16-tools is &lt;1.6.44-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246267"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042597" version="1" comment="trivy is &lt;0.69.0-bp160.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058583"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247322"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041320" version="1" comment="cockpit-subscriptions is &lt;12.1-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071219"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247070"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041321" version="1" comment="ImageMagick is &lt;7.1.2.0-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041322" version="1" comment="ImageMagick-config-7-SUSE is &lt;7.1.2.0-160000.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041323" version="1" comment="ImageMagick-config-7-upstream-limited is &lt;7.1.2.0-160000.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041324" version="1" comment="ImageMagick-config-7-upstream-open is &lt;7.1.2.0-160000.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041325" version="1" comment="ImageMagick-config-7-upstream-secure is &lt;7.1.2.0-160000.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041326" version="1" comment="ImageMagick-config-7-upstream-websafe is &lt;7.1.2.0-160000.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041327" version="1" comment="ImageMagick-devel is &lt;7.1.2.0-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041328" version="1" comment="ImageMagick-doc is &lt;7.1.2.0-160000.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247072"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041329" version="1" comment="ImageMagick-extra is &lt;7.1.2.0-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041330" version="1" comment="libMagick++-7_Q16HDRI5 is &lt;7.1.2.0-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041331" version="1" comment="libMagick++-devel is &lt;7.1.2.0-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041332" version="1" comment="libMagickCore-7_Q16HDRI10 is &lt;7.1.2.0-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041333" version="1" comment="libMagickWand-7_Q16HDRI10 is &lt;7.1.2.0-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041334" version="1" comment="perl-PerlMagick is &lt;7.1.2.0-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247071"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041335" version="1" comment="python313-FontTools is &lt;4.53.1-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041634" version="1" comment="python313-FontTools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071136"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041351" version="1" comment="python313-urllib3 is &lt;2.5.0-160000.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247082"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039777" version="1" comment="python313-urllib3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045689" version="1" comment="python313-urllib3_1 is &lt;1.26.20-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248057"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045810" version="1" comment="python313-urllib3_1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069967"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047304" version="1" comment="rhino is &lt;1.7.15.1-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009746731" version="1" comment="rhino is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047305" version="1" comment="rhino-demo is &lt;1.7.15.1-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009746733" version="1" comment="rhino-demo is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009061789"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047306" version="1" comment="rhino-engine is &lt;1.7.15.1-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033323" version="1" comment="rhino-engine is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047307" version="1" comment="rhino-javadoc is &lt;1.7.15.1-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033324" version="1" comment="rhino-javadoc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047308" version="1" comment="rhino-runtime is &lt;1.7.15.1-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248370"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010033325" version="1" comment="rhino-runtime is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071364"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037882" version="1" comment="cpp-httplib-devel is &lt;0.22.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069153"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037883" version="1" comment="libcpp-httplib0_22 is &lt;0.22.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071057"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246420"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048642" version="1" comment="tomcat is &lt;9.0.115-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035425"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048643" version="1" comment="tomcat-admin-webapps is &lt;9.0.115-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035426"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048644" version="1" comment="tomcat-docs-webapp is &lt;9.0.115-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035427"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048645" version="1" comment="tomcat-el-3_0-api is &lt;9.0.115-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040305"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048646" version="1" comment="tomcat-embed is &lt;9.0.115-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038812"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048647" version="1" comment="tomcat-javadoc is &lt;9.0.115-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035429"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048648" version="1" comment="tomcat-jsp-2_3-api is &lt;9.0.115-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040306"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048649" version="1" comment="tomcat-jsvc is &lt;9.0.115-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048650" version="1" comment="tomcat-lib is &lt;9.0.115-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035432"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048651" version="1" comment="tomcat-servlet-4_0-api is &lt;9.0.115-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046466"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048652" version="1" comment="tomcat-webapps is &lt;9.0.115-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035434"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248642"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051787" version="1" comment="tomcat11 is &lt;11.0.18-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069973"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051788" version="1" comment="tomcat11-admin-webapps is &lt;11.0.18-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069974"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051789" version="1" comment="tomcat11-doc is &lt;11.0.18-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069975"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051790" version="1" comment="tomcat11-docs-webapp is &lt;11.0.18-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069976"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051791" version="1" comment="tomcat11-el-6_0-api is &lt;11.0.18-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069977"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051792" version="1" comment="tomcat11-embed is &lt;11.0.18-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051793" version="1" comment="tomcat11-jsp-4_0-api is &lt;11.0.18-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069979"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051794" version="1" comment="tomcat11-jsvc is &lt;11.0.18-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069980"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051795" version="1" comment="tomcat11-lib is &lt;11.0.18-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069981"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051796" version="1" comment="tomcat11-servlet-6_1-api is &lt;11.0.18-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069982"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051797" version="1" comment="tomcat11-webapps is &lt;11.0.18-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069983"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249415"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050747" version="1" comment="python313-orjson is &lt;3.10.15-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249145"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051919" version="1" comment="python313-orjson is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071158"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037182" version="1" comment="python313-tornado6 is &lt;6.5-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246265"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037231" version="1" comment="python313-tornado6 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053367" version="1" comment="python313-cbor2 is &lt;5.6.5-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249753"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041485" version="1" comment="python313-filelock is &lt;3.18.0-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247117"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041635" version="1" comment="python313-filelock is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044609" version="1" comment="python313-Authlib is &lt;1.5.2-bp160.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247816"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044613" version="1" comment="python313-Authlib is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040025" version="1" comment="avahi is &lt;0.8-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040026" version="1" comment="avahi-autoipd is &lt;0.8-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040950"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040027" version="1" comment="avahi-compat-howl-devel is &lt;0.8-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040028" version="1" comment="avahi-compat-mDNSResponder-devel is &lt;0.8-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031838"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040029" version="1" comment="avahi-lang is &lt;0.8-160000.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246819"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040030" version="1" comment="avahi-utils is &lt;0.8-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033063"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040031" version="1" comment="avahi-utils-gtk is &lt;0.8-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033062"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040032" version="1" comment="libavahi-client3 is &lt;0.8-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033066"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040033" version="1" comment="libavahi-common3 is &lt;0.8-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033069"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040034" version="1" comment="libavahi-core7 is &lt;0.8-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040951"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040035" version="1" comment="libavahi-devel is &lt;0.8-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033071"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040036" version="1" comment="libavahi-glib-devel is &lt;0.8-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040037" version="1" comment="libavahi-glib1 is &lt;0.8-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033075"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040038" version="1" comment="libavahi-gobject-devel is &lt;0.8-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033076"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040039" version="1" comment="libavahi-gobject0 is &lt;0.8-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033077"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040040" version="1" comment="libavahi-libevent1 is &lt;0.8-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040041" version="1" comment="libavahi-qt6-1 is &lt;0.8-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071508"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040042" version="1" comment="libavahi-qt6-devel is &lt;0.8-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040043" version="1" comment="libavahi-ui-gtk3-0 is &lt;0.8-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047079"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040044" version="1" comment="libdns_sd is &lt;0.8-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033081"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040045" version="1" comment="libhowl0 is &lt;0.8-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040046" version="1" comment="python3-avahi-gtk is &lt;0.8-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009050595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040047" version="1" comment="python313-avahi is &lt;0.8-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068742"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040048" version="1" comment="typelib-1_0-Avahi-0_6 is &lt;0.8-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047082"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246818"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051006" version="1" comment="kernel-default is ==6.4.0-150600.23.84.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249253"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051007" version="1" comment="kernel-livepatch-6_4_0-150600_23_84-default is &gt;=2-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051008" version="1" comment="kernel-default is &lt;6.4.0-150600.23.84.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249254"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051509" version="1" comment="kernel-default is ==6.4.0-150700.53.28.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249354"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051510" version="1" comment="kernel-livepatch-6_4_0-150700_53_28-default is &gt;=2-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039641" version="1" comment="gdk-pixbuf-loader-libheif is &lt;1.19.7-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009752979" version="1" comment="gdk-pixbuf-loader-libheif is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060519"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039642" version="1" comment="libheif-aom is &lt;1.19.7-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039768" version="1" comment="libheif-aom is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064279"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039643" version="1" comment="libheif-dav1d is &lt;1.19.7-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039769" version="1" comment="libheif-dav1d is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064280"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039644" version="1" comment="libheif-devel is &lt;1.19.7-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009752980" version="1" comment="libheif-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039645" version="1" comment="libheif-ffmpeg is &lt;1.19.7-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039770" version="1" comment="libheif-ffmpeg is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039646" version="1" comment="libheif-jpeg is &lt;1.19.7-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039771" version="1" comment="libheif-jpeg is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064282"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039647" version="1" comment="libheif-openjpeg is &lt;1.19.7-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039772" version="1" comment="libheif-openjpeg is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039648" version="1" comment="libheif-rav1e is &lt;1.19.7-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039773" version="1" comment="libheif-rav1e is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039649" version="1" comment="libheif-svtenc is &lt;1.19.7-160000.3.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246742"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039774" version="1" comment="libheif-svtenc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039650" version="1" comment="libheif1 is &lt;1.19.7-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246741"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009752981" version="1" comment="libheif1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047349" version="1" comment="roundcubemail is &lt;1.6.13-bp160.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248384"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152670" version="1" comment="roundcubemail is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035622"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039705" version="1" comment="python-marshmallow-doc is &lt;3.20.2-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039775" version="1" comment="python-marshmallow-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039706" version="1" comment="python313-marshmallow is &lt;3.20.2-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039776" version="1" comment="python313-marshmallow is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050013" version="1" comment="libsnmp40 is &lt;5.9.4-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009726675" version="1" comment="libsnmp40 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050172" version="1" comment="net-snmp is &lt;5.9.4-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151708" version="1" comment="net-snmp is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030550"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050173" version="1" comment="net-snmp-devel is &lt;5.9.4-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151709" version="1" comment="net-snmp-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030791"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050174" version="1" comment="perl-SNMP is &lt;5.9.4-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151710" version="1" comment="perl-SNMP is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030792"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050175" version="1" comment="python313-net-snmp is &lt;5.9.4-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050229" version="1" comment="python313-net-snmp is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050014" version="1" comment="snmp-mibs is &lt;5.9.4-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248978"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151711" version="1" comment="snmp-mibs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031643"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038476" version="1" comment="python313-weasyprint is &lt;65.1-bp160.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246515"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010038477" version="1" comment="python313-weasyprint is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071623"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041939" version="1" comment="libpainter0 is &lt;0.9.26-bp160.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009287510" version="1" comment="libpainter0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042697"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041940" version="1" comment="librfxencode0 is &lt;0.9.26-bp160.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009287511" version="1" comment="librfxencode0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042698"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041941" version="1" comment="xrdp is &lt;0.9.26-bp160.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009287512" version="1" comment="xrdp is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033102"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041942" version="1" comment="xrdp-devel is &lt;0.9.26-bp160.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247180"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009287513" version="1" comment="xrdp-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037709" version="1" comment="dirmngr is &lt;2.5.5-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695558" version="1" comment="dirmngr is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037710" version="1" comment="gpg2 is &lt;2.5.5-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151446" version="1" comment="gpg2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037711" version="1" comment="gpg2-lang is &lt;2.5.5-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246391"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151447" version="1" comment="gpg2-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037712" version="1" comment="gpg2-tpm is &lt;2.5.5-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246390"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999481" version="1" comment="gpg2-tpm is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037738" version="1" comment="libwget4 is &lt;2.2.1-bp160.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037147" version="1" comment="libwget4 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071485"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037739" version="1" comment="wget2 is &lt;2.2.1-bp160.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037148" version="1" comment="wget2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071486"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037740" version="1" comment="wget2-devel is &lt;2.2.1-bp160.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246398"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037149" version="1" comment="wget2-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071487"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053394" version="1" comment="osslsigncode is &lt;2.13-bp160.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249761"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052792" version="1" comment="osslsigncode is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072046"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056197" version="1" comment="kernel-livepatch-5_14_21-150400_24_184-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071830"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053250" version="1" comment="kernel-livepatch-5_14_21-150400_24_187-default is &gt;=4-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071831"/>
		<state state_ref="oval:org.opensuse.security:ste:2009171147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053507" version="1" comment="kernel-livepatch-5_14_21-150500_55_127-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071832"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056198" version="1" comment="kernel-livepatch-5_14_21-150500_55_130-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071833"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053508" version="1" comment="kernel-livepatch-5_14_21-150500_55_133-default is &gt;=4-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009189688"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056199" version="1" comment="kernel-livepatch-6_4_0-150600_23_81-default is &gt;=3-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072011"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056200" version="1" comment="kernel-livepatch-6_4_0-150600_23_84-default is &gt;=3-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072012"/>
		<state state_ref="oval:org.opensuse.security:ste:2009230572"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056292" version="1" comment="kernel-livepatch-6_4_0-150700_53_25-default is &gt;=3-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072025"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056201" version="1" comment="kernel-livepatch-6_4_0-150700_53_28-default is &gt;=3-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072026"/>
		<state state_ref="oval:org.opensuse.security:ste:2009242103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050216" version="1" comment="mumble is &lt;1.5.857-bp160.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260552" version="1" comment="mumble is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050217" version="1" comment="mumble-server is &lt;1.5.857-bp160.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249032"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009260556" version="1" comment="mumble-server is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051876" version="1" comment="ffmpeg-7 is &lt;7.1.2-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051920" version="1" comment="ffmpeg-7 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051877" version="1" comment="ffmpeg-7-libavcodec-devel is &lt;7.1.2-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051921" version="1" comment="ffmpeg-7-libavcodec-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051878" version="1" comment="ffmpeg-7-libavdevice-devel is &lt;7.1.2-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051922" version="1" comment="ffmpeg-7-libavdevice-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051879" version="1" comment="ffmpeg-7-libavfilter-devel is &lt;7.1.2-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051923" version="1" comment="ffmpeg-7-libavfilter-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051880" version="1" comment="ffmpeg-7-libavformat-devel is &lt;7.1.2-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051924" version="1" comment="ffmpeg-7-libavformat-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051881" version="1" comment="ffmpeg-7-libavutil-devel is &lt;7.1.2-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051925" version="1" comment="ffmpeg-7-libavutil-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051882" version="1" comment="ffmpeg-7-libpostproc-devel is &lt;7.1.2-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051926" version="1" comment="ffmpeg-7-libpostproc-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051883" version="1" comment="ffmpeg-7-libswresample-devel is &lt;7.1.2-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051927" version="1" comment="ffmpeg-7-libswresample-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051884" version="1" comment="ffmpeg-7-libswscale-devel is &lt;7.1.2-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051928" version="1" comment="ffmpeg-7-libswscale-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051885" version="1" comment="libavcodec61 is &lt;7.1.2-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051929" version="1" comment="libavcodec61 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051886" version="1" comment="libavdevice61 is &lt;7.1.2-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051930" version="1" comment="libavdevice61 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051887" version="1" comment="libavfilter10 is &lt;7.1.2-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051931" version="1" comment="libavfilter10 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051888" version="1" comment="libavformat61 is &lt;7.1.2-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051932" version="1" comment="libavformat61 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051889" version="1" comment="libavutil59 is &lt;7.1.2-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051933" version="1" comment="libavutil59 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051890" version="1" comment="libpostproc58 is &lt;7.1.2-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051934" version="1" comment="libpostproc58 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051891" version="1" comment="libswresample5 is &lt;7.1.2-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051935" version="1" comment="libswresample5 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051892" version="1" comment="libswscale8 is &lt;7.1.2-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249428"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051936" version="1" comment="libswscale8 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066611"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041463" version="1" comment="libudisks2-0 is &lt;2.10.1-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152050" version="1" comment="libudisks2-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041464" version="1" comment="libudisks2-0-devel is &lt;2.10.1-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698124" version="1" comment="libudisks2-0-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009049497"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041465" version="1" comment="libudisks2-0_btrfs is &lt;2.10.1-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009695655" version="1" comment="libudisks2-0_btrfs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053450"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041466" version="1" comment="libudisks2-0_lsm is &lt;2.10.1-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698126" version="1" comment="libudisks2-0_lsm is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053451"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041467" version="1" comment="libudisks2-0_lvm2 is &lt;2.10.1-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009698127" version="1" comment="libudisks2-0_lvm2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041468" version="1" comment="typelib-1_0-UDisks-2_0 is &lt;2.10.1-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009238131" version="1" comment="typelib-1_0-UDisks-2_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041469" version="1" comment="udisks2 is &lt;2.10.1-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247111"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152051" version="1" comment="udisks2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041470" version="1" comment="udisks2-bash-completion is &lt;2.10.1-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041636" version="1" comment="udisks2-bash-completion is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070557"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041471" version="1" comment="udisks2-docs is &lt;2.10.1-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041637" version="1" comment="udisks2-docs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070558"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041472" version="1" comment="udisks2-lang is &lt;2.10.1-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152052" version="1" comment="udisks2-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041473" version="1" comment="udisks2-zsh-completion is &lt;2.10.1-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247112"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041638" version="1" comment="udisks2-zsh-completion is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070559"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045686" version="1" comment="autogen is &lt;5.18.16-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045811" version="1" comment="autogen is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045687" version="1" comment="autoopts is &lt;5.18.16-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045812" version="1" comment="autoopts is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045688" version="1" comment="libopts25 is &lt;5.18.16-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248056"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045813" version="1" comment="libopts25 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041453" version="1" comment="jasper is &lt;4.2.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151131" version="1" comment="jasper is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041454" version="1" comment="libjasper-devel is &lt;4.2.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151132" version="1" comment="libjasper-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031788"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041455" version="1" comment="libjasper7 is &lt;4.2.8-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247107"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010025042" version="1" comment="libjasper7 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060560"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034150" version="1" comment="libopenssl-3-devel is &lt;3.5.0-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034151" version="1" comment="libopenssl-3-fips-provider is &lt;3.5.0-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066172"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034152" version="1" comment="libopenssl-3-fips-provider-x86-64-v3 is &lt;3.5.0-160000.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066754"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034153" version="1" comment="libopenssl3 is &lt;3.5.0-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034154" version="1" comment="libopenssl3-x86-64-v3 is &lt;3.5.0-160000.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245671"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034155" version="1" comment="openssl-3 is &lt;3.5.0-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059285"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245670"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010034156" version="1" comment="openssl-3-doc is &lt;3.5.0-160000.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059286"/>
		<state state_ref="oval:org.opensuse.security:ste:2009245672"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037212" version="1" comment="chromedriver is &lt;143.0.7499.192-bp160.1.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037213" version="1" comment="chromium is &lt;143.0.7499.192-bp160.1.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246272"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037894" version="1" comment="chromedriver is &lt;144.0.7559.59-bp160.1.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010037895" version="1" comment="chromium is &lt;144.0.7559.59-bp160.1.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041570" version="1" comment="gio-branding-upstream is &lt;2.84.4-160000.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009046996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041571" version="1" comment="glib2-devel is &lt;2.84.4-160000.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031274"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041572" version="1" comment="glib2-devel-static is &lt;2.84.4-160000.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041253"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041573" version="1" comment="glib2-doc is &lt;2.84.4-160000.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041574" version="1" comment="glib2-lang is &lt;2.84.4-160000.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030893"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247129"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041575" version="1" comment="glib2-tests-devel is &lt;2.84.4-160000.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041576" version="1" comment="glib2-tools is &lt;2.84.4-160000.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040978"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041577" version="1" comment="libgio-2_0-0 is &lt;2.84.4-160000.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030896"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041578" version="1" comment="libgirepository-2_0-0 is &lt;2.84.4-160000.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066904"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041579" version="1" comment="libglib-2_0-0 is &lt;2.84.4-160000.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030899"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041580" version="1" comment="libgmodule-2_0-0 is &lt;2.84.4-160000.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030902"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041581" version="1" comment="libgobject-2_0-0 is &lt;2.84.4-160000.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041582" version="1" comment="libgthread-2_0-0 is &lt;2.84.4-160000.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041583" version="1" comment="typelib-1_0-GIRepository-3_0 is &lt;2.84.4-160000.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066905"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041584" version="1" comment="typelib-1_0-GLib-2_0 is &lt;2.84.4-160000.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041585" version="1" comment="typelib-1_0-GLibUnix-2_0 is &lt;2.84.4-160000.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041586" version="1" comment="typelib-1_0-GModule-2_0 is &lt;2.84.4-160000.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041587" version="1" comment="typelib-1_0-GObject-2_0 is &lt;2.84.4-160000.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041588" version="1" comment="typelib-1_0-Gio-2_0 is &lt;2.84.4-160000.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247130"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042230" version="1" comment="libxml2-2 is &lt;2.13.8-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035409"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042231" version="1" comment="libxml2-devel is &lt;2.13.8-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030405"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042232" version="1" comment="libxml2-doc is &lt;2.13.8-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009032915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247237"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042233" version="1" comment="libxml2-tools is &lt;2.13.8-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042234" version="1" comment="python313-libxml2 is &lt;2.13.8-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071109"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247236"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039736" version="1" comment="chromedriver is &lt;144.0.7559.96-bp160.1.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039737" version="1" comment="chromium is &lt;144.0.7559.96-bp160.1.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041602" version="1" comment="chromedriver is &lt;144.0.7559.109-bp160.1.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041603" version="1" comment="chromium is &lt;144.0.7559.109-bp160.1.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247135"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042593" version="1" comment="libsoup-3_0-0 is &lt;3.6.5-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042594" version="1" comment="libsoup-devel is &lt;3.6.5-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030515"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042595" version="1" comment="libsoup-lang is &lt;3.6.5-160000.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247321"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042596" version="1" comment="typelib-1_0-Soup-3_0 is &lt;3.6.5-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059851"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247320"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043887" version="1" comment="python313-pip is &lt;25.0.1-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043910" version="1" comment="python313-pip is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071159"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043888" version="1" comment="python313-pip-wheel is &lt;25.0.1-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247628"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043911" version="1" comment="python313-pip-wheel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071160"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050714" version="1" comment="keylime-config is &lt;7.14.0+0-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059254"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050715" version="1" comment="keylime-firewalld is &lt;7.14.0+0-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059255"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050716" version="1" comment="keylime-logrotate is &lt;7.14.0+0-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060032"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050717" version="1" comment="keylime-registrar is &lt;7.14.0+0-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059256"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050718" version="1" comment="keylime-tenant is &lt;7.14.0+0-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050719" version="1" comment="keylime-tpm_cert_store is &lt;7.14.0+0-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059257"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050720" version="1" comment="keylime-verifier is &lt;7.14.0+0-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059258"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050721" version="1" comment="python313-keylime is &lt;7.14.0+0-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069164"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249139"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045715" version="1" comment="libsoup-2_4-1 is &lt;2.74.3-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034629"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045716" version="1" comment="libsoup2-devel is &lt;2.74.3-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045717" version="1" comment="libsoup2-lang is &lt;2.74.3-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248062"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045718" version="1" comment="typelib-1_0-Soup-2_4 is &lt;2.74.3-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041013"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248061"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042366" version="1" comment="chromedriver is &lt;144.0.7559.132-bp160.1.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010042367" version="1" comment="chromium is &lt;144.0.7559.132-bp160.1.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247273"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050024" version="1" comment="curl is &lt;8.14.1-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051760" version="1" comment="curl-fish-completion is &lt;8.14.1-160000.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068178"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050729" version="1" comment="curl-zsh-completion is &lt;8.14.1-160000.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050730" version="1" comment="libcurl-devel is &lt;8.14.1-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050731" version="1" comment="libcurl-devel-doc is &lt;8.14.1-160000.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068180"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249142"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050025" version="1" comment="libcurl4 is &lt;8.14.1-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030964"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248986"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043206" version="1" comment="micropython is &lt;1.26.1-bp160.1.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043207" version="1" comment="mpremote is &lt;1.26.1-bp160.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247477"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010043208" version="1" comment="mpy-tools is &lt;1.26.1-bp160.1.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070822"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247476"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050748" version="1" comment="libecpg6 is &lt;18.3-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050749" version="1" comment="libpq5 is &lt;18.3-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035130"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052621" version="1" comment="postgresql16 is &lt;16.13-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063906"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052622" version="1" comment="postgresql16-contrib is &lt;16.13-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063910"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052623" version="1" comment="postgresql16-devel is &lt;16.13-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063911"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052624" version="1" comment="postgresql16-docs is &lt;16.13-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063912"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249581"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052625" version="1" comment="postgresql16-llvmjit is &lt;16.13-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063907"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052626" version="1" comment="postgresql16-llvmjit-devel is &lt;16.13-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063908"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052627" version="1" comment="postgresql16-plperl is &lt;16.13-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063913"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052628" version="1" comment="postgresql16-plpython is &lt;16.13-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063914"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052629" version="1" comment="postgresql16-pltcl is &lt;16.13-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063915"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052630" version="1" comment="postgresql16-server is &lt;16.13-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063916"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052631" version="1" comment="postgresql16-server-devel is &lt;16.13-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063917"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052632" version="1" comment="postgresql16-test is &lt;16.13-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063909"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249580"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050190" version="1" comment="postgresql17 is &lt;17.9-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050191" version="1" comment="postgresql17-contrib is &lt;17.9-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050192" version="1" comment="postgresql17-devel is &lt;17.9-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050193" version="1" comment="postgresql17-docs is &lt;17.9-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249026"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050194" version="1" comment="postgresql17-llvmjit is &lt;17.9-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050195" version="1" comment="postgresql17-llvmjit-devel is &lt;17.9-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050196" version="1" comment="postgresql17-plperl is &lt;17.9-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050197" version="1" comment="postgresql17-plpython is &lt;17.9-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068359"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050198" version="1" comment="postgresql17-pltcl is &lt;17.9-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068360"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050199" version="1" comment="postgresql17-server is &lt;17.9-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068361"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050200" version="1" comment="postgresql17-server-devel is &lt;17.9-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068362"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050201" version="1" comment="postgresql17-test is &lt;17.9-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068363"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249025"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050750" version="1" comment="postgresql18 is &lt;18.3-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071347"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050751" version="1" comment="postgresql18-contrib is &lt;18.3-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071348"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050752" version="1" comment="postgresql18-devel is &lt;18.3-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071349"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051761" version="1" comment="postgresql18-devel-mini is &lt;18.3-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071715"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050753" version="1" comment="postgresql18-docs is &lt;18.3-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071350"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249147"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051762" version="1" comment="postgresql18-llvmjit is &lt;18.3-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071351"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051763" version="1" comment="postgresql18-llvmjit-devel is &lt;18.3-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071352"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050754" version="1" comment="postgresql18-plperl is &lt;18.3-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071353"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050755" version="1" comment="postgresql18-plpython is &lt;18.3-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071354"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050756" version="1" comment="postgresql18-pltcl is &lt;18.3-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071355"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050757" version="1" comment="postgresql18-server is &lt;18.3-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071356"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050758" version="1" comment="postgresql18-server-devel is &lt;18.3-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071357"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051764" version="1" comment="postgresql18-test is &lt;18.3-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071358"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249146"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046377" version="1" comment="python313-azure-core is &lt;1.32.0-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248185"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046378" version="1" comment="python313-azure-core is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071734"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039707" version="1" comment="python313-urllib3 is &lt;2.5.0-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069965"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246759"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041438" version="1" comment="java-17-openjdk is &lt;17.0.18.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058529"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041439" version="1" comment="java-17-openjdk-demo is &lt;17.0.18.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058531"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041440" version="1" comment="java-17-openjdk-devel is &lt;17.0.18.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058532"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041441" version="1" comment="java-17-openjdk-headless is &lt;17.0.18.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058533"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041442" version="1" comment="java-17-openjdk-javadoc is &lt;17.0.18.0-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058534"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247103"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041443" version="1" comment="java-17-openjdk-jmods is &lt;17.0.18.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058535"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041444" version="1" comment="java-17-openjdk-src is &lt;17.0.18.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009058536"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247102"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041344" version="1" comment="java-21-openjdk is &lt;21.0.10.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063003"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041345" version="1" comment="java-21-openjdk-demo is &lt;21.0.10.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063004"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041346" version="1" comment="java-21-openjdk-devel is &lt;21.0.10.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063005"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041347" version="1" comment="java-21-openjdk-headless is &lt;21.0.10.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063006"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041348" version="1" comment="java-21-openjdk-javadoc is &lt;21.0.10.0-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063007"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247081"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041349" version="1" comment="java-21-openjdk-jmods is &lt;21.0.10.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063008"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041350" version="1" comment="java-21-openjdk-src is &lt;21.0.10.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063009"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247080"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041478" version="1" comment="java-25-openjdk is &lt;25.0.2.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041639" version="1" comment="java-25-openjdk is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070857"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041479" version="1" comment="java-25-openjdk-demo is &lt;25.0.2.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041640" version="1" comment="java-25-openjdk-demo is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070858"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041480" version="1" comment="java-25-openjdk-devel is &lt;25.0.2.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041641" version="1" comment="java-25-openjdk-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041481" version="1" comment="java-25-openjdk-headless is &lt;25.0.2.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041642" version="1" comment="java-25-openjdk-headless is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041482" version="1" comment="java-25-openjdk-javadoc is &lt;25.0.2.0-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247116"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041643" version="1" comment="java-25-openjdk-javadoc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041483" version="1" comment="java-25-openjdk-jmods is &lt;25.0.2.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041644" version="1" comment="java-25-openjdk-jmods is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070862"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041484" version="1" comment="java-25-openjdk-src is &lt;25.0.2.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247115"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041645" version="1" comment="java-25-openjdk-src is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070863"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045797" version="1" comment="gimp is &lt;3.0.8-bp160.2.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045798" version="1" comment="gimp-devel is &lt;3.0.8-bp160.2.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045799" version="1" comment="gimp-extension-goat-excercises is &lt;3.0.8-bp160.2.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045800" version="1" comment="gimp-lang is &lt;3.0.8-bp160.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248074"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045801" version="1" comment="gimp-plugin-aa is &lt;3.0.8-bp160.2.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045802" version="1" comment="gimp-plugin-python3 is &lt;3.0.8-bp160.2.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045803" version="1" comment="gimp-vala is &lt;3.0.8-bp160.2.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045804" version="1" comment="libgimp-3_0-0 is &lt;3.0.8-bp160.2.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010045805" version="1" comment="libgimpui-3_0-0 is &lt;3.0.8-bp160.2.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248073"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050759" version="1" comment="harfbuzz-devel is &lt;11.4.5-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153259" version="1" comment="harfbuzz-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040817"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050760" version="1" comment="harfbuzz-tools is &lt;11.4.5-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153260" version="1" comment="harfbuzz-tools is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040818"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050761" version="1" comment="libharfbuzz-cairo0 is &lt;11.4.5-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039428" version="1" comment="libharfbuzz-cairo0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068570"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050027" version="1" comment="libharfbuzz-gobject0 is &lt;11.4.5-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704571" version="1" comment="libharfbuzz-gobject0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059146"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050762" version="1" comment="libharfbuzz-icu0 is &lt;11.4.5-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153261" version="1" comment="libharfbuzz-icu0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050763" version="1" comment="libharfbuzz-subset0 is &lt;11.4.5-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704573" version="1" comment="libharfbuzz-subset0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059147"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050028" version="1" comment="libharfbuzz0 is &lt;11.4.5-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153263" version="1" comment="libharfbuzz0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040821"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050029" version="1" comment="typelib-1_0-HarfBuzz-0_0 is &lt;11.4.5-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248988"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009704575" version="1" comment="typelib-1_0-HarfBuzz-0_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059148"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039686" version="1" comment="libpng16-16 is &lt;1.6.44-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039687" version="1" comment="libpng16-16-x86-64-v3 is &lt;1.6.44-160000.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039688" version="1" comment="libpng16-compat-devel is &lt;1.6.44-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039689" version="1" comment="libpng16-compat-devel-x86-64-v3 is &lt;1.6.44-160000.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039690" version="1" comment="libpng16-devel is &lt;1.6.44-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039691" version="1" comment="libpng16-devel-x86-64-v3 is &lt;1.6.44-160000.4.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039692" version="1" comment="libpng16-tools is &lt;1.6.44-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039704" version="1" comment="python313-virtualenv is &lt;20.29.3-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039778" version="1" comment="python313-virtualenv is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071176"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047932" version="1" comment="ImageMagick is &lt;7.1.2.0-160000.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047933" version="1" comment="ImageMagick-config-7-SUSE is &lt;7.1.2.0-160000.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047934" version="1" comment="ImageMagick-config-7-upstream-limited is &lt;7.1.2.0-160000.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047935" version="1" comment="ImageMagick-config-7-upstream-open is &lt;7.1.2.0-160000.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047936" version="1" comment="ImageMagick-config-7-upstream-secure is &lt;7.1.2.0-160000.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047937" version="1" comment="ImageMagick-config-7-upstream-websafe is &lt;7.1.2.0-160000.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047938" version="1" comment="ImageMagick-devel is &lt;7.1.2.0-160000.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047939" version="1" comment="ImageMagick-doc is &lt;7.1.2.0-160000.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248498"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047940" version="1" comment="ImageMagick-extra is &lt;7.1.2.0-160000.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047941" version="1" comment="libMagick++-7_Q16HDRI5 is &lt;7.1.2.0-160000.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047942" version="1" comment="libMagick++-devel is &lt;7.1.2.0-160000.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047943" version="1" comment="libMagickCore-7_Q16HDRI10 is &lt;7.1.2.0-160000.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047944" version="1" comment="libMagickWand-7_Q16HDRI10 is &lt;7.1.2.0-160000.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047945" version="1" comment="perl-PerlMagick is &lt;7.1.2.0-160000.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248497"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041604" version="1" comment="hauler is &lt;1.4.1-bp160.1.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009069054"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247136"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044013" version="1" comment="openCryptoki is &lt;3.26.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857998" version="1" comment="openCryptoki is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035041"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044014" version="1" comment="openCryptoki-64bit is &lt;3.26.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009857999" version="1" comment="openCryptoki-64bit is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035040"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044015" version="1" comment="openCryptoki-devel is &lt;3.26.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247655"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009858000" version="1" comment="openCryptoki-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035042"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053509" version="1" comment="kernel-livepatch-5_14_21-150500_55_136-default is &gt;=3-150500.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071780"/>
		<state state_ref="oval:org.opensuse.security:ste:2009188866"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056202" version="1" comment="kernel-default is ==6.4.0-150600.23.87.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250286"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056203" version="1" comment="kernel-livepatch-6_4_0-150600_23_87-default is &gt;=2-150600.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071781"/>
		<state state_ref="oval:org.opensuse.security:ste:2009226091"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010056204" version="1" comment="kernel-default is &lt;6.4.0-150600.23.87.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009250287"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053510" version="1" comment="kernel-default is ==6.4.0-150700.53.31.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249780"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053511" version="1" comment="kernel-livepatch-6_4_0-150700_53_31-default is &gt;=2-150700.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072088"/>
		<state state_ref="oval:org.opensuse.security:ste:2009241462"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044385" version="1" comment="chromedriver is &lt;145.0.7632.75-bp160.1.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044386" version="1" comment="chromium is &lt;145.0.7632.75-bp160.1.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053251" version="1" comment="kernel-default is ==5.14.21-150400.24.194.1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249718"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053252" version="1" comment="kernel-livepatch-5_14_21-150400_24_194-default is &gt;=2-150400.2.1" check="none satisfy" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072068"/>
		<state state_ref="oval:org.opensuse.security:ste:2009170087"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053253" version="1" comment="kernel-default is &lt;5.14.21-150400.24.194.1" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030416"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249719"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039708" version="1" comment="python313-pyasn1 is &lt;0.6.1-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246760"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039779" version="1" comment="python313-pyasn1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039721" version="1" comment="python313-jaraco.context is &lt;5.3.0-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009246765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010039780" version="1" comment="python313-jaraco.context is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071625"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041562" version="1" comment="python313-wheel is &lt;0.45.1-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247126"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041646" version="1" comment="python313-wheel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071179"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047309" version="1" comment="assertj-core is &lt;3.27.7-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010040934" version="1" comment="assertj-core is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009067281"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047310" version="1" comment="assertj-core-javadoc is &lt;3.27.7-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248371"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047355" version="1" comment="assertj-core-javadoc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070679"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044579" version="1" comment="MozillaFirefox is &lt;140.7.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044580" version="1" comment="MozillaFirefox-branding-upstream is &lt;140.7.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044581" version="1" comment="MozillaFirefox-devel is &lt;140.7.1-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247812"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044582" version="1" comment="MozillaFirefox-translations-common is &lt;140.7.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044583" version="1" comment="MozillaFirefox-translations-other is &lt;140.7.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247811"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050733" version="1" comment="ImageMagick is &lt;7.1.2.0-160000.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030422"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050734" version="1" comment="ImageMagick-config-7-SUSE is &lt;7.1.2.0-160000.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047334"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050735" version="1" comment="ImageMagick-config-7-upstream-limited is &lt;7.1.2.0-160000.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062884"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050736" version="1" comment="ImageMagick-config-7-upstream-open is &lt;7.1.2.0-160000.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062885"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050737" version="1" comment="ImageMagick-config-7-upstream-secure is &lt;7.1.2.0-160000.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062886"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050738" version="1" comment="ImageMagick-config-7-upstream-websafe is &lt;7.1.2.0-160000.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009062887"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050739" version="1" comment="ImageMagick-devel is &lt;7.1.2.0-160000.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030421"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050740" version="1" comment="ImageMagick-doc is &lt;7.1.2.0-160000.7.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035796"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249144"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050741" version="1" comment="ImageMagick-extra is &lt;7.1.2.0-160000.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031644"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050742" version="1" comment="libMagick++-7_Q16HDRI5 is &lt;7.1.2.0-160000.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052473"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050743" version="1" comment="libMagick++-devel is &lt;7.1.2.0-160000.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031645"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050744" version="1" comment="libMagickCore-7_Q16HDRI10 is &lt;7.1.2.0-160000.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052475"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050745" version="1" comment="libMagickWand-7_Q16HDRI10 is &lt;7.1.2.0-160000.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052477"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050746" version="1" comment="perl-PerlMagick is &lt;7.1.2.0-160000.7.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030834"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249143"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041343" version="1" comment="python313-python-multipart is &lt;0.0.20-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247079"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041647" version="1" comment="python313-python-multipart is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068765"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047318" version="1" comment="expat is &lt;2.7.1-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047319" version="1" comment="libexpat-devel is &lt;2.7.1-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047320" version="1" comment="libexpat1 is &lt;2.7.1-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248374"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041445" version="1" comment="dirmngr is &lt;2.5.5-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052233"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041446" version="1" comment="gpg2 is &lt;2.5.5-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041447" version="1" comment="gpg2-lang is &lt;2.5.5-160000.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033865"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247105"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010041448" version="1" comment="gpg2-tpm is &lt;2.5.5-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009060208"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247104"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044668" version="1" comment="openQA is &lt;5.1771422749.560a3b26-bp160.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017290" version="1" comment="openQA is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070587"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044669" version="1" comment="openQA-auto-update is &lt;5.1771422749.560a3b26-bp160.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017291" version="1" comment="openQA-auto-update is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070588"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044670" version="1" comment="openQA-bootstrap is &lt;5.1771422749.560a3b26-bp160.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017292" version="1" comment="openQA-bootstrap is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070589"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044671" version="1" comment="openQA-client is &lt;5.1771422749.560a3b26-bp160.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017293" version="1" comment="openQA-client is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070590"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044672" version="1" comment="openQA-common is &lt;5.1771422749.560a3b26-bp160.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017294" version="1" comment="openQA-common is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070591"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044673" version="1" comment="openQA-continuous-update is &lt;5.1771422749.560a3b26-bp160.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017295" version="1" comment="openQA-continuous-update is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070592"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044674" version="1" comment="openQA-devel is &lt;5.1771422749.560a3b26-bp160.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017296" version="1" comment="openQA-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044675" version="1" comment="openQA-doc is &lt;5.1771422749.560a3b26-bp160.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017297" version="1" comment="openQA-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070594"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044676" version="1" comment="openQA-local-db is &lt;5.1771422749.560a3b26-bp160.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017298" version="1" comment="openQA-local-db is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044677" version="1" comment="openQA-mcp is &lt;5.1771422749.560a3b26-bp160.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017299" version="1" comment="openQA-mcp is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070596"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044678" version="1" comment="openQA-munin is &lt;5.1771422749.560a3b26-bp160.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017300" version="1" comment="openQA-munin is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044679" version="1" comment="openQA-python-scripts is &lt;5.1771422749.560a3b26-bp160.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017301" version="1" comment="openQA-python-scripts is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070598"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044680" version="1" comment="openQA-single-instance is &lt;5.1771422749.560a3b26-bp160.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017302" version="1" comment="openQA-single-instance is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044681" version="1" comment="openQA-single-instance-nginx is &lt;5.1771422749.560a3b26-bp160.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017303" version="1" comment="openQA-single-instance-nginx is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070600"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044682" version="1" comment="openQA-worker is &lt;5.1771422749.560a3b26-bp160.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247837"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017304" version="1" comment="openQA-worker is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070601"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044683" version="1" comment="os-autoinst is &lt;5.1771353921.c8005c9-bp160.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017305" version="1" comment="os-autoinst is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070602"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044684" version="1" comment="os-autoinst-devel is &lt;5.1771353921.c8005c9-bp160.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017306" version="1" comment="os-autoinst-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070603"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044685" version="1" comment="os-autoinst-ipmi-deps is &lt;5.1771353921.c8005c9-bp160.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017307" version="1" comment="os-autoinst-ipmi-deps is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070604"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044686" version="1" comment="os-autoinst-openvswitch is &lt;5.1771353921.c8005c9-bp160.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017308" version="1" comment="os-autoinst-openvswitch is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044687" version="1" comment="os-autoinst-qemu-kvm is &lt;5.1771353921.c8005c9-bp160.1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017309" version="1" comment="os-autoinst-qemu-kvm is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070606"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044688" version="1" comment="os-autoinst-qemu-x86 is &lt;5.1771353921.c8005c9-bp160.1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247839"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017310" version="1" comment="os-autoinst-qemu-x86 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070607"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044689" version="1" comment="os-autoinst-s390-deps is &lt;5.1771353921.c8005c9-bp160.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017311" version="1" comment="os-autoinst-s390-deps is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044690" version="1" comment="os-autoinst-swtpm is &lt;5.1771353921.c8005c9-bp160.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247838"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010017312" version="1" comment="os-autoinst-swtpm is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049133" version="1" comment="python313-Django is &lt;5.2.4-bp160.6.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068845"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248772"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048423" version="1" comment="go1.26 is &lt;1.26.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048372" version="1" comment="go1.26 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071859"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048424" version="1" comment="go1.26-doc is &lt;1.26.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048373" version="1" comment="go1.26-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071860"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048425" version="1" comment="go1.26-libstd is &lt;1.26.1-160000.1.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248602"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048467" version="1" comment="go1.26-libstd is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071875"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048426" version="1" comment="go1.26-race is &lt;1.26.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248601"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048374" version="1" comment="go1.26-race is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071861"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050011" version="1" comment="python313-maturin is &lt;1.8.7-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070574"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248976"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050171" version="1" comment="snpguest is &lt;0.10.0-160000.1.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249017"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010020071" version="1" comment="snpguest is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066617"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047569" version="1" comment="virtiofsd is &lt;1.12.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248443"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047298" version="1" comment="virtiofsd is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044384" version="1" comment="wicked2nm is &lt;1.4.1-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044388" version="1" comment="wicked2nm is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070315"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052596" version="1" comment="GraphicsMagick is &lt;1.3.45-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152591" version="1" comment="GraphicsMagick is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031413"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052597" version="1" comment="GraphicsMagick-devel is &lt;1.3.45-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151256" version="1" comment="GraphicsMagick-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031412"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052598" version="1" comment="libGraphicsMagick++-Q16-12 is &lt;1.3.45-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154127" version="1" comment="libGraphicsMagick++-Q16-12 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041128"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052599" version="1" comment="libGraphicsMagick++-devel is &lt;1.3.45-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152594" version="1" comment="libGraphicsMagick++-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031414"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052600" version="1" comment="libGraphicsMagick-Q16-3 is &lt;1.3.45-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151257" version="1" comment="libGraphicsMagick-Q16-3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040440"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052601" version="1" comment="libGraphicsMagick3-config is &lt;1.3.45-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151258" version="1" comment="libGraphicsMagick3-config is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040441"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052602" version="1" comment="libGraphicsMagickWand-Q16-2 is &lt;1.3.45-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151259" version="1" comment="libGraphicsMagickWand-Q16-2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040442"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052603" version="1" comment="perl-GraphicsMagick is &lt;1.3.45-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249576"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152600" version="1" comment="perl-GraphicsMagick is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052809" version="1" comment="python313-Pillow is &lt;11.3.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052814" version="1" comment="python313-Pillow is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068948"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052810" version="1" comment="python313-Pillow-tk is &lt;11.3.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249623"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052815" version="1" comment="python313-Pillow-tk is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068949"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010046321" version="1" comment="haproxy is &lt;3.2.12+git0.6011f448e-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038990"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248172"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050187" version="1" comment="busybox is &lt;1.37.0-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038761"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050188" version="1" comment="busybox-static is &lt;1.37.0-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038760"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249023"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050189" version="1" comment="busybox-warewulf3 is &lt;1.37.0-160000.5.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009059209"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249024"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044610" version="1" comment="chromedriver is &lt;145.0.7632.109-bp160.1.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010044611" version="1" comment="chromium is &lt;145.0.7632.109-bp160.1.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009247817"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053368" version="1" comment="cockpit-packages is &lt;4-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071217"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249754"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053188" version="1" comment="cockpit-repos is &lt;4.7-160000.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071218"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249710"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051784" version="1" comment="libnghttp2-14 is &lt;1.64.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153583" version="1" comment="libnghttp2-14 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040283"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051785" version="1" comment="libnghttp2-devel is &lt;1.64.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153584" version="1" comment="libnghttp2-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040284"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051786" version="1" comment="nghttp2 is &lt;1.64.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249414"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153587" version="1" comment="nghttp2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040287"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051875" version="1" comment="python313-pyOpenSSL is &lt;25.0.0-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249427"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051937" version="1" comment="python313-pyOpenSSL is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071162"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049114" version="1" comment="MozillaFirefox is &lt;140.8.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030476"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049115" version="1" comment="MozillaFirefox-branding-upstream is &lt;140.8.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033129"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049116" version="1" comment="MozillaFirefox-devel is &lt;140.8.0-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034520"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248766"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049117" version="1" comment="MozillaFirefox-translations-common is &lt;140.8.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033498"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049118" version="1" comment="MozillaFirefox-translations-other is &lt;140.8.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033499"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248765"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052265" version="1" comment="libIex-3_2-31 is &lt;3.2.2-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066237"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052266" version="1" comment="libIex-3_2-31-x86-64-v3 is &lt;3.2.2-160000.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071047"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052267" version="1" comment="libIlmThread-3_2-31 is &lt;3.2.2-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066238"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052268" version="1" comment="libIlmThread-3_2-31-x86-64-v3 is &lt;3.2.2-160000.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052269" version="1" comment="libOpenEXR-3_2-31 is &lt;3.2.2-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066239"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052270" version="1" comment="libOpenEXR-3_2-31-x86-64-v3 is &lt;3.2.2-160000.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071049"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052271" version="1" comment="libOpenEXRCore-3_2-31 is &lt;3.2.2-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066240"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052272" version="1" comment="libOpenEXRCore-3_2-31-x86-64-v3 is &lt;3.2.2-160000.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071050"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052273" version="1" comment="libOpenEXRUtil-3_2-31 is &lt;3.2.2-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009066241"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052274" version="1" comment="libOpenEXRUtil-3_2-31-x86-64-v3 is &lt;3.2.2-160000.5.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071051"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249495"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052275" version="1" comment="openexr is &lt;3.2.2-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041114"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052588" version="1" comment="openexr-devel is &lt;3.2.2-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040996"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249494"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052276" version="1" comment="openexr-doc is &lt;3.2.2-160000.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042296"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249496"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047348" version="1" comment="python313-joserfc is &lt;1.1.0-bp160.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248383"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047356" version="1" comment="python313-joserfc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071843"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050214" version="1" comment="python313-Authlib is &lt;1.5.2-bp160.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070670"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249030"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052648" version="1" comment="gnome-online-accounts is &lt;3.58.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151805" version="1" comment="gnome-online-accounts is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035605"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052649" version="1" comment="gnome-online-accounts-devel is &lt;3.58.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151806" version="1" comment="gnome-online-accounts-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052650" version="1" comment="gnome-online-accounts-lang is &lt;3.58.0-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249586"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151807" version="1" comment="gnome-online-accounts-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035609"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052651" version="1" comment="gvfs is &lt;1.59.90-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245313" version="1" comment="gvfs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047121"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052652" version="1" comment="gvfs-backend-afc is &lt;1.59.90-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245315" version="1" comment="gvfs-backend-afc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047122"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052653" version="1" comment="gvfs-backend-goa is &lt;1.59.90-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049957" version="1" comment="gvfs-backend-goa is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071819"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052654" version="1" comment="gvfs-backend-gphoto is &lt;1.59.90-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052707" version="1" comment="gvfs-backend-gphoto is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071835"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052655" version="1" comment="gvfs-backend-samba is &lt;1.59.90-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245316" version="1" comment="gvfs-backend-samba is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047123"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052656" version="1" comment="gvfs-backends is &lt;1.59.90-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245317" version="1" comment="gvfs-backends is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047124"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052657" version="1" comment="gvfs-fuse is &lt;1.59.90-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249587"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245319" version="1" comment="gvfs-fuse is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047126"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052658" version="1" comment="gvfs-lang is &lt;1.59.90-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249588"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009245320" version="1" comment="gvfs-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047127"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052659" version="1" comment="libgoa-1_0-0 is &lt;3.58.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151808" version="1" comment="libgoa-1_0-0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035610"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052660" version="1" comment="libgoa-backend-1_0-2 is &lt;3.58.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052708" version="1" comment="libgoa-backend-1_0-2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071065"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052661" version="1" comment="typelib-1_0-Goa-1_0 is &lt;3.58.0-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249585"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151810" version="1" comment="typelib-1_0-Goa-1_0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035618"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048427" version="1" comment="python313-lxml_html_clean is &lt;0.4.2-bp160.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248603"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048468" version="1" comment="python313-lxml_html_clean is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071892"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049125" version="1" comment="ocaml is &lt;4.14.2-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153244" version="1" comment="ocaml is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040443"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049126" version="1" comment="ocaml-compiler-libs is &lt;4.14.2-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153245" version="1" comment="ocaml-compiler-libs is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040446"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049127" version="1" comment="ocaml-compiler-libs-devel is &lt;4.14.2-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153246" version="1" comment="ocaml-compiler-libs-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040447"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049128" version="1" comment="ocaml-ocamldoc is &lt;4.14.2-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153249" version="1" comment="ocaml-ocamldoc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040452"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049129" version="1" comment="ocaml-runtime is &lt;4.14.2-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153251" version="1" comment="ocaml-runtime is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040453"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049130" version="1" comment="ocaml-source is &lt;4.14.2-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248770"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009153252" version="1" comment="ocaml-source is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040454"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010048428" version="1" comment="python313-PyPDF2 is &lt;2.11.1-bp160.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248604"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053372" version="1" comment="libsystemd0 is &lt;257.13-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154102" version="1" comment="libsystemd0 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041083"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053373" version="1" comment="libudev1 is &lt;257.13-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151691" version="1" comment="libudev1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037378"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053374" version="1" comment="systemd is &lt;257.13-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151693" version="1" comment="systemd is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036874"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053375" version="1" comment="systemd-boot is &lt;257.13-160000.1.1 for aarch64,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249757"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999290" version="1" comment="systemd-boot is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063029"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053376" version="1" comment="systemd-container is &lt;257.13-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009239132" version="1" comment="systemd-container is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042704"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053377" version="1" comment="systemd-devel is &lt;257.13-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152582" version="1" comment="systemd-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036878"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053378" version="1" comment="systemd-doc is &lt;257.13-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625972" version="1" comment="systemd-doc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052197"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053379" version="1" comment="systemd-experimental is &lt;257.13-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725369" version="1" comment="systemd-experimental is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053380" version="1" comment="systemd-homed is &lt;257.13-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009999291" version="1" comment="systemd-homed is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063030"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053381" version="1" comment="systemd-journal-remote is &lt;257.13-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625973" version="1" comment="systemd-journal-remote is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052198"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053382" version="1" comment="systemd-lang is &lt;257.13-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249758"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009625974" version="1" comment="systemd-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052199"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053383" version="1" comment="systemd-networkd is &lt;257.13-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050657" version="1" comment="systemd-networkd is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064725"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053384" version="1" comment="systemd-portable is &lt;257.13-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725370" version="1" comment="systemd-portable is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053418"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053385" version="1" comment="systemd-resolved is &lt;257.13-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050658" version="1" comment="systemd-resolved is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063417"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053386" version="1" comment="systemd-testsuite is &lt;257.13-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009725371" version="1" comment="systemd-testsuite is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053419"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053387" version="1" comment="udev is &lt;257.13-160000.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249756"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009151699" version="1" comment="udev is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031048"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050723" version="1" comment="gstreamer-plugins-ugly is &lt;1.26.7-160000.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042509"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249140"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050724" version="1" comment="gstreamer-plugins-ugly-lang is &lt;1.26.7-160000.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042510"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249141"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051874" version="1" comment="python313-pyasn1 is &lt;0.6.1-160000.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071608"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249426"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049136" version="1" comment="python313-PyPDF2 is &lt;2.11.1-bp160.4.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248774"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051873" version="1" comment="python313-black is &lt;25.1.0-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249425"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051938" version="1" comment="python313-black is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071145"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050026" version="1" comment="python313-tornado6 is &lt;6.5-160000.4.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068714"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248987"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051999" version="1" comment="python313-PyJWT is &lt;2.12.1-160000.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249455"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052709" version="1" comment="python313-PyJWT is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009068749"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050215" version="1" comment="python313-simpleeval is &lt;0.9.13-bp160.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249031"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010050230" version="1" comment="python313-simpleeval is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071941"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049134" version="1" comment="krb5-appl-clients is &lt;1.0.3-bp160.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049140" version="1" comment="krb5-appl-clients is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034718"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049135" version="1" comment="krb5-appl-servers is &lt;1.0.3-bp160.2.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248773"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049141" version="1" comment="krb5-appl-servers is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009034719"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052633" version="1" comment="expat is &lt;2.7.1-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033464"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052634" version="1" comment="libexpat-devel is &lt;2.7.1-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033465"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052635" version="1" comment="libexpat1 is &lt;2.7.1-160000.5.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033468"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249582"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051914" version="1" comment="python313-PyPDF2 is &lt;2.11.1-bp160.5.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071811"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249437"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051913" version="1" comment="python313-dynaconf is &lt;3.2.5-bp160.2.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249436"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051939" version="1" comment="python313-dynaconf is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071972"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051896" version="1" comment="freeciv is &lt;3.2.4-bp160.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707661" version="1" comment="freeciv is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052847"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051897" version="1" comment="freeciv-gtk3 is &lt;3.2.4-bp160.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707662" version="1" comment="freeciv-gtk3 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052848"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051898" version="1" comment="freeciv-gtk4 is &lt;3.2.4-bp160.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051940" version="1" comment="freeciv-gtk4 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071962"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051899" version="1" comment="freeciv-lang is &lt;3.2.4-bp160.1.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249432"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707663" version="1" comment="freeciv-lang is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052849"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051900" version="1" comment="freeciv-qt is &lt;3.2.4-bp160.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009707664" version="1" comment="freeciv-qt is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009052850"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051901" version="1" comment="freeciv-sdl2 is &lt;3.2.4-bp160.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249431"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051941" version="1" comment="freeciv-sdl2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009071963"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053360" version="1" comment="libpng16-16 is &lt;1.6.44-160000.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037593"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053361" version="1" comment="libpng16-16-x86-64-v3 is &lt;1.6.44-160000.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064369"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053362" version="1" comment="libpng16-compat-devel is &lt;1.6.44-160000.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037595"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053363" version="1" comment="libpng16-compat-devel-x86-64-v3 is &lt;1.6.44-160000.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064370"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053364" version="1" comment="libpng16-devel is &lt;1.6.44-160000.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037597"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053365" version="1" comment="libpng16-devel-x86-64-v3 is &lt;1.6.44-160000.6.1 for x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009064371"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249752"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053366" version="1" comment="libpng16-tools is &lt;1.6.44-160000.6.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009037599"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249751"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053395" version="1" comment="libjavamapscript is &lt;8.6.1-bp160.1.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053405" version="1" comment="libjavamapscript is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053181"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053396" version="1" comment="libmapserver2 is &lt;8.6.1-bp160.1.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053406" version="1" comment="libmapserver2 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053182"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053397" version="1" comment="mapserver is &lt;8.6.1-bp160.1.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053407" version="1" comment="mapserver is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053183"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053398" version="1" comment="mapserver-devel is &lt;8.6.1-bp160.1.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053408" version="1" comment="mapserver-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053184"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053399" version="1" comment="perl-mapscript is &lt;8.6.1-bp160.1.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053409" version="1" comment="perl-mapscript is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009053185"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053400" version="1" comment="php-mapscriptng is &lt;8.6.1-bp160.1.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053410" version="1" comment="php-mapscriptng is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072035"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053401" version="1" comment="python313-mapserver is &lt;8.6.1-bp160.1.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249762"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053411" version="1" comment="python313-mapserver is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072037"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053351" version="1" comment="libXvnc-devel is &lt;1.15.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154213" version="1" comment="libXvnc-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041415"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053352" version="1" comment="libXvnc1 is &lt;1.15.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009154118" version="1" comment="libXvnc1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009041072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053353" version="1" comment="tigervnc is &lt;1.15.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152053" version="1" comment="tigervnc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009038273"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053354" version="1" comment="tigervnc-selinux is &lt;1.15.0-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053412" version="1" comment="tigervnc-selinux is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009063431"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053355" version="1" comment="tigervnc-x11vnc is &lt;1.15.0-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276534" version="1" comment="tigervnc-x11vnc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048517"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053356" version="1" comment="xorg-x11-Xvnc is &lt;1.15.0-160000.3.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249748"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009152054" version="1" comment="xorg-x11-Xvnc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009031301"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053357" version="1" comment="xorg-x11-Xvnc-java is &lt;1.15.0-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276535" version="1" comment="xorg-x11-Xvnc-java is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009048518"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053358" version="1" comment="xorg-x11-Xvnc-module is &lt;1.15.0-160000.3.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249750"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276536" version="1" comment="xorg-x11-Xvnc-module is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009047404"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053359" version="1" comment="xorg-x11-Xvnc-novnc is &lt;1.15.0-160000.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249749"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009276537" version="1" comment="xorg-x11-Xvnc-novnc is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009042682"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047676" version="1" comment="chromedriver is &lt;145.0.7632.159-bp160.1.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010047677" version="1" comment="chromium is &lt;145.0.7632.159-bp160.1.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248452"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049131" version="1" comment="chromedriver is &lt;146.0.7680.80-bp160.1.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010049132" version="1" comment="chromium is &lt;146.0.7680.80-bp160.1.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009248771"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052698" version="1" comment="tinyproxy is &lt;1.11.3-bp160.1.1 for aarch64,ppc64le,s390x,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249593"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2009860261" version="1" comment="tinyproxy is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009036250"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051904" version="1" comment="gimp is &lt;3.0.8-bp160.3.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030642"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051905" version="1" comment="gimp-devel is &lt;3.0.8-bp160.3.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009030654"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051906" version="1" comment="gimp-extension-goat-excercises is &lt;3.0.8-bp160.3.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070500"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051907" version="1" comment="gimp-lang is &lt;3.0.8-bp160.3.1 for noarch" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009033699"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249435"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051908" version="1" comment="gimp-plugin-aa is &lt;3.0.8-bp160.3.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009040552"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051909" version="1" comment="gimp-plugin-python3 is &lt;3.0.8-bp160.3.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070501"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051910" version="1" comment="gimp-vala is &lt;3.0.8-bp160.3.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070502"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051911" version="1" comment="libgimp-3_0-0 is &lt;3.0.8-bp160.3.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070503"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051912" version="1" comment="libgimpui-3_0-0 is &lt;3.0.8-bp160.3.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009070504"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249434"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051894" version="1" comment="chromedriver is &lt;146.0.7680.153-bp160.1.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051895" version="1" comment="chromium is &lt;146.0.7680.153-bp160.1.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249430"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051902" version="1" comment="chromedriver is &lt;146.0.7680.164-bp160.1.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010051903" version="1" comment="chromium is &lt;146.0.7680.164-bp160.1.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249433"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053402" version="1" comment="aws-c-event-stream-devel is &lt;0.4.2-bp160.2.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053413" version="1" comment="aws-c-event-stream-devel is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072072"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053403" version="1" comment="libaws-c-event-stream1 is &lt;0.4.2-bp160.2.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249763"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010053414" version="1" comment="libaws-c-event-stream1 is signed with openSUSE key" check="all" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009072073"/>
		<state state_ref="oval:org.opensuse.security:ste:2009051526"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052812" version="1" comment="chromedriver is &lt;146.0.7680.177-bp160.1.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035396"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249625"/>
	</rpminfo_test>
	<rpminfo_test id="oval:org.opensuse.security:tst:2010052813" version="1" comment="chromium is &lt;146.0.7680.177-bp160.1.1 for aarch64,ppc64le,x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<object object_ref="oval:org.opensuse.security:obj:2009035398"/>
		<state state_ref="oval:org.opensuse.security:ste:2009249625"/>
	</rpminfo_test>
</tests>
<objects>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-XML-Parser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openSUSE-release</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_38-44-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_39-47-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_43-52_6-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_44-52_10-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_44-52_18-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_48-52_27-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_49-11-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_51-52_31-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_51-52_34-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_51-52_39-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_51-60_20-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_51-60_25-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_53-60_30-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_57-60_35-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_59-60_41-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_59-60_45-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_32-33-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_36-38-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_21-69-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_21-81-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_21-84-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_21-90-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_38-93-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_62-60_62-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_62-60_64_8-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_67-60_64_18-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_67-60_64_21-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_103-6_33-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_103-6_38-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_82-6_3-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_82-6_6-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_82-6_9-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_92-6_18-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_92-6_30-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_49-92_11-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_49-92_14-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_59-92_17-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_59-92_20-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_59-92_24-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_74-92_29-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_74-92_32-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_74-92_35-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_74-92_38-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_90-92_45-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_40-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-120-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_7-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_41-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_26-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_114-94_11-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_114-94_14-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_103-92_53-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_103-92_56-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_90-92_50-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-23-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-25_3-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_67-60_64_24-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_69-60_64_29-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_69-60_64_32-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-3_12_69-60_64_35-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_73-5-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_120-94_17-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042385" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_126-94_22-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_19-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_24-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_29-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_32-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_37-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_45-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_48-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_51-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_12-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_17-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_20-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_22-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_27-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_32-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_35-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_38-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_47-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-195-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_10-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_15-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_18-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_21-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_29-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_34-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_37-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_4-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_40-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_7-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_131-94_29-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_132-94_33-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-25_13-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-25_6-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_138-94_39-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_140-94_42-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_143-94_47-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-25_16-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_155-94_50-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_156-94_57-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_156-94_61-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_156-94_64-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-25_19-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xkbcomp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xkbcomp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-94_41-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_3-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_6-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-25_28-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_162-94_69-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_162-94_72-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-25_22-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-25_25-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_68-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_71-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_74-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_77-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_80-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_83-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_66-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_69-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_72-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_75-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_78-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_13-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_16-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_14-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_17-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_175-94_79-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_176-94_88-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_178-94_91-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_4_180-94_97-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_54-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_52-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_57-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_60-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_55-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_58-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_63-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_65-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_23-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_26-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_29-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_32-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_37-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_41-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_46-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_51-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_54-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_45-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_48-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_51-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_56-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_61-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_64-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_67-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_72-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_75-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-22-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_12-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_15-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_9-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_24-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_29-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_34-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_37-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_43-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_60-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_63-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_83-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_86-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_49-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_52-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-57-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_57-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_78-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_46-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_66-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_53_4-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_71-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_74-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052174" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_77-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_89-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051674" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_92-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_61-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_64-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_67-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_102-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_105-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_88-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_93-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_96-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_99-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_103-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_106-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_110-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_113-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_116-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_121-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_124-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_127-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_130-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_88-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_91-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_98-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150000_150_89-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150000_150_92-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150000_150_95-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150000_150_98-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_83-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150_86-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_111-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_114-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_117-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_120-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_102-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_105-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_108-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_112-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_115-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_126-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_102-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_107-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_83-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_86-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_93-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_96-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_99-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_43-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_46-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_49-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_54-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_60-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059626" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_63-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_68-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_71-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_76-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_87-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-59_24-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-59_27-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-59_34-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-59_37-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-59_40-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_22-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_11-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_18-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_80-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052227" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_83-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-197_99-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_70-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_75-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052225" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-24_78-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-59_10-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-59_13-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-59_16-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-59_19-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-59_5-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pnpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pnpm-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pnpm-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pnpm-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_129-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_134-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_90-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_93-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_98-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_21-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_28-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_33-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>patch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_162-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_165-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_173-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_176-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_179-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_183-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_186-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_189-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_194-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_201-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_216-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_154-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_157-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_160-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_163-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_166-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_169-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_172-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_175-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_178-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_183-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_188-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_124-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_127-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_130-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_133-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_138-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_141-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_144-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_147-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_150-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_153-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_158-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_161-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_191-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_194-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_197-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_164-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_167-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_36-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_39-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_44-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_49-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_52-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_59-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_62-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_65-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_68-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_73-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_100-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064367" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_103-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_108-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_111-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_116-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_119-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_122-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_125-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_88-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_92-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_97-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_28-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_31-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_101-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_108-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_111-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_133-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_136-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_123-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060439" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_126-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150000_150_101-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150000_150_104-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_114-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_139-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_144-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_131-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_139-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_38-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_142-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_145-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_106-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_109-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_112-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_115-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_159-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_151-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_121-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_60-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_63-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_66-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_69-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_74-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_81-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_11-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_53-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_12-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_19-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_7-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_219-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_222-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_225-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_228-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_170-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_174-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_128-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_133-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_80-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_231-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_179-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_136-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_83-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_234-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_237-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_244-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_247-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_250-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_182-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_185-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_188-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_195-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_198-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068738" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_141-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_144-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_147-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_150-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_153-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_158-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_88-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_91-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_94-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_97-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_255-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_258-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_261-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_266-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_269-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_272-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_161-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_164-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_167-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_170-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_173-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_176-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_201-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_204-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_207-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_211-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_215-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_218-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_100-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_103-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_110-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_113-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_116-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_121-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cluster-md-kmp-64kb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cluster-md-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cluster-md-kmp-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dlm-kmp-64kb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dlm-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dlm-kmp-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-allwinner</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-altera</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-amazon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-amd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-amlogic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-apm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-apple</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-arm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-broadcom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-cavium</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-exynos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-freescale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-hisilicon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-lg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-marvell</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-mediatek</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-nvidia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-qcom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-renesas</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-rockchip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-socionext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-sprd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dtb-xilinx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gfs2-kmp-64kb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gfs2-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gfs2-kmp-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-64kb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-64kb-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-64kb-optional</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-optional</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-default-vdso</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-docs-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-kvmsmall</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-kvmsmall-vdso</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-macros</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-obs-build</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-obs-qa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt-optional</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-rt-vdso</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-source</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-source-vanilla</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-syms</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-zfcpdump</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kselftests-kmp-64kb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kselftests-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kselftests-kmp-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocfs2-kmp-64kb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocfs2-kmp-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocfs2-kmp-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_275-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_179-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_124-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_221-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_280-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_283-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_290-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_184-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_187-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_127-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_130-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_133-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_41-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_147-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_15_11-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_46-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_55-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_117-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_134-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_150-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_153-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_156-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_137-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_142-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_145-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_148-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150300_59_118-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_120-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_157-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_148-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_151-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_154-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_160-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_165-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-4_12_14-150100_197_168-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cJSON-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcjson1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-95_125-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenjp2-7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenjp2-7-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openjpeg2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openjpeg2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openjpeg2-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freerdp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freerdp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freerdp-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freerdp-proxy-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freerdp-sdl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freerdp-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freerdp-wayland</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreerdp-server-proxy3-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreerdp3-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librdtk0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libuwac0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwinpr3-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rdtk0-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>uwac0-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>winpr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tcpreplay</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>WebKitGTK-4.0-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>WebKitGTK-4.1-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>WebKitGTK-6.0-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjavascriptcoregtk-4_0-18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjavascriptcoregtk-4_1-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjavascriptcoregtk-6_0-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkit2gtk-4_0-37</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkit2gtk-4_1-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwebkitgtk-6_0-4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-JavaScriptCore-4_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-JavaScriptCore-4_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-JavaScriptCore-6_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-WebKit-6_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-WebKit2-4_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-WebKit2-4_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-WebKit2WebExtension-4_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-WebKit2WebExtension-4_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-WebKitWebProcessExtension-6_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkit-jsc-4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkit-jsc-4.1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkit-jsc-6.0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkit2gtk-4_0-injected-bundles</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkit2gtk-4_1-injected-bundles</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkit2gtk3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkit2gtk3-minibrowser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkit2gtk3-soup2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkit2gtk3-soup2-minibrowser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkit2gtk4-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkit2gtk4-minibrowser</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>webkitgtk-6_0-injected-bundles</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cheat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_21-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_14-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_17-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_22-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_7-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_8-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_30-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_33-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_38-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_42-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_47-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_50-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_53-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_60-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_65-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_70-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_73-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150700_5-rt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150700_51-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150700_53_11-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150700_53_16-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150700_53_19-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150700_53_3-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150700_53_6-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kgraft-patch-4_12_14-122_293-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hauler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmosquitto1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmosquittopp1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mosquitto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mosquitto-clients</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mosquitto-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cloud-init</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cloud-init-config-suse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cloud-init-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cargo-c</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-loader-rsvg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg-2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librsvg-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsvg-convert</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rsvg-thumbnailer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Rsvg-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff-devel-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtiff6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tiff</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tiff-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>obs-scm-bridge</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>osc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freerdp2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freerdp2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freerdp2-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freerdp2-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfreerdp2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwinpr2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>winpr2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdcm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdcm-applications</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdcm-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdcm-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgdcm3_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsocketxx1_2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>orthanc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>orthanc-authorization</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>orthanc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>orthanc-dicomweb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>orthanc-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>orthanc-gdcm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>orthanc-indexer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>orthanc-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>orthanc-neuro</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>orthanc-postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>orthanc-python</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>orthanc-source</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>orthanc-stl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>orthanc-tcia</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>orthanc-wsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-gdcm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-pyorthanc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>exiv2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>exiv2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexiv2-28</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexiv2-28-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexiv2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ucode-intel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-cbor2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>containerized-data-importer-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>containerized-data-importer-cloner</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>containerized-data-importer-controller</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>containerized-data-importer-importer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>containerized-data-importer-manifests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>containerized-data-importer-operator</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>containerized-data-importer-uploadproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>containerized-data-importer-uploadserver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>obs-service-cdi_containers_meta</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>trivy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_3_18-150200_24_200-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_25-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubevirt-container-disk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubevirt-manifests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubevirt-pr-helper-conf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubevirt-sidecar-shim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubevirt-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubevirt-virt-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubevirt-virt-controller</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubevirt-virt-exportproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubevirt-virt-exportserver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubevirt-virt-handler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubevirt-virt-launcher</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubevirt-virt-operator</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubevirt-virt-synchronization-controller</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kubevirt-virtctl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>obs-service-kubevirt_containers_meta</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-bug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-bug-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-bug-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>git-bug-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>helmfile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>helmfile-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>helmfile-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>helmfile-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>htmldoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>coredns</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>coredns-extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-autoipd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-compat-howl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-compat-mDNSResponder-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>avahi-utils-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-client3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-common3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-core7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-glib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-glib1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-gobject-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-gobject0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-libevent1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-qt6-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-qt6-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavahi-ui-gtk3-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdns_sd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libhowl0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-avahi-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-avahi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Avahi-0_6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cluster-md-kmp-azure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047471" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dlm-kmp-azure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047472" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gfs2-kmp-azure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-azure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-azure-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-azure-optional</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-azure-vdso</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kselftests-kmp-azure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocfs2-kmp-azure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-arm64-efi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-arm64-efi-bls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-arm64-efi-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-arm64-efi-extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-i386-pc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-i386-pc-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-i386-pc-extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-powerpc-ieee1275</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-powerpc-ieee1275-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-powerpc-ieee1275-extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-s390x-emu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-s390x-emu-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-s390x-emu-extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-snapper-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-systemd-sleep-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-x86_64-efi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-x86_64-efi-bls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-x86_64-efi-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-x86_64-efi-extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-x86_64-xen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-x86_64-xen-debug</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>grub2-x86_64-xen-extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-aarch64-glibc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-ppc64le-glibc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-riscv64-glibc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-s390x-glibc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-gconv-modules-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-i18ndata</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-info</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-locale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-locale-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-profile</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glibc-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>binutils-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bpftool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bpftool-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-aarch64-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-arm-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-avr-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-bpf-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-epiphany-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-hppa-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-hppa64-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-i386-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-ia64-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-loongarch64-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-m68k-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-mips-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-ppc-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-ppc64-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-ppc64le-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-pru-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-riscv64-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-rx-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-s390-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-s390x-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-sparc-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-sparc64-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-spu-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-x86_64-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cross-xtensa-binutils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gprofng</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libctf-nobfd0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libctf0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>curl-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>curl-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcurl4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ctdb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ctdb-pcp-pmda</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ldb-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldb-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libldb2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-ldb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-ad-dc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059226" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-ad-dc-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-ceph</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059228" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-client-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-dcerpc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-dsdb-modules</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-gpupdate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-ldb-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-libs-python3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-python3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-tool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>samba-winbind-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-translations-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaFirefox-translations-other</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaThunderbird</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaThunderbird-openpgp-librnp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaThunderbird-translations-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>MozillaThunderbird-translations-other</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>keylime-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>keylime-firewalld</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>keylime-logrotate</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>keylime-registrar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>keylime-tenant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059257" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>keylime-tpm_cert_store</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059258" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>keylime-verifier</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-keylime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chromedriver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>chromium</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexslt0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxml2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libxslt1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-libxml2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-extension-goat-excercises</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-plugin-aa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-plugin-python3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gimp-vala</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgimp-3_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgimpui-3_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-3_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Soup-3_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>alloy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cosign</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cosign-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cosign-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cosign-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl-3-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl-3-fips-provider</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl-3-fips-provider-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopenssl3-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssl-3-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>haproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kea</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kea-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kea-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kea-hooks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-asiodns62</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-asiolink88</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-cc83</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-cfgrpt3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-config84</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-cryptolink64</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-d2srv63</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-database76</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-dhcp109</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-dhcp_ddns68</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-dhcpsrv131</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-dns71</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-eval84</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-exceptions45</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-hooks121</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-http87</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-log-interprocess3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-log75</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-mysql88</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-pgsql88</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-process91</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-stats53</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-tcp33</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-util-io12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-util102</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-kea</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-SLOF</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-accel-qtest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-arm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-audio-alsa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-audio-dbus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-audio-jack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-audio-oss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-audio-pa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-audio-pipewire</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-audio-spice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-block-curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-block-dmg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-block-iscsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-block-nfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-block-rbd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-block-ssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-chardev-baum</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-chardev-spice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-guest-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-hw-display-qxl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-hw-display-virtio-gpu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-hw-display-virtio-gpu-pci</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-hw-display-virtio-vga</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-hw-s390x-virtio-gpu-ccw</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-hw-usb-host</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051641" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-hw-usb-redirect</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-hw-usb-smartcard</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-img</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ipxe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ivshmem-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ksm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-linux-user</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-microvm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ppc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-pr-helper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-s390x</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-seabios</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-skiboot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-spice</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ui-curses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ui-dbus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ui-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ui-opengl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ui-spice-app</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-ui-spice-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-vgabios</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-vhost-user-gpu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-vmsr-helper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>qemu-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libunbound8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-unbound</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unbound</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unbound-anchor</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unbound-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>unbound-munin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython3_13-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython3_13-1_0-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpython3_13t1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-base-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-curses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-dbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-doc-devhelp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-idle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-nogil</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-nogil-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-nogil-curses</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-nogil-dbm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-nogil-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-nogil-idle</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-nogil-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-nogil-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-nogil-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071673" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libipa_hbac-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libipa_hbac0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnfsidmap-sss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042685" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_certmap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_certmap0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_idmap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_idmap0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_nss_idmap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsss_nss_idmap0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-ipa_hbac</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-sss-murmur</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-sss_nss_idmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-sssd-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-ad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-cifs-idmap-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-dbus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-ipa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-kcm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-krb5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-krb5-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sssd-winbind-idmap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwireshark18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwiretap15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwsutil16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark-ui-qt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-cpp2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-glib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037288" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-glib8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-qt5-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-qt5-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-qt6-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler-qt6-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpoppler148</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>poppler-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Poppler-0_18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcap-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcap-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpcap1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjxl-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjxl-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjxl0_11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjxl0_11-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libIex-3_2-31</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libIex-3_2-31-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libIlmThread-3_2-31</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libIlmThread-3_2-31-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libOpenEXR-3_2-31</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libOpenEXR-3_2-31-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libOpenEXRCore-3_2-31</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libOpenEXRCore-3_2-31-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libOpenEXRUtil-3_2-31</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libOpenEXRUtil-3_2-31-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openexr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openexr-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openexr-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-client-qemu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062409" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-config-network</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-config-nwfilter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-network</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-nodedev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-nwfilter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-qemu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-secret</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-disk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-iscsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-iscsi-direct</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-logical</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-mpath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-driver-storage-scsi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-hooks</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-lock</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-log</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-plugin-lockd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-daemon-qemu</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-nss</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvirt-ssh-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042635" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wireshark-plugin-libvirt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>golang-github-prometheus-prometheus</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libecpg6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpq5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030474" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030469" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030470" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-llvmjit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-llvmjit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-plperl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-plpython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-pltcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql13</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql13-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql13-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql13-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql13-llvmjit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql13-llvmjit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql13-pgaudit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql13-pgvector</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql13-plperl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql13-plpython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql13-pltcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql13-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql13-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050438" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql13-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql14</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql14-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql14-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql14-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql14-llvmjit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql14-llvmjit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql14-pgaudit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql14-pgvector</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql14-plperl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql14-plpython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql14-pltcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql14-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql14-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql14-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql15</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql15-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql15-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql15-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql15-llvmjit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql15-llvmjit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql15-pgaudit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql15-pgvector</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql15-plperl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql15-plpython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql15-pltcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql15-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql15-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql15-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql16-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql16-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql16-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql16-llvmjit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql16-llvmjit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql16-pgaudit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql16-pgvector</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql16-plperl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql16-plpython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql16-pltcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql16-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql16-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql16-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql17</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql17-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql17-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql17-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql17-llvmjit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql17-llvmjit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql17-pgaudit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql17-pgvector</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql17-plperl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql17-plpython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql17-pltcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql17-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql17-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql17-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql18</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql18-contrib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql18-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql18-devel-mini</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql18-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql18-llvmjit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql18-llvmjit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql18-pgaudit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql18-pgvector</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql18-plperl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql18-plpython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql18-pltcl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql18-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071357" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql18-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>postgresql18-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvpn</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvpn-auth-pam-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvpn-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openvpn-down-root-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1-6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libtasn1-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-uv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-uv-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-uv-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-uv-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-Django</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librnp0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rnp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053375" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rnp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-bridge</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-firewalld</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-kdump</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-machines</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-networkmanager</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-packagekit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-packages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-podman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-repos</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-selinux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-storaged</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-subscriptions</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-system</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-ws</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cockpit-ws-selinux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gio-branding-upstream</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-tests-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>glib2-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgio-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgirepository-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libglib-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgmodule-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgobject-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgthread-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GIRepository-3_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GLib-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GLibUnix-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GModule-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GObject-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Gio-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmariadbd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmariadbd19</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-bench</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-errormessages</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-galera</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-rpm-macros</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mariadb-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-salt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-salt-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-cloud</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-master</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-minion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-proxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040300" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-ssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-standalone-formulas-configuration</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-syndic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-transactional-update</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>salt-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-modules-bdbhpt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-modules-generic</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-modules-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-modules-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-modules-perl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-modules-sqlite3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bind-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-mod_php8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-bcmath</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-bz2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-calendar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-cli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-ctype</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-curl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-dba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-dom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-embed</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-enchant</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-exif</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-fastcgi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-ffi</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-fileinfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-fpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-fpm-apache</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-ftp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-gd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-gettext</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-gmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-iconv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-intl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-mbstring</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-odbc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-opcache</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-pcntl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-pdo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-phar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-posix</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-readline</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-shmop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-soap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-sockets</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-sodium</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-sysvmsg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-sysvsem</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-sysvshm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-test</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-tidy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-tokenizer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-xmlreader</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-xmlwriter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-xsl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-zip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php8-zlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup-2_4-1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsoup2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Soup-2_4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnutls</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls-devel-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutls30</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutlsxx-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgnutlsxx30</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>389-ds</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>389-ds-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>389-ds-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>lib389</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsvrcore0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fontforge</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fontforge-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fontforge-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071457" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsodium-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsodium26</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150500_55_136-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>podman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>podman-docker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>podman-remote</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066482" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>podmansh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tailscale</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tailscale-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tailscale-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tailscale-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>elemental-register</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>elemental-support</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>elemental-toolkit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go-sendxmpp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk-devel-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk-examples</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dpdk-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libdpdk-25</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmatio-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmatio13</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>matio-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng16-16</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng16-16-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng16-compat-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng16-compat-devel-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng16-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng16-devel-x86-64-v3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpng16-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>golang-github-teddysun-v2ray-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>golang-github-v2fly-v2ray-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>shadowsocks-v2ray-plugin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>v2ray-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dnsdist</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot24</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot24-backend-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot24-backend-pgsql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot24-backend-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot24-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot24-fts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot24-fts-flatcurve</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dovecot24-fts-solr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-stable</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-stable-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-stable-buildx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-stable-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-stable-rootless-extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-stable-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-rabbitmq-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rabbitmq-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rabbitmq-server-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rabbitmq-server-plugins</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rabbitmq-server-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mysql-connector-java</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>buildah</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>runc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_78-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150700_53_22-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_81-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150700_53_25-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-cc82</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-config83</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-dhcpsrv130</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-hooks119</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-process90</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libkea-util101</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvmtools-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libvmtools0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-vm-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-vm-tools-containerinfo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-vm-tools-desktop</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-vm-tools-salt-minion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>open-vm-tools-sdmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tar</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tar-backup-scripts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tar-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tar-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tar-rmt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tar-tests</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libprotobuf-lite28_3_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libprotobuf28_3_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libprotoc28_3_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libutf8_range-28_3_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>protobuf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>protobuf-java</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>protobuf-java-bom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>protobuf-java-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>protobuf-java-parent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-protobuf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>busybox</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>busybox-static</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>busybox-warewulf3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblasso-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>liblasso3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python3-lasso</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>redis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>valkey</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>valkey-compat-redis</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>valkey-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-tools-deprecated</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-tools-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.25</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.25-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.25-libstd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.25-race</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gitea-tea</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gitea-tea-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gitea-tea-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>helm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>helm-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>helm-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>helm-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kepler</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>sbctl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.24</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.24-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.24-libstd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.24-openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.24-openssl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.24-openssl-race</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.24-race</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.25-openssl</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.25-openssl-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.25-openssl-race</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071291" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>act</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>amazon-ssm-agent</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-compose</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-debugger</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-debugger-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-dialyzer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-dialyzer-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-diameter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-diameter-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-epmd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-et</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-et-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-jinterface</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-jinterface-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-observer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-observer-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-reltool</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-reltool-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-wx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009039876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>erlang-wx-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmozjs-128-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozjs128</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mozjs128-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk-jmods</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-17-openjdk-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openjdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openjdk-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openjdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openjdk-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openjdk-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openjdk-jmods</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-21-openjdk-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cpp-httplib-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcpp-httplib0_22</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-Brotli</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-aiohttp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>7zip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>exim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eximon</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>eximstats-html</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-data</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-data-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>vim-small</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xxd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-buildx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009050511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-fish-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-rootless-extras</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>docker-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>himmelblau</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>himmelblau-qr-greeter</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>himmelblau-sshd-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>himmelblau-sso</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnss_himmelblau2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>pam-himmelblau</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>corepack22</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs22</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs22-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nodejs22-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>npm22</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flake-pilot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flake-pilot-firecracker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flake-pilot-firecracker-dracut-netstart</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flake-pilot-firecracker-guestvm-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>flake-pilot-podman</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-devtools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-devtools-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-bad</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-bad-chromaprint</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-bad-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-bad-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-base</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-base-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041341" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-base-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041307" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-good</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-good-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-good-gtk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-good-jack</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-good-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-good-qtqml6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-libav</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-rs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-ugly</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-plugins-ugly-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-rtsp-server-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-transcoder</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-transcoder-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gstreamer-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>keylime-ima-policy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstadaptivedemux-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041342" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstallocators-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstanalytics-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstapp-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstaudio-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbadaudio-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstbasecamerabinsrc-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstcodecparsers-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstcodecs-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstcuda-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstdxva-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstfft-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstgl-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstinsertbin-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstisoff-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstmpegts-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstmse-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstpbutils-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstphotography-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstplay-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstplayer-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstreamer-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstriff-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstrtp-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041356" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstrtsp-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstrtspserver-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstsctp-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041358" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstsdp-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsttag-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsttranscoder-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041170" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgsturidownloader-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstva-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstvalidate-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstvideo-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstvulkan-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstwayland-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstwebrtc-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgstwebrtcnice-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rust-keylime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-CudaGst-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Gst-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstAllocators-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstAnalytics-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041365" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstApp-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041366" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstAudio-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstBadAudio-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstCodecs-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstCuda-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstDxva-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstGL-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstGLEGL-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstGLWayland-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstGLX11-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstInsertBin-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstMpegts-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstMse-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041368" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstPbutils-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstPlay-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstPlayer-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstRtp-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstRtsp-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstRtspServer-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstSdp-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstTag-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstTranscoder-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstVa-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstValidate-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstVideo-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstVulkan-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstVulkanWayland-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstVulkanXCB-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GstWebRTC-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>hawk2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-PyPDF2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-config-7-SUSE</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-config-7-upstream-limited</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-config-7-upstream-open</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-config-7-upstream-secure</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-config-7-upstream-websafe</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ImageMagick-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052473" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagick++-7_Q16HDRI5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagick++-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickCore-7_Q16HDRI10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libMagickWand-7_Q16HDRI10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-PerlMagick</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-admin-webapps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-docs-webapp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040305" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-el-3_0-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-embed</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040306" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-jsp-2_3-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-jsvc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-servlet-4_0-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat-webapps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat10-admin-webapps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat10-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat10-docs-webapp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat10-el-5_0-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat10-embed</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat10-jsp-3_1-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat10-jsvc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat10-lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat10-servlet-6_0-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat10-webapps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat11</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat11-admin-webapps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat11-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat11-docs-webapp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat11-el-6_0-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat11-embed</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat11-jsp-4_0-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat11-jsvc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat11-lib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat11-servlet-6_1-api</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tomcat11-webapps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-event</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-manual</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-prefork</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-utils</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>apache2-worker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fluidsynth</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009051505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fluidsynth-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libfluidsynth3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-h2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>warewulf4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>warewulf4-dracut</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>warewulf4-man</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>warewulf4-overlay</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069343" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>warewulf4-overlay-rke2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>warewulf4-overlay-slurm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>warewulf4-reference-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-ddk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>cups-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcups2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libcupsimage2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-maturin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>squid</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>expat</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexpat-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033468" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libexpat1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ongres-scram</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060256" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ongres-scram-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ongres-scram-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>micropython</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpremote</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mpy-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmicrohttpd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmicrohttpd12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071318" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>bash-git-prompt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-ldap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fetchmail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>fetchmailconf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009032625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-askpass-gnome</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-cavs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-clients</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-helpers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052255" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009062249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openssh-server-config-rootlogin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-query-loaders</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-thumbnailer</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgdk_pixbuf-2_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GdkPixbuf-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-GdkPixdata-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-Xvfb</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031302" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-extra</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-sdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-source</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058479" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-server-wrapper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058480" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xwayland</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009058481" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xwayland-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-fips</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-ipsec</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-mysql</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-nm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>strongswan-sqlite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-4-libavcodec-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046726" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-4-libavdevice-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-4-libavfilter-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046728" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-4-libavformat-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-4-libavresample-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046730" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-4-libavutil-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-4-libpostproc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046732" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-4-libswresample-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046733" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-4-libswscale-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009046734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-4-private-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavcodec58_134</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavdevice58_13</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavfilter7_110</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavformat58_76</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavresample4_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavutil56_70</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpostproc55_9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libswresample3_9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libswscale5_9</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-FontTools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-urllib3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009069967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-urllib3_1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rhino</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009061789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rhino-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rhino-engine</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071363" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rhino-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071364" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>rhino-runtime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-orjson</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-tornado6</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-filelock</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-Authlib</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_84-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150700_53_28-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gdk-pixbuf-loader-libheif</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libheif-aom</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libheif-dav1d</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libheif-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libheif-ffmpeg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libheif-jpeg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libheif-openjpeg</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libheif-rav1e</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libheif-svtenc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libheif1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>roundcubemail</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python-marshmallow-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-marshmallow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsnmp40</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>net-snmp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-SNMP</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-net-snmp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>snmp-mibs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-weasyprint</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpainter0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>librfxencode0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xrdp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xrdp-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>dirmngr</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009030602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpg2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009033865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpg2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gpg2-tpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libwget4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wget2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wget2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>osslsigncode</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mumble</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mumble-server</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-7-libavcodec-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-7-libavdevice-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-7-libavfilter-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-7-libavformat-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-7-libavutil-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-7-libpostproc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-7-libswresample-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ffmpeg-7-libswscale-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavcodec61</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavdevice61</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavfilter10</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavformat61</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libavutil59</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libpostproc58</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libswresample5</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libswscale8</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudisks2-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009049497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudisks2-0-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudisks2-0_btrfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudisks2-0_lsm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudisks2-0_lvm2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-UDisks-2_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udisks2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udisks2-bash-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udisks2-docs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udisks2-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udisks2-zsh-completion</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>autogen</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>autoopts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libopts25</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>jasper</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009060560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjasper7</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-pip</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-pip-wheel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-azure-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-25-openjdk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-25-openjdk-demo</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-25-openjdk-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-25-openjdk-headless</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-25-openjdk-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-25-openjdk-jmods</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>java-25-openjdk-src</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>harfbuzz-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>harfbuzz-tools</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libharfbuzz-cairo0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libharfbuzz-gobject0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libharfbuzz-icu0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libharfbuzz-subset0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libharfbuzz0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009059148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-HarfBuzz-0_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-virtualenv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openCryptoki</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openCryptoki-64bit</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openCryptoki-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150600_23_87-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-6_4_0-150700_53_31-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>kernel-livepatch-5_14_21-150400_24_194-default</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-pyasn1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-jaraco.context</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071179" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-wheel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009067281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>assertj-core</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>assertj-core-javadoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-python-multipart</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openQA</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openQA-auto-update</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openQA-bootstrap</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openQA-client</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openQA-common</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openQA-continuous-update</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openQA-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openQA-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openQA-local-db</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openQA-mcp</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openQA-munin</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openQA-python-scripts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openQA-single-instance</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openQA-single-instance-nginx</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>openQA-worker</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>os-autoinst</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>os-autoinst-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>os-autoinst-ipmi-deps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>os-autoinst-openvswitch</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>os-autoinst-qemu-kvm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>os-autoinst-qemu-x86</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>os-autoinst-s390-deps</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>os-autoinst-swtpm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.26</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.26-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.26-libstd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>go1.26-race</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>snpguest</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009066182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>virtiofsd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009070315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>wicked2nm</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>GraphicsMagick</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>GraphicsMagick-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libGraphicsMagick++-Q16-12</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libGraphicsMagick++-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040440" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libGraphicsMagick-Q16-3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040441" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libGraphicsMagick3-config</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libGraphicsMagickWand-Q16-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-GraphicsMagick</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-Pillow</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-Pillow-tk</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnghttp2-14</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libnghttp2-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>nghttp2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-pyOpenSSL</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-joserfc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-online-accounts</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-online-accounts-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gnome-online-accounts-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvfs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvfs-backend-afc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvfs-backend-goa</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvfs-backend-gphoto</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvfs-backend-samba</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvfs-backends</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvfs-fuse</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>gvfs-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgoa-1_0-0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libgoa-backend-1_0-2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009035618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>typelib-1_0-Goa-1_0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-lxml_html_clean</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-compiler-libs</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-compiler-libs-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-ocamldoc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-runtime</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009040454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>ocaml-source</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libsystemd0</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009037378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libudev1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-boot</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-container</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-doc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-experimental</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-homed</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-journal-remote</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009064725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-networkd</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-portable</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-resolved</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>systemd-testsuite</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>udev</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-black</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009068749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-PyJWT</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-simpleeval</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-appl-clients</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009034719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>krb5-appl-servers</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-dynaconf</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeciv</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeciv-gtk3</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeciv-gtk4</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeciv-lang</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009052850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeciv-qt</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009071963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>freeciv-sdl2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libjavamapscript</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libmapserver2</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mapserver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>mapserver-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009053185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>perl-mapscript</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>php-mapscriptng</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>python313-mapserver</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvnc-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009041072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libXvnc1</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009038273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tigervnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009063431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tigervnc-selinux</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tigervnc-x11vnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009031301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-Xvnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009048518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-Xvnc-java</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009047404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-Xvnc-module</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009042682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>xorg-x11-Xvnc-novnc</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009036250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>tinyproxy</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>aws-c-event-stream-devel</name>
	</rpminfo_object>
	<rpminfo_object id="oval:org.opensuse.security:obj:2009072073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
		<name>libaws-c-event-stream1</name>
	</rpminfo_object>
</objects>
<states>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.470.0-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <signature_keyid operation="equals">b88b2fd43dbdc284</signature_keyid>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243663" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <version operation="equals">16.0</version>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.38-44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.39-47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.43-52.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.44-52.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.44-52.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.48-52.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.49-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-14.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.51-52.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.51-52.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.51-52.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.51-60.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.51-60.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.53-60.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.57-60.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.59-60.41.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.59-60.45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.59-60.45.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.32-33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.32-33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.36-38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.36-38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-7.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-10.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009044800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.39-47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.43-52.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-5.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.49-11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009045676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.44-52.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.51-60.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009046552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.51-60.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-8.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-11.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.53-60.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.21-69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.21-81.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169775" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.21-84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.21-90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.38-93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009050993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.38-93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.57-60.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-17.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.59-60.41.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169779" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-20.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.62-60.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-5.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.62-60.62.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-9.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.62-60.64.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009047945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:3.12.62-60.64.8.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-23.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169786" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.67-60.64.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.21-81.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169787" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.67-60.64.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009048707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.21-84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169788" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.103-6.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169789" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169790" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.103-6.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169791" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.82-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169792" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169793" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.82-6.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169794" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169795" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.82-6.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169796" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.92-6.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169797" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.92-6.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.92-6.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-18.10.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169801" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.49-92.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169802" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.49-92.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169803" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.59-92.17.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169804" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.59-92.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169805" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.59-92.24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.74-92.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.74-92.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.74-92.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.74-92.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.74-92.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-18.13.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.74-92.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.82-6.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-21.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169820" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169821" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.59-92.20.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.90-92.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.90-92.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.92-6.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-120.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-21.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.59-92.24.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166504" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.82-6.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.114-94.11.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.114-94.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009049850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.21-69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.103-92.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.103-92.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.90-92.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009053337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.90-92.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-25.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-25.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-18.7.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.49-92.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.67-60.64.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169844" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.69-60.64.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169845" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-11.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.69-60.64.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169847" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:3.12.69-60.64.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009051455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.49-92.14.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.74-92.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169848" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.73-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169849" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-2.3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009052125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.73-5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169850" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169851" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.120-94.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.126-94.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-12.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.20.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169867" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.35.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169871" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169872" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-195.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169873" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-34.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169874" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169875" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169876" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169877" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.21.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169879" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169880" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.131-94.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169885" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.132-94.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169886" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-25.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169887" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-25.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-25.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169888" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.138-94.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.140-94.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.143-94.47.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-10.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-25.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-25.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.155-94.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.156-94.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.156-94.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.156-94.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-13.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-25.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.140-94.42.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-28.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-7.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.7-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-94.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-2.25.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-2.5-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-2.5-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-25.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-25.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.162-94.69.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.162-94.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.162-94.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-2.7.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-22.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-25.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-25.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-16.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166484" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166486" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166488" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.83.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166492" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.83.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166508" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166510" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.75.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-2.5-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-2.5-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169931" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-2.5-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169932" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-2.5-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169933" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-2.5-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166502" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169934" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.132-94.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169935" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-19.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169936" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-15.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009121033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-120.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169937" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169938" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-2.5-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169939" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-2.13.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.175-94.79.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.176-94.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.178-94.91.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.178-94.91.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-2.16.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-10.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111410" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-195.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.4.180-94.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.180-94.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-7.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-2.19.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-16.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169956" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169958" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169966" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-2.22.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-19.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-6.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-28.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-2.10.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.4.175-94.79.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.58.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-18.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.23.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.29.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.51.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.48.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.67.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.75.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170005" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.75.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170006" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-5.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170007" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170008" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.15.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170009" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170010" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170011" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.29.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170012" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170013" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.37.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.43.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-9.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-31.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.55.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-5.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.56.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.45.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009111923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-22.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.67.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-5.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.86.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170034" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.86.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.49.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170036" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170037" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-57.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009148129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-57.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170044" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-5.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170045" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170049" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-5.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170050" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.57.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170051" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.66.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.66.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-5.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166524" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.53.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166499" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.77.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.72.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.89.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.92.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.92.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-5.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.61.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.67.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.102.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.105.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167184" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167189" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167186" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.96.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.99.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.99.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.103.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.106.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167188" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.110.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167187" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167190" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.113.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.116.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167191" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.121.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.124.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.127.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.130.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166503" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166505" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.91.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.98.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166507" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.98.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150000.150.89.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150000.150.92.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150000.150.95.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150000.150.98.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150.86.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.86.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.111.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.114.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.117.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170077" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.120.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.102.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170078" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.105.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.108.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.108.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.112.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.115.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166567" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.126.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166566" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.102.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166568" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.107.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166594" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.83.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166536" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.86.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.96.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.99.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.99.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.43.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166610" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166611" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.54.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.60.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166596" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.71.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.76.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168229" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.87.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166556" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-59.24.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166608" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166558" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-59.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166559" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-59.34.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166561" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-59.37.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166563" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-59.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167221" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-59.40.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150400.4.12.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.18.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170157" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173046" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170158" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166500" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166501" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.75.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166521" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-197.99.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166523" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.99.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166529" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.75.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-24.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-59.10.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-59.13.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166552" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-59.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166554" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-59.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-59.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166565" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-59.5.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-5.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.32.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009168230" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166557" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166560" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166562" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.53.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245277" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.22.0-bp160.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.80.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.75.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.71.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-197.89.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.64.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-5.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-5.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-5.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170160" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170159" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166595" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150400.4.21.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172959" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170169" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.129.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172960" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.134.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166542" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009169303" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.90.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172961" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.98.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150200.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166555" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150400.4.3.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170605" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172962" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.33.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.33.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166487" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.96.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150200.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.96.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.91.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.86.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247654" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.6-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.162.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.165.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.173.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190537" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.176.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.179.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.183.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.186.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.189.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.194.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201675" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.201.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-8.10.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.216.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-8.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.216.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.154.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188192" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.157.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.160.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189889" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.163.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189890" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.166.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.169.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.172.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.175.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.178.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201678" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.183.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228903" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150200.5.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.188.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150200.5.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.188.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.124.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.127.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.130.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189892" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.133.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.138.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.141.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199830" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.144.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.147.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.150.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201681" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.153.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150300.7.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.158.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150300.7.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.158.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.161.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166553" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.161.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.191.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150200.5.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206781" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.194.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150200.5.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.197.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150200.5.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.197.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228904" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150300.7.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206783" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.164.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150300.7.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.167.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150300.7.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.167.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.191.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199854" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.36.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.39.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.44.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204843" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.49.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150500.11.8.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229948" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150500.11.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203284" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229949" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150500.11.10.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.62.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228852" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150500.11.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150500.11.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.73.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204841" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150500.11.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228906" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.73.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.100.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.103.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201683" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.108.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150400.9.8.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203280" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.111.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150400.9.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.116.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150400.9.8.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.119.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150400.9.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.122.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226739" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150400.9.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.125.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150400.9.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.92.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202840" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200519" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.68.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166485" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166509" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166520" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166522" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150200.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150200.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150200.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.93.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009161423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-150200.3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009166606" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:19-150200.3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-150200.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150400.4.15.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150400.4.9.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150000.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150000.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150000.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150000.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150000.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167204" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167205" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167154" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167208" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167155" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167156" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167209" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167210" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167211" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167212" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150300.3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167213" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167214" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167218" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167219" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009167222" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150400.4.6.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.101.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.98.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174881" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150400.4.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174882" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150000.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:19-150300.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.130.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.120.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.126.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150000.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.108.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.111.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.133.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.136.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.136.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173640" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.123.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173727" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.126.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009172963" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150000.150.101.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150000.150.104.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150400.4.24.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.114.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009173645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.139.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175690" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.144.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175691" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.144.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175731" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150100.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.131.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.139.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-24.107.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150400.7.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009171220" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150400.4.18.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009170607" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.21.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174883" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009174884" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.142.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150200.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.145.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.145.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.106.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.109.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.112.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.115.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.159.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.201.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.151.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.121.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188238" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188239" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.81.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199798" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206736" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.11.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150500.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.53.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203283" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150500.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188241" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.12.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202677" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202048" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201544" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199800" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188244" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178778" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225893" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150500.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150500.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150500.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150500.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150500.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.59.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204842" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150500.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205035" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150500.9.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182304" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.53.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.219.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.222.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228856" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.225.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.228.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231613" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.228.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.170.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228911" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.170.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.222.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.174.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229955" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.174.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231614" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.128.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.133.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.133.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.80.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231615" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.80.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230627" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.128.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-8.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-8.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205846" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-8.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204907" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-8.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229700" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.231.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243918" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.231.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150300.7.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150300.7.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.179.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201682" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150300.7.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.179.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009204914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150400.9.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203281" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150400.9.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.136.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.136.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009203215" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150500.11.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.83.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.234.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.237.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.244.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235346" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.247.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.250.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.250.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229714" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.182.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.185.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.188.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.195.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.198.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.198.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.141.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.144.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.147.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.150.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.153.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.158.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.158.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.91.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235348" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.94.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.97.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235345" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235347" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.247.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.195.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.150.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-150500.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150500.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150500.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150500.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150500.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.94.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.255.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.255.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240308" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240942" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.258.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241400" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.261.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241401" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.266.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.269.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243206" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.272.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243207" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.272.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:19-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.161.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.164.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241038" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.167.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241464" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.170.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.173.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.176.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.176.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243912" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:19-150300.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243913" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-150300.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243914" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150300.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243915" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150300.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240311" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.201.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243916" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150300.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.204.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.207.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243917" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150300.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241042" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.211.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.215.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.218.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243900" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.218.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243919" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243920" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243921" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243922" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-150400.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243923" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-150400.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243924" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150400.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243925" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150400.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243926" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150400.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243927" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150400.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243928" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150400.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243929" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150400.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150400.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240944" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.100.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150500.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.103.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240946" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.110.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243930" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150500.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240947" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.113.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.116.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150500.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243292" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.121.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243902" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150500.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-150500.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150500.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150500.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245858" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245859" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.8.1.160000.2.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245862" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245863" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245864" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.275.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246454" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.275.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.179.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.179.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.124.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.221.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245183" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.221.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.280.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248150" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.283.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248152" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.290.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248153" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.290.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248161" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.184.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248162" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.187.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.187.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150500.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248164" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.127.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.130.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248166" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.133.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248151" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.283.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.41.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177701" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.147.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.147.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177703" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.139.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177704" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150400.10.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177706" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177707" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177708" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177709" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177489" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177491" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206737" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.15.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178777" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150400.16.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.55.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177490" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188245" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.60.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009180976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.46.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150500.6.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.117.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.134.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.134.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177725" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.142.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150400.13.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178776" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.150.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.153.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.156.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184163" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.162.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177518" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.137.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.142.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.145.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.145.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.148.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184165" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.154.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150300.59.118.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.66.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150500.6.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177711" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150300.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.120.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.150.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.179.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150100.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190539" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.157.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190540" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.157.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206724" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.55.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009178744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.120.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.153.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.137.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.148.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009185167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.151.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.154.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.160.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.165.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-150100.197.168.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.168.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188865" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150500.9.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.148.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.156.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.142.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.148.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009184167" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150500.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188240" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.74.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189891" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.166.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.138.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.92.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150500.15.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.159.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009182111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.151.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.63.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.114.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009175693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.131.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009177723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248598" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.19-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.69.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-95.125.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009183297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-95.125.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188193" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.157.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189894" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150300.2.4-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189895" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150300.2.4-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150300.2.4-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150400.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189687" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150500.12.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188040" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.165.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009185168" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.151.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200620" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.81.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.173.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188896" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.154.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150500.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201295" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150500.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150500.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201297" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150500.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.183.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.169.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199832" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.141.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200516" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150500.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247629" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.3-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247630" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.3-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247631" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.3-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248597" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.22.0-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245282" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.5.2-bp160.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009188965" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.160.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.163.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009192120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.133.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200517" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201543" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150500.9.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150500.9.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246511" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.50.4-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246512" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.50.4-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190538" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.176.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009189897" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009190541" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150100.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.2-bp160.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.186.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150200.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199829" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.172.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199835" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.144.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201298" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150500.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199799" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150500.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.189.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199853" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.175.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200621" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.147.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.194.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009200618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.178.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201299" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.150.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.219.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206782" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.194.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206784" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.164.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.21.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227231" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150600.4.10.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225899" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.14.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229952" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150600.13.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225901" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.17.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227233" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150600.13.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150600.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150600.8.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225898" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150600.1.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009207379" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150600.3.3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150600.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150600.23.7.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235692" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-150500.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-150400.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240310" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-150600.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231624" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232954" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150600.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.42.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240478" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150600.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150600.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241033" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241407" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.60.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150600.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150600.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.73.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246456" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150600.23.73.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150700.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246408" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150700.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241458" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150700.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150700.3.24.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243290" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150700.53.11.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242828" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150700.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243293" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150700.53.16.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150700.53.19.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241462" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150700.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241461" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150700.53.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246634" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150700.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241466" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150700.53.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241467" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150700.53.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:4.12.14-122.293.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.293.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202047" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150500.12.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202870" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150500.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201680" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.183.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201688" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.153.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009199834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-150100.197.165.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245551" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.1-bp160.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009202676" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150500.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247836" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.0.23-bp160.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247083" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:25.1.3-160000.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246506" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.15-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.60.2-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249137" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.60.2-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.1-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7.1-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248650" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.4-bp160.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248651" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.0-bp160.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248382" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.7-bp160.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247325" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.24-bp160.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247326" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.10-bp160.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247327" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.3-bp160.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247328" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.10-bp160.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22-bp160.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8-bp160.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0-bp160.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247332" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2-bp160.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247333" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1-bp160.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247334" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0-bp160.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247335" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.0-bp160.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247336" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.2-bp160.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3-bp160.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247338" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3-bp160.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247339" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.22.1-bp160.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248442" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.1-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205344" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150500.9.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009205702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150500.12.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249148" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.28.8-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249411" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.28.8-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249149" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.28.8-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20260210-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245331" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.5-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241039" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.167.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240940" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-150600.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240905" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:19-150600.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009206953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150600.21.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150600.4.19.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248059" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.64.0-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.122.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150600.4.25.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230950" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150600.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.52.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009225712" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150600.3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150600.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009226744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.119.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228855" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150600.4.13.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150600.3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150600.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:20-150600.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229617" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.125.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241041" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.207.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245279" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.66.0-bp160.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:19-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235693" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-150500.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235734" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-150600.4.46.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235705" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150600.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-150600.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228857" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.225.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150600.4.31.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231910" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150600.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232953" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150600.4.34.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232951" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150600.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231616" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150600.4.28.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231618" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150600.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:19-150600.4.49.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240296" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-150600.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228908" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.3.18-150200.24.200.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201679" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150200.5.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009228909" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150200.24.200.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-150400.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:18-150500.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150600.4.40.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234720" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150600.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234609" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150600.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229713" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.234.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230569" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150600.4.22.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230570" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150600.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230571" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150600.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229717" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150600.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009230527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150600.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.0-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245361" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.1-bp160.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245362" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.1-bp160.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245995" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.9-bp160.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245996" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.9-bp160.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247639" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.23-bp160.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150600.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:20-150600.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241404" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150600.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241964" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:21-150600.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:17-150600.4.43.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150600.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150600.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234721" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150600.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235294" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150600.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235735" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150600.23.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:19-150300.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241403" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:19-150600.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150600.23.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229715" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.182.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229785" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.141.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201217" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150500.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234722" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150600.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235694" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150500.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237833" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:16-150600.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233406" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150600.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201684" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150400.9.8.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229716" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150600.4.16.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009227234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150600.13.6.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009229619" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150600.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.0-bp160.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.14.0-bp160.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246261" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246262" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150600.4.37.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233223" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150600.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.188.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.147.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235695" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.88.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240941" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:14-150600.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:19-2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.237.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242824" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150600.23.30.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009234723" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.185.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009233377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.144.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241043" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.211.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241465" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.170.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150600.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242572" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150600.23.33.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243967" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243968" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243969" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.6.1.160000.2.4</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231622" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150500.55.91.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240943" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.258.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240350" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.204.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.164.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248063" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248064" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248065" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248066" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248067" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.26.1.160000.2.7</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248068" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248069" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.26.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009237834" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150600.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009232987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.244.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009231973" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150600.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009201216" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150500.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245669" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235399" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.153.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150600.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009235428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150600.2.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.173.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247100" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.40-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247101" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.40-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245528" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.45-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245550" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.5.0-160000.2.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245530" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.45-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245531" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.45-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245532" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.45-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245533" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:2.45-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245534" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.45-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245195" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.14.1-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245196" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.14.1-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244970" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.22.5+git.431.dc5a539f124-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244971" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.22.5+git.431.dc5a539f124-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244972" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.22.5+git.431.dc5a539f124-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244981" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:140.5.0-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:140.5.0-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243974" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:140.3.0-bp160.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245549" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.13.0+40-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243664" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:141.0.7390.76-bp160.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248376" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.43-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248377" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.13.8-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248378" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.13.8-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.6-bp160.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.6-bp160.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247113" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.5-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247114" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.5-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.3-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249021" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.5-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249022" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.5-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247132" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.0-160000.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247133" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.0-160000.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247134" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.0-160000.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246396" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.0+git0.e134140d2-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249589" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.3-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249590" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.3-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245810" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.7-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.7-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.71.16.3_3_g3d33c746-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.7-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247108" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.1-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247109" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.1-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247813" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.13.12-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247814" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.13.12-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247815" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.13.12-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245993" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.9.5-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247131" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.13-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:140.4.0-bp160.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.43-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:141.0.7390.107-bp160.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249138" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:25.04.0-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246740" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.10.5-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243668" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:141.0.7390.122-bp160.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246746" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.13.11-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246747" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.13.11-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.13.11-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.6-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249018" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.6-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249019" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.2-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249020" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.2-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245525" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.2-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245526" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.2-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245527" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.2-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:142.0.7444.59-bp160.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.4.0-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.4.0-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247235" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.0-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249014" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:18.1-160000.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247087" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.23-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249584" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:13.23-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247088" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.3-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247089" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8.1-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248052" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:14.21-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248053" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:14.21-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247090" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.3-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248054" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:15.16-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248055" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:15.16-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247091" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.1-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247084" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.11-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247085" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.11-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247092" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.1-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247093" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.7-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247094" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:17.7-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247095" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.1-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247086" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:18.1-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249015" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18.1-160000.1.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247097" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:18.0-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245994" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:140.5.0-bp160.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247106" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.6.10-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.21.0-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244990" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:142.0.7444.162-bp160.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248450" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.18-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248451" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.18-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245535" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.4-bp160.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245278" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.18.1-bp160.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:354-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:354-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:346-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247319" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:117-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247809" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.1-160000.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.4-bp160.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246269" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.84.4-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.84.4-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245868" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.8.5-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245869" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.8.5-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249412" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3006.0-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3006.0-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.20.18-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.20.18-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246394" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.14.1-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246395" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.14.1-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246004" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:143.0.7499.146-bp160.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246822" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4.16-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246823" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.4.16-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246263" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:140.6.0-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246264" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:140.6.0-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:140.6.0-bp160.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:140.7.0-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:140.7.0-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249029" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:140.8.1-bp160.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245360" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:143.0.7499.40-bp160.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247181" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.8-bp160.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247182" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.8-bp160.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248644" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.74.3-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248645" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.74.3-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.10-160000.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.8.10-160000.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248646" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.8-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248647" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.8-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248648" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.81.16.3_3_g3d33c746-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248649" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0.8-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249416" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.6~git249.6688af9b2-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247696" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:20251009-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247697" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20251009-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248982" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.20-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242096" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150700.3.6.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241460" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150700.51.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242825" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150600.23.38.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241337" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150700.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241459" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:2-150700.3.3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249246" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150500.55.136.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009240312" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.201.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242831" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.161.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242826" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150600.23.42.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245197" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245198" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245199" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245200" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245201" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245202" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245203" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241405" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.261.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.3.18-150300.59.215.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243289" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150700.3.15.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242827" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150700.3.12.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248372" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.2-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248373" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.4.2-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247323" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.94.1-bp160.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247324" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.94.1-bp160.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247098" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.1-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247099" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.2-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.15.1-bp160.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150600.23.47.2</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150700.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245242" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150700.3.21.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247127" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.11.4-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247128" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:24.11.4-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.29-bp160.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.44-160000.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249016" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.44-160000.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245998" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.25.0-bp160.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245999" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.40.0-bp160.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246000" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.25.0-bp160.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246001" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.40.0-bp160.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249702" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.9.11-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245274" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.2-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248767" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.0.9_ce-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248768" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:24.0.9_ce-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248769" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.25.0-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.5-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.1.5-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248075" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:145.0.7632.116-bp160.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.3.0-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247110" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.2-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246745" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.39.5-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.3-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241463" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150700.53.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241945" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150700.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150700.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009241402" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.266.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150600.23.53.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242689" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:5-150700.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242309" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150700.3.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242578" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150700.3.9.2-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242579" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:4-150700.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243194" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150700.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:6-150700.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247564" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150700.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247656" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150700.3.27.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247657" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150700.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247957" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150700.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248176" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150700.3.30.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248177" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:11-150700.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249247" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:15-150600.2.3-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248866" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150700.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150700.3.33.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249248" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:12-150700.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150600.23.50.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242583" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150600.23.60.5</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009242515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:4.12.14-122.269.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243686" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150700.5.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150700.3.18.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243878" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150700.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243860" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150700.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243355" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150600.23.70.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243351" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150600.23.65.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245243" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150700.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:10-150600.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:9-150600.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:8-150600.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:7-150600.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243989" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150600.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243861" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:3-150700.4.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247118" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247119" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247120" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247121" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247122" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.9.1.160000.2.6</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247123" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247124" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247125" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.9.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.27.1.160000.2.8</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249424" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(s390x)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12.0-160000.27.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249612" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150700.3.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250301" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150700.3.36.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250285" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="greater than or equal">0:13-150700.2.1-0</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249249" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249252" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150600.23.78.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249352" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150700.53.22.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249250" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.81.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249251" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150600.23.81.3</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249353" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150700.53.25.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246413" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.20.15-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.20.15-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248599" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248600" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.1-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246513" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.0.5-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246514" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:13.0.5-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.35-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.35-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:28.3-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249027" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:28.3-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249028" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.28.3-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.37.0-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.37.0-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245178" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.8.2-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245997" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.2.3-bp160.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.6-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246260" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.0.6-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245545" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.5-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245546" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.5-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246419" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.1-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248380" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.0-bp160.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248381" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.12.0-bp160.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248444" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.1-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.19.1-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247636" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.11.3-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.18-bp160.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246271" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.68.2-bp160.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245547" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.11-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245548" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.11-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247652" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.13-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247637" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.7-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245359" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.64-bp160.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248643" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.3.2299.0-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249573" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.33.1-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246417" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:27.1.3-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246418" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:27.1.3-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245349" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:128.14.0-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244983" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:25.04.0-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245316" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.17.0-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245317" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.17.0-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245314" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.0.9.0-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245315" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:21.0.9.0-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248369" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.22.0-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247632" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.0-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247633" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.11.16-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248058" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:25.01-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246003" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.98.2-bp160.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248985" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.0110-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248984" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.2.0110-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246421" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:28.5.1_ce-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246422" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:28.5.1_ce-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246423" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.29.0-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249591" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.8+git0.dec3693-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249592" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.8+git0.dec3693-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247698" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:22.22.0-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247699" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:22.22.0-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243661" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.22-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243662" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1.22-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248446" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.7-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248447" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.7-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248448" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.7-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248449" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.7+git0.6ab75814-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248764" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.2.8+116-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246386" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.0+git.1742310530.bfcd0e2c-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248453" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.1-bp160.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245665" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.2.0-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.2.0-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246397" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.111-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249577" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:10.1.52-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.13-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246392" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.63-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246393" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.63-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248173" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.3.5-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247076" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.0-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243666" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.4-bp160.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243667" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.6.4-bp160.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247234" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.4.16-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247259" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.7-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246387" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.18-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246388" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.7.18-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247806" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:28.5.1_ce-160000.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247807" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:28.5.1_ce-160000.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247808" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.29.0-160000.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245275" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.23+git.0.9776141-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245276" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.23+git.0.9776141-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246389" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.12-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249574" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:140.9.0-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249575" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:140.9.0-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244980" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.1-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244060" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.0-bp160.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.0-bp160.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009243975" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.4-bp160.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246266" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.1-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247729" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.0-160000.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246002" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1-bp160.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246743" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.12-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246744" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.12-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246755" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.6-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.6-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247653" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.24.13-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247638" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.25.7-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249429" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.4.4-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249493" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.5.2-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245313" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:10.0p2-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.42.12-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.42.12-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247475" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.1.15-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245270" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:24.1.6-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245329" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.1-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245330" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:6.0.1-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245991" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3006.0-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245992" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3006.0-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246445" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.4.5-bp160.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244977" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.2-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.2-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009244979" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.2-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246267" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.44-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246268" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.44-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247322" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.69.0-bp160.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247070" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:12.1-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247071" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.2.0-160000.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247072" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.2.0-160000.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.53.1-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247082" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.0-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248057" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.20-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248370" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.7.15.1-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246420" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.22.0-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248642" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:9.0.115-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249415" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:11.0.18-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249145" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.10.15-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246265" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.5-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249753" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.6.5-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247117" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.18.0-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247816" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.2-bp160.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246818" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246819" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.8-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249253" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249254" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150600.23.84.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249354" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150700.53.28.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246741" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.7-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246742" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.19.7-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248384" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.13-bp160.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.20.2-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248978" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.9.4-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246515" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:65.1-bp160.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247180" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.26-bp160.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246390" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.5-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246391" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.5-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246398" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.2.1-bp160.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249761" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.13-bp160.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249032" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.857-bp160.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249428" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.2-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247111" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.1-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247112" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.10.1-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248056" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.18.16-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247107" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.2.8-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245670" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.0-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245671" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.0-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009245672" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.5.0-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246272" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:143.0.7499.192-bp160.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:144.0.7559.59-bp160.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247129" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.84.4-160000.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247130" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.84.4-160000.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247236" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.13.8-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247237" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.13.8-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:144.0.7559.96-bp160.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247135" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:144.0.7559.109-bp160.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247320" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.5-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247321" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.6.5-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247628" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:25.0.1-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249139" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.14.0+0-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248061" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.74.3-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248062" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.74.3-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247273" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:144.0.7559.132-bp160.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248986" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.14.1-160000.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249142" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:8.14.1-160000.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247476" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.1-bp160.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247477" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.1-bp160.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249146" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:18.3-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249580" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:16.13-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249581" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:16.13-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249025" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.9-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249026" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:17.9-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249147" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:18.3-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248185" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.32.0-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246759" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.0-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247102" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.18.0-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247103" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:17.0.18.0-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247080" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:21.0.10.0-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247081" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:21.0.10.0-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247115" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:25.0.2.0-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247116" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:25.0.2.0-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248073" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.8-bp160.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248074" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.8-bp160.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248988" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.4.5-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.44-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.44-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:20.29.3-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248497" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.2.0-160000.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248498" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.2.0-160000.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247136" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.1-bp160.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247655" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.26.0-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250286" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150600.23.87.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009250287" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:6.4.0-150600.23.87.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249780" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:6.4.0-150700.53.31.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:145.0.7632.75-bp160.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249718" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="equals">0:5.14.21-150400.24.194.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249719" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <evr datatype="evr_string" operation="less than">0:5.14.21-150400.24.194.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246760" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.1-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009246765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.3.0-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247126" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.45.1-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248371" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.27.7-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247811" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:140.7.1-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247812" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:140.7.1-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249143" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.2.0-160000.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249144" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:7.1.2.0-160000.7.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247079" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.0.20-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248374" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247104" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.5-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247105" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.5.5-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247837" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1771422749.560a3b26-bp160.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247838" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1771353921.c8005c9-bp160.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247839" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:5.1771353921.c8005c9-bp160.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248772" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:5.2.4-bp160.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248601" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.1-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248602" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.1-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248976" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.8.7-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249017" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.10.0-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248443" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.12.0-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.4.1-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249576" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.3.45-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249623" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:11.3.0-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248172" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.12+git0.6011f448e-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249023" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.37.0-160000.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249024" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.37.0-160000.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009247817" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:145.0.7632.109-bp160.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249754" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249710" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:4.7-160000.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249414" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.64.0-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249427" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:25.0.0-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248765" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:140.8.0-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248766" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:140.8.0-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249494" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.2-160000.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249495" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.2-160000.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249496" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.2-160000.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248383" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.1.0-bp160.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249030" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.5.2-bp160.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249585" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.58.0-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249586" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.58.0-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249587" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.59.90-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249588" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.59.90-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248603" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.2-bp160.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248770" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:4.14.2-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248604" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.1-bp160.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249756" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:257.13-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249757" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:257.13-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249758" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:257.13-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249140" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.7-160000.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249141" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.26.7-160000.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249426" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.6.1-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248774" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.1-bp160.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249425" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:25.1.0-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248987" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:6.5-160000.4.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249455" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.12.1-160000.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249031" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:0.9.13-bp160.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248773" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.0.3-bp160.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249582" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:2.7.1-160000.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249437" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:2.11.1-bp160.5.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249436" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.5-bp160.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249431" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.4-bp160.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249432" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.2.4-bp160.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249751" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.44-160000.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249752" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.6.44-160000.6.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249762" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:8.6.1-bp160.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249748" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.0-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249749" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.0-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249750" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.15.0-160000.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248452" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:145.0.7632.159-bp160.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009248771" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:146.0.7680.80-bp160.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249593" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|s390x|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:1.11.3-bp160.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249434" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.8-bp160.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249435" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(noarch)</arch>
   <evr datatype="evr_string" operation="less than">0:3.0.8-bp160.3.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249430" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:146.0.7680.153-bp160.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249433" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:146.0.7680.164-bp160.1.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249763" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:0.4.2-bp160.2.1</evr>
  </rpminfo_state>
  <rpminfo_state id="oval:org.opensuse.security:ste:2009249625" version="1" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
   <arch datatype="string" operation="pattern match">(aarch64|ppc64le|x86_64)</arch>
   <evr datatype="evr_string" operation="less than">0:146.0.7680.177-bp160.1.1</evr>
  </rpminfo_state>
</states>
</oval_definitions>
